Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Information Engineering University
1671-0673
2007 Issue 2
Acquisition Techniques of Geographical Spatial Information from Satellite Imagery
LIN Li-xia;ZHOU Li-ya;YANG Xu-hua
..............page:254-256
Linear Approximating Method in the Transacting Process of Nonlinear Standardization of Data
WU Song-tao;HOU Feng-hua;DAI Feng
..............page:250-253
Evaluation System of Young Officers' Psychology Qualities Based on Grey System Theory
LIU Dan-feng;ZHAI Dong-kai;DAI Feng;CHEN Jing
..............page:242-245
Dynamic System Modeling and Closed-Loop Control of Switching Power Converter
LIU Xiao-bao;SHI Yu-jie;LIANG Ning-ning
..............page:238-241
Research and Application of XML Technology in Distributed Network Management System
ZHANG De-wen;XU Meng-chun;DU Xiao-ning
..............page:231-234
Job Scheduling Algorithm Based on Workflow in Cluster Environment
CHEN Lan;HUANG Yong-zhong;CHEN Hai-yong;LI Yong-cai
..............page:227-230
Dynamic Rootkit Detection Methodology Based on Branch Instruction Analysis
RUAN Wen-bo;ZHANG Chang-he;LIU Sheng-li
..............page:221-226
Research on Key Mechanism of Trusted Computing Platform
XIAO Xi;HAN Jun;WANG Lun-wei
..............page:217-220,226
Multiset Rewriting and Spi Calculus Method for Analyzing Security Protocols
WANG Quan-lai;WANG Ya-di;HAN Ji-hong
..............page:165-170,187
Analysis of Security Protocols Based on Probabilistic Observational Equivalence
ZHANG Feng;XIONG Xuan-dong;JIA Xue-dong
..............page:161-164
Pixel Unexpanded MSM Visual Cryptography Scheme
YU Bin;WANG Cui
..............page:156-160
Improved ARCE Method Based on Double k Type Ridge Estimator
HAN Song-hui;GUI Qing-ming;DU Yuan-lu
..............page:151-155
Efficient Group Rekeying Scheme for Ad hoc Networks
HE Bin;WANG Zi-long;GAO Feng-xiu
..............page:147-150
Subjective Trust Model Based on Assurance in Open Networks
gao cheng-shi; gao cheng shi ; fu jiang liu ; shen chang xiang ; liu yi
..............page:142-146
Study of the Algebra Properties for the Camellia S-Box
SUN Wei;HAN Wen-bao
..............page:138-141,164
Generic ID-Based Signature Schemes and Forking Lemma
ZHOU Jin;ZHANG Ya-juan;ZHU Yue-fei
..............page:129-133
Three-Party Key Distribution in UC Framework
CHANG Ting-mao;ZHU Yue-fei;ZHOU Jin;ZHANG Ya-juan
..............page:134-137,155
Automatically Extracting Images of JPEG Format from PDF Documents
CHEN Yun-rong;LIU Li-zhu;YE Han
..............page:213-216
Study of Efficient Structure Based on CIC Filter
YU Lei;JIANG Hua
..............page:210-212,216
Spatial-Temporal Segmentation Algorithm Based on Edge Detection for Video Object Segmentation
WANG Xin-wei;ZHOU Li-li;CHEN Gang;GUO Ge
..............page:206-209
Simulation Model of Independent Multipath Rayleigh Fading Channels
WANG Yang;GE Lin-dong
..............page:202-205
Test Evaluation of an Improved S-MAC Protocol for WSN
SHEN Zheng;YU Hong-yi;LIU A-na
..............page:191-194,197
New Substructure for Microstrip Equalizer and Its Application
LU Da-long;ZHAO Wei-na;ZHANG Yi;ZHOU Dong-fang
..............page:188-190
Hairpin Resonator Applied to Microstrip Equalizer
ZHAO Wei-na;LU Da-long;NIU Zhong-xia;ZHOU Dong-fang
..............page:185-187
Keyhole Effect and Its Impact on the Capacity of Multiple Input Multiple Output Channels
WANG Chao;ZHU Yi-jun;WANG Ying-min
..............page:182-184
Analysis of Relay Channel Characteristics under Influence of Space Diversity
LI Yang;BAI Gui-fang;FENG Wen-tao
..............page:179-181,190
Research of Adaptive Equalization Algorithms for HF Burst-Mode Communication
ZHANG Hong-li;YU Hong-yi;WU Shao-min
..............page:175-178