Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Information Engineering University
1671-0673
2010 Issue 1
Agents-Based Model of Privacy Certification Authority
li chao ling ; zhou yan zhou ; li li xin ; hu jia fu
..............page:113-117
gong gao
..............page:35
Trust Evaluating Model Based on Trade Amount in P2P E-Commerce
zhang xu ; gao cheng shi ; dai qing
..............page:93-98
Improved BD Precoding Algorithms for Multi-User MIMO Systems
zhu zuo ; wang li ; hu han ying
..............page:7-10
Research and Realization of Urban 3D Underground Pipeline Network Information System
xiong zi ming ; ge wen ; wu shao min ; dai hao
..............page:59-62
High Speed and Power Efficient Multi-Match Algocithm Based on Hardware
xia jun bo ; yang xu hua ; liu dong ; pang zhi bing
..............page:67-70,87
Research on JPEG2000 Error-Correction
ding zhi hong ; zhu wen wen ; liu li zhu
..............page:49-52
Research on the Weak Signal Phase Detection Method
xu min bin ; li jian xin ; yang tian chi
..............page:40-44
Research on Satellite Channel Parameter Tracking Method Based on Kalman Filtering
zuo guo feng ; ji zhong mei ; hu han ying ; liu luo zuo
..............page:1-6
FCI and Generalized ε-Correlation Immunity of Boolean Function
gao guang pu ; liu wen fen
..............page:99-103
On the Single-Valued Extension Property and Analyticity of Semigroups
shi jin e ; liu guang yan
..............page:121-123
Solution of Time Difference Positioning Solution Based on Short Baseline
li xiao peng ; zhang xiao yi ; wang xiao yan ; wu dong biao
..............page:27-30,44
Simulation Multi-Target Instruction Set and Implementation of Based on Plug-in Technology
song peng tao ; jiang lie hui ; xie yao bin ; wang jiu yu ; yu xian ; tian li
..............page:63-66
Functional Model Analysis of TCG Software Stack
wang zhen yu ; zuo zeng jie ; tian jia ; chen zuo ; yu xian
..............page:71-74
Hybrid Blind Equalization Algorithm for High-Order QAM Signals
wu di ; ge lin dong ; wang bin
..............page:45-48
Adaptive Acquisition Scheme for WCDMA Slot Synchronization
xin yong zuo ; wang da ming
..............page:17-20
Cryptanalysis of Two Three-Party Password-Based Authentication Key Exchange Protocols
hu xue xian ; liu wen fen
..............page:104-107,128
Quantitative Modeling and Analysis for End to End Communication Performance Evaluation of Mobile Ad Hoc Networks
guo hong ; lan ju long ; cheng dong nian ; liu luo zuo
..............page:11-16
Research on Mediated Identity-Based Signature
yang bin ; cao jin ke ; xiong xuan dong
..............page:108-112
Program Design of PLC Fuzzy Control
tan yan bin ; chen zuo ; zeng lei
..............page:79-82
Design and Implementation of LAN Data Security System Based on Trusted Network Connection
liu sheng li ; wang wen bing ; fei jin long ; zhu yue fei
..............page:83-87
Research on Strong Migration Algorithm of Enterprise Java Bean Components Based on JPDA
zhou zuo peng ; guo yuan bo ; liu wei ; xiao jian peng
..............page:75-78
New Role Hierarchy Model
ren zhi yu ; chen xing yuan ; zhang bin ; wang jun
..............page:88-92,98
Application of Multi-Classifier Fusion Method to Multi-Attribute Decision Making Based on Sugeno Fuzzy Integral
hou shuai ; han zhong geng ; huang jie ; yu jun jie
..............page:124-128
Research on WCDMA Signal Interpolation Algorithms in Timing Synchronization
li huai jin ; wang da ming ; ji zhong mei
..............page:21-26,35