Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Information Engineering University
1671-0673
2010 Issue 2
Research and Implementation of Middleware Development Framework of Dependable Cryptographic Systems
tao jian ping ; cao guang yu ; zhang yong fu
..............page:243-247
Degenerate Property of Logical Functions over Finite Fields
zuo ji hong ; huang xiao ying ; zeng ben sheng
..............page:152-155
Blind Detection and Parameter Estimation Algorithm for OFDM Signals Based on Cyclic Prefix
cao peng ; peng hua ; dong yan kun ; wang bin
..............page:196-200,227
Ontology-Enabled Intelligent Geospatial Web Service Discovery
wang qiang ; wang jia yao ; jiang yan zuo
..............page:170-174
Design of a Distributed Asynchronous Transaction Model Based on JMS
wang cheng liang ; li li xin ; ye jian ; qin xiao long
..............page:234-238
Research on the Carry Distribution of Galois FCSR
wang zhong xiao ; qi wen feng
..............page:147-151
Review of Three-Dimensional Visualization Technology
huang hui ; lu li zhong ; zuo zuo ; chen jian
..............page:218-222,247
Recogniton among the Common Digital Signals Based on Statistical Parameters
huang yu mei ; wu zuo
..............page:201-205
On the BitSliced Implementation of ECC over GF(2m)
zhao long ; han wen bao
..............page:142-146,189
Analysis and Improvement of an ID-Based Key Agreement Protocol
cheng qing feng ; wang yong juan ; ma chuan gui
..............page:129-131,136
Study and Implementation on Distributed GIS Processing Service Sharing
huang rui yang ; guo jian zhong ; cheng yi ; deng jin chun
..............page:180-184
Research on Channel Capacity of UWB Communication Based on Interference Temperature
zhao liang ; jin liang ; zhong zhou
..............page:185-189
Modeling Two Cryptanalysis Problems with Markov Chains
wang fei ; li xin guo ; li zheng chao
..............page:156-159
Research on Data Management and Retrieval Service Based on Toponym Ontology
liang ru peng ; li shu xia ; li wen juan
..............page:175-179
Peak Detection Method of Hough Space Based on Improving Hierarchical Clustering Method
chen dong ; lin jian hu ; ma de bao
..............page:210-213
Approach to Constsucting a Component-Based Service-Oriented Information Integration Platform
yuan bo ; wang bin qiang ; qu jian
..............page:223-227
Boundedness of Maximal Operator for Multilinear Singular Integrals
chen zheng gang
..............page:137-141
Design and Implementation of Aspect-Oriented Telecommunication System Development Framework
fang yi qiu ; he lei ; ge jun wei
..............page:239-242
Security Analysis of Two Certificateless Signcryption Schemes
ge ai jun ; chen shao zhen
..............page:132-136
Equal-Cost-Multi-Path Routing Algorithm Based on Link Busyness Potential Value
tian ming ; lan ju long ; zhu xuan yong
..............page:190-195
Comparison of Point-Mass Model with Monolayer Density Model for Trajectory Disturbing Gravity Calculation
liu xiao gang ; zhao dong ming ; wu xing ; tian yan feng
..............page:160-165
Component Retrieval Algorithm Based on FI-BPNN
qu jian ; wang bin qiang ; zhang bo ; yuan bo
..............page:228-233
Research and Realization of Fast Parallel-Beam Reconstruction Algorithm in CT
ma chen xin ; jiang zuo ; zuo zuo
..............page:206-209
Grid-Based Coordinate Transformation Method
guo chong ; lv zhi ping ; li yan ; li guang hui
..............page:166-169