Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Information Engineering University
1671-0673
2011 Issue 6
Vectorization for Scientific Computation Programs
WEI Shuai;WEI Ran;HOU Yong-sheng
..............page:759-763,768
Fast Blind Equalization Algorithm Based on Recursive Inverse Algorithm
XUE Jiang;PENG Hua;MA Jin-quan;WU Di
..............page:698-702
Equivalent Impulse Width of High Power Microwave Rising Edge
DENG Chao-ping;HOU De-ting;XIA Wei;WANG Li-ping
..............page:694-697
Analysis of Applying Wavelet Transformation to Thin Cloud and Mist Reduction of Remote Sensing Images
ZHOU Li-ya;QIN Zhi-yuan;YIN Xiao-long;SHANG Wei
..............page:708-712
Differential Fault Analysis Attacks of ECSM on Smart Cards
WENG Jiang;DOU Yun-qi;MA Chuan-gui
..............page:660-665
E2LSH-based Fast Specific Person Retrieval
ZHAO Yong-wei;LI Bi-cheng;GAO Hao-lin;LI Zhi-gang
..............page:703-707,723
Research and Realization of Quick Browsing of Real-Time Transport Streams Videos
LI Huang;LIU Zhen-zhong;TIAN Ya
..............page:754-758
Minimal Polynomial of σ-LFSR Sequences
HU Da-liang;ZENG Guang;HAN Wen-bao;LIU Wei
..............page:646-649,655
Formal Representation of BBS Data
GUO Zhi-gang;XI Yao-yi;LI Bi-cheng;XU Xu-yang
..............page:734-737,744
Genre Recognition Method of Web Pages Based on Integral Features
CHEN Han;ZHOU Jie;LI Bi-cheng
..............page:738-744
Radar Emitter Signal Recognition Based on Sub-Block Integral Cyclic Bispectrum
XIAO Le-qun;ZHAO Yong-jun;ZHU Jian-dong;ZHANG Kun-fan
..............page:729-733
Pattern Matching Performance Improvements Based on Parallel Computing
SUN Gao-chao;LI Xiang-he;HE Yao-bin
..............page:750-753
Searching Scheme for Cover of Suspicious Images
LIN Ze-bing;LIU Jiu-fen;CHEN Jia-yong;ZHANG Wei-ming
..............page:650-655
Frequent Closed Pattern Based Clustering Algorithm for Categorical Data
LIU Qing-bao;WANG Wan-jun;WANG De-xin
..............page:745-749
Improved Detection Method of Camera Tampering
JI Guan-xin;ZHOU Li-li;LI Kan
..............page:724-728,758
Joint Sources Number Detection and DOA Estimation Based on Signal Sparse Representation
XUE Hui-xiang;ZHAO Yong-jun;CHEN Jian-hong
..............page:713-718
Performance Analysis of Multi-Layer Joint Error Control Mechanism in Wireless Sensor Networks
WANG Xiao-mei;YAN Jun;CHI Li-tao;FAN Liang
..............page:683-688
Wireless Relay System Using Network Coding to Improve Physical Security
SHI Bin;JIN Liang;ZHONG Zhou;JI Jiang
..............page:689-693,697
Fuzzy Group Decision-Making Based on Multigranular Linguistic Preference
GUO Yong-hui;WANG Fu-ming;SUN Hai-chuan
..............page:666-669,688
Document Image Segmentation Based on Partial Differential Equations
ZHOU Lin;PING Xi-jian;TONG Li
..............page:719-723
New Threshold Proxy Signcryption Scheme without Trusted Party
ZHOU Meng-chuang;YU Zhao-ping;HUANG Li;XIE Xin
..............page:656-659
Kernel Integrity Verification of Windows 7
HAN Zhuo;RAN Xiao-min;LV Wen-gao
..............page:764-768