Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Information Engineering University
1671-0673
2015 Issue 1
New Proof of Three-Valued Crosscorrelation Functions of m-Sequences
XU Li-ping;,HU Bin;,ZHOU Bian;
..............page:1-4
Application Analysis of Quantum Error Correcting-Codes in Security Proving
LI Hong-xin;,GAO Ming;,MA Zhi;,MA Chuan-gui;
..............page:5-14
Security Event Correlation Analysis Based on Plan Recognition
LIU Yu-nan;,XU Zhen;,WANG Ruo-qi;
..............page:15-19
Method of TDOA Estimation Based on Timing Information Weighting
YAO Xiang-wen;,SHEN Zhi-xiang;,HU Yun-peng;,SHEN Cai-yao;
..............page:25-29
Control-Flow Checking Optimization Method Based on Detection Performance Analysis
WEI Yan-kang;,WANG Da-ming;,CUI Wei-jia;
..............page:30-34,40
Symbol Rate Estimation of MASK Modulated Signals
WANG Wei;,ZHANG Xiao-yi;,TENG Xiao-yun;,HU Yun-peng;
..............page:35-40
Implementation of Correlative Interferometer Algorithm Based on GPU
WANG Yun-long;,WU Ying;
..............page:41-45
Investigation of Visual Decoding Based on Functional Magnetic Resonance Imaging
TONG Li;,WANG Li-jun;,ZHENG Zai-zhou;,YAN Bin;
..............page:66-72
PIT Searching Based on Bloom Filters
HUANG Hui-qun;,HE Min;,LAN Ju-long;
..............page:84-89
Multi-Scale Local Community Detection Algorithm Based on Structure Similarity
CHEN Dong;,WANG Bo;,ZHOU Jie;,TANG Yong-wang;
..............page:90-97,116
Cross-Block Data Transmission for Heterogeneous Multi-Core Processors
LI Yan-bing;,ZHAO Rong-cai;,DING Rui;,ZHAO Bo;
..............page:98-106
General Multivariable Algorithm Framework Based on Software Buses
ZHAO Ju;,LI Qin-wei;,XU An-ying;,LI Zu-wei;
..............page:107-110
Design and Implementation of a Sealed and Reconfigurable Network Security Testbed
LI Rui;,ZHU Jun-hu;,WANG Qing-xian;,ZHOU Tian-yang;
..............page:111-116
Shellcode Detecting Method Based on Dynamic Behavior Mapping Models
HUA Chao;,TANG Li;,KANG Fei;
..............page:117-122
Research and Design of Bit-Level Extraction Instruction for Stream Cipher
CHEN Tao;,MA Chao;,LUO Xing-guo;,LI Wei;,CHANG Zhong-xiang;
..............page:123-128