Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal of Information Engineering University
1671-0673
2015 Issue 1
New Proof of Three-Valued Crosscorrelation Functions of m-Sequences
XU Li-ping;,HU Bin;,ZHOU Bian;
..............
page:1-4
Application Analysis of Quantum Error Correcting-Codes in Security Proving
LI Hong-xin;,GAO Ming;,MA Zhi;,MA Chuan-gui;
..............
page:5-14
Security Event Correlation Analysis Based on Plan Recognition
LIU Yu-nan;,XU Zhen;,WANG Ruo-qi;
..............
page:15-19
Zero Correlation Linear Cryptanalysis of Lightweight Block Cipher MIBS
LI Xu;,GUAN Jie;
..............
page:20-24
Method of TDOA Estimation Based on Timing Information Weighting
YAO Xiang-wen;,SHEN Zhi-xiang;,HU Yun-peng;,SHEN Cai-yao;
..............
page:25-29
Control-Flow Checking Optimization Method Based on Detection Performance Analysis
WEI Yan-kang;,WANG Da-ming;,CUI Wei-jia;
..............
page:30-34,40
Symbol Rate Estimation of MASK Modulated Signals
WANG Wei;,ZHANG Xiao-yi;,TENG Xiao-yun;,HU Yun-peng;
..............
page:35-40
Implementation of Correlative Interferometer Algorithm Based on GPU
WANG Yun-long;,WU Ying;
..............
page:41-45
Performance Analysis and Calibration Source Optimization in Differential Calibration Location Systems Using TDOA and FDOA Measurements
ZHANG Li;,WANG Ding;,YU Hong-yi;
..............
page:46-51
Blind Algorithm for Channel Order Estimation by Improved Channel Matrix Recursion Criterion
CUI Bo;,LIU Shi-gang;,WANG Jing;
..............
page:52-58
Conflicting Evidence Combination Based on the Applicable Condition of Dempster's Combination Rule
CUI Jia-wei;,LI Bing;,LI Bi-cheng;
..............
page:59-65
Investigation of Visual Decoding Based on Functional Magnetic Resonance Imaging
TONG Li;,WANG Li-jun;,ZHENG Zai-zhou;,YAN Bin;
..............
page:66-72
Automatic Modulation Classification Using Cumulant Features for Communications via Multipath Channels
DONG Xin;,OUYANG Xi;,YUAN Qiang;
..............
page:73-78
Blind Detection Method of FH Signals Based on Twice Gray-Level Morphological Filtering
GU Pei;,WANG Bin;
..............
page:79-83,128
PIT Searching Based on Bloom Filters
HUANG Hui-qun;,HE Min;,LAN Ju-long;
..............
page:84-89
Multi-Scale Local Community Detection Algorithm Based on Structure Similarity
CHEN Dong;,WANG Bo;,ZHOU Jie;,TANG Yong-wang;
..............
page:90-97,116
Cross-Block Data Transmission for Heterogeneous Multi-Core Processors
LI Yan-bing;,ZHAO Rong-cai;,DING Rui;,ZHAO Bo;
..............
page:98-106
xin xi gong cheng da xue xue bao zheng gao jian ze
..............
page:封3
General Multivariable Algorithm Framework Based on Software Buses
ZHAO Ju;,LI Qin-wei;,XU An-ying;,LI Zu-wei;
..............
page:107-110
Design and Implementation of a Sealed and Reconfigurable Network Security Testbed
LI Rui;,ZHU Jun-hu;,WANG Qing-xian;,ZHOU Tian-yang;
..............
page:111-116
Shellcode Detecting Method Based on Dynamic Behavior Mapping Models
HUA Chao;,TANG Li;,KANG Fei;
..............
page:117-122
Research and Design of Bit-Level Extraction Instruction for Stream Cipher
CHEN Tao;,MA Chao;,LUO Xing-guo;,LI Wei;,CHANG Zhong-xiang;
..............
page:123-128