Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Beijing University of Posts and Telecommunications
1007-5321
2003 Issue z1
The Research of Covert Channels Based on TCP/IP
xu jie feng
..............page:144-150
Security Analysis of VPN
liu ya kun ; yang ding cai
..............page:140-143
Servlet Technology and Application
chi ya ping ; fang yong
..............page:137-139,143
Transposition Cryptosystem and the Future Expectation
zhang ya ; feng deng guo
..............page:134-136
Image Intelligent Technology of Target Detection(Ⅲ)--Optimal Clustering and Character Recognition
jing xiao jun ; li jian feng ; zhang su hui ; yang yi xian
..............page:63-69
The Physiological Authentication Methods for Bluetooth Equipment
cheng shi qun ; wen tie hua
..............page:60-62
Recursive Production Algorithm of a Lager Set of Orthogonal Arrays of GF(2)n
huang zuo ; ding jin kou ; wen qiao yan ; yang yi xian
..............page:57-59
Authentication in Quantum Key Distribution
guo fen zhuo ; wen qiao yan
..............page:54-56,75
Construction and Properties with a Kind of Extensive Bent Functions
ding jin kou ; huang zuo ; wen qiao yan ; yang yi xian
..............page:50-53
A Simple Model of TCP Latency
zhao jiong ; zhang shu jing ; zhou qi gang
..............page:44-49
Study on the Access Performance of Leaky Bucket Technique in ATM
liu qin ; yang jia zuo ; li jian dong
..............page:38-43
The Maximal Jump Number M(19,10)
you lin ; wang tian ming
..............page:28-37
Image Intelligent Technology of Target Detection(Ⅱ)--Data Flow Chart and Background Estimating
jing xiao jun ; li jian feng ; zhang su hui ; yang yi xian
..............page:17-27
Image Intelligent Technology of Target Detection(Ⅰ)--Target-Background Expression Model
jing xiao jun ; li jian feng ; zhang su hui ; yang yi xian
..............page:1-7
A Dual Channel Real Time DSP System Based on TMS320C31
zhang hai yan ; li xin ; zhao li feng ; liu chun jie
..............page:130-133
Research on Embedded Internet and Extend the Internet
yuan bing ; fu hong ; wu hong zuo
..............page:126-129
A Low Complexity Decorrelating Multiuser Detection and Performance Simulations
hai ping ; xie xian zhong
..............page:115-118
Implementation of Speech Segmentation and Enhancement Based on Fractal Dimension
chen liang ; zhang xiong wei
..............page:112-114,125
Research on Home-Networking System Based on Powerline Communication Technology
wei wei wei ; li jie ; zhou guo yong
..............page:109-111
The Design of Real-Time Kernel for TMS320C54X Based on μC/OS-II
luo shi bo ; zhang xiong wei
..............page:99-104
Bargaining Exploration in Electronic Business
su an yang
..............page:95-98,104
Multiple Access Protocol in Mobile Ad Hoc Networks with Smart Antennas
yang jun ; li jian dong
..............page:89-94
Decentralized CORBA Authorization Service Based on SPKI Certificate
liu ; zhou ming tian
..............page:81-88
The Security Study of QoS Mechanism in Internet
li zhi bing ; yang yi xian
..............page:76-80
Implemetation of Management and Control System in Distance Education
xu bo ; zheng shao ren
..............page:70-75