Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Beijing University of Posts and Telecommunications
1007-5321
2010 Issue 3
On the Equivalent Keys of Multivariate Public Key Cryptography
YUAN Feng;HU Yu-pu;OU Hai-wen;LI Shun-bo
..............page:97-101
A Smoothing-Based Noise Estimation Method of the Image Based on Local Homogeneity Measurement
WU Qiang;CHI Yao-bin;WANG Zhi-yong
..............page:130-134,142
A Music Retrieval Research and Implementation of New Methods
LI Peng;ZHOU Ming-quan;XIA Xiao-liang;LI Nan-shan
..............page:62-66,92
Queuing System M/M/1/T with Priority Mechanism Based on Living Time
WANG Ye-qun;HUANG Guo-ce;YANG Feng;ZHANG Heng-yang
..............page:80-83
Constructions of Quadratic Bent Functions over Finite Fields
ZHANG Feng-rong;HU Yu-pu;XIE Min;GAO Jun-tao
..............page:52-56
Fountain Codes Based on Modulo and Chaos
HUANG Cheng;YI Ben-shun;GAN Liang-cai;DENG Zai-hui;XIE Wen-hua
..............page:121-125
The Influence of Magnetic Field on the Electron Ground State Energy of Two-Dimensional Quantum Ring
JIA Bo-yong;YU Zhong-yuan;LIU Yu-min;HAN Li-hong;ZHAO Wei
..............page:84-87
Design and Performance Optimization of Batch Rekeying Algorithm
PAN Jin;LI Bo;FU Ying;LI Guo-peng;HAN Ming-kui
..............page:102-106
Analysis of Transmission Capacity of Ad Hoc Networks with SBPC Strategy
CHEN Chang-hai;YIN Chang-chuan;LI Na-na;YUE Guang-xin
..............page:117-120
A Risk Assessment Model Using Incomplete Attack Graphs Analysis
WU Huan;PAN Lin;WANG Xiao-zhen;XU Rong-sheng
..............page:57-61
An Optimal Dynamic Deployment of Paging Areas for Mobile IP Networks
ZHU Yi-hua;YOU Li-li;LI Yan-jun;PAN Jian
..............page:24-29
A Blind Recognition of the(n,n-1,m)Convolution Code
ZHOU Ya-jian;LIU Jian
..............page:135-138
Power Allocation with Max-Min and Min-Max Fairness for Relay Networks
TANG Lun;YE Jian-xiong;CHEN Qian-bin;ZENG Xiao-ping
..............page:67-70
A Perception Model for Network Risk Using Danger-Theory
CHAI Zheng-yi;LIU Fang
..............page:40-43
An Accelerate-Layer-Into Error Control Coding Method for Nand Flash
HAN Ke;DENG Zhong-lian;HUANG Jian-ming
..............page:71-74
A Complexity-Reduced Joint Transceiver Design for Multiuser MIMO Downlink
WANG Li;HU Han-ying;CUI Wei-jia
..............page:107-111
A New Selection Algorithm for Modulation and Coding Scheme in TD-HSPA+MU-MIMO System
ZHANG Xiang;WANG Wen-bo;PENG Mu-gen;CHEN Shu-ping
..............page:93-96,111
Constructing Secure Routing Protocol Using Trust Model
YU Wang-ke;MA Wen-ping;YAN Ya-jun;YANG Yuan-yuan
..............page:48-51
A Time-Varying Nonintegral Codebook with Nonuniform Quantization
LONG Hang;ZHENG Kan;ZHANG Yue-ying;WANG Wen-bo
..............page:15-19
Analysis on the Consistent Degree of Addition Modulo 2n with XOR and Its Application
CHEN Shi-wei;JIN Chen-hui;LI Xi-bin
..............page:44-47
Internet of Things:Summarize on Concepts,Architecture and Key Technology Problem
SUN Qi-bo;LIU Jie;LI Shan;FAN Chun-xiao;SUN Juan-juan
..............page:1-9
Principle and Dynamic Analysis of a New-Type Spherical Underwater Vehicle
LAN Xiao-juan;SUN Han-XU;JIA Qing-xuan
..............page:20-23,29
A Method of Time-Frequency Analysis for Frequency-Hopping Signals
FENG Tao;YUAN Chao-wei
..............page:10-14
A Distributed Video Coding Method Using Joint Bit-Planes Decoding Algorithm
WANG Zun-liang;LI Xue-ming
..............page:88-92
Simulation Test of Mobile Phone Dust Ingression
WANG Dong;XU Liang-jun;YIN Zhu-ling;ZHANG Hao;ZHU Meng
..............page:112-116
RAKE Receiver with Carrier Coherent Demodulation for Multi-Path Signals
FU Hai-yang;DAI Zhen-hua;ZHENG Jian-guang;JIA Xiang-dong
..............page:30-33