Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Changchun Post and Telecommunication In
1000-1794
2010 Issue 4
Stereo Video Matching Algorithm of Belief Propagation Based on Motion Estimation
GENG Ying-nan;ZHAO Yan;CHEN He-xin
..............page:329-333
Solution to Overcome Zenith Blind Zone in Altitude-Azimuth Optoelectronic System
WANG Hong-xuan;JI Tong-bo;WANG Wei-guo;LIU Ting-xia;LI Bo
..............page:347-351
Cluster Computing System Architecture Based on LAMMPS System
TAO Yong-lana;ZHAO Donga;LIU Guang-wua;ZHENG Kaib
..............page:414-418
Resource Allocation Algorithm of Cooperative Clustered MB-OFDM-UWB System
YANG Ting-tinga;ZHANG Shu-fanga;SUN Zhong-huab
..............page:352-358
Area-CCD Image Acquisition System Based on Camera Link Protocol
DONG Yan1a;PENG Qi1b;LI Jian-zhi2;CHEN Jia-yu3
..............page:372-377
Parameter Variation Chaotic Synchronization Method with Single Driving Variable
SUN Ling-ming;SUN Xiao-dong;WANG Qing-zhu
..............page:385-389
Design and Implementation of Simple and Practical Network Sniffer
YU Jie1;ZHU You-zhong2
..............page:423-427
Gene Expression Programming Based on Diversified Development Strategy
WU Jiang1;LI Tai-yong1;JIANG Yue2;LI Zi-li1;LIU Yang-yang1
..............page:396-403
Influence of GSM Wireless Network Parameters Congestion
ZHANG Tie-jun1;ZHANG Hui-bo1;SHI Chun-yu2;XU Wei1
..............page:359-364
Design and Implementation of PD SOI CMOS Radiation-Hardened Standard Cells Library
TANG Wei;LIU You-bao;WU Long-sheng;ZHAO De-yi;LU Hong-li
..............page:365-371
Summary of Computer Forensics
HU Liang;WANG Wen-bo;ZHAO Kuo
..............page:378-384
Backbone Topology Construction Method in Space Access Network Based on WMN
ZHANG Chuan-fu;YU Jiang;SU Jin-hai;LIU Jian-guo
..............page:334-339
Image Enlargement Engine Based on One-Dimensional Data Interpolation Algorithm
WANG Yang1a;ZHAO Chun-xi1b;GUO Shan-he2
..............page:410-413
Approach to Evaluating Level of Experts for Assessment of Science Research Projects
YU Hong-guo;FAN Zhi-ping;SUO Wei-lan
..............page:390-395
Fragile Watermarking Scheme Used in Content Features Complete Authentication
LIU Jinga;ZHU Xiao-dongb;LI Da-weic
..............page:419-422