Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Chengdu University Of Information Technology
1671-1742
2012 Issue 6
Semi-dynamic Configuration of SFN in Multi Cell Situation
LU Wen-xi;WANG Xiao-xiang;ZHANG Hai-bo
..............page:610-614
Multi-Antenna Opportunistic Multicast Scheduling with Limited Feedback
SUI Cheng-liang;WANG Xiao-xiang
..............page:605-609
Intrusion Detection Algorithm Based on Semi-supervised Learning
JIA Zhi-wei;GUAN Zhong-ren;ZHAO Jian-fang
..............page:560-563
Research on Network Security Surveillance Based on Clonal Selection Principle
ZHANG Yan;LIU Cai-ming
..............page:556-559
The Extraction of Weak Weather Radar Echo with Low SNR Based on Wavelet Analysis
LI Hua;GAO Yu-chun;LIU Yun-lei
..............page:574-579
Improved Particle Swarm Optimization
YAN Wen-jing;ZOU Shu-rong;ZHANG Hong-wei
..............page:580-584
Hybrid Attack on Camellia Algorithm Combining SPA with DPA
YANG Bin;CHEN Yun;CHEN Jun;LUO Xiao-fei
..............page:531-535
Study on Multi-Agent Assisting Browsing System Based on Immune Co-evolution
LI Guo-qing;YAN Jing-feng
..............page:585-588
Comparative Analysis of Two Kinds of Power Attacks on DES Cryptographic Chip
LUO Xiao-fei;CHEN Yun;CHEN Jun;YANG Bin
..............page:536-540
Research on Digital Watermarking Algorithm Based on LSB for QR Code
ZHU Ben-wei;WAN Wu-nan;CHEN Yun
..............page:541-547
Technology of MDIO Bus-Switching based on FPGA
che zuo zuo ; qing zuo bo ; he xiao hai
..............page:569-573
Side-Channel Cube Attacks on EPCBC
ZHAO Xin-jie;GUO Shi-ze;WANG Tao;ZHANG Fan
..............page:525-530
The Model of Information Security System Under the Meaning of General System Theory
GUO Yu-cui;LEI Min;YANG Yi-xian
..............page:564-568
Resource Allocation Scheme Based on User Grouping for Device-to-Device Communication
YUN Chen-jun;WANG Xiao-xiang;WANG Dong-yu
..............page:594-598