Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Acta Electronica Sinica
0372-2112
2003 Issue 7
New Method to Reconstruct Static Image in Electrical Impedance Tomography
hou wei dong ; mo yu long
..............page:1083-1085
(t,n) Threshold Shared Verification Signature Encryption Scheme with Specified Receiving Groups
li ji guo ; cao zhen fu ; li jian zhong
..............page:1086-1088
A Secure Fair Off-Line E-Cash Scheme
xu zuo ; yang yi xian
..............page:1078-1079
New DCT Computation Algorithm for VLIW Architecture
li xue ming ; li ji
..............page:1074-1077
An Assessment of Modulation Classifiers for ISI Channels
luo li chun
..............page:1070-1073,1077
Study on Sequences of Degree Distribution for Low-Density Erasure Codes
mu jian jun ; yang li ; wang xin mei
..............page:1066-1069
An Algorithm for Fragile Watermarking Based on HVS
hu jun quan ; huang ji wu ; huang da ren
..............page:1057-1061
Rapid Acquisition of Doppler Shift in Satellite Communications
huang zhen ; lu jian hua ; yang shi zhong
..............page:1052-1056
Study on Calculation and Measurement of Grey Conception
jin xin zheng
..............page:1049-1051
On Batch Rekey Algorithm for Secure Multicast
qu jin ; ge jian hua ; jiang ming
..............page:1046-1048
An Algorithm STF-PDA for Maneuvering Target Tracking with Dynamic Model
xu zuo ; yang rui juan ; zhou yan
..............page:981-984
The Techniques of Suppressing UCN-Sequence
li jin zong ; wei xiang quan ; li ning ning ; wang song
..............page:985-989
Parallel Detection Algorithm of V-BLAST
tao xiao feng ; yu zhui zhuan ; qin hai yan ; zhang ping
..............page:990-993
Pilot Symbol-Aided Space-Time 2D RAKE Receiver for Wideband CDMA System
zuo zhi gang ; he zhi qiang ; wu wei ling
..............page:994-997
A New Model of Optimum Channel Assignment in Mobile Communications Systems
dang an hong ; tang jun xiong ; zhu shi hua
..............page:1002-1004
Performance Evaluation of the Concatenated Convolutional Codes
liu pei ; ge jian hua ; liu gang
..............page:1089-1091
Joint Source /Channel Coding Modulation Algorithm Based on TTCM
guo dong liang ; shu feng ; wu le nan
..............page:1092-1094
Blind Equalization Based on the Modified Principle of Autocorrelation Matching
lan hong ; song liang ; hu bo ; ling zuo ting ;ruey-wen liu
..............page:1095-1097
On the Security of Wireless Network Protocol 802.11
sun hong ; yang yi xian
..............page:1098-1100
A Method of Implementing a Base-Stations Channelizer with Low Complexity
zhang yu liang ; wu wei ling ; tian bao yu
..............page:1101-1103
Application of the Bayesian Fusion in SAR Image Classification
su fang ; hong wen ; mao shi yi
..............page:1107-1110,1091
Research on the Suppression Technology of Narrow-Band Interference in OTHR
yang zhi qun ; ni jin zuo ; liu guo sui
..............page:1111-1113
The Ambiguity Function of Intra-Pulse Chirp and Inter-Pulse Stepped Frequency Signal
he zhi yi ; tang bin ; hao zu quan
..............page:1118-1120
Effect of MRC-Based Macrodiversity on CDMA Reverse-Link Capacity
dai lin ; zhou shi dong ; yao yan
..............page:1022-1025,1051
Design of Gray-Mapped Constant Weight Modulation Code for Digital Holographic Data Storage System
pei xian deng ; chen duan rong ; xie chang sheng
..............page:1015-1017
Bit Error Rate of Spectral Phase Encoding OCDMA Systems
zhang hai bin ; huang pei zhong ; song wen tao ; li rong yu ; li zuo zuo
..............page:1012-1014
A Multi-Service Radio Resource Scheduling Algorithm Suitable for W-CDMA Systems
lei chun juan ; cao zuo bo ; li cheng shu
..............page:1005-1007,1021
A New Integrated Routing Algorithm for SDH Transport Network
wei hong ; liu gang ; chen xing yu ; meng luo ming
..............page:1008-1011
Composite Attacks on Strong-Password Authentication Protocol
qin xiao long ; yang yi xian
..............page:1043-1045
Analysis of Multipath Fading Channels Using Chaos and Fractal Theories
hu gang ; zhu shi hua ; xie bo
..............page:1039-1042
Feature Extraction Using Best Wavelet Packet Transform
wang shou yong ; zhu guang xi ; tang yuan yan
..............page:1035-1038
Pattern Matching Based on Fingerprint Classification
yang li min ; yang jie ; li gang
..............page:1030-1034
Nonlinear Cryptanalysis of 5-Round SAFER++
wu wen ling ; ma heng tai ; tang liu ying ; qing si han
..............page:961-965
The Gauss-Hermite Particle Filter
yuan ze jian ; zheng nan ning ; jia xin chun
..............page:970-973
Blind Estimation of Parameters in Gaussian Noise
wang hui gang ; li zhi shun
..............page:974-976
Security Policies Study for Information Systems
li shou peng ; sun hong bo
..............page:977-980