Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Acta Electronica Sinica
0372-2112
2005 Issue 1
User Interest Spectrum of Broadcasting Gird
MA Jian-guo;XING Ling;LI You-ping;WEN Li
..............page:142-146
Reed_Muller Coding in 3GPP
WU Zhan-ji;WU Wei-ling
..............page:147-149
The Design of an EFM/EFM+ Demodulator used in DVD Servo Control System
XIA Jun;YUAN Li-xia;ZOU Xue-cheng
..............page:150-153
Extracting Doppler Ultrasound Blood Signals Based on the Cubic Spline Reconstruction
TAO Qian;WANG Yuan-yuan;WANG Wei-qi
..............page:154-157
Speech Separation Based on Sound Localization and Auditory Masking Effect
ZHAO He-ming;GE Liang;CHEN Xue-qin;YU Yi-biao
..............page:158-160
Modeling the Distributed Coordination Function of the IEEE 802.11
CHEN Hong-yuan;LI Yan-da
..............page:138-141
Optimal Quantum Multi-User Detection
ZHAO Sheng-mei;LI Fei;ZHENG Bao-yu
..............page:135-137
Cramer-Rao Low Bound for Location and Time Delay Estimation Algorithm in Multi-User Environments
WANG Wei;XIONG Jin-yu;ZHU Zhong-liang
..............page:131-134
A Superresolution Reconstruction Algorithm of Video Sequence
HAN Yu-bing;CHEN Xiao-qiang;WU Le-nan
..............page:126-130
Analysis of the Transmission Property of TEM Cell by Operator Theory
REN Lie-hui;CHEN Zhi-yu;SONG Wen-miao
..............page:123-125
Mutual Coupling Analysis and Calibration Method of Phased Array Antenna in Near Field
LI Jie;GAO Huo-tao;ZHENG Xia
..............page:119-122
Generation of Interpretable Fuzzy System Based on Evolution Strategy
YAN Ling;ZHENG Hong-tao;JIANG Jing-ping
..............page:70-73
A Probability Model for Adaptive Image Denoising
YI Xiang;WANG Wei-ran
..............page:63-66
On the Design of Node Architecture and MAC Protocol for WDM Metro Ring Networks with Variable Length Packets Support
ZHANG Zhi-zhong;LUO Jiang-tao;CHENG Fang;JIANG Ming;ZENG Qing-ji
..............page:1-6
A New Method for Main Roads Description:Symmetrical Edge Orientation Histogram
TANG Liang;XIE Wei-xin;HUANG Jian-jun;HUANG Jing-xiong
..............page:7-11
On the k-Error Linear Complexity of Binary Period Sequences
ZHAO Yao-dong;QI Wen-feng
..............page:12-16
A Linear-Approach Fairness Algorithm for High-Speed Resilient Packet Ring
LIU Li-feng;ZHANG Lei;CHEN Shi-duan
..............page:17-21
Conformance Test Methodology of Network Management Interface Based on tML/Message Queue
DONG Wen-li;MENG Luo-ming;QIU Xue-song
..............page:22-25
A Novel Random Access Protocol for Ad Hoc Wireless LANs
WANG Chun-Jiang;GENG Fang-Ping;LIU Yuan-An;GAO Jin-chun
..............page:26-31
A Multi-Protection Domains Process Model and Its Implementation
XIE Jun;HUANG Hao;ZHANG Jia
..............page:38-42
Performance of Irregular LDPC Codes on Rician-Fading Channels
LIN Jia-ru;WU Wei-ling
..............page:43-46
A Multi-Model Modeling Approach to MIMO Nonlinear Systems
XUE Zhen-kuang;LI Shao-yuan
..............page:52-56
A Novel Image Retrieval Method Using Texture Features Based on Color-Connected Regions
YANG Yu-bin;CHEN Shi-fu;LIN hui
..............page:57-62
Remote Sensing Image Automatic Registration Based on Feature
WEI Yan-feng;ZHAO Zhong-ming;YAN Dong-mei;ZENG Qing-ye
..............page:161-165
Security Analysis of Authenticated Key Exchange Protocol Based on Password
LI Li;XUE Rui;ZHANG Huan-guo;FENG Deng-guo;WANG Li-na
..............page:166-170
Formal Analysis of a Non-Repudiation Protocol ZG
FAN Hong;FENG Deng-guo
..............page:171-173
Study on Algebraic Representations of Coordinates of Finite Fields
WEI Bao-dian;LIU Jing-wei;WANG Xin-mei
..............page:174-176
Using Energy Flow Information for Video Segmentation
ZHANG Zhong-wei;LIU Gui-zhong;LI Hong-liang;LI Yong-li
..............page:177-180
Some Theoretical Problems on Wavelet Packet Transform
LI He-sheng;MAO Jian-Qin;ZHAO Ming-sheng;WU You-shou
..............page:106-110
A Novel Keyword Verification Algorithm
DAI Hai-sheng;ZHU Xiao-yan;LUO Yu-pin;YANG Shi-yuan
..............page:101-105
Research on Intrusion Tolerant Architecture Based on Role-Based Access Control
PENG Wen-ling;WANG Li-na;ZHANG Huan-guo;Fu Jian-ming
..............page:91-95
An Improved Proxy Multi-Signature Scheme
GU Li-ze;GAO Hong;YANG Yi-xian
..............page:88-90
The Elliptic Curves over Zn and Key Exchange Protocol
ZHU Wen-yu;SUN Qi
..............page:83-87
BioAgent:a Biological Data Integration System Based on Multi-Agent
ZHUANG Yong-long;MA Fei;ZHOU Min;SHEN Yan;LI Yan-da
..............page:78-82
Multiple Video Object Segmentation Based on Spatio-Temporal Curve Evolution
BAO Hong-qiang;ZHANG Zhao-yang;CHEN You-ming
..............page:181-185
Topological Relations Model of Fuzzy Regions Based on Interval Valued Fuzzy Sets
YU Qiang-yuan;LIU Da-you;OUYANG Ji-hong
..............page:186-189