Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Acta Electronica Sinica
0372-2112
2006 Issue z1
Study of a X-Band Coaxial Cavity Multi Beam Klystron
DING Yao-gen;RUAN Cun-jun;SHEN Bin;ZHANG Yong-qing;CAO Jing
..............page:2337-2341
A Runtime Software Architecture-enhanced BPEL Supporting System
MA Qian;YU Jian-jie;MA Xiao-xing;L(U) Jian
..............page:2360-2365
An Approach to Performance Assessment of Interoperability Protocols
ZHANG Nu-yun;LI Jun-guo;HUANG Gang;MEI Hong;YE Meng;CHEN Ying
..............page:2355-2359
Gabor Filter Based Text Extraction from Digital Document Images
FU Ping;LI Meng;YIN Hong-tao
..............page:2387-2390
Software Complexity Metrics Based on Complex Networks
LI Bing;WANG Hao;LI Zheng-yang;HE Ke-qing;YU Dun-hui
..............page:2371-2375
Design and Three-Dimensional Beam/Circuit Interaction Simulation of W-Band Folded Waveguide SWS
CAI Jun;FENG Jin-jun;LIAO Fu-jiang;HUANG Ming-guang;WU Xian-ping
..............page:2342-2346
A New Component-Oriented Programming Language
CHEN Bo;TAN Qing-ping;LI Zhou-jun;CHEN Huo-wang
..............page:2462-2466
Tasks Scheduling with Dynamic Voltage Scaling on Multi-Core Real-Time Systems
ZHONG Xiao;QI Yong;HOU Di;MIAO Lei;ZHENG Xiao-mei
..............page:2481-2484
Conflict Resolution in Distributed CAD Cooperative Design
SUN Huan;LIU Qiang
..............page:2458-2461
BBNs-Based Software Fault Prediction Method
LUO Yun-feng;BEN Ke-rong
..............page:2380-2383
Design and Analysis of a Novel Broad-band Folded Planar Monopole Antenna for Mobile Handset
LI Zeng-rui;JIANG Kai-bo;LI Chuan-xin;LI Yan-fei;WANG Jun-hong
..............page:2399-2401
Research on Model Driven Test Modeling of EJB Component
DENG Xiong;CHANG Chuang-ye;WU Ji;JIN Mao-zhong;LIU Chao
..............page:2467-2472
Study of a New Method of the Shipborne Gun\'s Closed Loop Fire Correction Against Air
DAI Yao;WANG De-hu;HU Jiang
..............page:2491-2493
A Method for Segmentation of Pulmonary Nodules on Multi-Slice CT Images
ZHAO Da-zhe;YANG Jin-zhu;XU Xin-he
..............page:2478-2480
The Frequency Synchronization and Synchronization Error Compensation of Airborne Bistatic SAR
ZHU Zhen-bo;TANG Zi-yue;JIANG Xing-zhou
..............page:2417-2420
The Survey of the Pattern Matching Algorithm in Intrusion Detection System
MU Yong-min;LI Mei-gui;LIANG Qi
..............page:2488-2490
Construct Double-Erasure-Correcting Data Layout Using P1F
WANG Gang;DONG Sha-sha;LIU Xiao-guang;LIN Sheng;LIU Jing
..............page:2447-2450
An Optimizing Resource Usage for ALM Tree Building Algorithm
WANG Tai-yong;Zhou Gang
..............page:2376-2379
Image Forensics Technology Using Abnormity of Local Hue for Blur Detection
WANG Bo;SUN Lu-lu;KONG Xiang-wei;YOU Xin-gang
..............page:2451-2454
Reversible Watermark Technique for Relational Databases
ZHANG Yong;NIU Xia-mu
..............page:2425-2428
Design of Compatibility of Stepped Frequency and Pulse Doppler
LIN De-fu;SHEN Ji;ZHANG Wei;QI Zai-kang
..............page:2410-2413
A New Model of Information Security System Based on Immune System
YU Han;WANG Yi;SHEN Chang-xiang
..............page:2455-2457
Research on Learning Markov Logic Networks Based on GA and PSO
YU Peng;LIU Da-you;OUYANG Dan-tong
..............page:2551-2555
Study of the Technology of Automatic Testing System for Mooring and Sea Trials of Ship Electronic Equipment
GAI Qiang;YIN Fu-liang;MA Xiao-jiang;LIU Xi-zuo
..............page:2533-2536
An SFDTD Algorithm for the Analysis of Microstrip Patch Antennas
LI Min-quan;WU Xian-liang
..............page:2544-2546
The Model and Implement of File Enc/Decryption Based on Solaris VFS
MU Yong-min;LI Bei
..............page:2547-2550
Research on China Internet of Things\' services and Management
NING Huan-sheng;ZHANG Yu;LIU Fang-li;LIU Wen-ming;QU Shen-feng
..............page:2514-2517
Simulation Design And Experiment of An 8mm Gyroklystron Amplifier
YU Sheng;NIU Xin-jian;LI Hong-fu;ZHAO Qing;LUO Yong;DENG Xue;XU Yong;WANG Hui;XIE Zhong-lian;WANG Li;LIU Ying-hui;YANG Ming
..............page:2541-2543
An Efficient Universal Designated Verifier Signature Proof
MING Yang;LI Shu-hai;WANG Yu-min
..............page:2434-2437
ID-Based Partial Delegation Proxy Multi-Signature with Warrant from Bilinear Pairings
TIAN Xiu-xia;CAO Zhen-fu;YE Wen-jun
..............page:2569-2570
The Design and Implementation of a Trust Management Engine Based on Mobile Agent
PAN Jing;XU Feng;WANG Yuan;ZHANG Lin;L(U) Jian
..............page:2571-2574
A Use-Case Driven Approach to Supporting Separation of Concerns on Requirements
HAN Xiao-ying;YU Hui-qun
..............page:2498-2501
National Coaxial Primary Standard for Broadband Power
LIU Xin-meng;PENG Xi-yuan;CHEN Cheng-ren
..............page:2560-2563
A System Security Gap Analysis Based Risk Assessment Metric and Method
JIANG Chang-qing;ZHANG Li;LIN Jia-jun;WU Shi-zhong
..............page:2556-2559
A SWP Compilation for Exploiting Inner-Loop in Multimedia Applications
WU Dan;WANG Zhi-ying;WANG Shao-gang;WANG Miao
..............page:2575-2578
A Modified Differential Evolution Algorithm with Hybrid Optimization Strategy
ZHAO Guang-quan;PENG Xi-yuan;SUN Ning
..............page:2402-2405
A Novel Real Time Predictor for Complex Time Series
WANG Jun;PENG Xi-yuan;PENG Yu
..............page:2391-2394
High Capcity Image Steganography Based on Transform Domain
ZHOU Lin-na;GUO Yun-biao;YANG Yi-xian
..............page:2429-2433
A Study of Chaff Clouds\' Inverse Scattering Based on SVR
WANG Tao-sheng;FANG Ning;XUE Ming-hua;MENG Gang;NAN Hua;CHEN Wei-shi;WANG Bao-fa
..............page:2494-2497
Study on the Frame of Information Steganography and Steganalysis
NIU Xin-xin;YANG Yi-xian
..............page:2421-2424
Lattice Based Gray-Level Digital Watermarking
LI Xiao-qiang
..............page:2438-2442
Security Design Based on Social Modeling
XIANG Jian;LIU Lin;YU Eric
..............page:2350-2354
Research on Holism-Based Feature Extraction and Fusion for Steganalysis
GUO Yan-qing;HE Dequan;YOU Xin-gang;KONG Xiang-wei;WANG Bo
..............page:2443-2446
Detecting Duplicate Event Flows in Use Case Models
LIU Hui;MA Zhi-yi;HE Yun-feng;SHAO Wei-zhong
..............page:2366-2370
Geometrically Invariant Feature Points Detection Based on Scale Space Theory
TAO Mao-yuan;LU Zheng-ding;YUAN Wu-gang;LING He-fei;ZOU Fu-hao
..............page:2564-2568
A Millimeter-Wave Solid State Power Amplifier Based on Two Stage Branch Dividing/Combining Network
YUN Xiao-hua;SUN Lin-lin;CHU Ran;SHEN Ming-lei
..............page:2347-2349
A Genetic Selection Operator Based on Difference Among Individuals
QIAO Jia-qing;FU Ping;MENG Sheng-wei
..............page:2414-2416
Modeling of User Preference Based on Agent for Service Selection
HUANG Hai-qing;ZHANG Ping;ZHANG Xi-wen
..............page:2537-2540
Semantic Representation and Composition of Business Components Based on Domain Feature Ontology
PENG Xin;ZHAO Wen-yun;QIAN Le-qiu
..............page:2473-2477
A New Support Vector Machine Method for Unbalanced Data Treatment
WU Hong-xing;PENG Yu;PENG Xi-yuan
..............page:2395-2398
The Monte Carlo Algorithm to Evaluate the Cover Quality of Object Points in Wireless Sensor Network
WANG Xing-fu;MIAO Fu-you;XIONG Yan;ZHOU Da-quan;YUE Li-hua
..............page:2485-2487
Experiment Development of Relativistic Backward Wave Oscillator Based on Superridiance Regime in Russia
HU Lin-lin;CHEN Hong-bin;MA Guo-wu;LIU Tian-wen;SONG Rui;MENG Fan-bao;ZHOU Chuan-ming
..............page:2510-2513
An Efficient Motion Estimation Algorithm for H.264 Video Coding Standard
DUAN Zhe-min;ZHOU Wei;LI Hui;ZHOU Xin
..............page:2406-2409
The Application of Bayesian Estimate Theory in the Extreme-small-sample Tests of Batch Equipments
HUANG Zhi-gang;CHEN Xiao-fang;LIU Zhong-kan
..............page:2530-2532