Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Acta Electronica Sinica
0372-2112
2009 Issue 11
Optimization on Motion Estimation Algorithm Based on H.264
WU Xiao-jun;BAI Shi-jun;LU Wen-tao
..............page:2541-2545
Patterns of the Low-Bias Conductance of A Molecular Device
ZHANG Zhen-hua;LI Qiao-hua
..............page:2448-2451
Research on Reliability Assurance of COTS Components in Space Application
DANG Wei;SUN Hui-zhong;LI Rui-ying;LU Cong-min
..............page:2589-2594
Analysis of Software Structure Vulnerabilities
SU Jian-min;XU Tuan;WANG Ying;CUI Bao-jiang;Jiang Lan;SUN Wei-lian
..............page:2403-2408
Data Hiding in Binary Images
GUO Meng;ZHANG Hong-bin;WEI Lei
..............page:2409-2415
Study of Heat Load Forecasting Based on RBF Neural Network and Time Series Crossover
CHEN Lie;ZHANG Yong-ming;QI Wei-gui;DENG Sheng-chuan;LI Juan
..............page:2444-2447
Adaptive Inverse Control Strategy and Its Application in IC Material Slicing Equipment
TANG Rui;LIU Hong-Li;DAI Yu-xing;ZHANG Yi-bing;JIANG Jin
..............page:2480-2483
Study of Heatsink Electromagnetic Radiation Based on Vector FEM
SHI Zheng;DU Ping-an;NIE Bao-lin
..............page:2439-2443
Classification of Distributed GEP-BP Based on Grid Service
DENG Song;WANG Ru-chuan
..............page:2600-2603
An Efficient Energy-Saving Broadcast Mechanism for Wireless Sensor Networks
ZHAO Rui-qin;LIU Zeng-ji;WEN Ai-jun
..............page:2457-2462
Construction of Non-Aliasing Pyramidal Transform
FENG Peng;WEI Biao;PAN Ying-jun;MI De-ling
..............page:2510-2514
An Advanced Non-Dominated Sorting Genetic Algorithm Based SOC Hardware/Software Partitioning
LUO Sheng-qin;MA Xiao-xiao;LU Yi
..............page:2595-2599
Research on the Attack Model for RFID Anti-Counterfeit Protocol
LI Hui;HOU Yi-bin;HUANG Zhang-qin;LIU Hong-zhen;HE Jian;CHEN Rui
..............page:2565-2573
A Module Based Scheduling Policy
ZHANG Ye;LI Xi;TANG Ling;CHEN Xiang-lan;GONG Yu-chang
..............page:2380-2388
A Method of Multiple Classifier Fusion with Self-Adjusting Weights
MI Ai-zhong;HAO Hong-wei;ZHENG Xue-feng;TU Xu-yan
..............page:2604-封3
Study on Monolithic Integration of Grating Light Modulator and CMOS Driver Circuits
JIN Zhu;WEN Zhi-yu;ZHANG Zhi-hai;HUANG Shang-lian
..............page:2515-2519
Study on Thermal Placement Optimization of Stacked 3D-MCM Based on Thermal Superposition Model
LIANG Ying;HUANG Chun-yue;YAN De-jin;LI Tian-ming
..............page:2520-2524
Hardware Implementation an Iterative Algorithm for Single-Frequency Estimation
PENG Xiao-yan;CAN Lu;WEI Ping
..............page:2452-2456
Distributed Multicast Protocol Based Multi-Bids Auction Mechanism in P2P Networks
WANG Hao-yun;ZHANG Shun-yi;LONG Hua;LI Jun
..............page:2373-2379
A Compressed Simplex Method Based on GPU
BAI Hong-tao;OUYANG Dan-tong;HE Li-li;JIANG Shan-shan
..............page:2574-2578
A Response Method for Cooperative Intrusions Based on the Attack Group Model
WU Yao-rui;LIU Shu-fen
..............page:2416-2419
Dependency-Aware Maintenance Model for Dynamic Grid Services
WU Song;QI Li;JIN Hai;SHI Xuan-hua;ZHENG Ran;CHEN Zhao
..............page:2359-2366
A Load Balancing Scheme of Minimum Buffers for Scalable Switches
LI Hui;LIN Liang-min;HUANG Jia-qing;WANG Wei;AN Hui-yao;YI Peng;WANG Bin-qiang
..............page:2367-2372
A Kind of Distributed Video Compression Scheme Based on Rateless Low-Density Parity-Check Codes
CAI Shu-ting;WANG Qin-ruo;XIE Yun;YIN Ming
..............page:2535-2540
Non-Treelike Network Motif Detection Algorithm
QIN Gui-min;GAO Lin;ZHOU Xiao-feng
..............page:2420-2426
Research on the Comparison of Time Series Models for Network Traffic Prediction
JIANG Ming;WU chun-ming;ZHANG Min;HU Da-min
..............page:2353-2358
Study on Fast Numerical Compensation of Hysteresis Measurement of Ferroelectric Film
DONG Wei-jie;CUI Yan;WANG Jing
..............page:2557-2560
A Sequential Weighted k-Nearest Neighbor Classification Method
ZHU Ming-han;LUO Da-yong;YI Li-qun
..............page:2584-2588
Method of Triangulating Spatial Points Based on Manifold Study
HOU Wen-guang;DING Ming-yue
..............page:2579-2583
The Authentication Technology of P2P Network Based on Distributed PKI
DAI Zhan-feng;Wen Qiao-yan;LI Xiao-biao
..............page:2561-2564
Blind Convolutive Separation Algorithm for Speech Signals via Tri-Quadratic Minimization
ZHANG Hua;FENG Da-zheng;PANG Ji-yong
..............page:2530-2534
A Provable Secure Group Key Agreement Protocol with Fault-Tolerant
ZHENG Ming-hui;ZHOU Hui-hua;CUI Guo-hua;HAN Lan-sheng
..............page:2396-2402
Tautologies and Quasi-Tautologies in Fuzzy Modal Logic
HU Ming-di;WANG Guo-jun
..............page:2484-2488
A Classfication Method For Imbalance Data Set Based on Kernel SMOTE
ZENG Zhi-qiang;WU Qun;LIAO Bei-shui;GAO Ji
..............page:2489-2495
Ten-Normalized Algorithm for Reversal Development of Input Verse Output Signal In Sensors
SUN Yi-cai;BIAN Cui-hua;GAO Qian;LI Xiao-li;Harry Hutchinson
..............page:2470-2475
A New Method on Analyzing Modeling of Multi-Source Information in Complicated System
ZHANG Yu-cun;XING Ting-ting
..............page:2427-2431
Knowledge Acquisition from Decision Tables Containing Continuous-Valued Attributes
FENG Lin;WANG Cuo-yin;LI Tian-rui
..............page:2432-2438
Overview of Study on One-Class Classifiers
PAN Zhi-song;CHEN Bin;MIAO Zhi-min;NI Gui-qiang
..............page:2496-2503
Research on the DES Physical Observable Security
CHEN Kai-yan;ZHANG Peng;DENG Gao-ming;ZHAO Qiang
..............page:2389-2395