Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Acta Electronica Sinica
0372-2112
2012 Issue 5
PCNN Model Automatic Parameters Determination and Its Modified Model
DENG Xiang-yu;MA Yi-de
..............page:955-964
A Verifiable Rational Secret Sharing Scheme Based on Bilinear Pairing
ZHANG En;CAI Yong-quan
..............page:1050-1054
IoT Technology and Application
QIAN Zhi-hong;WANG Yi-jun
..............page:1023-1029
A Modified Parallel Wrapper Cell for Hierarchical SOCs Test
DENG Li-bao;QIAO Li-yan;YU Yang;PENG Xi-yuan
..............page:949-954
FDOA Location Algorithm for Fixed Emitter with Moving Observer
LIU Cong-feng;YANG Jie;WANG Feng-shuai
..............page:907-910
Heyting System and Its Representation by H-Spatilization
WU Hong-bo;SHI Hui-jun
..............page:995-999
An Improved Level Partitioning Algorithm Considering Minimum Execution Delay and Resource Restraints
CHEN Nai-jin;JIANG Jian-hui;CHEN Xin;ZHOU Zhou;XU Ying
..............page:1055-1066
The Model and Algorithm for the Target Threat Assessment Based on Elman_ AdaBoost Strong Predictor
WANG Gai-ge;GUO Li-hong;DUAN Hong;LIU Luo;WANG He-qi
..............page:901-906
Deployment Algorithm of Mobile Sensing Nodes Based on Evolutionary Optimization
NAN Guo-fang;CHEN Zhong-nan
..............page:1017-1022
Research of Content Feature Descriptors for Lunar Images Based on Saliency Regions
CHEN Hui-zhong;CHEN Yong-guan;JING Ning;CHEN Luo;WANG Jun
..............page:911-919
A Minimal Boundary Thermal Analysis Method for Stacked 3D IC
YU Hui;WU Hao;CHEN Geng-sheng;TONG Jia-rong
..............page:865-870
Adaptive Range-Spread Target Detectors for Compound-Gaussian Clutter
JIAN Tao;SU Feng;HE You;PING Dian-fa;GU Xue-feng
..............page:990-994
Compact Multi-Coupon Schemes with Concurrent Security
LIU Xin;Xu Qiu-liang
..............page:877-882
BIST Scheme of Parallel Folding Counters
LIANG Hua-guo;LI Xin;CHEN Tian;WANG Wei;YI Mao-xiang
..............page:1030-1033
Qubits Reversible Logic Circuits Synthesis Based on Bisection Method
YANG Zhong-ming;CHEN Han-wu;WANG Dong
..............page:1045-1049
3D Mesh Merging and Stitching with Large Overlaps
ZOU Bei-ji;ZHOU Hao-yu;WANG Lei;LIANG Yi-xiong
..............page:1005-1010
A Fault-Tolerant Routing Algorithm Based on BIST for 2D-Mesh Network-on-Chip without Using Virtual Channels
YAO Lei;CAI Jue-ping;LI Zan;ZHANG Hai-lin;WANG Shao-Li
..............page:983-989
Secure Multi-Party Comparing Protocol and Its Applications
LIU Wen;WANG Yong-bin
..............page:871-876
A Novel Design of QAM Whose Modulation Index is not the Nth Power of 2
CHANG Cheng-wei;LIU Rong-ke;DUAN Rui-feng
..............page:1039-1044
A New Fast Automatic Mosaic Method on Unmanned Aerial Vehicle Images
LI Yan-shan;PEI Ji-hong;XIE Wei-xin;LI Liang-qun
..............page:935-940
A Personalized Privacy Anonymous Method Based on Inverse Clustering
WANG Bo;YANG Jing
..............page:883-890
The Scheme of Symplectic MRTD Using Propagation Technique
WEI Min;WU Xian-liang;HUANG Zhi-xiang;LIAO Su-yin;WANG Hui
..............page:1034-1038
A Middleware-Based Algorithm for Redundant Reader Elimination in RFID Systems
Lü Shi-lei;YU Shun-zheng
..............page:965-970
The Aliasing Analysis and Resolution Calculation of Tilting Sampling System
WANG Jing;XU Li-yan;XIA De-shen
..............page:1067-1072
2TF: A Collaborative Considered TSV and Thermal Floorplanning Algorithm for Three-Dimensional Chip
WANG Wei;ZHANG Huan;FANG Fang;CHEN Tian;LIU Jun;LI Xin;ZOU Yi-wen
..............page:971-976
A Software Watermarking Algorithm Based on Threads Relation
XU Jin-chao;ZENG Guo-sun
..............page:891-896