Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Acta Electronica Sinica
0372-2112
2013 Issue 2
Anti-Attack Recommender Algorithm Based on Automatic Trust Establishment
HUANG Shi-ping;HUANG Jin;CHEN Jian;TANG Yong
..............page:382-387
Dynamic Modeling of Networked Software Interactive Behavior
PENG Cheng;YANG Lu-ming;MAN Jun-feng
..............page:314-320
Antarctic Ice-Sheet Freeze-Thaw Detection Based on Improved Wavelet Transform
WANG Xing-dong;XIONG Zhang-qiang;LI Xin-wu;LIANG Lei
..............page:402-406
A Trusted Fair Non-Repudiation Protocol Based on Dynamic Third Party in Mobile Ad Hoc Networks
WU Cheng-yi;XIONG Yan;HUANG Wen-chao;LU Qi-wei;GONG Xu-dong
..............page:227-232
A Universal Steganalysis Method Based on Local Features Extracted from LSB Sequences
ZHONG Shang-ping;XU Qiao-fen;CHEN Yu-zhong;HE Feng-ying
..............page:239-247
Subcarrier Pairing and Power Allocation Algorithm for OFDM Relay Systems with Delay QoS Guarantees
HUANG Gao-fei;LUO Li-ping;ZHANG Guang-chi;TANG Dong;QIN Jia-yin
..............page:335-339
Fast Computation of Threshold Based on Otsu Criterion
HE Zhi-yong;SUN Li-ning;CHEN Li-guo
..............page:267-272
Optimal Design of Multi-Band Multi-Section Transformer Considering the Characteristic Impedance Discontinuities
ZHANG Chen-lu;CHEN Ming;ZHANG Yi;LIANG Li-jun
..............page:407-411
Review of Cloud Computing Security
YU Neng-hai;HAO Zhuo;XU Jia-jia;ZHANG Wei-ming;ZHANG Chi
..............page:371-381
A Series-Connection Structure Digital Carrier Tracking Loop and Analysis of Its Noise Performance in Z Domain
HAN Meng-fei;WANG Yong-qing;WU Si-liang;LUO Hai-kun
..............page:307-313
An Algorithm for Hole Recovery in Wireless Sensor Networks Based on Triangle Net
LIU Quan;YANG Kai;FU Yu-chen;ZHANG Shu-kui
..............page:209-213
A Power-Aware Dead Lock Avoid Three-Dimensional Full-Adaptive Routing Algorithm for 3D NoC
YU Xiao;LI Li;ZHANG Yu-ang;PAN Hong-bing;WANG Jia-wen;HAN Ping
..............page:329-334
Mobile Robot Navigation Algorithm of Biomimetic Conditioned Reflex Based on Biological Antennas
JIANG Ji-liang;TU Da-wei;XU Shuo;ZHAO Qi-jie
..............page:388-394
Secret Sharing Schemes Based on Minimal Linear Codes
SONG Yun;LI Zhi-hui;LI Yong-ming
..............page:220-226
12Bit Low Power Single Slope ADC Design for CMOS Image Sensor
TANG Fang;TANG Jian-guo
..............page:352-356
Interfacial Stress Sensor for Artificial Skin Application
L(U) Xiao-zhou;LU Wen-ke
..............page:340-345
Automatically Extracting Implicit Programming Rules and Detecting Violations from C Programs
YU Zhen;SU Xiao-hong;WANG Tian-tian;MA Pei-jun
..............page:248-254
JPEG Image Steganalysis Method Based on Uncertainty Reasoning Theory
ZHU Ting-ting;WANG Li-na;HU Dong-hui;FU Jian-wei;WANG Min-jie
..............page:233-238
A Novel Algorithm for Channel Coding Recognition Using Soft-Decision
YU Pei-dong;LI Jing;PENG Hua
..............page:301-306
Improved Moving Average Filter for GPS Disciplined
ZHANG Jie;ZHOU Dong-ming
..............page:412-416
A Key Management Scheme Based on Quadratic Form for Wireless Sensor Network
WANG Xiao-gang;SHI Wei-ren;ZHOU Wei;GAO Pen;JIANG Yi-song
..............page:214-219
A Vectorization of FIR Filter Supporting Arbitrary Coefficients Length and Data Types
LIU Zhong;CHEN Yue-yue;CHEN Hai-yan
..............page:346-351
An Improved Method for Deep Web Sources Classification Based on the Theme and Form Attributes
ZHU Guan-wen;WANG Nian-bin;WANG Hong-bin
..............page:260-266
An Algorithm of Wireless Routing Based on Intra-Flow and Inter-Flow Network Coding
TIAN Xian-zhong;ZHOU Qian-wei
..............page:395-401