Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Telecom Engineering Technics and Standardization
1008-5599
2011 Issue 10
Research and analysis of the re-capturing porn sites
SU Li;CONG Jian;ZHAO Le-yi
..............page:11-14
Study of basic information security evaluation system
DU Xue-tao;LI You-guo;YUAN Jie;ZHAO Bei;CHEN Tao
..............page:20-24
Application of image recognition technology in mobile Intemet
ZHANG Chen-min
..............page:67-69
Two-way reliable network framework
LIU Jia;DU Xue-tao
..............page:57-61
Research of WLAN test system and congestion control strategy based on cross-AC switching
ZHOU Xue-song;LI Bin;WANG Qi;ZHAO Wang-fei
..............page:82-86
Exploration on Intemet data services security measures
SUN Xiu-cheng
..............page:54-57
Study on the analysis and strategies of mobile coprological information
ZHOU Xiao-lei;ZHAO Gang;LI Hai-yah;CHENG Xiao-ming;HUANG Cheng-huan
..............page:25-28
Introduction of safety evaluation system
JLANG Jing;DONG Zhi-chun;LV Ming;ZHANG Qing
..............page:46-49
xin xi dong tai
..............page:91-92,53,66,86,24
Research in the control of spam message
WU Zhen-kui;LOU Tao;TIAN Gang;LAI Xiao-long;QIAO Yun
..............page:29-32
Discuss on battery used in energy efficient base station
WANG Xiao-ping;ZHAO Li-ming
..............page:78-81
Comprehensive management system of basic information security
HOU Fang;YAN Jun;ZHU Dong-lai;SUN Run-tao;SUN Jing
..............page:42-45
Research based on MSC pool N+1 centralized backup solution
SHI Chao-yun;HU Sheng-hong
..............page:87-90
Briefly discussion on the construction of China mobile lntemet base information security system
WANG Jia;FENG Yun-bo;SUN Li-jun;HUANG Guo-xiong;YE Zhi-xiong
..............page:7-10
Construction of the data anti-leakage security system
JIANG Jia-xing;QIAO Zhe;CHEN Xi;LIAO Wei
..............page:33-37
General report of mobile virus governance
LAI Xiao-yang;HONG Jing;HANG Yue-bin
..............page:38-41
Service security for WLAN
WANG Zi-liang;LI Xiang-jun;LIU Song-sen
..............page:15-19