Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Telecommunications Science
1000-0801
2008 Issue 1
jian xun
..............
page:10,18,43,49,63,70,81,94,96,99,102,107-108
shi shi bao hu zai nan wu wei hp dian xin xing ye dao pian jie jue fang an
..............
page:106-107
hsdpa fen zu diao du suan fa de ce shi he bi jiao
gao yue
..............
page:103-105
dslam duan kou su lv da biao lv fen xi
yuan zuo feng
..............
page:100-102
zhong guo yi dong ben di guan dao wang gui hua
zhao chong ming
..............
page:97-99
ngn hua wu fen xi rong ru jiao huan zong he wang guan xi tong de she ji yu shi xian
yuan zhi yi
..............
page:95-96
shou ji you xiang zong he jie jue fang an de she ji yu shi jian
che li jun ; wang zhen ; dai zhong wei
..............
page:90-94
gu wang yun ying shang tuo zhan ict shi chang de mao dun he jie jue si lu
fan yao dong
..............
page:88-89
Application of a Multi-angle Analysis Model in Network Operations
Feng Miao;Qiu Yanjuan;Lu Chuncong
..............
page:82-87
mian xiang ke hu ti yan de zhuan xing ye wu wei hu si kao
cheng wei
..............
page:78-81
li yong fec jie ma jiu cuo ji shu jin xing roadm de zi dong se san bu chang
yang zhao hua ; lei fei
..............
page:76-78
Application of Network Tomography in Network Topology Inference
Zhao Honghua;Chen Ming;Qiu Xiaofeng
..............
page:71-75
Bidirectional Differentiated Services Technologies Solution Used at Interconnection of Networks
Yang Guoliang;Zhang Guangzhao
..............
page:64-70
3G Value-added Services Quality Monitoring Platform Design and Development
Li Baorong;Li Lei
..............
page:58-63
Design and Implementation of the Trusted E-mail System Based on IPv6
Yang Daoquan;Xu Yong;Zhang Ling
..............
page:54-57
New Trends of DDoS Attack and ISP Best Practice
Ji Ye
..............
page:50-54
Research on the Security Mechanisms of IP Multi-media Subsystem
Yang Wu
..............
page:47-49
Analysis of Softswitch Network Security Menace and Requirement
Chen Jian
..............
page:44-47
Classified Protection for Information System
Huang Kaifeng;Zhou Kaiyu
..............
page:39-43
Research on Quantitative Risk Assessment Method for Softswitch
Shi Minrui;Chen Jian
..............
page:33-38
Source Address Spoofing and Prevention Technologies in Internet
Yao Guang;Bi Jun
..............
page:26-32
Status and Study Focuses of Network and Information Security Standard
Huang Yuanfei;Li Xin
..............
page:19-25
A Source Address Validation Test-bed in CNGI-CERNET2
Bi Jun;Wu Jianping;Cheng Xiangbin
..............
page:11-18
China Telecom CRM System Construction Experience and Prospect
Zhao Jun
..............
page:7-10
Chance and Challenge From Importing Internet
Jiang Lintao
..............
page:1-6