Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Telecommunications Science
1000-0801
2009 Issue 2
fttx guang fen lu qi zu jian de fen lei ji xing neng zhi biao fen xi
jin guang zhao ; zhu bing bing
..............page:7-11
ji yu ke diao xie shi rs-potdr shi xian yi an zhuang guang xian lei ji pmd fen bu de ce liang
francis;audet;andr ;girard;hongxin;chen;gregory;w.schinn
..............page:12-15
Discussion on the Situation and Some Issues of Network and Information Security
Huang Yuanfei;Gu Liyong;Jin Liping
..............page:16-20
Overview of Mobile Communication Services Security
Bai Hongtao;Liu Hailong;Ren Xiaoming;Liu Fei
..............page:21-28
Identity Management Technology and Its Development
Chen Jianyong;Wu Guihua
..............page:35-41
ji yu jia ting wang guan de wu sheng yu yin fmc jie jue fang an
han jian ting ; ma zhi yong ; hu bing song ; huang yan
..............page:117-121
da ke hu kuan dai zhuan wang ye wu xu qiu yu mstp pei zhi fang an fen xi
wu fei ; chen hong biao ; sha qing liang
..............page:112-116
dian xin zhong zu guo cheng zhong yun ying shang 3g wang guan xi tong jian she ce lue tan tao
wang hong ding ; zhang zhi jiang ; zhang fan ; zhu xiao yan
..............page:108-111
A Low Complexity Echo Canceller on TMS320DM642
Gao Guoping;Chen Shuixian
..............page:102-107
Research of Telecommunication Product Model
Yang Yuyan;Zhao Dongsheng
..............page:96-101
A FFT/IFFT Processor for MB-OFDM UWB Applications
Liang Huaguo;Tan Mindong;OuYang Yiming
..............page:90-95
Applications of RNS in SDR Systems
Ma Shang;Hu Jianhao;Ling Xiang
..............page:84-89
Research on Graded Network and Information System Security Defense Mechanism
Zhao Yang;Zhang Jian;Wang Xinfeng
..............page:80-83
Study and Trends on Client-side Malicious Code of Web Application
Huang Wei;Cui Baojiang;Hu Zhengming
..............page:72-79
Attack and Defense of Software Vulnerability
Chen Xin;Cui Baojiang;Fan Winqing;Niu Xinxin
..............page:66-71
Research About System-behavior-based Anomaly Detection Technologies
Zhou Binbin;Cui Baojiang;Yang Yixian
..............page:59-65
Discuss on Internet Traceback
Wei Liang
..............page:55-59
Development and Analysis of Managed Security Services in North America
Zhou Sining;Xiang Youjun
..............page:41-47