Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Telecommunications Science
1000-0801
2009 Issue 2
Research of China Telecom OSS Transformation and Construction Based on the Successful Transformation of BT
Su Gengshu;Yu Qianli
..............
page:1-6
fttx guang fen lu qi zu jian de fen lei ji xing neng zhi biao fen xi
jin guang zhao ; zhu bing bing
..............
page:7-11
ji yu ke diao xie shi rs-potdr shi xian yi an zhuang guang xian lei ji pmd fen bu de ce liang
francis;audet;andr ;girard;hongxin;chen;gregory;w.schinn
..............
page:12-15
Discussion on the Situation and Some Issues of Network and Information Security
Huang Yuanfei;Gu Liyong;Jin Liping
..............
page:16-20
Overview of Mobile Communication Services Security
Bai Hongtao;Liu Hailong;Ren Xiaoming;Liu Fei
..............
page:21-28
Security Threats and Technology Development Trends of Information Network
Zheng Zhibin
..............
page:28-34
Identity Management Technology and Its Development
Chen Jianyong;Wu Guihua
..............
page:35-41
amdocs wei zhong guo dian xin yun ying shang da zao ben tu hua chan pin he fu wu
hu xiao nv
..............
page:121-122
ji yu jia ting wang guan de wu sheng yu yin fmc jie jue fang an
han jian ting ; ma zhi yong ; hu bing song ; huang yan
..............
page:117-121
da ke hu kuan dai zhuan wang ye wu xu qiu yu mstp pei zhi fang an fen xi
wu fei ; chen hong biao ; sha qing liang
..............
page:112-116
dian xin zhong zu guo cheng zhong yun ying shang 3g wang guan xi tong jian she ce lue tan tao
wang hong ding ; zhang zhi jiang ; zhang fan ; zhu xiao yan
..............
page:108-111
A Low Complexity Echo Canceller on TMS320DM642
Gao Guoping;Chen Shuixian
..............
page:102-107
Research of Telecommunication Product Model
Yang Yuyan;Zhao Dongsheng
..............
page:96-101
A FFT/IFFT Processor for MB-OFDM UWB Applications
Liang Huaguo;Tan Mindong;OuYang Yiming
..............
page:90-95
Applications of RNS in SDR Systems
Ma Shang;Hu Jianhao;Ling Xiang
..............
page:84-89
Research on Graded Network and Information System Security Defense Mechanism
Zhao Yang;Zhang Jian;Wang Xinfeng
..............
page:80-83
Study and Trends on Client-side Malicious Code of Web Application
Huang Wei;Cui Baojiang;Hu Zhengming
..............
page:72-79
Attack and Defense of Software Vulnerability
Chen Xin;Cui Baojiang;Fan Winqing;Niu Xinxin
..............
page:66-71
Research About System-behavior-based Anomaly Detection Technologies
Zhou Binbin;Cui Baojiang;Yang Yixian
..............
page:59-65
Discuss on Internet Traceback
Wei Liang
..............
page:55-59
Security Schemes and Development Trends of Evolved Broadband Wireless Communication Systems
Wu Hao;Wu Shaobo;Zhong Zhangdui
..............
page:48-54
Development and Analysis of Managed Security Services in North America
Zhou Sining;Xiang Youjun
..............
page:41-47