Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Informotion & Communications
1673-1131
2008 Issue 5
Research on the Encryption Scheme of WiMAX
LANG Wei-min;WU Jian-hua;QI Xiang-yu;SONG Shan-Shan
..............
page:8-11
guo ji yao wen
..............
page:7
guo nei yao wen
..............
page:4-7
Communication and monitoring for inverter based on Profibus-dp
Sang jian-ming;Li ying-jie;Zhang shi-feng
..............
page:78-80
Light Source-LED Applied in TV
Wang Chunli;Wang Zhe
..............
page:75-77,74
the study of influencing from ground reflection electromagnetic wave
Zhao Guo-qun;Zhu Feng
..............
page:72-74
tie tong hu lian wang ye wu jie zhu p2p ji shu teng fei
zhang jin zuo
..............
page:69-71
The appliance of hmm-based trainable speech synthesis to Uyghur
Askarrozi;Askarhamdulla
..............
page:66-68
Based on MVC pattern chemical enterprise ERP production management system\'s realization
ZHANG Han-wen;GAO Shu-zhi
..............
page:63-65
Smart antenna technology in mobile communication application
LI wei
..............
page:60-62
Implementation of Intelligent community access network of broadband communication
Hao Xiaorong
..............
page:57-59
Association Rules Mining for the Demand of Telecommunication Customer Service
XU Yan;CHEN Ling
..............
page:53-56
Bus arbitration design on MPEG2 video decode system
du juan
..............
page:15-16
The research of ad hoc networks simulation based on NS2
Kang chun-nian
..............
page:12-14
An Intrusion Detection System for Fighting Against DDoS Attacks
Xue Jie;Shan Pei-wei;Li Ming
..............
page:40-42
qian xi " mai ma " hua wu yong sai zhong ye wu xin dao fen pei cheng gong lv de you hua
dai ming
..............
page:36-39
xin xing yi tai wang ji shu zai kuan dai jie ru wang zhong de ying yong
he yuan feng
..............
page:33-35,23
pon ji shu zai jie ru wang guang jin tong tui fa zhan zhong de you shi yu ying yong
feng yan
..............
page:31-32
shi pin bian ma biao zhun h.264 de yun dong bu chang ji shu fen xi
wang li fei
..............
page:29-30
rong ru hsdpa ji shu de td-scdma xi tong wang luo gui hua qian xi
li wei ; wang shao jun ; sun sheng
..............
page:51-52
Design of Mobile Network Game form and process Based on JSP
Zhu Quanyin;Zhang Hui;Kong Qingxia;Xu Chaojun
..............
page:48-50,68
Multiple Input Multiple Output Smart Antenna in Mobile Communication System
Cui Nan;Xu Xianling
..............
page:45-47,28
Research on wireless campus network based on WLAN technology
Zhaoli;Xu Chunmei
..............
page:43-44
A Study of Survivability of ASON
cai can yu
..............
page:24-28
cdma450 wu xian xin dao gong lv pei zhi
wu yun cai
..............
page:20-23
The Application of Elliptic Curve Cryptosystem and its Safety Analysis
Wang Yan-hong;Zhou Jun
..............
page:17-19