Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Telecom Market
1006-6675
2009 Issue 4
da tang yi dong : zai chuang xin zhong wen jian cheng chang
..............
page:1
man zu td-scdma kuai su jian wang , you xiao shi yong pin duan zi yuan da tang yi dong lv xian tui chu a+b shuang pin duan dan tong dao rru
..............
page:2
shi pin fen bu wang luo yong yuan cheng tong ji fu yong ji shu
li zuo ya
..............
page:3
tie lu ti su tong xin chang tong
..............
page:6
2009 nian 4 yue 9-11 ri shen zuo zhong guo quan qiu ding wei yu wei zhi fu wu chan ye lian meng jia zhi lian
..............
page:10
gps shi chang wei lai fa zhan de si wei gai nian
qian bao liang
..............
page:10
jin rong wei ji tu xian zhong guo ruan jiao hui ping tai jia zhi
..............
page:12
A Distributed Storage Architecture Based On Virtual Computing Environment
Zhang Yan;Liu Xin-Ran;Xu Hui-Bin
..............
page:18
Study of P2P System
YANG Li;ZHANG Yong
..............
page:24
The Study for Distributed Tecnology of Streaming Media on the Basement of CDN and P4P
Zhi Fenxiang;Liu Wenjiao;Chen Runzi
..............
page:29
Internet Search Engine
li hui ; zhang min ; song yuan qing
..............
page:33
Reareh and Design of PRES Based on Web Technology
Chen Run zi;Zhi Fen-xiang;Liu Wen-jiao;Liu Bin
..............
page:39
gao xing neng fen bu xi tong zhong de mu lu fu wu
li bo
..............
page:44
DEAMC: A Distributed, Energy-efficient, Adaptive, Mobile, Clustering sensor network protocol
SUN Xueli
..............
page:51
Cluster Routing Algorithm Based on Grads for Wireless Sensor Networks
WANG Ping;LI Feng
..............
page:57
Application Research of Clustering Algorithms in Web Text Mining
Chen Yu;Wang Qiang
..............
page:62
Performance analysis of all-to-all on Gigabit Ethernet cluster
WENG Yu-fen;FANG Jian-bin;CHE Yong-gang;WANG Zheng-hua
..............
page:69
The improvement of UDP and its application in embedded nuclear radiation measurement system
ZHANG Ye;YANG Ming;ZHU Tao-jiang;ZUO Qin-wen
..............
page:74
The Connectivity Analysis of Intermittent Connected Wireless Network
Li Yun;Zhou Yahui;Liu Qilie;Wang Xiaoying
..............
page:79
Feature Selection for Chinese Text Clustering Based on HowNet and Genetic Algorithm
Hu Yuxian
..............
page:87
A predicting model of network situation based on proved BP algorithm
Chen Tao;Gong Zheng Hu;Hu Ning
..............
page:93
Research of the SIM application based on the OTA technology
ZHU Zhengjian;DA Feipeng;QUE Chaoyang;CHEN Xuxiang
..............
page:100
Design and simulation of direct digital frequency synthesizer based on FPGA
WU Shi-yun;YE Jian-fang;Liu Min
..............
page:109
Design and Implementation of Wireless Communication Encoding Module for UHF RFID
Zhao-na Zheng;Peng Sun
..............
page:114
Draft2.0 The design and implementation of MANET mobile terminal based on IEEE 802.11n
Chen Tiaoli;Liu Zhiyong
..............
page:119
Analysis of Mobile Clients Segmentation on basis of Data Mining
LI Fen;WU Junjie
..............
page:124
Research on BOC modulation signal
HUANG Jing-hua;FU Hai-peng;WEI Xun
..............
page:130
Ethernet Communications Implement of AT89S51 by ZNE-100T
Wang Xian;Bai Yitong
..............
page:135
Raytheon Radar data decoding based on Serial communication
Liu Jian-Jun
..............
page:139
zigbee ji shu zai wu xian ding wei ling yu de ying yong
huang hai
..............
page:145
Application of AHP-level Analysis in Network Emergency Preparedness Plans
LI Hao-tian;NIU Shao-zhang
..............
page:153
Design & Implementation of Security Evaluation Support System
Liu Wei;Zeng Qingkai
..............
page:159
Emergency Automatic Dispatching in the Community Safety GIS
Xu Yuan;Li Gang
..............
page:166
Study on Deming Ring in the Operation of CSIRT
SHOU Qing-hao;NIU Shao-zhang
..............
page:170
Design and Implementation of Network Monitor Management System
XU Yang-yang;LIU Xue-ling
..............
page:174
A Rational Secret Sharing Based on Special Access Right
DONG Wei;XU Qiu-Liang
..............
page:180
Improvement of Needham-Schroeder Protocol with Shared Keys
Miao Xianghua
..............
page:185
An order-preserving encryption method operating the encrypted data directly
Duan You-xiang;Li Yan-qiu
..............
page:193
A New Kind of Task Scheduling of Operating System Based on Dual-Bus Secure Architecture
Wenze Huang;Fengjing Shao;Rencheng Sun
..............
page:200
Detecting and Defending DNS DDoS Attacks Based on Statistical Analysis and Flow Controls
ZONG Zhao-wei;LI Feng;ZHAI Zheng-de
..............
page:206
Security Protection Model and methods for Computer Network Terminals
Xiao Zhi-ting;Xu Yong-He;Ren Yi
..............
page:214
Assistant Secret-level Setting of Uncertain Inference Based on Reliability
Zhang Fan;Lu Yu
..............
page:218
Research on XML Digital Signature in Electronic Commerce
Cao Jin-gang
..............
page:223
Research of dual authentication of Trusted Storage Based on TPM
Wang Guan;Xue Bing
..............
page:228
An Intrusion Detection System Basing on Outlier Mining
BAI Ya-nan;REN Guang-wei
..............
page:234
Personnel emergency evacuation direction simulation research
Li Cheng-qiang;Song Da-peng;Li Yun-long
..............
page:241
Computer Forensics in the United Forensics Software Application
Wang Lei;Wu Zifeng
..............
page:246
A body-driven sub-1v low voltage bandgap reference
Su Gongxun;Huang Wenda;Feng Yongjian
..............
page:250
The Design and Manufacture For the Miss Distance Vector Measurement Software System
Liu Li
..............
page:256
yu zhong bu tong : ying pan zhu yin dao shan qu de du li
wang ji zhu ; niu shao zhang
..............
page:260
The analysis and assessment of E-Government's input&output
Liu Yongyan
..............
page:264
Research and Implementation on archives circulation system that Based on JBPM
Liu li-kun;Pan wei
..............
page:268
The Theory of Perfect Ternary Sequences Pairs
CHEN Wen-bo;GUO Ji-shan
..............
page:274
A Study of Common Resource Conflicting Based on System Dynamics
Shuang Lin;Guozhu Jia
..............
page:278
Analysis and Study of Buffer Overflow
Liu Sidong;Zen TaoYu;Yongquan
..............
page:284
A Comparative Research Based of Spectrum Similarity Measurements In Information Resource Science
Li Binbin;Luo Le
..............
page:290
Research on metadata integration architecture
WANG Cui-ru;GAO Li-xian
..............
page:296
Teaching Methods of Cycle Structure in C Language
Shi Lei;Chen Weiwei
..............
page:301
A Survey of semantic annotation technology in (X)HTML:RDFa
SONG Yu;ZHENG Yi;WU Yan
..............
page:306
Aspect-oriented Dynamic Behavior Modeling
LIAN Ruo-mu;WANG Li;CAI Hua-li;ZHANG Ji-chun
..............
page:313
The Design of Wireless Temperature Controlled Electric Fan Governor Based on MCU
FAN Lingzhi
..............
page:321