Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Telecom Market
1006-6675
2009 Issue 4
tie lu ti su tong xin chang tong
..............page:6
gps shi chang wei lai fa zhan de si wei gai nian
qian bao liang
..............page:10
A Distributed Storage Architecture Based On Virtual Computing Environment
Zhang Yan;Liu Xin-Ran;Xu Hui-Bin
..............page:18
Study of P2P System
YANG Li;ZHANG Yong
..............page:24
The Study for Distributed Tecnology of Streaming Media on the Basement of CDN and P4P
Zhi Fenxiang;Liu Wenjiao;Chen Runzi
..............page:29
Internet Search Engine
li hui ; zhang min ; song yuan qing
..............page:33
Reareh and Design of PRES Based on Web Technology
Chen Run zi;Zhi Fen-xiang;Liu Wen-jiao;Liu Bin
..............page:39
Application Research of Clustering Algorithms in Web Text Mining
Chen Yu;Wang Qiang
..............page:62
Performance analysis of all-to-all on Gigabit Ethernet cluster
WENG Yu-fen;FANG Jian-bin;CHE Yong-gang;WANG Zheng-hua
..............page:69
The improvement of UDP and its application in embedded nuclear radiation measurement system
ZHANG Ye;YANG Ming;ZHU Tao-jiang;ZUO Qin-wen
..............page:74
The Connectivity Analysis of Intermittent Connected Wireless Network
Li Yun;Zhou Yahui;Liu Qilie;Wang Xiaoying
..............page:79
A predicting model of network situation based on proved BP algorithm
Chen Tao;Gong Zheng Hu;Hu Ning
..............page:93
Research of the SIM application based on the OTA technology
ZHU Zhengjian;DA Feipeng;QUE Chaoyang;CHEN Xuxiang
..............page:100
Design and simulation of direct digital frequency synthesizer based on FPGA
WU Shi-yun;YE Jian-fang;Liu Min
..............page:109
Analysis of Mobile Clients Segmentation on basis of Data Mining
LI Fen;WU Junjie
..............page:124
Research on BOC modulation signal
HUANG Jing-hua;FU Hai-peng;WEI Xun
..............page:130
Ethernet Communications Implement of AT89S51 by ZNE-100T
Wang Xian;Bai Yitong
..............page:135
Application of AHP-level Analysis in Network Emergency Preparedness Plans
LI Hao-tian;NIU Shao-zhang
..............page:153
Design & Implementation of Security Evaluation Support System
Liu Wei;Zeng Qingkai
..............page:159
Emergency Automatic Dispatching in the Community Safety GIS
Xu Yuan;Li Gang
..............page:166
Study on Deming Ring in the Operation of CSIRT
SHOU Qing-hao;NIU Shao-zhang
..............page:170
Design and Implementation of Network Monitor Management System
XU Yang-yang;LIU Xue-ling
..............page:174
A Rational Secret Sharing Based on Special Access Right
DONG Wei;XU Qiu-Liang
..............page:180
Improvement of Needham-Schroeder Protocol with Shared Keys
Miao Xianghua
..............page:185
An order-preserving encryption method operating the encrypted data directly
Duan You-xiang;Li Yan-qiu
..............page:193
A New Kind of Task Scheduling of Operating System Based on Dual-Bus Secure Architecture
Wenze Huang;Fengjing Shao;Rencheng Sun
..............page:200
Detecting and Defending DNS DDoS Attacks Based on Statistical Analysis and Flow Controls
ZONG Zhao-wei;LI Feng;ZHAI Zheng-de
..............page:206
Security Protection Model and methods for Computer Network Terminals
Xiao Zhi-ting;Xu Yong-He;Ren Yi
..............page:214
Research on XML Digital Signature in Electronic Commerce
Cao Jin-gang
..............page:223
Research of dual authentication of Trusted Storage Based on TPM
Wang Guan;Xue Bing
..............page:228
An Intrusion Detection System Basing on Outlier Mining
BAI Ya-nan;REN Guang-wei
..............page:234
Personnel emergency evacuation direction simulation research
Li Cheng-qiang;Song Da-peng;Li Yun-long
..............page:241
Computer Forensics in the United Forensics Software Application
Wang Lei;Wu Zifeng
..............page:246
A body-driven sub-1v low voltage bandgap reference
Su Gongxun;Huang Wenda;Feng Yongjian
..............page:250
yu zhong bu tong : ying pan zhu yin dao shan qu de du li
wang ji zhu ; niu shao zhang
..............page:260
The Theory of Perfect Ternary Sequences Pairs
CHEN Wen-bo;GUO Ji-shan
..............page:274
A Study of Common Resource Conflicting Based on System Dynamics
Shuang Lin;Guozhu Jia
..............page:278
Analysis and Study of Buffer Overflow
Liu Sidong;Zen TaoYu;Yongquan
..............page:284
Research on metadata integration architecture
WANG Cui-ru;GAO Li-xian
..............page:296
Teaching Methods of Cycle Structure in C Language
Shi Lei;Chen Weiwei
..............page:301
A Survey of semantic annotation technology in (X)HTML:RDFa
SONG Yu;ZHENG Yi;WU Yan
..............page:306
Aspect-oriented Dynamic Behavior Modeling
LIAN Ruo-mu;WANG Li;CAI Hua-li;ZHANG Ji-chun
..............page:313