Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Telecom Market
1006-6675
2011 Issue 4
guang xian zu jian shi chang zeng chang fa li di er ji du jiang shuai tui
..............
page:6-6
inmarsat xie shou bei jing chuan bo tong xin dao hang gong si liang xiang
..............
page:11-11
ofweek guang tong xun yan tao hui cha shang guang wang teng fei zhi yi
..............
page:11-11
qmap ji yu wu lian wang gui mo hua shi shi yi ti hua ying yong
..............
page:26-26
xian shi qi kan 3d da pian gong lue ! wang you chao shuang ti yan san xing sa950
..............
page:18-19
An ant colony algorithm based on meshing strategy for reliability optimization of all-terminal network
liu yan qiu ; du jiao jiao
..............
page:48-54
zhong guo yi dong you ji hui cheng wei you xian dian shi ye zhe ma
..............
page:5-5
ying dui wu da wang luo an quan wei xie ni zhun bei hao liao ma wang lu yao arc sight ya tai qu xing xiao zong jian zuo ce lue gou tong chang
..............
page:1-1
An Improved Mobbile Localization Algorithm For Sensor Networks
zhang rui heng ; zhuang yi
..............
page:74-78
fusion-i0 bing gou 10 turbine
..............
page:9-9
neng liang chuan shu guang xian ji qi zuo he qi de fa zhan
shen zi qing ; ren jian guo ; yang hua yong
..............
page:43-47
ya tai qu yin ling ipv6 de cai yong pu ji
..............
page:7-7
2012 nian ya tai qu it yu suan zeng jia
..............
page:4-4
Research on information technology security evaluation and methodology based on CC
li guo jun ; wang rui lin
..............
page:79-84
Study of Pervasive Computing System for Self-driving Tour Based on Internet of Things
hu juan ; zhou yi peng ; li huan chun ; wang run hua
..............
page:128-132
ya tai qu ip yu yin guan li fu wu shi chang jiang cheng chang san bei
..............
page:6-6
Applications And Development of Location-Based Service in Pervasive Environment
hu xing ; shi dian xi
..............
page:117-122
lian fa ke ji xie shou chan ye lian wei wcdma chan ye fa zhan
..............
page:27-27
The Research of Web Content Recommendation System
song chao
..............
page:123-127
shou ci zhen dui pon she bei bu shu jian she bi li de fen xi jie lu jing ren de yan jiu jie guo
..............
page:5-5
xin pin zhi chuang
..............
page:32-34
bu gou zhong shi an quan xing dao zhi wang zhan chu xian lou dong
..............
page:6-6
tian zuo zi gong si aster data de zhuan li ji shu da kai da shu ju shang ji da men
..............
page:27-28
Policy Based Link Selection Algorithm
yang zhi wen ; shi dian xi ; guo chang guo
..............
page:69-73
asigra zhu li hui ji gong si zhao hui diu shi de shu ju
..............
page:9-9
xiao yuan tong xin shi chang jing zheng feng qi yun yong
..............
page:12-12
lion xia zai liang shou ri tu po 100 wan
..............
page:7-7
dian xin yun ying shang qiang ke ji lia tou xi
xie jian chao
..............
page:17-17
ni jia shui zuo fan ji qi ren !
..............
page:2-3
cai yong zhi neng ka ji shu you hua shi you tian ran qi xing ye de shen fen yan zheng yu men jin guan li xi tong
..............
page:28-28
tong xin duan bo
..............
page:35-37
A Multi-Thread Packet Classification Algorithm Based on Multi-Core NPU
liu wen zuo ; chen shu zuo ; xuan lei
..............
page:55-61
2015 nian ya tai qu cai fu guan li it zhi chu jiang da 46 yi
..............
page:8-8
gong neng shou ji feature phone app shi chang jiang fan bei
..............
page:4-4
di li kong jian xin xi zhi neng
..............
page:29-31
cong yun ying shang de shi jiao lai kan yi dong jian kang fu wu de xian zhuang he wei lai fa zhan
xu li qun
..............
page:13-16
Source Validation Technique of Active Path Identification
wei jian ; cai gui lin ; wang bao sheng ; zhang shuo
..............
page:62-68
apple app store xia zai liang tu po 150 yi
..............
page:8-8
zhu da xing jia bi san xing tui chu shang yong xian shi qi sa200
..............
page:20-21
Soft Error Reliability Evaluation of Combinational Logic Element
sun jin yin ; li zuo
..............
page:105-109
yuan cheng yi liao ji shu yi jing zhun bei jiu xu
..............
page:25-25
A Selection Method of Recommenders Based on Reputation and Genetic Algorithm in P2P Network
huang hai ; xu feng
..............
page:110-116
Research of High Performance Firewall Based On IPv6
jiang feng ; wang yong jun ; wang xiao dong ; jie pei zuo
..............
page:85-92
ya tai ling shou ye ke hu guan xi wai bao ye zhe cheng chang ji hui
..............
page:11-11
component-based distributed workflow modeling and verification
liu xu peng
..............
page:93-98
Research on the Ciphertext Retrieval System Based on Search History
xie xian ming ; wu qing bo ; tan yu song
..............
page:99-104
hui pu yan jiu fa xian yi zhi wang luo fan zui cheng ben shang sheng 56
..............
page:10-10
wu feng pin jie shi dai san xing shang yong ao shi qun xiong
..............
page:21-22
di qi jie ruan bo hui ji jiang ju xing
..............
page:24-25
mspmentor250 jiang wei yun bei fen xing ye de ling dao zhe
..............
page:10-10
tong yi tong xin shi chang zai zhong guo qian jing kan hao
..............
page:5-5
hua qian mai ming bai ! hong yun sa330 dao di na li hao
..............
page:19-20
Scheme on Backstage Management of IPTV Video Website
shu nan fei ; wang fang ; wu yuan ; yu zhi qiang ; wang jie bin ; ding yao ; tang ling
..............
page:39-42
di liu jie ofweek guang tong xun ji shu yan tao hui ji jiang sheng da qi hang
..............
page:23-23