Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Telecom Market
1006-6675
2012 Issue 1
zhong duan ce lue lian tong 3g fa zhan de zhong tou xi
qiu huan huan
..............page:1-3
mi guan ji shu zai wang luo an quan zhong de ying yong
zou hong mei ; li ying ; wu xiao wan
..............page:101-104
A Survey of Digital image forensics based on JPEG header
zuo ru ; li ye zhou ; niu shao zhang ; meng xian zhe ; wu xiao mei
..............page:59-63
Development Edge Tool of Distributed System--Study of ZooKeeper
wang run hua ; ren hua min ; zhou yan fang
..............page:64-67
Research of Fair scheduler algorithm in Hadoop platform
zhou gen hong ; yang guo gui
..............page:105-110
Research of the Mandatory Integrity Control Mixed Biba with TE Policy
lin qiao zuo ; chen song zheng ; wei li feng
..............page:111-119
Smart Antenna based Joint Transmission Algorithm in TD-SCDMA Systems
liu chao ; hu ai qun ; song xiao qin
..............page:129-135
The Design and Realization of XX Info System Based on Solaris
yu gang ; wang guo sheng ; zhang lei
..............page:96-100
Design and implementationA of personalized service push based on middleware technology and intelligent pipeline
wang yue bin ; liu tie min ; su ren chao ; feng qing yuan ; lv xiang hui
..............page:37-41
Simulation realization based on Linux scheduling system
di guang ye ; yang guo gui
..............page:91-95
ji yu gai jin de yi chuan suan fa de che liang lu jing wen ti yan jiu
wang shun shun ; zuo wei jian ; dong liang cai
..............page:85-90
A Method of Accessing Control Address Space based on MCU and FPGA
xu zuo ; li zuo ; yang li zuo
..............page:32-36
Research on Information Security in Cloud Computing
li zhu qun
..............page:125-128
A method of measuring program regions' runtime data based on profiling
luo zhao cheng ; yi hui zhan
..............page:120-124
xin pin zhi chuang
..............page:20-22
tong xin duan bo
..............page:23-24
ye wu xin xi an quan fang sim ka fu zhi zong he zhi li
lin peng ; li hui guang ; liang ru kai
..............page:136-139
Three-dimensional virtual display system based on Flash
chen chong ; shen guo qiang
..............page:68-72
The Research and Analysis of the personalization likes Based on No.7 Signaling Mining
liu tie min ; feng qing yuan ; wang yue bin ; su ren chao ; lv xiang hui
..............page:42-46
xiao ling tong tui shi jin tui liang nan de ji lei
liang li hong
..............page:4-4
The application of DHCP syslog sampling and analysisin a enterprise intranet
cheng gang ; ren ming hui ; zhang zuo
..............page:26-31