Home
|
Survey
|
Payment
|
Talks & Presentations
|
Job Opportunities
Journals
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Telecom Market
1006-6675
2013 Issue 2
zheng qi shi chang , san guo sha ru huo ru zuo
cao xian zhen
..............
page:1-3
wang luo zhan zheng de yi shu
daniel ayoub
..............
page:13-14
zhuan ye yong hu shou xuan san xing 27 cun guang shi jiao xian shi qi s27a850d
..............
page:7
san xing shang yong da li kai tuo guo nei shu zi biao pai shi chang
..............
page:10-11
di tan huan bao geng an quan san xing zhu li zheng fu ban gong jie jue fang an
..............
page:9
dang jin shou xi xin xi guan jiao se xin zhuan bian
pan jia chi
..............
page:11-12
tong xin duan bo
..............
page:17-18
Research on property insurance call center system construction scale based on measurement
SHANG Yan
..............
page:20-24
Ear Divergence Feature Extraction and Matching Based on Force Field Transformation
CUI Yan-Wei
..............
page:36-41
A method of radio wave reflection error for multi-static radar
Zhang Yanpeng;Xue Junshi;Li wei
..............
page:42-46
Research of carrier estimation based on modified High-order cyclic cummulant
HAO Jianhua;LU Maochang
..............
page:25-29
The design of optic date cross connect module
Wang Yongai
..............
page:47-51
Several Question about COSMIC Data Movement Uniqueness
XU Zhi;HE Hong-jun;MAI Xin-hui;LIU Qing-he
..............
page:30-35
Research the image fusion algorithm of PCA based on GPU
FANG Min-quan;ZHOU Hai-fang;YAO Tian-wen;SHEN Xiao-long
..............
page:52-56
Security Analysis for DHCP Lease Time
GAO Ying;MEI Jia
..............
page:57-62
qiang qiang lian he , gong chuang bei dou xin ge ju sai ge dao hang yu tai dou wei dian zi qian shu zhan lue he zuo xie yi
..............
page:14
Using genetic algorithm to realize frequency hopping signal sparse decomposition based on MP
Yi QIN;Weigang ZHU;Qiquan SHU
..............
page:73-77
Radar Optimal Waveform Algorithm by Maxmize The Signal-to-Noise Ratio
Hu Xu;Shu Qiquan;Gao Yang
..............
page:63-68
Design and Implementation of Power Communication Resources Network Early Warning Based on Threshold Method
lv shun li ; zhou zuo ; hong zi huan ; wu zhan ; zuo sheng chao ; gao fei
..............
page:78-82
A Method for Delicate Control of the MES Software Permission
..............
page:69-72
Study on the Risk Analysis of Classified Information Security
Si Qingmin;Wu Qiong;Zhang Min
..............
page:83-87
Case analysis of distributed systems based on Kilin platform
LI Yan-nan
..............
page:93-97
xin pin zhi chuang
..............
page:15-16
The security payment research based on theencrypted SD card
Yun Xiao-ming;Zhang Wen;Niu Shao-zhang
..............
page:88-92
Research the achievable secrecy rate of MISO wiretap channel based on artificial interference
Zhang Jinhu
..............
page:98-102
Side Channel Cube Attack on PRINCE
Cheng Lei;Sun Bing;Li Chao
..............
page:107-114
A Design and Implementation of Voting system Based on GSM SMS function
HU-Lishuan
..............
page:115-119
Design of Network Security Active Defense Model
CAO Jin-gang
..............
page:103-106
ovum:2012 nian it fu wu shi chang can dan shou wei
..............
page:4
infocomm2013: san xing quan xin zhi neng shang wu jie jue fang an zuo zuo liang xiang
..............
page:7-8
tong guo she jiao xie zuo shi xian ling huo he chuang xin citrix,google,vmware he yammer zhi yin dao lu
..............
page:4
kuan dai shi chang , ti su yu rong he bing jin
hu jia yao
..............
page:5-6