Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Telecom Market
1006-6675
2013 Issue 2
zheng qi shi chang , san guo sha ru huo ru zuo
cao xian zhen
..............page:1-3
wang luo zhan zheng de yi shu
daniel ayoub
..............page:13-14
dang jin shou xi xin xi guan jiao se xin zhuan bian
pan jia chi
..............page:11-12
tong xin duan bo
..............page:17-18
A method of radio wave reflection error for multi-static radar
Zhang Yanpeng;Xue Junshi;Li wei
..............page:42-46
Research of carrier estimation based on modified High-order cyclic cummulant
HAO Jianhua;LU Maochang
..............page:25-29
The design of optic date cross connect module
Wang Yongai
..............page:47-51
Several Question about COSMIC Data Movement Uniqueness
XU Zhi;HE Hong-jun;MAI Xin-hui;LIU Qing-he
..............page:30-35
Research the image fusion algorithm of PCA based on GPU
FANG Min-quan;ZHOU Hai-fang;YAO Tian-wen;SHEN Xiao-long
..............page:52-56
Security Analysis for DHCP Lease Time
GAO Ying;MEI Jia
..............page:57-62
Radar Optimal Waveform Algorithm by Maxmize The Signal-to-Noise Ratio
Hu Xu;Shu Qiquan;Gao Yang
..............page:63-68
Design and Implementation of Power Communication Resources Network Early Warning Based on Threshold Method
lv shun li ; zhou zuo ; hong zi huan ; wu zhan ; zuo sheng chao ; gao fei
..............page:78-82
Study on the Risk Analysis of Classified Information Security
Si Qingmin;Wu Qiong;Zhang Min
..............page:83-87
xin pin zhi chuang
..............page:15-16
The security payment research based on theencrypted SD card
Yun Xiao-ming;Zhang Wen;Niu Shao-zhang
..............page:88-92
Side Channel Cube Attack on PRINCE
Cheng Lei;Sun Bing;Li Chao
..............page:107-114
Design of Network Security Active Defense Model
CAO Jin-gang
..............page:103-106
kuan dai shi chang , ti su yu rong he bing jin
hu jia yao
..............page:5-6