Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of Wuhan University(Natural Science Edition)
1671-8836
2013 Issue 5
ji yu android ping tai de zhi neng shou ji di li shu ju hui fu
WU Xixi;LI Binglong;Information Engineering University;State Key Laboratory of Mathematic Engineering and Advanced Computing;
..............page:449-452
ji yu zui da zhi ju li ma de niederreiter gong yue mi ma ti zhi de gai jin
ZHANG Xiaode;XU Chungen;Department of Applied Mathematics;Nanjing University of Science and Technology;
..............page:477-480
xu ni hua xi tong zhong de gong ji yu fang hu mo xing yan jiu
WANG Xiaorui;WANG Qingxian;GUO Yudong;LU Jianping;Fourth Department;PLA Information Science and Technology University;State Key Laboratory of Mathematical Engineering and Advanced Computing;Department of Communication Command;Chongqing Communication Institute;
..............page:416-424
yi zhong ji yu shou ji ling pai he nfc ji shu de shen fen ren zheng xi tong
WANG Juan;TANG Ximing;WANG Yong;YAN Fei;MA Jun;XU Jing;SUN Qingxin;School of Computer;Wuhan University;Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education;
..............page:403-410
yi zhong ji yu li dai shu de mi ma ti zhi
WU Wanqing;ZHANG Huanguo;WU Shuomei;MAO Shaowu;School of Computer;Wuhan University;Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education;Wuhan University;Computer Department;Shijiazhuang University;
..............page:465-470
yi zhong mian xiang yun fu wu de zi zhu xin yu guan li ji zhi
WU Qingtao;ZHANG Xulong;ZHANG Mingchuan;ZHENG Ruijuan;LOU Ying;Information Engineering College;Henan University of Science and Technology;
..............page:425-430
zhen dui sui ji shi jian pian dui kang de pa fen xi fang fa yan jiu
TANG Ming;SUN Weijin;WANG Xin;LEI Gang;PENG Hongbo;QIU Zhenlong;LI Weijie;School of Computer;Wuhan University;Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education;
..............page:481-485
yue shu tiao jian xia ji yu qu jian zu he de ce shi yong li sheng cheng
YANG Jian;ZHANG Huanguo;School of Computer;Wuhan University;Management Department;South-Central University for Nationalities;State Key Laboratory of Software Engineering;Wuhan University;Key Laboratory of Aerospace Information Security and Trust Computing of Ministry of Education;
..............page:458-464
ji yu k-svd zi dian xue xi de he cheng tu xiang mang jian ce
WANG Wei;ZENG Feng;DUAN Xintao;LI Hongjun;LIU Haisheng;School of Electronics and Information;Nantong University;School of Computer and Information Technology;Henan Normal University;
..............page:499-504
jie he yi cun guan lian fen xi he gui ze tong ji fen xi de qing gan ci ku gou jian fang fa
LI Yonggan;ZHOU Xueguang;SUN Yan;ZHANG Huanguo;School of Computer;Wuhan University;Department of Computer;Henan Vocational School of Quality Engineering;Department of Information Security;Naval University of Engineering;
..............page:491-498
ji yu tu xiang kuai xiang guan xing fen lei de jia mi yu ke ni shu ju yin cang
LIU Shangyi;HUO Yongjin;LUO Xinrong;BAI Zhongliang;WEI Linfeng;XIANG Shijun;School of Information Science and Technology;Jinan University;
..............page:486-490
yi zhong ji yu gai jin fuzzing jia gou de gong ye kong zhi she bei lou dong wa jue kuang jia
XIANG Shuang;ZHAO Bo;JI Xiangmin;ZHANG Huanguo;School of Computer;Wuhan University;Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education;College of Computer and Information;Fujian Agricultural and Forestry University;
..............page:411-415
yi zhong qos ke xin zeng qiang de fu wu xuan ze fang fa
HE Xingya;WANG Haiyan;YANG Wenbin;College of Information Engineering;Yangzhou University;College of Computer Science;Nanjing University of Posts and Telecommunications;
..............page:443-448
ji yu xin xi liu mo xing de tcb wan zheng xing ce lue fen xi fang fa yu gong ju
HU Wei;JI Dongyao;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:431-437
ji yu ke xin ji suan de che lian wang yun an quan mo xing
ZHANG Wenbo;BAO Zhenshan;LI Jian;College of Computer Science;Beijing University of Technology;Beijing Municipal Key Laboratory of Trusted Computing;
..............page:438-442
ji yu tu bian ji ju li de e yi dai ma jian ce
YANG Fan;ZHANG Huanguo;FU Jianming;SHEN Zhidong;School of Computer;Wuhan University;Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education;Computer School;China University of Geosciences;School of International Software;Wuhan University;
..............page:453-457
aes jia mi yin qing bing xing hua she ji yu shi xian
SU Yang;Department of Electronic Technology;the College of Chinese Armed Police Force;
..............page:471-476