Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of University of Science and Technology of China
0253-2778
2009 Issue 2
Limited feedback precoding interference suppression scheme in multi-cell MIMO systems
LIU Nai-jin;QIU Ling;ZHU Jin-kang
..............page:113-119
Multiuser MIMO block diagonalization system with differential unitary space-time modulation
ZHU You-tuan;TANG Zhi-hua;ZHU Jin-kan;QIU Ling
..............page:120-124
A novel multipath routing and traffic distribution algorithm in wireless Ad hoc network
WANG Hui;SHAN Jian-feng;YU Neng-hai
..............page:125-131
Remote sensing image retrieval based on multiple instance learning
GE Yong;WU Xiu-qing;HONG Ri-chang
..............page:132-136
An OFDM timing synchronization method for multi-cell systems
SHI Guan-chao;DENG Dan;ZHU Jin-kang
..............page:142-147
Research on watermarking of iris images in Radon domain
LI Yang;DU Si-dan;HOU Wen-jun
..............page:148-153
Three-dimensional guidance laws with nonlinear disturbance based on ISS
WU Ri-na;JI Hai-bo;NIE Zhang-hai
..............page:154-157
An adaptive quasi-Newton algorithm for generalized eigen-decomposition problem
YANG Feng;XI Hong-sheng;YANG Jian
..............page:158-162
An expression space model for facial expression analysis
LIU Wei-feng;WANG Zeng-fu
..............page:163-168
Design of conformance testing system for PIM-SM protocol based on TCL
ZHANG Zhi-xie;ZHOU Hao;HU Tian;ZHAO Bao-hua
..............page:169-173
Simulating study on descent character of hot smoke under sprinkler spray and fire source with decreasing HRR
LI Kai-yuan;HUO Ran;SUN Xiao-qian;ZHANG Cun-feng;LI Si-cheng;PENG Wei
..............page:220-224
A symmetric-curve-based fast algorithm for generating non-uniform FDTD mesh
ZHOU Guo-xiang;WANG Chun-yan;SHI Lei
..............page:204-207
Matrix block computation with serial carry chain for rule extraction in massive data sets
CHENG Yu-sheng;ZHANG You-sheng;HU Xue-gang
..............page:196-203
A static memory leak detection method for binary programs
GONG Yuc-hang;HU Yan;ZHANG Ye;ZHAO Zhen-xi
..............page:189-195,203
A hardware-software partitioning algorithm for reconfigurable computing systems
SHEN Ying-zhe;ZHOU Xue-hai
..............page:182-188
A cheat-proofing model for DVE based on single proxy computing
ZHANG Jin;LI Jin-long;WANG Xu-fa
..............page:174-181