Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of the Graduate School of the Chinese Academy of Sciences
1002-1175
2011 Issue 5
Design on configurations of multi-beam antenna of LEO communication satellite
ZHAO Xing-Wei;L(U) Yuan;LIU Hui-Jie;LIANG Xu-Wen
..............page:636-641
A self-adaptive hierarchical belief propagation algorithm
CHI Ling-Hong;GUO Li;YU Li;CHEN Yun-Bi
..............page:630-635
Synthesis and properties of flame retardant vinyl acetate copolymer emulsion
ZHAO Chun-Xia;LIU Bai-Ling;PENG Gang;LUO Rong
..............page:591-596
Competitiveness of high-tech industries in Beijing based on dynamic shift-share analysis
WANG Zhao-Hong;ZHANG Xiao-Ping
..............page:604-610
Analysis on the spectral reflectance response to snow contaminants in Northeast China
LEI Xiao-Chun;SONG Kai-Shan;DU Jia;WU Yan-Qing;WANG Yuan-Dong;TANG Xu-Guang;ZENG Li-Hong1
..............page:611-616
An improved image steganalysis method based on Markov chains for spread-spectrum data hiding
LIU Shao-Hui;SUN Jian-Chao;YAO Hong-Xun
..............page:690-695
Some remarks on a quasilinear elliptic equation with critical exponent*
LIU Xing;SUN Yi-Jing
..............page:583-590
A modified method for storage and revoking of the AACS device keys
YANG Hui-Hui;ZHAO Xian-Feng
..............page:642-647
TPM security model for virtual domains
QIN Yu;LAN Hai-Bo
..............page:648-658
Scenario prediction for CO2 emissions in 2020 in Jilin province
ZHANG Ya-Xin;ZHANG Ping-Yu
..............page:617-623
Advances in light field photography technique
NIE Yun-Feng;XIANGLI Bin;ZHOU Zhi-Liang
..............page:563-572
A behavior-based client defense scheme against XSS
WANG Xia-Li;ZHANG Yu-Qing
..............page:668-675
A DCT domain watermarking algorithm based on scrambling transforming
LI Zhao-Hui;WANG Min
..............page:684-689
Automatic penetration test framework based on unified data format mechanism
WEN Guan-Xing;ZHANG Yuan-Chao;ZHANG Yu-Qing
..............page:676-683
A censorship-resistant covert communication protocol based on Web communication behavior
TAN Qing-Feng;SHI Jin-Qiao;GUO Li;WANG Xiao
..............page:659-667
zheng gao jian ze
..............page:后插1
Modeling and detection of ontology-based Byzantine attacks
FENG Tao;SUN Guan-Nan;XIA Yan-Hui;MA Jian-Feng
..............page:696-705
Harmonic two-spheres in the complex Grassmann manifold G(2,5)*
LI Kang;JIAO Xiao-Xiang
..............page:573-582