电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TN393":
2307 Rong Hong, Wang Hui-Mei, Xian Ming, Shi Jiang-Yong
  A Novel Method for Detecting Reduction of Quality (RoQ) Attack Based on Fast Independent Component Analysis
    JEIT   2013 Vol.35 (10): 2307-2313 [Abstract] (1695) [HTML 1 KB] [PDF 368 KB] (1372)
2415 Yang Hua-Wei, Wang Hong-Bo, Chen Shi-Duan, Chen Shan-Zhi, Lin Yu
  Minimizing Sum of Path-cost Model and Algorithm for Traffic Balancing
    JEIT   2010 Vol.32 (10): 2415-2420 [Abstract] (2311) [HTML 1 KB] [PDF 264 KB] (1490)
1200 Zhu Yun①②; Pan Cheng-kang; Xu You-yun; Cai Yue-ming
  A Multi-packet Reception Method Based on Cooperative Communication for Wireless Mesh Networks
    JEIT   2010 Vol.32 (5): 1200-1204 [Abstract] (2616) [HTML 1 KB] [PDF 255 KB] (1041)
1 Xin Yang; Wei Jing-zhi; Li Chao; Yang Yi-xian
  Research on the Telebiometric Authentication System Based on PKI and PMI
    JEIT   2008 Vol.30 (1): 1-5 [Abstract] (2780) [HTML 1 KB] [PDF 227 KB] (1546)
2560 Tian Hui-Rong; Zou Shi-Hong; Wang Wen-Dong;Cheng Shi-Duan
  A Hierarchical Reputation Model for P2P Networks
    JEIT   2007 Vol.29 (11): 2560-2563 [Abstract] (2557) [HTML 1 KB] [PDF 216 KB] (1506)
1679 Zhao Bao-hua; Qian Lan; Zhou Hao; Guo Xiong -hui
  Fault Diagnosis Algorithm Based on Finite State Machine
    JEIT   2006 Vol.28 (9): 1679-1683 [Abstract] (1629) [HTML 1 KB] [PDF 274 KB] (894)
634 Shi Yan; Liu Zeng-ji; Sheng Min
  Study of an Efficient Distributed QoS Routing Algorithm
    JEIT   2005 Vol.27 (4): 634-637 [Abstract] (1632) [HTML 1 KB] [PDF 1062 KB] (949)
346 Jin Guang; Zhao Jie-yu; Zhao Yi-ming; Wang Xiao-hong
  A Study on IP Traceback of DDoS Attack Ingress within an Autonomous System
    JEIT   2005 Vol.27 (3): 346-350 [Abstract] (1822) [HTML 1 KB] [PDF 1315 KB] (810)
First page | Prev page | Next page | Last pagePage 1 of 1, 8 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech