电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TN915":
11 WANG Daxing, TENG Jikai
  Probably Secure Cetificateless Aggregate Signature Algorithm for Vehicular Ad hoc Network
    JEIT   2018 Vol.40 (1): 11-17 [Abstract] (255) [HTML 1 KB] [PDF 503 KB] (1945)
1711 MENG Luoming, SUN Kang, WEI Lei, GUO Shaoyong, XU Siya
  Optimal Resource Allocation Mechanism for Electric Power Wireless Virtual Networks
    JEIT   2017 Vol.39 (7): 1711-1718 [Abstract] (165) [HTML 1 KB] [PDF 724 KB] (555)
1719 MA Bin, WANG Dong, XIE Xianzhong
  Robust Vertical Handoff Algorithm Based on Decision Tree in Vehicle Heterogeneous Network
    JEIT   2017 Vol.39 (7): 1719-1726 [Abstract] (199) [HTML 1 KB] [PDF 451 KB] (797)
1727 ZENG Shuai, GAI Shaocong, ZHANG Yi, ZHAO Guofeng, ZUO Lizheng
  Survivability Deployment Method for Controller with Time-delay Constraint in Software Defined Optical Network
    JEIT   2017 Vol.39 (7): 1727-1734 [Abstract] (171) [HTML 1 KB] [PDF 542 KB] (535)
1170 LIU Caixia, LI Lingshu, TANG Hongbo, WANG Xiaolei, LU Ganqiang
  Hierarchical Coordination Strategy for vEPC Virtual Network Embedding Based on Subgraph Isomorphism
    JEIT   2017 Vol.39 (5): 1170-1177 [Abstract] (200) [HTML 1 KB] [PDF 833 KB] (672)
840 WU Haowei, ZOU Yutao, SUN Chen, OU Jinglan②
  A Hybrid-duplex MAC Protocol for WLAN
    JEIT   2017 Vol.39 (4): 840-846 [Abstract] (229) [HTML 1 KB] [PDF 856 KB] (583)
546 TANG Hongbo, YUAN Quan, LU Ganqiang,WANG Xiaolei, ZHAO Yu
  A Model for Virtualized Network Function Deployment Based on Node-splitting in vEPC
    JEIT   2017 Vol.39 (3): 546-553 [Abstract] (217) [HTML 1 KB] [PDF 1123 KB] (736)
367 ZHENG Fei, LI Wenjing, YU Peng, FENG Lei, MENG Luoming
  Benders Decomposition Based Cooperative Energy-saving Mechanism in Wireless Networks
    JEIT   2017 Vol.39 (2): 367-373 [Abstract] (219) [HTML 1 KB] [PDF 1406 KB] (489)
2922 LIU Caixia, LU Ganqiang, TANG Hongbo, WANG Xiaolei, ZHAO Yu
  Adaptive Deployment Method for Virtualized Network Function Based on Viterbi Algorithm
    JEIT   2016 Vol.38 (11): 2922-2930 [Abstract] (245) [HTML 1 KB] [PDF 1175 KB] (973)
2590 LIU Yulei, LIANG Jun, XIAO Nan, HU Yulong, HU Meng
  Dynamic Double Threshold Energy Detection Based on Markov Model in Cognitive Radio
    JEIT   2016 Vol.38 (10): 2590-2597 [Abstract] (167) [HTML 1 KB] [PDF 531 KB] (607)
1880 WANG Ruyan, JIANG Jing, XIONG Yu, TANG Jianbo
  An Efficient Dynamic Resource Allocation Strategy with Grey Prediction in Hybrid Multiplex Passive Optical Network
    JEIT   2016 Vol.38 (8): 1880-1887 [Abstract] (173) [HTML 1 KB] [PDF 673 KB] (606)
1211 XIONG Yu, DONG Xiancun, LI Yuanyuan, Lü Yi, WANG Ruyan
  The Cross-layer Survivable Design of Control Plane Based on Minimum Point Covering in Software Defined Optical Network
    JEIT   2016 Vol.38 (5): 1211-1218 [Abstract] (262) [HTML 1 KB] [PDF 914 KB] (599)
803 XU Jun, ZHONG Yuansheng, WAN Shuping
  Incentive Adaptive Trust Model Based on Integrated Intuitionistic Fuzzy Information
    JEIT   2016 Vol.38 (4): 803-810 [Abstract] (349) [HTML 1 KB] [PDF 378 KB] (729)
700 TANG Xiaoxuan,GUO Shaoyong, QI Feng
  Fault Tolerance Mechanism for Sensors Monitoring Overhead Transmission Line in Smart Grid
    JEIT   2016 Vol.38 (3): 700-706 [Abstract] (265) [HTML 1 KB] [PDF 497 KB] (713)
310 YANG Jing, ZHAO Yanyan, WANG Ruyan, GONG Lingling
  Data Forwarding Mechanism with Blackhole Attack Detection in Intermittently Connected Wireless Networks
    JEIT   2016 Vol.38 (2): 310-317 [Abstract] (207) [HTML 1 KB] [PDF 305 KB] (505)
2650 Dong Yi, Zhao Shang-hong, Li Yong-jun, Zhao Jing, Deng Bo-yu
  Research on Routing and Wavelength Assignment Based on Ant Colony Optimization in Distributed Satellite Optical Network
    JEIT   2015 Vol.37 (11): 2650-2656 [Abstract] (272) [HTML 1 KB] [PDF 555 KB] (728)
2424 Xie Xian-zhong, Xie Cheng-jing, Lei Wei-jia, Zhan Mei-hui
  Improved Transmit Design for Physical Layer Security in Cognitive Radio Networks with Multiple Eavesdropper Base on Semi-definite Programming
    JEIT   2015 Vol.37 (10): 2424-2430 [Abstract] (219) [HTML 1 KB] [PDF 311 KB] (648)
2204 Sun Yan-zan, Jiang Yu-feng,Wu Ya-ting, Ma Yi-ming, Fang Yong
  Improved Random Incomplete Coloring for Interference Mitigation in Wireless Body Area Networks
    JEIT   2015 Vol.37 (9): 2204-2210 [Abstract] (183) [HTML 1 KB] [PDF 529 KB] (567)
1562 Huang Kai-zhi, Hong Ying, Luo Wen-yu, Lin Sheng-bin
  Security Coalition Method Based on Game Theory
    JEIT   2015 Vol.37 (7): 1562-1568 [Abstract] (278) [HTML 1 KB] [PDF 506 KB] (580)
1200 Gong Zhi-Peng, Chen Te-Fang, Zou Fu-Min, Chen Yi-Jun, Chen Jun-Gen
  A Fast Optimal Scheduling Algorithm for FlexRay Static Segment
    JEIT   2015 Vol.37 (5): 1200-1206 [Abstract] (252) [HTML 1 KB] [PDF 515 KB] (553)
874 Ma Bin, Xie Xian-Zhong, Liao Xiao-Feng
  Prediction Vertical Handoff Algorithm in Vehicle Heterogeneous Network
    JEIT   2015 Vol.37 (4): 874-880 [Abstract] (861) [HTML 1 KB] [PDF 948 KB] (955)
715 Chen Bin, Bao Dong-Hui, Su Gong-Chao, Dai Ming-Jun, Wang Hui, Lin Xiao-Hui
  The Application of the Path Based Integer Linear Programming Method for Optimizing Energy Consumption in Blocking IP over WDM Networks
    JEIT   2015 Vol.37 (3): 715-720 [Abstract] (744) [HTML 1 KB] [PDF 320 KB] (939)
193 Huang Kai-Zhi, Hong Ying, Luo Wen-Yu, Lin Sheng-Bin
  A Method for Physical Layer Security Cooperation Based on Evolutionary Game
    JEIT   2015 Vol.37 (1): 193-199 [Abstract] (1000) [HTML 1 KB] [PDF 317 KB] (826)
2786 Xiong Fei, Qiao Di, Wang Hong-Xiang, Zhao Zi-Yan, Yang Hong, Shen Liang
  A Novel Network Reliability Evaluating Algorithm with Ordered Binary Decision Diagram Based on Boolean Function
    JEIT   2014 Vol.36 (11): 2786-2790 [Abstract] (1078) [HTML 1 KB] [PDF 257 KB] (1388)
2131 Feng Lei, Li Wen-Jing, Qiu Xue-Song
  A Packet Scheduling Algorithm for Wireless Service Capacity and Coverage Optimization
    JEIT   2014 Vol.36 (9): 2131-2137 [Abstract] (1101) [HTML 1 KB] [PDF 379 KB] (960)
2138 Fan Bing, Zeng Ying, Tang Liang-Rui
  Vulnerability Assessment of Power Communication Network Based on Information Entropy
    JEIT   2014 Vol.36 (9): 2138-2144 [Abstract] (1016) [HTML 1 KB] [PDF 249 KB] (784)
1209 Shao Su-Jie, Guo Shao-Yong, Qiu Xue-Song, Meng Luo-Ming
  Traffic Scheduling Algorithm Based on Weighted Queue for Meter Data Collection in Wireless Smart Grid Communication Network
    JEIT   2014 Vol.36 (5): 1209-1214 [Abstract] (1127) [HTML 1 KB] [PDF 351 KB] (964)
41 Xiong Yu, Zhang Hong, Wang Ru-Yan, Wu Da-Peng
  Fault Location Mechanism Based on Lightpath Status Aware Using Cluster Allocation
    JEIT   2014 Vol.36 (1): 41-47 [Abstract] (1492) [HTML 1 KB] [PDF 320 KB] (826)
2972 Geng Hua, Meng Xiang-Wu, Shi Yan-Cui
  A Mobile User Preference Prediction Method Based on Trust and Link Prediction
    JEIT   2013 Vol.35 (12): 2972-2977 [Abstract] (1216) [HTML 1 KB] [PDF 226 KB] (1048)
2978 Chen Xi-Lian, Xu Bo, Zhou Yu-Meng, Cui Zhan-Qi, Qiu Kun
  Research on the Network Fault in Multistage Multi-plane Optical Switching Fabric
    JEIT   2013 Vol.35 (12): 2978-2984 [Abstract] (1186) [HTML 1 KB] [PDF 443 KB] (897)
First page | Prev page | Next page | Last pagePage 1 of 7, 198 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech