电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TP3":
2953 SUN Rui, FANG Wei, HUANG Qiheng, GAO Jun
  Indirect Person Re-identification Based on Support Samples
    JEIT   2017 Vol.39 (12): 2953-2961 [Abstract] (132) [HTML 1 KB] [PDF 35350 KB] (467)
3013 WANG Jianhua, WANG Guangbo, XU Kaiyong
  Ciphertext Policy Attribute-based Encryption Scheme Supporting Attribute Level User Revocation Under Large Universe
    JEIT   2017 Vol.39 (12): 3013-3022 [Abstract] (117) [HTML 1 KB] [PDF 567 KB] (567)
3023 WANG Zaijian, DONG Yuning, TANG Pingping, YANG Lingyun, ZHANG Hui
  Network Multimedia QoS Class Recognition Based on Improved K-SVD
    JEIT   2017 Vol.39 (12): 3023-3029 [Abstract] (98) [HTML 1 KB] [PDF 704 KB] (411)
3045 ZHANG Yulei, WANG Huan, LIU Wenjing, WANG Caifen
  Security Analysis and Improvement of Mutual Signcryption Schemes under Heterogeneous Systems
    JEIT   2017 Vol.39 (12): 3045-3050 [Abstract] (112) [HTML 1 KB] [PDF 211 KB] (398)
2615 WANG Qiandong
  A Matching Path Constrained Longest Common Subsequence Length Algorithm
    JEIT   2017 Vol.39 (11): 2615-2619 [Abstract] (143) [HTML 1 KB] [PDF 198 KB] (526)
2627 HE Jian, ZHOU Mingwo, WANG Xiaoyi
  Wearable Method for Fall Detection Based on Kalman Filter and k-NN Algorithm
    JEIT   2017 Vol.39 (11): 2627-2634 [Abstract] (124) [HTML 1 KB] [PDF 2326 KB] (621)
2635 TIAN Peng, Lü Jianghua, MA Shilong, WANG Ronghe
  Robust Object Tracking Based on Local Discriminative Analysis
    JEIT   2017 Vol.39 (11): 2635-2643 [Abstract] (111) [HTML 1 KB] [PDF 30873 KB] (476)
2644 WANG Chen, FAN Yangyu, LI Bo
  Saliency Detection Based on Robust Foreground Selection
    JEIT   2017 Vol.39 (11): 2644-2651 [Abstract] (154) [HTML 1 KB] [PDF 14387 KB] (470)
2652 CHEN Hongchang,CHEN Lei, LI Shaomei, ZHU Junguang
  Person Re-identification of Adaptive Blocks Based on Saliency Fusion
    JEIT   2017 Vol.39 (11): 2652-2660 [Abstract] (177) [HTML 1 KB] [PDF 6028 KB] (617)
2661 YE Feng, LI Wanru, CHEN Jiazhen, ZHENG Zihua
  Image Fast Segmentation Algorithm Based on Saliency Region Detection and Level Set
    JEIT   2017 Vol.39 (11): 2661-2668 [Abstract] (177) [HTML 1 KB] [PDF 12221 KB] (667)
2724 ZHAO Zhiyuan, WANG Jianhua, XU Kaiyong
  Distributed Attribute-based Encryption with Constant-size Ciphertext and Fast Decryption
    JEIT   2017 Vol.39 (11): 2724-2732 [Abstract] (136) [HTML 1 KB] [PDF 313 KB] (454)
2733 WANG Ying, YU Jinke,PEI Keke, QIU Xuesong
  A Load Informing Based Load Balancing Mechanism for Multiple Controllers in SDN
    JEIT   2017 Vol.39 (11): 2733-2740 [Abstract] (151) [HTML 1 KB] [PDF 265 KB] (455)
2741 RUI Lanlan, KONG Jiahui, HUANG Haoqiu, PENG Hao
  Domain-orientated Coordinated Hybrid Content Caching and Request Search in Information-centric Networking
    JEIT   2017 Vol.39 (11): 2741-2747 [Abstract] (143) [HTML 1 KB] [PDF 977 KB] (414)
2748 RAN Xiaomin, FANG Deliang
  Distributed Sensor Allocation Algorithm for Target Tracking Based on Potential Game
    JEIT   2017 Vol.39 (11): 2748-2754 [Abstract] (159) [HTML 1 KB] [PDF 549 KB] (595)
2428 LI Haiyang, WANG Hengyuan
  Subspace Clustering Method Based on TL1 Norm Constraints
    JEIT   2017 Vol.39 (10): 2428-2436 [Abstract] (122) [HTML 1 KB] [PDF 2008 KB] (537)
2479 XU Hong, SU Penghui, QI Wenfeng
  Impossible Differential Cryptanalysis of Reduced-round SPECK
    JEIT   2017 Vol.39 (10): 2479-2486 [Abstract] (178) [HTML 1 KB] [PDF 334 KB] (512)
2487 DAI Zibin, YI Suwen, LI Wei, NAN Longmei
  Research and Design of Efficient Parallel Processing Architecture for Elliptic Curve Cryptographic Processor
    JEIT   2017 Vol.39 (10): 2487-2494 [Abstract] (169) [HTML 1 KB] [PDF 1273 KB] (475)
2495 TU Yuanfei, YANG Geng, YUAN Fengjie
  Secure and Efficient Attribute Based Access Control for Brain-computer Interface
    JEIT   2017 Vol.39 (10): 2495-2503 [Abstract] (107) [HTML 1 KB] [PDF 326 KB] (426)
2504 ZHU Chengang, CHENG Guang
  Program Popularity Prediction Model of Internet TV Based on Viewing Behavior
    JEIT   2017 Vol.39 (10): 2504-2512 [Abstract] (123) [HTML 1 KB] [PDF 1459 KB] (488)
2513 SUN Baoming,GUO Yan, LI Ning, ZHANG Xinghang, LI Aijing
  Dynamic Dictionary Algorithm for CS-based Localization in Wireless Sensor Networks
    JEIT   2017 Vol.39 (10): 2513-2519 [Abstract] (175) [HTML 1 KB] [PDF 796 KB] (436)
2033 WANG Xiaofeng, LIU Gongshen, LI Jianhua
  Multiresolution Community Detection Based on Fuzzy Clustering
    JEIT   2017 Vol.39 (9): 2033-2039 [Abstract] (315) [HTML 1 KB] [PDF 366 KB] (706)
2040 LI Lei, CHU Yuqi, WANG Meng, HAN Li, WU Xindong
  NSGA2-based Multi-label Seed Node Selection in Network Environments
    JEIT   2017 Vol.39 (9): 2040-2047 [Abstract] (234) [HTML 1 KB] [PDF 346 KB] (534)
2048 SUN Xiao, PENG Xiaoqi, HU Min, REN Fuji
  Extended Multi-modality Features and Deep Learning Based Microblog Short Text Sentiment Analysis
    JEIT   2017 Vol.39 (9): 2048-2055 [Abstract] (394) [HTML 1 KB] [PDF 495 KB] (1119)
2071 DENG Xiaolong, ZHAI Jiayu, YIN Luanyu
  Vector Influence Clustering Coefficient Based Efficient Directed Community Detection Algorithm
    JEIT   2017 Vol.39 (9): 2071-2080 [Abstract] (141) [HTML 1 KB] [PDF 325 KB] (522)
2081 YU Dongjin, NI Zhiyong, SUN Jingchao
  Extracting Dimension Hierarchy of Tweeters’ Interests for On-line Analytical Processing
    JEIT   2017 Vol.39 (9): 2081-2088 [Abstract] (124) [HTML 1 KB] [PDF 3026 KB] (532)
2089 WU Dapeng, SI Shushan, YAN Junjie, WANG Ruyan
  Behaviors Analysis Based Sybil Detection in Social Networks
    JEIT   2017 Vol.39 (9): 2089-2096 [Abstract] (158) [HTML 1 KB] [PDF 308 KB] (559)
2097 PAN Li, WU Peng, HUANG Danhua
  Reviews on Group Detection in Online Social Networks
    JEIT   2017 Vol.39 (9): 2097-2107 [Abstract] (223) [HTML 1 KB] [PDF 423 KB] (927)
2108 LI Lei, WANG Meng, WU Xindong
  Social Network Based Social Behavior Analysis
    JEIT   2017 Vol.39 (9): 2108-2118 [Abstract] (214) [HTML 1 KB] [PDF 713 KB] (1301)
2119 DAI Zibin, MA Chao, LI Wei, NAN Longmei
  Wide-width Bit Permutation Instructions for Accelerating Cryptographic Algorithms
    JEIT   2017 Vol.39 (9): 2119-2126 [Abstract] (143) [HTML 1 KB] [PDF 1130 KB] (548)
2127 ZHANG Yulei, ZHANG Linggang, WANG Caifen, MA Yanli, ZHANG Yongjie
  Provable Secure IDPKC-to-CLPKC Heterogeneous Signcryption Scheme
    JEIT   2017 Vol.39 (9): 2127-2133 [Abstract] (128) [HTML 1 KB] [PDF 240 KB] (466)
First page | Prev page | Next page | Last pagePage 5 of 64, 1895 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech