电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TP393":
1879 CHEN Zhonghui, LING Xianyao, FENG Xinxin, ZHENG Haifeng, XU Yiwen
  Short-term Traffic State Prediction Approach Based on FCM and Random Forest
    JEIT   2018 Vol.40 (8): 1879-1886 [Abstract] (153) [HTML 1 KB] [PDF 7450 KB] (753)
1998 ZHANG Qiang, WANG Guojun
  Privacy Preserving Method Based on Location Service in Personalized Search
    JEIT   2018 Vol.40 (8): 1998-2005 [Abstract] (155) [HTML 1 KB] [PDF 2033 KB] (542)
2006 WANG Lili, HUANG Cheng, WU Xiaobei
  Cross-layer Optimization for Wireless Body Area Networks Based on Prediction Method
    JEIT   2018 Vol.40 (8): 2006-2012 [Abstract] (179) [HTML 1 KB] [PDF 277 KB] (461)
2013 LUO Zhiyong, ZHU Zihao, YOU Bo, LIU Jiahui
  Virtual Workflow Constrained Time-accuracy Optimization Algorithm Scheduling by Iterative Reduction
    JEIT   2018 Vol.40 (8): 2013-2019 [Abstract] (202) [HTML 1 KB] [PDF 286 KB] (431)
1676 YU Bin, LIU Ziqing
  Malicious Attack-resistant Secure Localization Algorithm for ZigBee Network
    JEIT   2018 Vol.40 (7): 1676-1683 [Abstract] (79) [HTML 1 KB] [PDF 643 KB] (333)
1684 LIU Xinbo, WANG Buhong, YANG Zhixian, LIU Shuaiqi
  A Virtual Network Embedding Algorithm Based on Topology Potential
    JEIT   2018 Vol.40 (7): 1684-1690 [Abstract] (129) [HTML 1 KB] [PDF 287 KB] (305)
1691 WANG Lian, WANG Meng, REN Zhihao, BAI Jiajie
  Delay Minimization Retransmission Scheme Based on Instantly Decodable Network Coding for D2D Communications
    JEIT   2018 Vol.40 (7): 1691-1698 [Abstract] (140) [HTML 1 KB] [PDF 334 KB] (269)
1699 YU Dunhui, ZHANG Lingli, FU Cong
  Online Task Allocation of Spatial Crowdsourcing Based on Dynamic Utility
    JEIT   2018 Vol.40 (7): 1699-1706 [Abstract] (124) [HTML 1 KB] [PDF 1134 KB] (337)
1707 HUANG Hongcheng, LAI Licheng, HU Min, SUN Xinran, TAO Yang
  Information Propagation Control Method in Social Networks Based on Exact Controllability Theory
    JEIT   2018 Vol.40 (7): 1707-1714 [Abstract] (147) [HTML 1 KB] [PDF 1829 KB] (309)
1715 HAO Xiaochen, LIU Jinshuo,YAO Ning, XIE Lixia, WANG Liyuan
  Research of Network Capacity and Transmission Energy  Consumption in WSNs Based on Game Theory
    JEIT   2018 Vol.40 (7): 1715-1722 [Abstract] (158) [HTML 1 KB] [PDF 1358 KB] (344)
1
 
    JEIT   0 Vol. (): 1- [Abstract] (30) [HTML 1 KB] [PDF 845 KB] (1)
1
 
    JEIT   0 Vol. (): 1- [Abstract] (46) [HTML 1 KB] [PDF 465 KB] (6)
1
 
    JEIT   0 Vol. (): 1- [Abstract] (33) [HTML 1 KB] [PDF 1052 KB] (5)
1
 
    JEIT   0 Vol. (): 1- [Abstract] (61) [HTML 1 KB] [PDF 1026 KB] (2)
1446 ZHANG Bingtao, WANG Xiaopeng, WANG Lücheng, ZHANG Zhonglin, LI Yanlin, LIU Hu
  Intrusion Detection Method for MANET Based on Graph Theory
    JEIT   2018 Vol.40 (6): 1446-1452 [Abstract] (168) [HTML 1 KB] [PDF 505 KB] (567)
1453 DING Yonggang, LI Shijun, FU Xing, LIU Mengjun
  Temporal-aware Multi-category Products Recommendation  Model Based on Aspect-level Sentiment Analysis
    JEIT   2018 Vol.40 (6): 1453-1460 [Abstract] (134) [HTML 1 KB] [PDF 376 KB] (473)
1515 WANG Gang,HU Xin,MA Runnian,LIU Wenbin
  Synchronization Modeling and Stability of Cyberspace Operation Based on Collective Defensive Mechanism
    JEIT   2018 Vol.40 (6): 1515-1519 [Abstract] (97) [HTML 1 KB] [PDF 734 KB] (517)
1094 YANG Lingyun, DONG Yuning, WANG Zaijian, TANG Pingping
  Network Video Traffic Classification Based on Probability Distribution of M Value
    JEIT   2018 Vol.40 (5): 1094-1100 [Abstract] (104) [HTML 1 KB] [PDF 490 KB] (240)
1101 DIAO Pengfei, WANG Yanjiao
  Coverage-preserving Clustering Algorithm for Underwater Sensor Networks Based on the Sleeping Mechanism
    JEIT   2018 Vol.40 (5): 1101-1107 [Abstract] (129) [HTML 1 KB] [PDF 247 KB] (535)
1108 JIN Zhigang, WU Ting, SU Yishan, YANG Qiuling
  Dynamic MAC Mechanism for Underwater Glider Networks
    JEIT   2018 Vol.40 (5): 1108-1114 [Abstract] (93) [HTML 1 KB] [PDF 509 KB] (370)
763 CHEN Zhuo, FENG Gang, LIU Bei, ZHOU Yang
  Construction Policy of Network Service Chain Oriented to Resource Fragmentation Optimization in Operator Network
    JEIT   2018 Vol.40 (4): 763-769 [Abstract] (187) [HTML 1 KB] [PDF 272 KB] (502)
770 YI Peng, LI Gen, ZHANG Zhen
  Energy Optimized Implicit Collaborative Caching Scheme for Content Centric Networking
    JEIT   2018 Vol.40 (4): 770-777 [Abstract] (133) [HTML 1 KB] [PDF 720 KB] (415)
778 BI Xiaojun, ZHANG Qian
  Service Access Control for Heterogeneous Wireless Networks Based on Multi-objective Evolutionary Algorithm Based on Decomposition
    JEIT   2018 Vol.40 (4): 778-784 [Abstract] (158) [HTML 1 KB] [PDF 764 KB] (372)
785 LI Dan, LAN Julong, WANG Peng, HU Yuxiang
  Distributed Service Path Selection Algorithm under Central Control
    JEIT   2018 Vol.40 (4): 785-793 [Abstract] (144) [HTML 1 KB] [PDF 1368 KB] (397)
794 WANG Kai, CHEN Xinhua, CHEN Xi, Wu Zehui
  On the Defense Advantages of Network Address Shuffling Against Different Scanning Attacks
    JEIT   2018 Vol.40 (4): 794-801 [Abstract] (158) [HTML 1 KB] [PDF 817 KB] (398)
802 WANG Jianhua, WANG Guangbo, XU Yang, HU Yixiao, ZHANG Yue, FAN Liwen
  Traceable Ciphertext-policy Attribute-based Encryption Scheme with Constant Decryption Costs
    JEIT   2018 Vol.40 (4): 802-810 [Abstract] (117) [HTML 1 KB] [PDF 348 KB] (368)
690 WU Dapeng, WU Guangkai,WANG Ruyan
  Energy-saving Mechanism of Integrated Fiber-wireless Access Network with Uplink Data Frame Aggregation
    JEIT   2018 Vol.40 (3): 690-696 [Abstract] (125) [HTML 1 KB] [PDF 249 KB] (471)
697 SHEN Zhijun, GAO Jing, WU Rigeng
  Feedback and Reverse Transmission Mechanism Based Two-stage Switch Architecture
    JEIT   2018 Vol.40 (3): 697-704 [Abstract] (139) [HTML 1 KB] [PDF 777 KB] (344)
447 ZHEN Yan, LI Xing, YANG Jing
  Distributed Energy-balanced Dynamic Packet Forwarding Strategy in WSN
    JEIT   2018 Vol.40 (2): 447-454 [Abstract] (107) [HTML 1 KB] [PDF 612 KB] (306)
455 SHI Jiugen, ZHU Wei, JIA Kunying, XU Ying
  Multi-controller Deployment Algorithm Based on Load Balance in Software Defined Network
    JEIT   2018 Vol.40 (2): 455-461 [Abstract] (204) [HTML 1 KB] [PDF 258 KB] (464)
First page | Prev page | Next page | Last pagePage 1 of 22, 633 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech