电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TP393":
2993 Yang Tan; Cui Yi-dong; Jin Yue-hui; Cheng Shi-duan
  Performance Evaluation of Network Traffic Based on Chaos Theory
    JEIT   2009 Vol.31 (12): 2993-2996 [Abstract] (2347) [HTML 1 KB] [PDF 248 KB] (1022)
2997 Wu Ai; Liu Xin-song; Liu Dan
  Frangibility of Complex Networks Based on Flow Attack and Edge Failure
    JEIT   2009 Vol.31 (12): 2997-3000 [Abstract] (2180) [HTML 1 KB] [PDF 248 KB] (1004)
2738 Xue Kai-ping; Hong Pei-lin; Guo Chan; Lu Han-cheng; Luo Lian-he
  Study of Probabilistic Logging Based on Bloom Filter for Source Tracing
    JEIT   2009 Vol.31 (11): 2738-2743 [Abstract] (2276) [HTML 1 KB] [PDF 346 KB] (844)
2744 Fu Zhi-xin; Xu Zhi-liang; Huang Cheng; Wu Xiao-bei
  Research on the Impact of Node Failure on the Reliability of Coverage and Connection for Wireless Sensor Networks
    JEIT   2009 Vol.31 (11): 2744-2750 [Abstract] (2828) [HTML 1 KB] [PDF 365 KB] (986)
2751 Liu Hao-ran; Yin Rong-rong; Hao Xiao-chen; Dou Jing-jing; Bi Wei-hong
  A Robust Adjustable Topology Algorithm with Steady Links in Wireless Sensor Network
    JEIT   2009 Vol.31 (11): 2751-2756 [Abstract] (2288) [HTML 1 KB] [PDF 293 KB] (1093)
2757 Tang Rui-chun; Wei Qing-lei; Liu Bin
  A Proxy-Caching Scheduler Based on P2P Cooperation
    JEIT   2009 Vol.31 (11): 2757-2761 [Abstract] (2389) [HTML 1 KB] [PDF 269 KB] (1048)
2786 Li Jia-lun;Gu Li-ze; Yang Yi-xian
  A New Trust Management Model for P2P Network with Time Self-Decay and Subjective Expect
    JEIT   2009 Vol.31 (11): 2786-2790 [Abstract] (2540) [HTML 1 KB] [PDF 282 KB] (1059)
2791 Chen Ji-ming; Zhang Yan-ping; Cao Xiang-hui; Shen Xing-fa; Sun You-xian
  Acoustic Energy Based Scheme for Target Tracking in Wireless Sensor Networks
    JEIT   2009 Vol.31 (11): 2791-2794 [Abstract] (2353) [HTML 1 KB] [PDF 287 KB] (1180)
2287 Qiu Han; Li Yu-feng①②; Wu Jiang-xing
  Analysis on Network Delay for Temporal Structure Guarantee of Streaming Media
    JEIT   2009 Vol.31 (10): 2287-2293 [Abstract] (2527) [HTML 1 KB] [PDF 225 KB] (1213)
2294 Wu Ai; Liu Xin-song; Li Fan
  A P2P Media-on-Demand Architecture Supporting Reliable Service
    JEIT   2009 Vol.31 (10): 2294-2298 [Abstract] (2617) [HTML 1 KB] [PDF 241 KB] (1060)
2299 Dai Jing-ke; Peng Lai-xian; Zhang Bang-ning
  A New Scheduling Algorithm Supporting Unicast and Multicast Traffic for High-speed Crossbars
    JEIT   2009 Vol.31 (10): 2299-2304 [Abstract] (2392) [HTML 1 KB] [PDF 348 KB] (1050)
2305 Deng Ke-bo; Liu Zhong
  Energy-Efficient Area Coverage in Wireless Sensor Networks with Adjustable Sensing Ranges
    JEIT   2009 Vol.31 (10): 2305-2309 [Abstract] (2531) [HTML 1 KB] [PDF 246 KB] (1186)
2310 Yi Ping①②; Liu Ning; Wu Yue
  Intrusion Detection Based Timed Automata for Ad hoc Networks
    JEIT   2009 Vol.31 (10): 2310-2315 [Abstract] (2506) [HTML 1 KB] [PDF 254 KB] (964)
2316 Luo Chang-yuan; Li Wei①②; Li Hai-lin; Jian Bo
  Measurement Method for Space Networks Authenticated Key Security under Distributed CA
    JEIT   2009 Vol.31 (10): 2316-2320 [Abstract] (2367) [HTML 1 KB] [PDF 238 KB] (945)
2232 Wei Xing; Yang Jiang; Xi Hong-sheng
  Optimal Content Distribution on Clustered Streaming Media System Consisting of Homogeneous Configuration
    JEIT   2009 Vol.31 (9): 2232-2236 [Abstract] (2297) [HTML 1 KB] [PDF 338 KB] (922)
2237 Zhou Ye-jun; Li Hui; Ma Jian-feng
  Secure Error-Correction Network Coding
    JEIT   2009 Vol.31 (9): 2237-2241 [Abstract] (2493) [HTML 1 KB] [PDF 208 KB] (981)
2242 Li Shi-tang①②; Zheng Bao-yu; Huang Chuan①②; Cui Jing-wu
  Performance of System Outage Based on Opportunistic Network Coding
    JEIT   2009 Vol.31 (9): 2242-2246 [Abstract] (2546) [HTML 1 KB] [PDF 272 KB] (811)
2247 Zhou Nan-run; Wan Hui
  Distributed Authentication Scheme for Cluster-Based Ad hoc Networks
    JEIT   2009 Vol.31 (9): 2247-2251 [Abstract] (2586) [HTML 1 KB] [PDF 237 KB] (1028)
2028 Xu Hai-mei①③; Lu Xian-liang; Ge Li-jia②③; Qi Shou-qing
  Rare Resource’s Sharing Mechanism in Unstructured P2P Networks
    JEIT   2009 Vol.31 (8): 2028-2032 [Abstract] (2588) [HTML 1 KB] [PDF 221 KB] (934)
1588 Yan Jun-rong; Zhang Shun-yi; Long Hua; Sun Yan-fei
  Channel Assignment Strategy for Wireless Mesh Network Based on Topology-division
    JEIT   2009 Vol.31 (7): 1588-1593 [Abstract] (2414) [HTML 1 KB] [PDF 275 KB] (1227)
1594 Chen Bing;Pang Yu-ke; Ding Qiu-lin
  A Heuristic Lookup Partition Algorithm for Packet Classification
    JEIT   2009 Vol.31 (7): 1594-1599 [Abstract] (2361) [HTML 1 KB] [PDF 236 KB] (1074)
1600 Xu Li;Zhang Hong-yan; Shen Jin-bo
  Pair-wise Key Establishment Scheme Based on Transerval Design in Clustered Sensor Networks
    JEIT   2009 Vol.31 (7): 1600-1605 [Abstract] (2476) [HTML 1 KB] [PDF 298 KB] (998)
1758 Huang Peng; Liu Ye; Zhou Nan-run; Zeng Gui-hua
  A Secure Quantum Virtual Private Network Scheme in Passive Optical Network
    JEIT   2009 Vol.31 (7): 1758-1762 [Abstract] (2545) [HTML 1 KB] [PDF 262 KB] (889)
1470 Zhi Ying-jian; Wang Bin-qiang
  RMFS: A Streaming Media Scheduling Scheme Supporting User Interactivity
    JEIT   2009 Vol.31 (6): 1470-1474 [Abstract] (2627) [HTML 1 KB] [PDF 284 KB] (873)
1475 Ma Xiang-jie; Li Xiu-qin; Lan Ju-long; Zhang Bai-sheng
  A Novel Scheduling Scheme with Bandwidth Guarantees in the Multiple-Plane and Multiple-Stage Packet Switching Fabric
    JEIT   2009 Vol.31 (6): 1475-1478 [Abstract] (2507) [HTML 1 KB] [PDF 241 KB] (1033)
1509 Ding Fan; Song Li-ru; Xiong Hua-gang
  A Data Transmission Control Algorithm for FC-AE-ASM Network
    JEIT   2009 Vol.31 (6): 1509-1512 [Abstract] (3236) [HTML 1 KB] [PDF 304 KB] (1685)
1513 Wei An-ming①②; Wang Hong-bo; Cheng Shi-duan
  Inferring the P2P’s Super Peers with Packet Sampling
    JEIT   2009 Vol.31 (6): 1513-1516 [Abstract] (2589) [HTML 1 KB] [PDF 236 KB] (1035)
1017 Ren Yong; Xu Chen-min; Wang Lei; Xu Lei; Ye Wang-yi; Ma Xin
  A New Asymmetric Network Architecture for Ubiquitous Information Sharing
    JEIT   2009 Vol.31 (5): 1017-1021 [Abstract] (2390) [HTML 1 KB] [PDF 305 KB] (1061)
1022 Li Fei;Yang Fang-chun; Su Sen
  Efficient Load-Balance in Distributed QoS Registry for Web Service
    JEIT   2009 Vol.31 (5): 1022-1025 [Abstract] (2742) [HTML 1 KB] [PDF 210 KB] (1099)
1026 Ma Xiang-jie; Li Xiu-qin①②; Lan Ju-long; Zhang Bai-sheng
  Graphic Model and Performance Analysis of a Novel Scalable Multiple-Plane and Multiple-Stage Packet Switching Fabric
    JEIT   2009 Vol.31 (5): 1026-1030 [Abstract] (2394) [HTML 1 KB] [PDF 275 KB] (947)
First page | Prev page | Next page | Last pagePage 15 of 22, 633 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech