电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TP393":
746 Wei Jing-zhi;Yang Yi-xian;Niu Xin-xin
  Overview of Study on the Technical Architecture of OMA DRM
    JEIT   2008 Vol.30 (3): 746-751 [Abstract] (3423) [HTML 1 KB] [PDF 282 KB] (2173)
6 Tie Man-xia①②; Li Jian-dong; Zhang Bian-ling; Huang Zhen-hai
  A Wireless Access Authentication Protocol Suitable for IBSS Networks
    JEIT   2008 Vol.30 (1): 6-9 [Abstract] (3050) [HTML 1 KB] [PDF 212 KB] (1469)
10 Zhang Jing; Hu Han-ying; Tong Min; Li Qing-rong
  A Security Metric and Related Security Routing Algorithm Design Based on Trust Model
    JEIT   2008 Vol.30 (1): 10-15 [Abstract] (2565) [HTML 1 KB] [PDF 381 KB] (2017)
16 Zhang Mu①②; Zhang Shun-yi; Liu Wei-yan
  On the Optimal Multi-rate Throughput for Multicast
    JEIT   2008 Vol.30 (1): 16-20 [Abstract] (2768) [HTML 1 KB] [PDF 190 KB] (1240)
21 Chen Li-qing; Zhang Fu-tai 
  A Novel Identity-Based Key Agreement Scheme for Secure Multicast
    JEIT   2008 Vol.30 (1): 21-24 [Abstract] (2296) [HTML 1 KB] [PDF 249 KB] (889)
25 Wu Guang-zhu;Wang Jin-lin;Qi Wei-ning
  ARLNCStream: Adaptive Random Linear Network Coding for Media Streaming System
    JEIT   2008 Vol.30 (1): 25-28 [Abstract] (2819) [HTML 1 KB] [PDF 244 KB] (1366)
29 Liu A-na; Li Lin; Yu Hong-yi; Li Hong
  An Energy-Efficient MAC Protocol Based on Routing Information for Wireless Sensor Networks
    JEIT   2008 Vol.30 (1): 29-32 [Abstract] (2495) [HTML 1 KB] [PDF 288 KB] (1206)
33 Mei Xiang;Meng Xiang-wu;Chen Jun-Liang;Xu Meng
  A Query Optimization Method Based on User Profiles Reasoning
    JEIT   2008 Vol.30 (1): 33-37 [Abstract] (2312) [HTML 1 KB] [PDF 278 KB] (1596)
2991 Kang Kai; Hu Hai-bo; Lin Xiao-kang
  A New Method to Provide QoS in IEEE 802.11e EDCA
    JEIT   2007 Vol.29 (12): 2991-2995 [Abstract] (2655) [HTML 1 KB] [PDF 280 KB] (1165)
2996 Tian Le; Xie Dong-liang; Ren Biao; Zhang Lei; Cheng Shi-duan
  Routing Void Problem of Greedy Forwarding Strategy in Wireless Sensor Networks
    JEIT   2007 Vol.29 (12): 2996-3000 [Abstract] (2884) [HTML 1 KB] [PDF 260 KB] (1580)
3001 Song Wen; Fang Xu-ming
  QoS Routing Algorithm and Performance Evaluation Based on Dynamic Programming Method in Wireless Mesh Networks
    JEIT   2007 Vol.29 (12): 3001-3005 [Abstract] (3316) [HTML 1 KB] [PDF 374 KB] (1690)
3006 Guo Bin; Li Zhe
  United Voting Dynamic Cluster Routing Algorithm Based on Residual-Energy in Wireless Sensor Networks
    JEIT   2007 Vol.29 (12): 3006-3010 [Abstract] (2804) [HTML 1 KB] [PDF 314 KB] (1938)
3011 Xiao Yun; Han Chong-zhao; Zheng Qing-hua; Zhao ting
  An Approach to Filter False Positive Alerts Based on RS-SVM Theory
    JEIT   2007 Vol.29 (12): 3011-3014 [Abstract] (2738) [HTML 1 KB] [PDF 233 KB] (1552)
2564 Wang Ying; Qiu Xue-song; Wang Zhi-li
  Service-Oriented Modeling Methods of Network Management Mechanisms
    JEIT   2007 Vol.29 (11): 2564-2568 [Abstract] (2197) [HTML 1 KB] [PDF 254 KB] (1101)
2569 Chen Zhen-zhen; Yang Chen-yang
  Performance Analysis of Cooperative Diversity at PHY Layer in Wireless Sensor Networks
    JEIT   2007 Vol.29 (11): 2569-2573 [Abstract] (2479) [HTML 1 KB] [PDF 259 KB] (981)
2574 Wang Wen-lin; Liao Jian-xin; Zhu Xiao-min; Wang Chun
  The Study on Prefetch Schema for the VoiceXML-Based Voice Platform
    JEIT   2007 Vol.29 (11): 2574-2579 [Abstract] (2388) [HTML 1 KB] [PDF 301 KB] (919)
2580 Tian Xin-guang; Sun Chun-lai; Duan mi-yi
  Anomaly Detection of User Behaviors Based on Shell Commands and Markov Chain Models
    JEIT   2007 Vol.29 (11): 2580-2584 [Abstract] (2488) [HTML 1 KB] [PDF 294 KB] (1237)
2688 Zou Yi;Wei Wen-long; Li Bin; Xiao Jin-chao; Zhuang Zhen-quan
  A Multi-objective Q-bit Coding Genetic Algorithm
    JEIT   2007 Vol.29 (11): 2688-2692 [Abstract] (2473) [HTML 1 KB] [PDF 329 KB] (1648)
2460 Ren Xing-tian; Huang Xiao-hong; Su Yu-jie; Ma Yan
  Design and Analysis of Web Services-Based Service Management Protocol
    JEIT   2007 Vol.29 (10): 2460-2465 [Abstract] (2662) [HTML 1 KB] [PDF 293 KB] (1026)
2466 Ye Bin; Hu Gu-yu; Pan Zhi-song
  A Fair Algorithm for Wireless Ad hoc Networks Based on Data Retransfer Ratio
    JEIT   2007 Vol.29 (10): 2466-2470 [Abstract] (2753) [HTML 1 KB] [PDF 308 KB] (1136)
2471 Lv Xin-rong, Liao Jian-xin, Bo Yang, Wu Jia-chun, Zhu Xia-omin
  Research on Location Management of IMS
    JEIT   2007 Vol.29 (10): 2471-2476 [Abstract] (2417) [HTML 1 KB] [PDF 1392 KB] (897)
2477 Liu Xiao-hu; Gu Nai-jie; Lu Yu-Liang; Bi Kun
  PSA: An Efficient Group Key Updating Algorithm in Secure Multicast
    JEIT   2007 Vol.29 (10): 2477-2481 [Abstract] (2618) [HTML 1 KB] [PDF 1148 KB] (735)
2482 Hou Rong-hui; Shi Hao-shan; Yang Shao-jun
  An Adaptive Cooperative Communication Routing Protocol for Wireless Sensor Networks
    JEIT   2007 Vol.29 (10): 2482-2486 [Abstract] (2394) [HTML 1 KB] [PDF 261 KB] (974)
2487 Wang Hong-bo; Pei Yu-jie;Lin Yu; Cheng Shi-duan; Jin Yue-hui
  A LRU Based Algorithm for Identifying and Measuring Large Flows
    JEIT   2007 Vol.29 (10): 2487-2492 [Abstract] (2336) [HTML 1 KB] [PDF 262 KB] (1245)
2244 Wang Tian-jing; Yang Zhen; Hu Hai-feng
  An Adaptive Data Fusion Routing Algorithm Based on Genetic Algorithm for Wireless Sensor Networks
    JEIT   2007 Vol.29 (9): 2244-2247 [Abstract] (2649) [HTML 1 KB] [PDF 272 KB] (1207)
2248 Tian Jun-feng; Wang Hui-ran; Fu Yue
  Research on the Feasibility of TCP/IP Feature Reduction for Intrusion Detection
    JEIT   2007 Vol.29 (9): 2248-2251 [Abstract] (2417) [HTML 1 KB] [PDF 222 KB] (1152)
2252 Liu Wei; Cheng Wen-qing
  Modeling Interactive User Behavior in Streaming-on-Ddemand
    JEIT   2007 Vol.29 (9): 2252-2256 [Abstract] (2268) [HTML 1 KB] [PDF 283 KB] (1828)
2257 Ren Xun-yi; Wang Ru-chuan; Qi Zheng-hua
  Study on Vanishing Moments Influence on Estimation Hurst Parameter of Self-similar Traffic
    JEIT   2007 Vol.29 (9): 2257-2261 [Abstract] (2514) [HTML 1 KB] [PDF 280 KB] (1181)
2262 Sun Yong; Jing Bo; Zhang Zong-lin; Zhang Jie
  Survey on Energy Efficiency of Clustered Routing in Wireless Sensor Network
    JEIT   2007 Vol.29 (9): 2262-2264 [Abstract] (2425) [HTML 1 KB] [PDF 218 KB] (1056)
1974 Lu Zhao-yi; Jiang Hui; Lü Lei
  A New Protocol of the Double Loop LAN of the Integrated Services and Its Mathematic Modeling
    JEIT   2007 Vol.29 (8): 1974-1978 [Abstract] (2325) [HTML 1 KB] [PDF 290 KB] (704)
First page | Prev page | Next page | Last pagePage 18 of 22, 633 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech