电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TP393.0":
1227 Li Jian-Bing, Li Qing, Dong Qing-Kuan, Li Xiao-Ping
  A Chained Multicast Source Authentication Technology Based on the Threshold Cryptography in A Noisy Channel
    JEIT   2015 Vol.37 (5): 1227-1233 [Abstract] (288) [HTML 1 KB] [PDF 301 KB] (547)
887 Hou Ying, Huang Hai, Lan Ju-Long, Li Peng, Zhu Sheng-Ping
  An Adaptive Timeout Counter Bloom Filter Algorithm for Traffic Measurement
    JEIT   2015 Vol.37 (4): 887-893 [Abstract] (782) [HTML 1 KB] [PDF 816 KB] (755)
2343 Chen Zheng-Yu, Yang Geng, Chen Lei, Zhou Qiang
  Data Gathering for Long Network Lifetime in WSNs Based on Compressed Sensing
    JEIT   2014 Vol.36 (10): 2343-2349 [Abstract] (1298) [HTML 1 KB] [PDF 341 KB] (895)
1735 Tang Jian-Qiang, Zhou Hua-Chun, Liu Ying, Zhang Hong-Ke
  Mitigating Interest Flooding Attack Based on Prefix Identification in Content-centric Networking
    JEIT   2014 Vol.36 (7): 1735-1742 [Abstract] (1099) [HTML 1 KB] [PDF 442 KB] (898)
1743 Zhou Qiang, Yang Geng, Chen Lei, Chen Zheng-Yu, Dai Hua
  Secure Data Aggregation Scheme Based on Homomorphic MAC for Wireless Sensor Networks
    JEIT   2014 Vol.36 (7): 1743-1748 [Abstract] (1284) [HTML 1 KB] [PDF 300 KB] (949)
2630 Ge Hai-Hui, Xiao Da, Chen Tian-Ping, Yang Yi-Xian
  Quantitative Evaluation Approach for Real-time Risk Based on Attack Event Correlating
    JEIT   2013 Vol.35 (11): 2630-2636 [Abstract] (1213) [HTML 1 KB] [PDF 317 KB] (1426)
2328 Liu Jun, Cheng Liang-Lun, Wang Jian-Hua
  Distributed Multicast Routing Optimal Algorithm in Sensor Networks
    JEIT   2013 Vol.35 (10): 2328-2334 [Abstract] (1339) [HTML 1 KB] [PDF 304 KB] (1113)
1739 Li Jin-Ling, Wang Bin-Qiang
  Detecting App-DDoS Attacks Based on Maximal Frequent Sequential Pattern Mining
    JEIT   2013 Vol.35 (7): 1739-1745 [Abstract] (1358) [HTML 1 KB] [PDF 343 KB] (1600)
1746 Zhou Ye, Yang Xu, Li Yong, Su Li, Jin De-Peng, Zeng Lie-Guang
  Classification Based Consistent Flow Update Scheme in Software Defined Network
    JEIT   2013 Vol.35 (7): 1746-1752 [Abstract] (1742) [HTML 1 KB] [PDF 316 KB] (2184)
1277 Zhou Qiang, Yang Geng, Li Sen, Chen Lei
  An Integrity-checking Private Data Aggregation Algorithm
    JEIT   2013 Vol.35 (6): 1277-1283 [Abstract] (1965) [HTML 1 KB] [PDF 286 KB] (1329)
141 Wu Da-Peng, Jin Ji-Wei, Lv Yi , Wang Ru-Yan
  Similarity Aware Community Detecting Method for Social Intermittently Connected Mobile Network
    JEIT   2013 Vol.35 (1): 141-146 [Abstract] (1547) [HTML 1 KB] [PDF 242 KB] (989)
2905 Yang Jing-Li, Xu Yong-Hui, Jiang Shou-Da
  A Precise Link Loss Inference Algorithm with Minimal Cover Set
    JEIT   2012 Vol.34 (12): 2905-2912 [Abstract] (1410) [HTML 1 KB] [PDF 319 KB] (870)
1432 Cao Li-Feng, Chen Xing-Yuan, Du Xue-Hui, Xia Chun-Tao
  A Level Inference Method for Aggregated Information of Objects Based on Clustering Analysis
    JEIT   2012 Vol.34 (6): 1432-1437 [Abstract] (1656) [HTML 1 KB] [PDF 241 KB] (843)
1445 Li Zhen, Tian Jun-Feng, Zhao Peng-Yuan
  A Trustworthy Behavior Model for Software Monitoring Point Based on Classification Attributes
    JEIT   2012 Vol.34 (6): 1445-1451 [Abstract] (1558) [HTML 1 KB] [PDF 300 KB] (738)
818 Song An, Zhao Hai-Tao, Wang Shan, WEI Ji-Bo
  Available Bandwidth Estimation in Wireless Multihop Path for QoS Provision: Model and Method
    JEIT   2012 Vol.34 (4): 818-824 [Abstract] (1495) [HTML 1 KB] [PDF 304 KB] (842)
3015 Wang Hui-Mei, Xian Ming, Wang Guo-Yu
  A Network Attack Decision-making Algorithm Based on the Extended Attack Graph
    JEIT   2011 Vol.33 (12): 3015-3021 [Abstract] (1737) [HTML 1 KB] [PDF 374 KB] (1280)
2278 Fei Gao-Lei, Hu Guang-Min
  Unicast Network Loss Tomography Based on k-th Order Markov Chain
    JEIT   2011 Vol.33 (9): 2278-2282 [Abstract] (2143) [HTML 1 KB] [PDF 429 KB] (1262)
1924 Zhang Zhi-Yong, Hu Guang-Min
  A Novel Algorithm for Lossy Link Identification
    JEIT   2011 Vol.33 (8): 1924-1929 [Abstract] (2004) [HTML 1 KB] [PDF 327 KB] (866)
908 Li Wen, Wu Chun-Ming, Chen Jian, Ping Ling-Di
  Virtual Network Mapping Algorithm with Repeatable Mapping over Substrate Nodes
    JEIT   2011 Vol.33 (4): 908-914 [Abstract] (2802) [HTML 1 KB] [PDF 290 KB] (1189)
479 Chen Wei-Jie, Wang Wan-Liang, Jiang Yi-Bo, Zheng Jian-Wei
  SABlue: A Self-tune AQM Algorithm with Acceleration Factor
    JEIT   2011 Vol.33 (2): 479-483 [Abstract] (2331) [HTML 1 KB] [PDF 298 KB] (791)
2241 Yan Li-Li, Peng Dai-Yuan
  Security Analysis of ARAN Routing Protocol for Ad hoc Networks
    JEIT   2010 Vol.32 (9): 2241-2244 [Abstract] (2215) [HTML 1 KB] [PDF 198 KB] (857)
2245 Li Yi-Nan, Qian Zhi-Hong, Liu Ying, Zhang Xu
  An Intrusion Detection Model of Mobile Ad hoc Networks Based on Game Theory
    JEIT   2010 Vol.32 (9): 2245-2248 [Abstract] (2785) [HTML 1 KB] [PDF 228 KB] (1547)
1608 Zhang Zhen; Wang Bin-qiang; Chen Shu-qiao; Zhu Ke
  A Mechanism of Identifying Heavy Hitters Based on Multi-dimensional Counting Bloom Filter
    JEIT   2010 Vol.32 (7): 1608-1613 [Abstract] (2666) [HTML 1 KB] [PDF 299 KB] (1065)
1457 Peng Lai-xian; Yun Zi; Zhao Wen-dong; Tian Chang
  A Novel Scheduling Algorithm Based on Longest Queue Detecting for CICQ Switching Fabrics
    JEIT   2010 Vol.32 (6): 1457-1462 [Abstract] (2799) [HTML 1 KB] [PDF 316 KB] (899)
1463 Ni Ping; Liao Jian-xin; Zhu Xiao-min; Wan Li
  A Method of QoE mapped to SLA Based on QoS
    JEIT   2010 Vol.32 (6): 1463-1468 [Abstract] (2823) [HTML 1 KB] [PDF 274 KB] (1380)
1469 Yu Yao; Li Zhe; Liu Jun; Liu Cui-xiang; Guo Lei
  A Feasible Dynamic Reputation Evaluation Model in Hierarchical Ad hoc Networks
    JEIT   2010 Vol.32 (6): 1469-1474 [Abstract] (2455) [HTML 1 KB] [PDF 257 KB] (710)
830 Zhou Yao①②; Xu Jia; Liu Feng-yu
  Path Compression Based on Node Staying Probability for Wireless Ad hoc Networks
    JEIT   2010 Vol.32 (4): 830-835 [Abstract] (2263) [HTML 1 KB] [PDF 294 KB] (816)
836 Chu Ling-wei; Zou Shi-hong; Cheng Shi-duan; Tian Chun-qi; Wang Wen-dong; Hu Bo
  Distributed Fault Diagnosis Algorithm in Multi-domain Service Environment
    JEIT   2010 Vol.32 (4): 836-840 [Abstract] (2381) [HTML 1 KB] [PDF 245 KB] (907)
841 Zhang Dong; Wu Chun-ming; Jiang Ming; Xiong Wei
  Topology Design for Large Scale Service Overlay Networks
    JEIT   2010 Vol.32 (4): 841-845 [Abstract] (2191) [HTML 1 KB] [PDF 263 KB] (931)
852 Zhou Xian-wei; Guo Ji-wen
  HuffMHT-Based Entity Authentication Scheme for Ad hoc Networks
    JEIT   2010 Vol.32 (4): 852-856 [Abstract] (2742) [HTML 1 KB] [PDF 244 KB] (883)
First page | Prev page | Next page | Last pagePage 2 of 4, 117 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech