电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TP393.0":
671 Fei Gao-lei; Hu Guang-min; Qian Feng
  A Novel Method for Nonstationary Network Internal Loss Tomography
    JEIT   2010 Vol.32 (3): 671-676 [Abstract] (2844) [HTML 1 KB] [PDF 286 KB] (1017)
272 Hu Yu-xiang,Lan Ju-long,Wu Jun-ting
  The Switch Structure and Scheduling Algorithm for Maintaining Packet Order in Multistage Switching Fabric
    JEIT   2010 Vol.32 (2): 272-277 [Abstract] (2354) [HTML 1 KB] [PDF 432 KB] (1232)
172 Chen Song,Wang Shan,Zhou Ming-tian
  A New Physical Network Topology Discovery Algorithm
    JEIT   2010 Vol.32 (1): 172-177 [Abstract] (2556) [HTML 1 KB] [PDF 320 KB] (1664)
183 Luo Chang-yuan; L i Wei①②; Xing Hong-zhi; Chu Xiao
  Research on Identity-based Distributed Key Management in Space Network
    JEIT   2010 Vol.32 (1): 183-188 [Abstract] (3152) [HTML 1 KB] [PDF 279 KB] (1394)
2299 Dai Jing-ke; Peng Lai-xian; Zhang Bang-ning
  A New Scheduling Algorithm Supporting Unicast and Multicast Traffic for High-speed Crossbars
    JEIT   2009 Vol.31 (10): 2299-2304 [Abstract] (2392) [HTML 1 KB] [PDF 348 KB] (1065)
2316 Luo Chang-yuan; Li Wei①②; Li Hai-lin; Jian Bo
  Measurement Method for Space Networks Authenticated Key Security under Distributed CA
    JEIT   2009 Vol.31 (10): 2316-2320 [Abstract] (2367) [HTML 1 KB] [PDF 238 KB] (956)
2237 Zhou Ye-jun; Li Hui; Ma Jian-feng
  Secure Error-Correction Network Coding
    JEIT   2009 Vol.31 (9): 2237-2241 [Abstract] (2493) [HTML 1 KB] [PDF 208 KB] (989)
2247 Zhou Nan-run; Wan Hui
  Distributed Authentication Scheme for Cluster-Based Ad hoc Networks
    JEIT   2009 Vol.31 (9): 2247-2251 [Abstract] (2586) [HTML 1 KB] [PDF 237 KB] (1041)
1017 Ren Yong; Xu Chen-min; Wang Lei; Xu Lei; Ye Wang-yi; Ma Xin
  A New Asymmetric Network Architecture for Ubiquitous Information Sharing
    JEIT   2009 Vol.31 (5): 1017-1021 [Abstract] (2390) [HTML 1 KB] [PDF 305 KB] (1071)
1031 Sun Tian-hao; Zhu Qing-sheng; Li Shuang-qing
  Research on One-to-Many Negotiation Model
    JEIT   2009 Vol.31 (5): 1031-1034 [Abstract] (2292) [HTML 1 KB] [PDF 201 KB] (998)
929 Zhang Rui; Liu Ji-qiang; Zhao Jia
  An ID-based Key Pre-distribution Scheme for Wireless Sensor Networks
    JEIT   2009 Vol.31 (4): 929-932 [Abstract] (2385) [HTML 1 KB] [PDF 219 KB] (900)
933 Xie Pei-zhong; Zheng Bao-yu
  Research on Energy Efficiency of Clustered Communication Schemes in One-Dimensional Wireless Sensor Networks
    JEIT   2009 Vol.31 (4): 933-936 [Abstract] (2512) [HTML 1 KB] [PDF 222 KB] (992)
462 Liu Wei-yan①②; Sun Yan-fei; Zhang Shun-yi; Liu Bin
  An Adaptive Active Queue Management Algorithm—Self-Adaptive BLUE
    JEIT   2009 Vol.31 (2): 462-466 [Abstract] (2673) [HTML 1 KB] [PDF 289 KB] (1269)
467 Qiu Gon-gan; Zhang Shun-yi; Hu Jun
  Fuzzy Flow Awareness Based Dynamical Priority Fair Scheduling Algorithm
    JEIT   2009 Vol.31 (2): 467-471 [Abstract] (2071) [HTML 1 KB] [PDF 248 KB] (969)
2490 Jin Guang, Yang Jian-Gang, Wei Wei, Dong Ya-Bo
  Stateless Filtering Based on Enhanced Capabilities
    JEIT   2008 Vol.30 (10): 2490-2493 [Abstract] (2555) [HTML 1 KB] [PDF 245 KB] (966)
2503 Ni Ping, Liao Jian-Xin, Wang Chun, Zhang Cheng
  A General Algorithm Mapping KPI to KQI
    JEIT   2008 Vol.30 (10): 2503-2506 [Abstract] (3710) [HTML 1 KB] [PDF 228 KB] (2776)
2283 Li Zhi-Tao, Xu Ya-Jing, Liu Li-Hong, Xu Hui-Min
  An Approach to Available Bandwidth Measurement in IPv6 Networks
    JEIT   2008 Vol.30 (9): 2283-2286 [Abstract] (2825) [HTML 1 KB] [PDF 259 KB] (878)
1493 Wu Zhi-Jun;Zhang Dong
  The Approach of Defending Against DoS Attack in Frequency Domain
    JEIT   2008 Vol.30 (6): 1493-1495 [Abstract] (2546) [HTML 1 KB] [PDF 221 KB] (1385)
975 Li Zhen-qiang; Zhang Sheng-liang; Ma Yan①②; Zhao Xiao-yu
  Multiple Decision Tree Algorithm for Packet Classification
    JEIT   2008 Vol.30 (4): 975-978 [Abstract] (2592) [HTML 1 KB] [PDF 239 KB] (1806)
695 Cheng Geng; Li Yun-zhao; Liu Wei; Cheng Wen-qing; Yang Zong-kai
  Joint Routing and Spectrum Assignment in Cognitive Radio Networks
    JEIT   2008 Vol.30 (3): 695-698 [Abstract] (2695) [HTML 1 KB] [PDF 300 KB] (1487)
703 Wu Jiang-xia; Yang Fang-chun
  QoS Prediction of Web Service Composition with Transaction Mechanism
    JEIT   2008 Vol.30 (3): 703-706 [Abstract] (2270) [HTML 1 KB] [PDF 230 KB] (1097)
712 Liu Xinag-hui; Jing Ning; Yin Jian-ping; Li Jun; Jin Xiao-shan
  The Hierarchical Network Monitoring Model with Bounded Bandwidth and Delay Constraints
    JEIT   2008 Vol.30 (3): 712-716 [Abstract] (2298) [HTML 1 KB] [PDF 218 KB] (834)
6 Tie Man-xia①②; Li Jian-dong; Zhang Bian-ling; Huang Zhen-hai
  A Wireless Access Authentication Protocol Suitable for IBSS Networks
    JEIT   2008 Vol.30 (1): 6-9 [Abstract] (3050) [HTML 1 KB] [PDF 212 KB] (1486)
29 Liu A-na; Li Lin; Yu Hong-yi; Li Hong
  An Energy-Efficient MAC Protocol Based on Routing Information for Wireless Sensor Networks
    JEIT   2008 Vol.30 (1): 29-32 [Abstract] (2495) [HTML 1 KB] [PDF 288 KB] (1219)
2996 Tian Le; Xie Dong-liang; Ren Biao; Zhang Lei; Cheng Shi-duan
  Routing Void Problem of Greedy Forwarding Strategy in Wireless Sensor Networks
    JEIT   2007 Vol.29 (12): 2996-3000 [Abstract] (2884) [HTML 1 KB] [PDF 260 KB] (1585)
3006 Guo Bin; Li Zhe
  United Voting Dynamic Cluster Routing Algorithm Based on Residual-Energy in Wireless Sensor Networks
    JEIT   2007 Vol.29 (12): 3006-3010 [Abstract] (2805) [HTML 1 KB] [PDF 314 KB] (1949)
3011 Xiao Yun; Han Chong-zhao; Zheng Qing-hua; Zhao ting
  An Approach to Filter False Positive Alerts Based on RS-SVM Theory
    JEIT   2007 Vol.29 (12): 3011-3014 [Abstract] (2738) [HTML 1 KB] [PDF 233 KB] (1566)
2564 Wang Ying; Qiu Xue-song; Wang Zhi-li
  Service-Oriented Modeling Methods of Network Management Mechanisms
    JEIT   2007 Vol.29 (11): 2564-2568 [Abstract] (2198) [HTML 1 KB] [PDF 254 KB] (1110)
2471 Lv Xin-rong, Liao Jian-xin, Bo Yang, Wu Jia-chun, Zhu Xia-omin
  Research on Location Management of IMS
    JEIT   2007 Vol.29 (10): 2471-2476 [Abstract] (2417) [HTML 1 KB] [PDF 1392 KB] (908)
2487 Wang Hong-bo; Pei Yu-jie;Lin Yu; Cheng Shi-duan; Jin Yue-hui
  A LRU Based Algorithm for Identifying and Measuring Large Flows
    JEIT   2007 Vol.29 (10): 2487-2492 [Abstract] (2336) [HTML 1 KB] [PDF 262 KB] (1256)
First page | Prev page | Next page | Last pagePage 3 of 4, 117 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech