电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Other articles related with "TP393.0":
2248 Tian Jun-feng; Wang Hui-ran; Fu Yue
  Research on the Feasibility of TCP/IP Feature Reduction for Intrusion Detection
    JEIT   2007 Vol.29 (9): 2248-2251 [Abstract] (2417) [HTML 1 KB] [PDF 222 KB] (1162)
2252 Liu Wei; Cheng Wen-qing
  Modeling Interactive User Behavior in Streaming-on-Ddemand
    JEIT   2007 Vol.29 (9): 2252-2256 [Abstract] (2268) [HTML 1 KB] [PDF 283 KB] (1842)
2257 Ren Xun-yi; Wang Ru-chuan; Qi Zheng-hua
  Study on Vanishing Moments Influence on Estimation Hurst Parameter of Self-similar Traffic
    JEIT   2007 Vol.29 (9): 2257-2261 [Abstract] (2514) [HTML 1 KB] [PDF 280 KB] (1190)
1617 Liu Shi-dong; Zhang Shun-yi; Qiu Gong-an; Sun Yan-fei
  An Improved Path Performance Parameter Estimation Technique Based on End-to-End Measurements
    JEIT   2007 Vol.29 (7): 1617-1621 [Abstract] (2413) [HTML 1 KB] [PDF 299 KB] (1062)
1628 Tian Chun-qi; Zou Shi-hong; Tian Hui-rong; Wang Wen-dong; Cheng Shi-duan
  A New Trust Model Based on Reputation and Risk Evaluation for P2P Networks
    JEIT   2007 Vol.29 (7): 1628-1632 [Abstract] (2551) [HTML 1 KB] [PDF 290 KB] (2008)
1343 Wei An-ming; Wang Hong-bo; Lin Yu; Cheng Shi-duan
  Improved Flow Sampling Algorithm on Resource Constraints
    JEIT   2007 Vol.29 (6): 1343-1347 [Abstract] (2278) [HTML 1 KB] [PDF 271 KB] (986)
1206 Chen Chen; Pei Chang-xing; Guo Nan; Chen Nan; Yi Yun-hui
  ARBFAM: Ad hoc Routing Based on Fame, Available Bandwidth and Minimum Hops
    JEIT   2007 Vol.29 (5): 1206-1210 [Abstract] (2374) [HTML 1 KB] [PDF 289 KB] (995)
1215 Wang Kun; Yin Zhong-hai; Zhou Li-hua; Yuan Feng
  Study on Complicated Information System Support Platform
    JEIT   2007 Vol.29 (5): 1215-1219 [Abstract] (2381) [HTML 1 KB] [PDF 295 KB] (1241)
1220 Dong Lei; Yu Hong-yi; Zhang Xia
  A Fully Connected Clustering Based Sleeping Algorithm for Sensor Networks
    JEIT   2007 Vol.29 (5): 1220-1223 [Abstract] (2377) [HTML 1 KB] [PDF 243 KB] (1081)
1224 Li Jie; Liu Xian-xing; Han Zhi-Jie
  Research on the ARMA-Based Traffic Prediction Algorithm for Wireless Sensor Network
    JEIT   2007 Vol.29 (5): 1224-1227 [Abstract] (2328) [HTML 1 KB] [PDF 289 KB] (2018)
771 Zhang Xin; Chang Yi-lin; Sun Fang-tao; Shen Zhong
  A Fault Monitoring Algorithm for Hierarchical Network
    JEIT   2007 Vol.29 (4): 771-775 [Abstract] (2364) [HTML 1 KB] [PDF 274 KB] (846)
776 Wang Kun; Yin Zhong-hai; Zhou Li-hua; Cai Zhen
  Study on Information System Disaster Recovery Planning
    JEIT   2007 Vol.29 (4): 776-780 [Abstract] (2693) [HTML 1 KB] [PDF 248 KB] (1354)
781 Lü Xin-yan; Zhao Bao-hua; Qu Yu-gui
  Analysis of Conformance Test Reliability Based on Formal Specification
    JEIT   2007 Vol.29 (4): 781-784 [Abstract] (2578) [HTML 1 KB] [PDF 266 KB] (977)
719 Liu Bin-bin; Zhao Dong-feng; Ding Hong-wei
  Analysis of Multi-channel and Random Multi-access Ad hoc Protocol with Probability Detection
    JEIT   2007 Vol.29 (3): 719-724 [Abstract] (2597) [HTML 1 KB] [PDF 304 KB] (952)
733 Peng Zhi-ping; Peng Hong; Zheng Qi-lun
  Study on Bilateral and Multi-issue Autonomous Negotiation Model
    JEIT   2007 Vol.29 (3): 733-738 [Abstract] (2529) [HTML 1 KB] [PDF 332 KB] (921)
345 Xu Xiao-long; Wang Ru-chuan
  The Collaboration Alliance Mechanism of P2P Based on Mobile Multi-agent Technology
    JEIT   2007 Vol.29 (2): 345-349 [Abstract] (2057) [HTML 1 KB] [PDF 277 KB] (1084)
2378 Xi Guo-bao; Chen Hui-fang; Zhao Wen-dao
  Chinese Remainder Theorem-Based Secret Sharing Scheme
    JEIT   2006 Vol.28 (12): 2378-2381 [Abstract] (2064) [HTML 1 KB] [PDF 212 KB] (1202)
2162 Tian Jun-feng; Zhang Zhe; Zhao Wei-dong
  The Design and Research of Intrusion Detection System Based on Misuse and Anomaly
    JEIT   2006 Vol.28 (11): 2162-2166 [Abstract] (2957) [HTML 1 KB] [PDF 309 KB] (1634)
1926 Bian Jing; Wang Ze-qiang; Zhang Guang-zhao
  An Active Estimation Algorithm for Available Bandwidth Based on the Delay Parameters
    JEIT   2006 Vol.28 (10): 1926-1929 [Abstract] (1930) [HTML 1 KB] [PDF 242 KB] (1212)
1940 Sun Yan-fei; Zhang Shun-yi; Wang Pan; Zhou Lei; Shi Jin
  Research on Active Queue Management of Delay Network Based on Adaptive Control
    JEIT   2006 Vol.28 (10): 1940-1945 [Abstract] (1904) [HTML 1 KB] [PDF 467 KB] (981)
1492 Zhang Shi-bin①②; He Da-ke; Homare Endo
  Research of Fuzzy Autonomous Trust Establishment Strategy
    JEIT   2006 Vol.28 (8): 1492-1496 [Abstract] (1841) [HTML 1 KB] [PDF 137 KB] (736)
1135 Liu Meng-juan; Hong Pei-lin; Li Jin-sheng
  Analyzing the Performance of Multi-constraints Active Routing Protocol in Active Network
    JEIT   2006 Vol.28 (6): 1135-1140 [Abstract] (1716) [HTML 1 KB] [PDF 251 KB] (1034)
805 Wang Rong; Chen Yue; Wu Jiang-xing
  Implementing Distributed Weighted Fair Scheduling Algorithm in CICQ Switches
    JEIT   2006 Vol.28 (5): 805-809 [Abstract] (1928) [HTML 1 KB] [PDF 224 KB] (1160)
753 Jiang Hong-yan; Lin Ya-ping; Huang Sheng-ye
  Model and Algorithm Research for Seeking Efficient Monitor-Nodes Measuring Network Traffic
    JEIT   2006 Vol.28 (4): 753-756 [Abstract] (1749) [HTML 1 KB] [PDF 268 KB] (1420)
546 Wang Hai-yan; Wang Ru-chuan①②
  The Security Research of Multiple Mobile AgentSystem Based on Secret Splitting
    JEIT   2006 Vol.28 (3): 546-550 [Abstract] (1877) [HTML 1 KB] [PDF 256 KB] (843)
570 Qiao Yan-tao; Jin Yan-liang; Yu Song-yu
  Simulation-based TCP Performance in Wired/Mobile Ad hoc Networks
    JEIT   2006 Vol.28 (3): 570-573 [Abstract] (1745) [HTML 1 KB] [PDF 256 KB] (1251)
1310 Liu Li;Hu Peng;Li Jin-sheng;Hong Pei-lin
  Secure and Dynamic Tunneling Mechanism of Construction VPN in Dynamic Network
    JEIT   2005 Vol.27 (8): 1310-1314 [Abstract] (1835) [HTML 1 KB] [PDF 212 KB] (874)
First page | Prev page | Next page | Last pagePage 4 of 4, 117 records
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech