column
Research on Trustworthiness Evaluation Method for Domain Software Based on Actual Evidence
BAO Tie, LIU Shufen, WANG Xiaoyan
2011, 20(2): 195-199.
Abstract PDF
Improved Multi-proxy Signature Scheme without Random Oracles
SUN Ying, XU Chunxiang, WANG Hua, FU Chaoxu
2011, 20(2): 200-206.
Abstract PDF
Using Non-Negative Matrix Factorization to Cluster Learners and Construct Learning Communities
ZHANG Tongzhen, SHEN Ruimin, LU Hongtao
2011, 20(2): 207-211.
Abstract PDF
The Wolf Colony Algorithm and Its Application
LIU Changan, YAN Xiaohu, LIU Chunyang, WU Hua
2011, 20(2): 212-216.
Abstract PDF
A New Method to Fault Diagnosis for a Class of Nonlinear Systems
LIU Jun, YU Jinshou
2011, 20(2): 217-222.
Abstract PDF
Multi-robots Cooperative Online FastSLAM
CAI Yunfei, TANG Zhenmin, ZHAO Chunxia
2011, 20(2): 223-227.
Abstract PDF
A Novel Feature Selection Method Based on Probability Latent Semantic Analysis for Chinese Text Classification
ZHONG Jiang, SUN Qigan, LI Xue, WEN Luosheng
2011, 20(2): 228-232.
Abstract PDF
Evolutionary Generation of Test Data for Multiple Paths Coverage
GONG Dunwei, ZHANG Wanqiu, ZHANG Yan
2011, 20(2): 233-237.
Abstract PDF
Optimal Anonymization for Transaction Publishing
LIU Junqiang
2011, 20(2): 238-242.
Abstract PDF
A Robust High Density 7T SRAM Bitcell for Subthreshold Applications
BAI Na, WU Xiulong, YANG Jun, SHI Longxing
2011, 20(2): 243-246.
Abstract PDF
HSM-based Change Impact Analysis of Object-Oriented Java Programs
SUN Xiaobing, LI Bixin, TAO Chuanqi, ZHANG Sai
2011, 20(2): 247-251.
Abstract PDF
Optically Pumped Alkali Laser in Pure 87Rb Atom Cell Without Buffer Gas
WU Wenguo, CHEN Jingbiao
2011, 20(2): 252-254.
Abstract PDF
An Information Fusion Method of Fault Diagnosis Based on Interval Basic Probability Assignment
XU Xiaobin, FENG Haishan, WANG Zhi, WEN Chenglin
2011, 20(2): 255-260.
Abstract PDF
Adaptive Resource Allocation with SVM-based Multi-hop Video Packet Delay Bound Violation Modeling
ZHANG Yunsheng, ZHANG Yongfei, SUN Shixin, QIN Shiyin, HE Zhihai
2011, 20(2): 261-267.
Abstract PDF
Sparse Representations for Speech Enhancement
ZHAO Nan, XU Xin, YANG Yi
2011, 20(2): 268-272.
Abstract PDF
Joint Source Channel safety and Virtual User Identification Method for Wireless Ad Hoc Networks
TU Guofang, ZHANG Can, FAN Lian, GAO Shaoshuai, LV Shuwang, ZHAO Heping
2011, 20(2): 273-277.
Abstract PDF
Identification of a Distant Speaker and Its Robustness
JIANG Ye, TANG Zhenmin, WANG Longbiao
2011, 20(2): 278-282.
Abstract PDF
On Random Linear Network Coding for Butterfly Network
GUANG Xuan, FU Fangwei
2011, 20(2): 283-286.
Abstract PDF
The Efficiency of ICA-based Representation Analysis: Application to Speech Feature Extraction
DU Jun, ZOU Xin, HAO Jie, LIU Ju
2011, 20(2): 287-292.
Abstract PDF
Subspace Noise Estimation and Gamma Distribution Based Microphone Array Post-filter Design
CHENG Ning, LIUWenju, WANG Lan
2011, 20(2): 293-298.
Abstract PDF
Improved Digital Costas Loop Design in Spread Spectrum Communication
WANG Hongbo, DENG Li, MA Zhonggui, TU Xuyan
2011, 20(2): 299-302.
Abstract PDF
Finite Symmetry Transformation Groups and Exact Solutions of KP-B and BKK Equations
XUAN Hengnong, SUN Mingming, CHENG Guoda, HE Tao
2011, 20(2): 303-306.
Abstract PDF
On the Cryptographic Properties of Binary 2n-periodic Sequences
CHANG Zuling, WEN Qiaoyan
2011, 20(2): 307-311.
Abstract PDF
Adaptive Spreading Code Assignment for an Expanded Time-Frequency OFDM System with a Zero-forcing Equalizer
WU Bo, SHANG Yong, XIANG Haige
2011, 20(2): 312-316.
Abstract PDF
ID-based Signcryption KEM to Multiple Recipients
SUN Yinxia, LI Hui
2011, 20(2): 317-322.
Abstract PDF
Identity-based Threshold Decryption Scheme Without Random Oracles
MING Yang, WANG Yumin
2011, 20(2): 323-328.
Abstract PDF
ERMR: Energy-efficient and Reliability-ensured Multipath Routing for WMSNs
WANG Xiaoming, YANG Tao
2011, 20(2): 329-332.
Abstract PDF
An Aggregate Signature Scheme with Specified Verifier
WEN Yiling, MA Jianfeng, HUANG Huawei
2011, 20(2): 333-336.
Abstract PDF
Timing Acquisition for Distributed Antenna Systems by Exploiting the Advantages of Cooperation over Flat-Fading Channels
QING Chaojin, SHAO Shihai, TANG Youxi
2011, 20(2): 337-342.
Abstract PDF
A Three-Frequency Transformer for Complex Impedances with Three-Section
CHEN Ming
2011, 20(2): 343-346.
Abstract PDF
Data Center Local Thermal Management Based on Thermal Cameras Networks
LIU Hang, LEE Eun Kyung, POMPILI Dario, KONG Xiangwei
2011, 20(2): 347-351.
Abstract PDF
Cellular Genetic Algorithms for Optimizing the Area Covering of Wireless Sensor Networks
LI Xunbo, WANG Zhenlin
2011, 20(2): 352-356.
Abstract PDF
Key Distribution over the Covert Communication Based on VoIP
HUANG Yongfeng, YUAN Jian, CHEN Minchao, XIAO Bo
2011, 20(2): 357-360.
Abstract PDF
A New Network Coding Design for Reliable Video Multicast
XIAO Song, WANG Hui, WU Chengke
2011, 20(2): 361-364.
Abstract PDF
Related-Key Chosen IV Attack on K2
DING Lin, GUAN Jie
2011, 20(2): 365-369.
Abstract PDF
Modeling and Computation on the Attitude Misalignment Parameters for Geostationary Meteorological Satellite
YANG Lei, SHANG Jian
2011, 20(2): 370-374.
Abstract PDF
A Track-Before-Detect Algorithm Based on Extended H Particle Filter
WAN Yang, WANG Shouyong
2011, 20(2): 375-379.
Abstract PDF
Optimal Linear Array Configuration and DOF Tradeoff for MIMO-SAR
WANG Libao, XU Jia, PENG Shibao, YUAN Junquan, MA Xiaoyan
2011, 20(2): 380-384.
Abstract PDF
Mutual Impedance Between Probes in an Elliptic Waveguide-Part I: Basic Theory
WANG Yan, LI Sen, WANG Baisuo
2011, 20(2): 385-388.
Abstract PDF