- Ke Xu, Yuexuan Wang, Cheng Wu:
Formal verification technique for grid service chain model and its application.
- Yu Huang, GuoZhao Wang:
An orthogonal basis for the hyperbolic hybrid polynomial space.
- Bingru Yang, Wei Song, Zhangyan Xu:
New construction for expert system based on innovative knowledge discovery technology.
- JunDe Wu, XuanChang Zhou, Minhyung Cho:
An ideal topology type convergent theorem on scale effect algebras.
- MingYi Zhang, Ying Zhang, FangZhen Lin:
A characterization of answer sets for logic programs.
- Zheng Tian, XiaoBin Li, YanWei Ju:
Spectral clustering based on matrix perturbation theory.
- ZhenYu Hu, Dongdai Lin, Wenling Wu, Dengguo Feng:
Constructing parallel long-message signcryption scheme from trapdoor permutation.
- LinHua Ma, YiLin Chang, ShengDa Wang:
Study on the distribution law of random code structure of irregular LDPC codes and its application in eliminating short cycles.
- QiHui Wu, ChunMing Zhao, JinLong Wang:
Turbo iterative equalization for HSDPA systems.
- XueSong Wang, JianCheng Liu, WenMing Zhang, QiXiang Fu, Zhong Liu, XiaoXia Xie:
Mathematic principles of interrupted-sampling repeater jamming (ISRJ).
- Zhen Peng, XinQing Sheng:
Application of asymptotic waveform approximation technique to hybrid FE/BI method for 3D scattering.
- Junzhou Luo, Ming Yang:
Analysis of security protocols based on challenge-response.
- DaoWen Qiu:
Notes on automata theory based on quantum logic.
- WenHui Zhou, Lin Li, GuoHai Chen, AnXi Yu:
Optimality analysis of one-step OOSM filtering algorithms in target tracking.
- WenXiu Zhang, GuoFang Qiu, WeiZhi Wu:
A general approach to attribute reduction in rough set theory.
- XiaoBin Li, Zheng Tian:
Multiscale stochastic hierarchical image segmentation by spectral clustering.
- Yunxia Liu, Yuhua Peng, Huaijing Qu, Yong Yin:
Energy-based adaptive orthogonal FRIT and its application in image denoising.
- Zhirong Ge, Bin Wang, LiMing Zhang:
Remote sensing image fusion based on Bayesian linear estimation.
- Bo Zhu, Xianglin Yang:
Fiber soliton-form 3R regenerator and its performance analysis.
- Chu Gao, ZhiNing Chen, YunYi Wang, Ning Yang:
Study on relationships of electromagnetic band gap structures and left/right handed structures.
- ZhiGuang Shi, JianXiong Zhou, HongZhong Zhao, Qiang Fu:
Study on joint Bayesian model selection and parameter estimation method of GTD model.
- ChangXiang Shen, HuangGuo Zhang, Dengguo Feng, ZhenFu Cao, JiWu Huang:
Survey of information security.
- Qingshu Meng, Huanguo Zhang, Min Yang, Zhang-yi Wang:
Analysis of affinely equivalent Boolean functions.
- Na Li, Wen-Feng Qi:
Boolean functions of an odd number of variables with maximum algebraic immunity.
- Jian Weng, Shengli Liu, Kefei Chen:
Pirate decoder for the broadcast encryption schemes from Crypto 2005.
- MingXin Lu, Xuejia Lai, Guozhen Xiao, Lei Qin:
Symmetric-key cryptosystem with DNA technology.
- YiWei Zhang, YuMin Wang, XuBang Shen:
A chaos-based image encryption algorithm using alternate structure.
- Jie Chen, YuPu Hu, YueYu Zhang:
Impossible differential cryptanalysis of Advanced Encryption Standard.
- Zongduo Dai, Xiutao Feng:
Classification and counting on multi-continued fractions and its application to multi-sequences.
- Zhenchuan Chai, Zhenfu Cao, Xiaolei Dong:
Identity-based signature scheme based on quadratic residues.
- Dengguo Feng, Weidong Chen:
Modular approach to the design and analysis of password-based security protocols.
- Sihan Qing, Changxiang Shen:
Design of secure operating systems with high security levels.
- Hong Zhang, Yeping He, Zhiguo Shi:
A formal model for access control with supporting spatial context.
- Fan Zhang, Jianfeng Ma, Sang-Jae Moon:
Universally composable anonymous Hash certification model.
- Wei Wang, Guosun Zeng:
Trusted dynamic level scheduling based on Bayes trust model.
- Hefei Ling, Wugang Yuan, Fuhao Zou, Zhengding Lu:
Log-scaling magnitude modulated watermarking scheme.
- Miao Yu, HongJie He, Jiashu Zhang:
A digital authentication watermarking scheme for JPEG images with superior localization and security.
- Xiangao Huang, Wei Huang, Chao Wang, ZeJun Lü, YanHua Hu:
Blind reconnaissance of the pseudo-random sequence in DS/SS signal with negative SNR.
- Xiangyi Meng, Ran Tao, Yue Wang:
Fractional Fourier domain analysis of decimation and interpolation.
- Jinhua Sun, Jiandong Li, Lijun Jin:
A reduced state SISO iterative decoding algorithm for serially concatenated continuous phase modulation.
- XiaoHu Tang:
On the linear span of the p -ary cascaded GMW sequences.
- XueMin Yin, JianHua Yuan, XiaoPeng Lu, MouYan Zou:
De-interlacing technique based on total variation with spatial-temporal smoothness constraint.
- Ding Wang, Li Zhang, Ying Wu:
Constrained total least squares algorithm for passive location based on bearing-only measurements.
- JianXing Fan, Huazhong Yang, Hui Wang, Xiaolang Yan, Chaohuan Hou:
Phase noise analysis of oscillators with Sylvester representation for periodic time-varying modulus matrix by regular perturbations.
- Li Zhou, You He, WeiHua Zhang:
New optimal algorithm of data association for multi-passive-sensor location system.
- DanHui Wu, ChenFei Zhao, YuJie Zhang:
Application research on the chaos synchronization self-maintenance characteristic to secret communication.
- XiuPing Han, JunAn Lu:
The changes on synchronizing ability of coupled networks from ring networks to chain networks.
- Long Wang, Feng Xiao:
A new approach to consensus problems in discrete-time multiagent systems with time-delays.
- MeiQin Liu:
Unified stabilizing controller synthesis approach for discrete-time intelligent systems with time delays by dynamic output feedback.
- YingZhou Zhang:
A novel formal approach to program slicing.
- Yuzhen Wang, Shuzhi Sam Ge, Daizhan Cheng:
On Hamiltonian realization of time-varying nonlinear systems.
- Zhisheng Wang, DaoBo Wang, Ziyang Zhen:
Primary exploration of nonlinear information fusion control theory.
- Jinguo Liu, Yuechao Wang, Bin Li, Shugen Ma, Dalong Tan:
Center-configuration selection technique for the reconfigurable modular robot.
- Feng Liu:
Stabilization of switched linear systems with bounded disturbances and unobservable switchings.
- Qiang Guan, Long Wang, Bican Xia, Lu Yang, Wensheng Yu, Zhenbing Zeng:
Solution to the Generalized Champagne Problem on simultaneous stabilization of linear systems.
- Bo Li, Jiandong Li, Roberto Battiti:
Supporting service differentiation with enhancements of the IEEE 802.11 MAC protocol: Models and analysis.
- Zhendong Luo, Yuanan Liu, Jinchun Gao:
Differential space-time block-diagonal codes.
- Qi Wu, Jingping Bi, Zihua Guo, Yongqiang Xiong, Qian Zhang, Zhongcheng Li:
Cross-layer optimization in ultra wideband networks.
- Ming Xiao, Shengli Xie, Yuli Fu:
Searching-and-averaging method of underdetermined blind speech signal separation in time domain.
- Jian Wang, Lin Zhang, Xiuming Shan, Yong Ren:
New theoretical framework for OFDM/CDMA systems with peak-limited nonlinearities.
Copyright © Fri Mar 12 17:25:16 2010
by Michael Ley (firstname.lastname@example.org)
- Fei Pu, Wenhui Zhang:
Combining search space partition and abstraction for LTL model checking.
- Amjad Mahmood:
Dynamic replication of web contents.
- YiMin Sun, ShengWei Mei, Qiang Lu:
On global controllability of affine nonlinear systems with a triangular-like structure.
- Dandan Song, Zhidong Deng:
A fuzzy model of predicting RNA secondary structure.
- GuoJun Wang, XiaoJing Hui:
Randomization of classical inference patterns and its application.
- Xuanli Wu, Xuejun Sha, Naitong Zhang:
Pulse shaping method to compensate for antenna distortion in ultra-wideband communications.
- QiSheng Cao, DeQun Liang:
Study on modulation techniques free of orthogonality restriction.
- Peng Zhang, Guangguo Bi, Xiuying Cao:
Joint-state differential detection algorithm and its application in UWB wireless communication systems.
- Zhe Zhang, MaoLiu Lin, QingHua Xu, JiuBin Tan:
Accurate and robust estimation of phase error and its uncertainty of 50 GHz bandwidth sampling circuit.
- Ming-e Jing, Dian Zhou, PuShan Tang, XiaoFang Zhou, Hua Zhang:
Solving SAT problem by heuristic polarity decision-making algorithm.