Volume 50,
Number 1,
February 2007
- Ke Xu, Yuexuan Wang, Cheng Wu:
Formal verification technique for grid service chain model and its application.
1-20
- Yu Huang, GuoZhao Wang:
An orthogonal basis for the hyperbolic hybrid polynomial space.
21-28
- Bingru Yang, Wei Song, Zhangyan Xu:
New construction for expert system based on innovative knowledge discovery technology.
29-40
- JunDe Wu, XuanChang Zhou, Minhyung Cho:
An ideal topology type convergent theorem on scale effect algebras.
41-45
- MingYi Zhang, Ying Zhang, FangZhen Lin:
A characterization of answer sets for logic programs.
46-62
- Zheng Tian, XiaoBin Li, YanWei Ju:
Spectral clustering based on matrix perturbation theory.
63-81
- ZhenYu Hu, Dongdai Lin, Wenling Wu, Dengguo Feng:
Constructing parallel long-message signcryption scheme from trapdoor permutation.
82-98
- LinHua Ma, YiLin Chang, ShengDa Wang:
Study on the distribution law of random code structure of irregular LDPC codes and its application in eliminating short cycles.
99-104
- QiHui Wu, ChunMing Zhao, JinLong Wang:
Turbo iterative equalization for HSDPA systems.
105-112
- XueSong Wang, JianCheng Liu, WenMing Zhang, QiXiang Fu, Zhong Liu, XiaoXia Xie:
Mathematic principles of interrupted-sampling repeater jamming (ISRJ).
113-123
- Zhen Peng, XinQing Sheng:
Application of asymptotic waveform approximation technique to hybrid FE/BI method for 3D scattering.
124-134
Volume 50,
Number 2,
April 2007
- Junzhou Luo, Ming Yang:
Analysis of security protocols based on challenge-response.
137-153
- DaoWen Qiu:
Notes on automata theory based on quantum logic.
154-169
- WenHui Zhou, Lin Li, GuoHai Chen, AnXi Yu:
Optimality analysis of one-step OOSM filtering algorithms in target tracking.
170-187
- WenXiu Zhang, GuoFang Qiu, WeiZhi Wu:
A general approach to attribute reduction in rough set theory.
188-197
- XiaoBin Li, Zheng Tian:
Multiscale stochastic hierarchical image segmentation by spectral clustering.
198-211
- Yunxia Liu, Yuhua Peng, Huaijing Qu, Yong Yin:
Energy-based adaptive orthogonal FRIT and its application in image denoising.
212-226
- Zhirong Ge, Bin Wang, LiMing Zhang:
Remote sensing image fusion based on Bayesian linear estimation.
227-240
- Bo Zhu, Xianglin Yang:
Fiber soliton-form 3R regenerator and its performance analysis.
241-250
- Chu Gao, ZhiNing Chen, YunYi Wang, Ning Yang:
Study on relationships of electromagnetic band gap structures and left/right handed structures.
251-260
- ZhiGuang Shi, JianXiong Zhou, HongZhong Zhao, Qiang Fu:
Study on joint Bayesian model selection and parameter estimation method of GTD model.
261-272
Volume 50,
Number 3,
June 2007
- ChangXiang Shen, HuangGuo Zhang, Dengguo Feng, ZhenFu Cao, JiWu Huang:
Survey of information security.
273-298
- Qingshu Meng, Huanguo Zhang, Min Yang, Zhang-yi Wang:
Analysis of affinely equivalent Boolean functions.
299-306
- Na Li, Wen-Feng Qi:
Boolean functions of an odd number of variables with maximum algebraic immunity.
307-317
- Jian Weng, Shengli Liu, Kefei Chen:
Pirate decoder for the broadcast encryption schemes from Crypto 2005.
318-323
- MingXin Lu, Xuejia Lai, Guozhen Xiao, Lei Qin:
Symmetric-key cryptosystem with DNA technology.
324-333
- YiWei Zhang, YuMin Wang, XuBang Shen:
A chaos-based image encryption algorithm using alternate structure.
334-341
- Jie Chen, YuPu Hu, YueYu Zhang:
Impossible differential cryptanalysis of Advanced Encryption Standard.
342-350
- Zongduo Dai, Xiutao Feng:
Classification and counting on multi-continued fractions and its application to multi-sequences.
351-358
- Zhenchuan Chai, Zhenfu Cao, Xiaolei Dong:
Identity-based signature scheme based on quadratic residues.
373-380
- Dengguo Feng, Weidong Chen:
Modular approach to the design and analysis of password-based security protocols.
381-398
- Sihan Qing, Changxiang Shen:
Design of secure operating systems with high security levels.
399-418
- Hong Zhang, Yeping He, Zhiguo Shi:
A formal model for access control with supporting spatial context.
419-439
- Fan Zhang, Jianfeng Ma, Sang-Jae Moon:
Universally composable anonymous Hash certification model.
440-455
- Wei Wang, Guosun Zeng:
Trusted dynamic level scheduling based on Bayes trust model.
456-469
- Hefei Ling, Wugang Yuan, Fuhao Zou, Zhengding Lu:
Log-scaling magnitude modulated watermarking scheme.
470-490
- Miao Yu, HongJie He, Jiashu Zhang:
A digital authentication watermarking scheme for JPEG images with superior localization and security.
491-509
- Xiangao Huang, Wei Huang, Chao Wang, ZeJun Lü, YanHua Hu:
Blind reconnaissance of the pseudo-random sequence in DS/SS signal with negative SNR.
510-520
Volume 50,
Number 4,
August 2007
- Xiangyi Meng, Ran Tao, Yue Wang:
Fractional Fourier domain analysis of decimation and interpolation.
521-538
- Jinhua Sun, Jiandong Li, Lijun Jin:
A reduced state SISO iterative decoding algorithm for serially concatenated continuous phase modulation.
539-550
- XiaoHu Tang:
On the linear span of the p -ary cascaded GMW sequences.
551-560
- XueMin Yin, JianHua Yuan, XiaoPeng Lu, MouYan Zou:
De-interlacing technique based on total variation with spatial-temporal smoothness constraint.
561-575
- Ding Wang, Li Zhang, Ying Wu:
Constrained total least squares algorithm for passive location based on bearing-only measurements.
576-586
- JianXing Fan, Huazhong Yang, Hui Wang, Xiaolang Yan, Chaohuan Hou:
Phase noise analysis of oscillators with Sylvester representation for periodic time-varying modulus matrix by regular perturbations.
587-599
- Li Zhou, You He, WeiHua Zhang:
New optimal algorithm of data association for multi-passive-sensor location system.
600-608
- DanHui Wu, ChenFei Zhao, YuJie Zhang:
Application research on the chaos synchronization self-maintenance characteristic to secret communication.
609-614
- XiuPing Han, JunAn Lu:
The changes on synchronizing ability of coupled networks from ring networks to chain networks.
615-624
- Long Wang, Feng Xiao:
A new approach to consensus problems in discrete-time multiagent systems with time-delays.
625-635
- MeiQin Liu:
Unified stabilizing controller synthesis approach for discrete-time intelligent systems with time delays by dynamic output feedback.
636-656
Volume 50,
Number 5,
October 2007
- YingZhou Zhang:
A novel formal approach to program slicing.
657-670
- Yuzhen Wang, Shuzhi Sam Ge, Daizhan Cheng:
On Hamiltonian realization of time-varying nonlinear systems.
671-685
- Zhisheng Wang, DaoBo Wang, Ziyang Zhen:
Primary exploration of nonlinear information fusion control theory.
686-696
- Jinguo Liu, Yuechao Wang, Bin Li, Shugen Ma, Dalong Tan:
Center-configuration selection technique for the reconfigurable modular robot.
697-710
- Feng Liu:
Stabilization of switched linear systems with bounded disturbances and unobservable switchings.
711-718
- Qiang Guan, Long Wang, Bican Xia, Lu Yang, Wensheng Yu, Zhenbing Zeng:
Solution to the Generalized Champagne Problem on simultaneous stabilization of linear systems.
719-731
- Bo Li, Jiandong Li, Roberto Battiti:
Supporting service differentiation with enhancements of the IEEE 802.11 MAC protocol: Models and analysis.
732-746
- Zhendong Luo, Yuanan Liu, Jinchun Gao:
Differential space-time block-diagonal codes.
747-759
- Qi Wu, Jingping Bi, Zihua Guo, Yongqiang Xiong, Qian Zhang, Zhongcheng Li:
Cross-layer optimization in ultra wideband networks.
760-770
- Ming Xiao, Shengli Xie, Yuli Fu:
Searching-and-averaging method of underdetermined blind speech signal separation in time domain.
771-782
- Jian Wang, Lin Zhang, Xiuming Shan, Yong Ren:
New theoretical framework for OFDM/CDMA systems with peak-limited nonlinearities.
783-792
Volume 50,
Number 6,
December 2007
- Fei Pu, Wenhui Zhang:
Combining search space partition and abstraction for LTL model checking.
793-810
- Amjad Mahmood:
Dynamic replication of web contents.
811-830
- YiMin Sun, ShengWei Mei, Qiang Lu:
On global controllability of affine nonlinear systems with a triangular-like structure.
831-845
- Dandan Song, Zhidong Deng:
A fuzzy model of predicting RNA secondary structure.
846-866
- GuoJun Wang, XiaoJing Hui:
Randomization of classical inference patterns and its application.
867-877
- Xuanli Wu, Xuejun Sha, Naitong Zhang:
Pulse shaping method to compensate for antenna distortion in ultra-wideband communications.
878-888
- QiSheng Cao, DeQun Liang:
Study on modulation techniques free of orthogonality restriction.
889-896
- Peng Zhang, Guangguo Bi, Xiuying Cao:
Joint-state differential detection algorithm and its application in UWB wireless communication systems.
897-904
- Zhe Zhang, MaoLiu Lin, QingHua Xu, JiuBin Tan:
Accurate and robust estimation of phase error and its uncertainty of 50 GHz bandwidth sampling circuit.
905-914
- Ming-e Jing, Dian Zhou, PuShan Tang, XiaoFang Zhou, Hua Zhang:
Solving SAT problem by heuristic polarity decision-making algorithm.
915-925
Copyright © Fri Mar 12 17:25:16 2010
by Michael Ley (ley@uni-trier.de)