Volume 50,
Number 1,
February 2007
 
- Ke Xu, Yuexuan Wang, Cheng Wu:
 Formal verification technique for grid service chain model and its application.
1-20
             
- Yu Huang, GuoZhao Wang:
 An orthogonal basis for the hyperbolic hybrid polynomial space.
21-28
             
- Bingru Yang, Wei Song, Zhangyan Xu:
 New construction for expert system based on innovative knowledge discovery technology.
29-40
             
- JunDe Wu, XuanChang Zhou, Minhyung Cho:
 An ideal topology type convergent theorem on scale effect algebras.
41-45
             
- MingYi Zhang, Ying Zhang, FangZhen Lin:
 A characterization of answer sets for logic programs.
46-62
             
- Zheng Tian, XiaoBin Li, YanWei Ju:
 Spectral clustering based on matrix perturbation theory.
63-81
             
- ZhenYu Hu, Dongdai Lin, Wenling Wu, Dengguo Feng:
 Constructing parallel long-message signcryption scheme from trapdoor permutation.
82-98
             
- LinHua Ma, YiLin Chang, ShengDa Wang:
 Study on the distribution law of random code structure of irregular LDPC codes and its application in eliminating short cycles.
99-104
             
- QiHui Wu, ChunMing Zhao, JinLong Wang:
 Turbo iterative equalization for HSDPA systems.
105-112
             
- XueSong Wang, JianCheng Liu, WenMing Zhang, QiXiang Fu, Zhong Liu, XiaoXia Xie:
 Mathematic principles of interrupted-sampling repeater jamming (ISRJ).
113-123
             
- Zhen Peng, XinQing Sheng:
 Application of asymptotic waveform approximation technique to hybrid FE/BI method for 3D scattering.
124-134
             
Volume 50,
Number 2,
April 2007
 
- Junzhou Luo, Ming Yang:
 Analysis of security protocols based on challenge-response.
137-153
             
- DaoWen Qiu:
 Notes on automata theory based on quantum logic.
154-169
             
- WenHui Zhou, Lin Li, GuoHai Chen, AnXi Yu:
 Optimality analysis of one-step OOSM filtering algorithms in target tracking.
170-187
             
- WenXiu Zhang, GuoFang Qiu, WeiZhi Wu:
 A general approach to attribute reduction in rough set theory.
188-197
             
- XiaoBin Li, Zheng Tian:
 Multiscale stochastic hierarchical image segmentation by spectral clustering.
198-211
             
- Yunxia Liu, Yuhua Peng, Huaijing Qu, Yong Yin:
 Energy-based adaptive orthogonal FRIT and its application in image denoising.
212-226
             
- Zhirong Ge, Bin Wang, LiMing Zhang:
 Remote sensing image fusion based on Bayesian linear estimation.
227-240
             
- Bo Zhu, Xianglin Yang:
 Fiber soliton-form 3R regenerator and its performance analysis.
241-250
             
- Chu Gao, ZhiNing Chen, YunYi Wang, Ning Yang:
 Study on relationships of electromagnetic band gap structures and left/right handed structures.
251-260
             
- ZhiGuang Shi, JianXiong Zhou, HongZhong Zhao, Qiang Fu:
 Study on joint Bayesian model selection and parameter estimation method of GTD model.
261-272
             
Volume 50,
Number 3,
June 2007
 
- ChangXiang Shen, HuangGuo Zhang, Dengguo Feng, ZhenFu Cao, JiWu Huang:
 Survey of information security.
273-298
             
- Qingshu Meng, Huanguo Zhang, Min Yang, Zhang-yi Wang:
 Analysis of affinely equivalent Boolean functions.
299-306
             
- Na Li, Wen-Feng Qi:
 Boolean functions of an odd number of variables with maximum algebraic immunity.
307-317
             
- Jian Weng, Shengli Liu, Kefei Chen:
 Pirate decoder for the broadcast encryption schemes from Crypto 2005.
318-323
             
- MingXin Lu, Xuejia Lai, Guozhen Xiao, Lei Qin:
 Symmetric-key cryptosystem with DNA technology.
324-333
             
- YiWei Zhang, YuMin Wang, XuBang Shen:
 A chaos-based image encryption algorithm using alternate structure.
334-341
             
- Jie Chen, YuPu Hu, YueYu Zhang:
 Impossible differential cryptanalysis of Advanced Encryption Standard.
342-350
             
- Zongduo Dai, Xiutao Feng:
 Classification and counting on multi-continued fractions and its application to multi-sequences.
351-358
             
- Zhenchuan Chai, Zhenfu Cao, Xiaolei Dong:
 Identity-based signature scheme based on quadratic residues.
373-380
             
- Dengguo Feng, Weidong Chen:
 Modular approach to the design and analysis of password-based security protocols.
381-398
             
- Sihan Qing, Changxiang Shen:
 Design of secure operating systems with high security levels.
399-418
             
- Hong Zhang, Yeping He, Zhiguo Shi:
 A formal model for access control with supporting spatial context.
419-439
             
- Fan Zhang, Jianfeng Ma, Sang-Jae Moon:
 Universally composable anonymous Hash certification model.
440-455
             
- Wei Wang, Guosun Zeng:
 Trusted dynamic level scheduling based on Bayes trust model.
456-469
             
- Hefei Ling, Wugang Yuan, Fuhao Zou, Zhengding Lu:
 Log-scaling magnitude modulated watermarking scheme.
470-490
             
- Miao Yu, HongJie He, Jiashu Zhang:
 A digital authentication watermarking scheme for JPEG images with superior localization and security.
491-509
             
- Xiangao Huang, Wei Huang, Chao Wang, ZeJun Lü, YanHua Hu:
 Blind reconnaissance of the pseudo-random sequence in DS/SS signal with negative SNR.
510-520
             
Volume 50,
Number 4,
August 2007
 
- Xiangyi Meng, Ran Tao, Yue Wang:
 Fractional Fourier domain analysis of decimation and interpolation.
521-538
             
- Jinhua Sun, Jiandong Li, Lijun Jin:
 A reduced state SISO iterative decoding algorithm for serially concatenated continuous phase modulation.
539-550
             
- XiaoHu Tang:
 On the linear span of the p -ary cascaded GMW sequences.
551-560
             
- XueMin Yin, JianHua Yuan, XiaoPeng Lu, MouYan Zou:
 De-interlacing technique based on total variation with spatial-temporal smoothness constraint.
561-575
             
- Ding Wang, Li Zhang, Ying Wu:
 Constrained total least squares algorithm for passive location based on bearing-only measurements.
576-586
             
- JianXing Fan, Huazhong Yang, Hui Wang, Xiaolang Yan, Chaohuan Hou:
 Phase noise analysis of oscillators with Sylvester representation for periodic time-varying modulus matrix by regular perturbations.
587-599
             
- Li Zhou, You He, WeiHua Zhang:
 New optimal algorithm of data association for multi-passive-sensor location system.
600-608
             
- DanHui Wu, ChenFei Zhao, YuJie Zhang:
 Application research on the chaos synchronization self-maintenance characteristic to secret communication.
609-614
             
- XiuPing Han, JunAn Lu:
 The changes on synchronizing ability of coupled networks from ring networks to chain networks.
615-624
             
- Long Wang, Feng Xiao:
 A new approach to consensus problems in discrete-time multiagent systems with time-delays.
625-635
             
- MeiQin Liu:
 Unified stabilizing controller synthesis approach for discrete-time intelligent systems with time delays by dynamic output feedback.
636-656
             
Volume 50,
Number 5,
October 2007
 
- YingZhou Zhang:
 A novel formal approach to program slicing.
657-670
             
- Yuzhen Wang, Shuzhi Sam Ge, Daizhan Cheng:
 On Hamiltonian realization of time-varying nonlinear systems.
671-685
             
- Zhisheng Wang, DaoBo Wang, Ziyang Zhen:
 Primary exploration of nonlinear information fusion control theory.
686-696
             
- Jinguo Liu, Yuechao Wang, Bin Li, Shugen Ma, Dalong Tan:
 Center-configuration selection technique for the reconfigurable modular robot.
697-710
             
- Feng Liu:
 Stabilization of switched linear systems with bounded disturbances and unobservable switchings.
711-718
             
- Qiang Guan, Long Wang, Bican Xia, Lu Yang, Wensheng Yu, Zhenbing Zeng:
 Solution to the Generalized Champagne Problem on simultaneous stabilization of linear systems.
719-731
             
- Bo Li, Jiandong Li, Roberto Battiti:
 Supporting service differentiation with enhancements of the IEEE 802.11 MAC protocol: Models and analysis.
732-746
             
- Zhendong Luo, Yuanan Liu, Jinchun Gao:
 Differential space-time block-diagonal codes.
747-759
             
- Qi Wu, Jingping Bi, Zihua Guo, Yongqiang Xiong, Qian Zhang, Zhongcheng Li:
 Cross-layer optimization in ultra wideband networks.
760-770
             
- Ming Xiao, Shengli Xie, Yuli Fu:
 Searching-and-averaging method of underdetermined blind speech signal separation in time domain.
771-782
             
- Jian Wang, Lin Zhang, Xiuming Shan, Yong Ren:
 New theoretical framework for OFDM/CDMA systems with peak-limited nonlinearities.
783-792
             
Volume 50,
Number 6,
December 2007
 
- Fei Pu, Wenhui Zhang:
 Combining search space partition and abstraction for LTL model checking.
793-810
             
- Amjad Mahmood:
 Dynamic replication of web contents.
811-830
             
- YiMin Sun, ShengWei Mei, Qiang Lu:
 On global controllability of affine nonlinear systems with a triangular-like structure.
831-845
             
- Dandan Song, Zhidong Deng:
 A fuzzy model of predicting RNA secondary structure.
846-866
             
- GuoJun Wang, XiaoJing Hui:
 Randomization of classical inference patterns and its application.
867-877
             
- Xuanli Wu, Xuejun Sha, Naitong Zhang:
 Pulse shaping method to compensate for antenna distortion in ultra-wideband communications.
878-888
             
- QiSheng Cao, DeQun Liang:
 Study on modulation techniques free of orthogonality restriction.
889-896
             
- Peng Zhang, Guangguo Bi, Xiuying Cao:
 Joint-state differential detection algorithm and its application in UWB wireless communication systems.
897-904
             
- Zhe Zhang, MaoLiu Lin, QingHua Xu, JiuBin Tan:
 Accurate and robust estimation of phase error and its uncertainty of 50 GHz bandwidth sampling circuit.
905-914
             
- Ming-e Jing, Dian Zhou, PuShan Tang, XiaoFang Zhou, Hua Zhang:
 Solving SAT problem by heuristic polarity decision-making algorithm.
915-925
             
Copyright © Fri Mar 12 17:25:16 2010
 by Michael Ley (ley@uni-trier.de)