Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             29 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Access control for rural medical and health collaborative working platform JIANG, Yan-feng
2013
20 S2 p. 7-10
4 p.
artikel
2 A fuzzy reinforcement learning approach for cell outage compensation in radio access networks QIN, Wen-cong
2013
20 S2 p. 26-32
7 p.
artikel
3 A method for polarization scattering parameter measurement and calibration based on vector network analyzer KANG, Hong-bo
2013
20 S2 p. 117-120
4 p.
artikel
4 Analysis on the risk of personal cloud computing based on the cloud industry chain XIE, Xue-mei
2013
20 S2 p. 105-112
8 p.
artikel
5 An automatically privacy setting algorithm based on Rasch model GU, Yong-hao
2013
20 S2 p. 17-20
4 p.
artikel
6 A practical physical network coding scheme over hybrid field HAO, Jian-jun
2013
20 S2 p. 33-39
7 p.
artikel
7 Autoregressive-based online backup scheme for small files YE, Peng-di
2013
20 S2 p. 40-46
7 p.
artikel
8 Construction and implementation of ‘classic reading’ innovation platform WU, Xu
2013
20 S2 p. 128-135
8 p.
artikel
9 Critical phenomenon of two coupled phase oscillators LI, Bo
2013
20 S2 p. 121-127
7 p.
artikel
10 Efficient methods for choosing quantum channel in teleportation and bidirectional teleportation HU, Yang
2013
20 S2 p. 101-104
4 p.
artikel
11 Enhanced mutual authentication model of IoT YANG, Jin-cui
2013
20 S2 p. 69-74
6 p.
artikel
12 Fuzzy multi-objective collaborative evaluation for business process family configuration ZHANG, Hong-xia
2013
20 S2 p. 11-16
6 p.
artikel
13 Gain-flattened tellurite-based fiber Raman amplifiers GONG, Jia-min
2013
20 S2 p. 143-146
4 p.
artikel
14 Interference alignment and spatially-normalized degrees of freedom of cellular networks with two cells and three users per cell SONG, Xiao-shi
2013
20 S2 p. 86-91
6 p.
artikel
15 Invertible entanglement matching method in probabilitic teleportation ZHAO, Mei-xia
2013
20 S2 p. 113-116
4 p.
artikel
16 Knowledge-based information security risk assessment method GUAN, Ji-zheng
2013
20 S2 p. 60-63
4 p.
artikel
17 Multi-cell cooperation based on time reversal in heterogeneous wireless networks WANG, Li
2013
20 S2 p. 80-85
6 p.
artikel
18 New IPv4/IPv6 transition solution for data center ZHAO, Qin
2013
20 S2 p. 21-25
5 p.
artikel
19 Novel jagged-shaped ultra-wideband antenna CAO, Xi
2013
20 S2 p. 92-94
3 p.
artikel
20 On a novel method of designing distributed LDoS attack based on network behavior features LIU, Xiao-ming
2013
20 S2 p. 54-59
6 p.
artikel
21 Parameter estimation of chirp signals based on fractional Fourier transform ZHANG, Hong-xin
2013
20 S2 p. 95-100
6 p.
artikel
22 Protocol reverse engineering through dynamic and static binary analysis WANG, Ying
2013
20 S2 p. 75-79
5 p.
artikel
23 Research on PMD compensation in high-speed optical fiber communication network WANG, Xu-hui
2013
20 S2 p. 152-155
4 p.
artikel
24 Secure solution of trusted Internet of things base on TCM WU, Qiu-xin
2013
20 S2 p. 47-53
7 p.
artikel
25 Security and privacy mechanism for health internet of things KANG, Kai
2013
20 S2 p. 64-68
5 p.
artikel
26 Study and application of semantic-based image retrieval XIE, Xia-qing
2013
20 S2 p. 136-142
7 p.
artikel
27 Study on the influences of system parameters on bound self-similar pulse pairs in a passively mode-locked fiber laser WU, Ge
2013
20 S2 p. 147-151
5 p.
artikel
28 The quasi-stationary platform of stratospheric ISAR imaging QI, Zhao-qun
2013
20 S2 p. 156-160
5 p.
artikel
29 Top-N selection based on user behavior history formobile applications recommendation CUI, Yi-dong
2013
20 S2 p. 1-6
6 p.
artikel
                             29 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland