Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             22 results found
no title author magazine year volume issue page(s) type
1 A method for detecting code security vulnerability based on variables tracking with validated-tree Zhang, Zhefei
2008
3 2 p. 162-166
article
2 Analytical design of PI controller for AQM with robustness adjustability Gu, Danying
2008
3 2 p. 240-245
article
3 A new directional multi-resolution ridgelet network Yang, Shuyuan
2008
3 2 p. 198-203
article
4 A novel scheme for global scattering center modeling of radar targets Zhou, Jianxiong
2008
3 2 p. 176-182
article
5 A PO-CI/MC-CDMA scheme for high modulation styles Zhang, Yanyan
2008
3 2 p. 145-149
article
6 A strong multi-designated verifiers signature scheme Yang, Bo
2008
3 2 p. 167-170
article
7 Closed-form solutions to fractional-order linear differential equations Zhao, Chunna
2008
3 2 p. 214-217
article
8 DCT_M model for excitation parameter in low bit rate vocoder Dang, Xiaoyan
2008
3 2 p. 204-207
article
9 Delay-dependent robust H∞ controller design for a class of nonlinear uncertainty time-delay systems with input delay Wang, Yanqing
2008
3 2 p. 234-239
article
10 Enhancement of wave and acceleration of electron in plasma in the external field Wu, Jun
2008
3 2 p. 223-226
article
11 Epidemic spreading behavior with time delay on local-world evolving networks Xia, Chengyi
2008
3 2 p. 129-135
article
12 Gain-scheduled H2/H∞ filtering for linear discrete-time systems with polytopic uncertainties Ma, Qingliang
2008
3 2 p. 208-213
article
13 Image content authentication technique based on Laplacian Pyramid Wo, Yan
2008
3 2 p. 188-193
article
14 Joint admission control algorithm in access network Shan, Linwei
2008
3 2 p. 150-154
article
15 Multi-image gradient-based algorithms for motion measurement using wavelet transform Lu, Qinghua
2008
3 2 p. 183-187
article
16 Replica location mechanism in data grid based on ED-Chord Song, Jiaxing
2008
3 2 p. 171-175
article
17 Simulation study on delay of end-to-end data communication for protective relaying in substations Gao, Huisheng
2008
3 2 p. 246-250
article
18 Single-trial EEG classification using in-phase average for brain-computer interface Guan, Jin’an
2008
3 2 p. 194-197
article
19 The design and fabrication on gate type resonant tunneling transistor Guo, Weilian
2008
3 2 p. 227-233
article
20 Using experimental designs for modelling of intermittent air filtration process Tilmatine, A.
2008
3 2 p. 218-222
article
21 Using Petri nets to verify acyclic rule-based system Ding, Zhijun
2008
3 2 p. 155-161
article
22 UWB planar antenna technology Zhong, Shunshi
2008
3 2 p. 136-144
article
                             22 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands