nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blind video watermarking scheme based on ICA and shot segmentation
|
Sun, Jiande |
|
2006 |
|
3 |
p. 302-312 |
artikel |
2 |
A chaos-based image encryption algorithm using alternate structure
|
Zhang, YiWei |
|
2007 |
|
3 |
p. 334-341 |
artikel |
3 |
A digital authentication watermarking scheme for JPEG images with superior localization and security
|
Yu, Miao |
|
2007 |
|
3 |
p. 491-509 |
artikel |
4 |
A formal model for access control with supporting spatial context
|
Zhang, Hong |
|
2007 |
|
3 |
p. 419-439 |
artikel |
5 |
A hybrid rendering algorithm for textile objects
|
Zhang, MingMin |
|
2009 |
|
3 |
p. 490-499 |
artikel |
6 |
A micro amperometric immunosensor for detection of human immunoglobulin
|
Xu, Yuanyuan |
|
2006 |
|
3 |
p. 397-408 |
artikel |
7 |
A mobile-agent-based approach to software coordination in the HOOPE system
|
Ma, Xiaoxing |
|
|
|
3 |
p. 203-219 |
artikel |
8 |
An algebraic approach to revising propositional rule-based knowledge bases
|
Luan, ShangMin |
|
2008 |
|
3 |
p. 240-257 |
artikel |
9 |
Analysis of affinely equivalent Boolean functions
|
Meng, QingShu |
|
2007 |
|
3 |
p. 299-306 |
artikel |
10 |
Analysis of fault detection method based on predictive filter approach
|
Li, Ji |
|
|
|
3 |
p. 335-353 |
artikel |
11 |
Analysis of time and frequency synchronization error for wireless systems using OFDM
|
Shu, Feng |
|
|
|
3 |
p. 379-396 |
artikel |
12 |
An estimation method for InSAR interferometric phase combined with image auto-coregistration
|
Li, Hai |
|
2006 |
|
3 |
p. 386-396 |
artikel |
13 |
A new fast friendly window-based congestion control for real-time streaming media transmission
|
Li, Yongli |
|
|
|
3 |
p. 273-284 |
artikel |
14 |
A new numerical method on American option pricing
|
Gu, Yonggeng |
|
|
|
3 |
p. 181-188 |
artikel |
15 |
An extension of Harrington’s noncupping theorem
|
Yu, Liang |
|
|
|
3 |
p. 199-209 |
artikel |
16 |
An improved description method of the bumpy texture
|
Gao, RongHua |
|
2009 |
|
3 |
p. 523-528 |
artikel |
17 |
A novel fuzzy neural network and its approximation capability
|
Liu, Puyin |
|
|
|
3 |
p. 184-194 |
artikel |
18 |
A novel space-borne antenna anti-jamming technique based on immunity genetic algorithm-maximum likelihood
|
Tao, Haihong |
|
|
|
3 |
p. 397-408 |
artikel |
19 |
A predicate spatial logic for mobile processes
|
Lin, Huimin |
|
|
|
3 |
p. 394-408 |
artikel |
20 |
A proof of image Euler Number formula
|
Lin, Xiaozhu |
|
|
|
3 |
p. 364-371 |
artikel |
21 |
A proof of image Euler Number formula
|
Lin, Xiaozhu |
|
2006 |
|
3 |
p. 364-371 |
artikel |
22 |
A survey on virtual reality
|
Zhao, QinPing |
|
2009 |
|
3 |
p. 348-400 |
artikel |
23 |
A trinomial type of σ-LFSR oriented toward software implementation
|
Zeng, Guang |
|
2007 |
|
3 |
p. 359-372 |
artikel |
24 |
Autonomy-subnet based structural synthesis and liveness guarantying policy of Petri net model of flexible manufacturing system
|
Xue, Lei |
|
|
|
3 |
p. 273-286 |
artikel |
25 |
Blind reconnaissance of the pseudo-random sequence in DS/SS signal with negative SNR
|
Huang, XianGao |
|
2007 |
|
3 |
p. 510-520 |
artikel |
26 |
Boolean functions of an odd number of variables with maximum algebraic immunity
|
Li, Na |
|
2007 |
|
3 |
p. 307-317 |
artikel |
27 |
Building enterprise reuse program
|
Mei, Hong |
|
|
|
3 |
p. 161-173 |
artikel |
28 |
Chaotic laser synchronization and its application in optical fiber secure communication
|
Yan, Senlin |
|
|
|
3 |
p. 332-347 |
artikel |
29 |
Classification and counting on multi-continued fractions and its application to multi-sequences
|
Dai, ZongDuo |
|
2007 |
|
3 |
p. 351-358 |
artikel |
30 |
Color-image retrieval based on fuzzy correlation
|
Zhai, Hongchen |
|
|
|
3 |
p. 295-300 |
artikel |
31 |
Constructing iterative non-uniform B-spline curve and surface to fit data points
|
Lin, Hongwei |
|
|
|
3 |
p. 315-331 |
artikel |
32 |
Construction of compactly supported orthonormal wavelets with beautiful structure
|
Peng, Lizhong |
|
|
|
3 |
p. 372-383 |
artikel |
33 |
Convergence analysis of cautious control
|
Zhang, Yanxia |
|
2006 |
|
3 |
p. 328-338 |
artikel |
34 |
Design of secure operating systems with high security levels
|
Qing, SiHan |
|
2007 |
|
3 |
p. 399-418 |
artikel |
35 |
Differential negative resistance effect of output characteristics in deep sub-micrometer wurtzite AlGaN/GaN MODFETs
|
Guo, Baozeng |
|
|
|
3 |
p. 187-198 |
artikel |
36 |
Directional EMD and its application to texture segmentation
|
Liu, Zhongxuan |
|
|
|
3 |
p. 354-365 |
artikel |
37 |
Editor’s note
|
Zhao, QinPing |
|
2009 |
|
3 |
p. 347 |
artikel |
38 |
Electroluminescence in organic single-layer light-emitting diodes at high fields
|
Yang, Shengyi |
|
|
|
3 |
p. 168-175 |
artikel |
39 |
Estimating differential quantities from point cloud based on a linear fitting of normal vectors
|
Cheng, ZhangLin |
|
2009 |
|
3 |
p. 431-444 |
artikel |
40 |
Existence of 3-round zero-knowledge proof systems for NP
|
Li, HongDa |
|
2008 |
|
3 |
p. 273-282 |
artikel |
41 |
Filtering images contaminated with pep and salt type noise with pulse-coupled neural networks
|
Zhang, Junying |
|
|
|
3 |
p. 322-334 |
artikel |
42 |
Fuzzy metric based on the distance function of plane and its application in optimal scheduling problems
|
Liu, Min |
|
|
|
3 |
p. 210-224 |
artikel |
43 |
Gaits-transferable CPG controller for a snake-like robot
|
Lu, ZhenLi |
|
2008 |
|
3 |
p. 293-305 |
artikel |
44 |
Generalized L systems
|
Lu, Ruqian |
|
|
|
3 |
p. 220-231 |
artikel |
45 |
Gene selection in class space for molecular classification of cancer
|
Zhang, Junying |
|
|
|
3 |
p. 301-314 |
artikel |
46 |
Geometrically robust video watermarking based on wavelet transform
|
Zhao, Yao |
|
2006 |
|
3 |
p. 313-327 |
artikel |
47 |
Globally exponentially attractive sets of the family of Lorenz systems
|
Liao, XiaoXin |
|
2008 |
|
3 |
p. 283-292 |
artikel |
48 |
Haptic rendering for dental training system
|
Wang, DangXiao |
|
2009 |
|
3 |
p. 529-546 |
artikel |
49 |
Identity-based signature scheme based on quadratic residues
|
Chai, ZhenChuan |
|
2007 |
|
3 |
p. 373-380 |
artikel |
50 |
Impossible differential cryptanalysis of Advanced Encryption Standard
|
Chen, Jie |
|
2007 |
|
3 |
p. 342-350 |
artikel |
51 |
Integrating advanced reasoning into a SAT solver
|
Ding, Min |
|
|
|
3 |
p. 366-378 |
artikel |
52 |
Intelligent control based on intelligent characteristic model and its application
|
Wu, Hongxin |
|
|
|
3 |
p. 225-240 |
artikel |
53 |
Joint frequency, 2-D AOA and polarization estimation in broad-band
|
Wang, Jianying |
|
|
|
3 |
p. 161-167 |
artikel |
54 |
Log-scaling magnitude modulated watermarking scheme
|
Ling, HeFei |
|
2007 |
|
3 |
p. 470-490 |
artikel |
55 |
LoI: Efficient relevance evaluation and filtering for distributed simulation
|
Zhou, Zhong |
|
2009 |
|
3 |
p. 470-489 |
artikel |
56 |
Low power DCVSL circuits employing AC power supply
|
Wu, Xunwei |
|
|
|
3 |
p. 232-240 |
artikel |
57 |
Maximum-likelihood detection based on branch and bound algorithm for MIMO systems
|
Li, Zi |
|
2008 |
|
3 |
p. 306-319 |
artikel |
58 |
Meshless methods for physics-based modeling and simulation of deformable models
|
Guo, XiaoHu |
|
2009 |
|
3 |
p. 401-417 |
artikel |
59 |
Modeling plants with sensor data
|
Ma, Wei |
|
2009 |
|
3 |
p. 500-511 |
artikel |
60 |
Modular approach to the design and analysis of password-based security protocols
|
Feng, DengGuo |
|
2007 |
|
3 |
p. 381-398 |
artikel |
61 |
MRF based construction of statistical operator and its application
|
Li, Hongliang |
|
|
|
3 |
p. 287-294 |
artikel |
62 |
Multiuser detection algorithm based on belief propagation in multiple-input multiple-output systems
|
Jiang, Wei |
|
|
|
3 |
p. 384-393 |
artikel |
63 |
New strategy of modeling inversion layer characteristics in MOS structure for ULSI applications
|
Ma, Yutao |
|
|
|
3 |
p. 176-183 |
artikel |
64 |
Nonexistence of cross-term free time-frequency distribution with concentration of Wigner-Ville distribution
|
Zou, Hongxing |
|
|
|
3 |
p. 174-180 |
artikel |
65 |
Online approach to feature interaction problems in middleware based system
|
Huang, Gang |
|
2008 |
|
3 |
p. 225-239 |
artikel |
66 |
On the new results of global attractive set and positive invariant set of the Lorenz chaotic system and the applications to chaos control and synchronization
|
Liao, Xiaoxin |
|
|
|
3 |
p. 304-321 |
artikel |
67 |
Parameterization of 3-channel non-separable 2-D wavelets and filters
|
Gao, Xieping |
|
|
|
3 |
p. 362-371 |
artikel |
68 |
Pirate decoder for the broadcast encryption schemes from Crypto 2005
|
Weng, Jian |
|
2007 |
|
3 |
p. 318-323 |
artikel |
69 |
Polynomial-time algorithm for the legal firing sequences problem of a type of synchronous composition Petri nets
|
Jiang, Changjun |
|
|
|
3 |
p. 226-233 |
artikel |
70 |
Probability representations of fuzzy systems
|
Li, Hongxing |
|
|
|
3 |
p. 339-363 |
artikel |
71 |
Probability representations of fuzzy systems
|
Li, Hongxing |
|
2006 |
|
3 |
p. 339-363 |
artikel |
72 |
Removing local irregularities of triangular meshes with highlight line models
|
Yong, JunHai |
|
2009 |
|
3 |
p. 418-430 |
artikel |
73 |
Robust DOA estimation and array calibration in the presence of mutual coupling for uniform linear array
|
Wang, Buhong |
|
|
|
3 |
p. 348-361 |
artikel |
74 |
Security analysis of a new stream cipher
|
Zhang, Bin |
|
2006 |
|
3 |
p. 286-301 |
artikel |
75 |
Semi-tensor product of matrices and its application to Morgen’s problem
|
Cheng, Daizhan |
|
|
|
3 |
p. 195-212 |
artikel |
76 |
Solving and analyzing PD0L inverse process
|
Fan, Yongbing |
|
|
|
3 |
p. 234-240 |
artikel |
77 |
Star-sensor-based predictive Kalman filter for satellite attitude estimation
|
Lin, Yurong |
|
|
|
3 |
p. 189-195 |
artikel |
78 |
Steganalysis of stochastic modulation steganography
|
He, Junhui |
|
2006 |
|
3 |
p. 273-285 |
artikel |
79 |
Survey of information security
|
Shen, ChangXiang |
|
2007 |
|
3 |
p. 273-298 |
artikel |
80 |
Symmetric-key cryptosystem with DNA technology
|
Lu, MingXin |
|
2007 |
|
3 |
p. 324-333 |
artikel |
81 |
Task scheduling of parallel programs to optimize communications for cluster of SMPs
|
Zheng, Weimin |
|
|
|
3 |
p. 213-225 |
artikel |
82 |
Texture synthesis via the matching compatibility between patches
|
Wang, WenCheng |
|
2009 |
|
3 |
p. 512-522 |
artikel |
83 |
The key theorem and the bounds on the rate of uniform convergence of learning theory on Sugeno measure space
|
Ha, Minghu |
|
2006 |
|
3 |
p. 372-385 |
artikel |
84 |
The proportional fairness scheduling algorithm on multi-classes
|
Jiang, Yong |
|
|
|
3 |
p. 161-174 |
artikel |
85 |
Time-varying clustering for local lighting and material design
|
Huang, PeiJie |
|
2009 |
|
3 |
p. 445-456 |
artikel |
86 |
Trusted dynamic level scheduling based on Bayes trust model
|
Wei, Wang |
|
2007 |
|
3 |
p. 456-469 |
artikel |
87 |
Universally composable anonymous Hash certification model
|
Zhang, Fan |
|
2007 |
|
3 |
p. 440-455 |
artikel |
88 |
Virtual hairy brush for digital painting and calligraphy
|
Xu, Songhua |
|
|
|
3 |
p. 285-303 |
artikel |
89 |
Virtual hairy brush for digital painting and calligraphy
|
Xu, Songhua |
|
|
|
3 |
p. 285-303 |
artikel |
90 |
ViWoSG: A distributed scene graph of ultramassive distributed virtual environments
|
Wang, GuoPing |
|
2009 |
|
3 |
p. 457-469 |
artikel |
91 |
WDM star single-hop network reusing wavelengths
|
Gan, Chaoqin |
|
|
|
3 |
p. 196-202 |
artikel |
92 |
Weight hierarchies of linear codes satisfying the almost chain condition
|
Chen, Wende |
|
|
|
3 |
p. 175-186 |
artikel |