Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             21 results found
no title author magazine year volume issue page(s) type
1 A hierarchical architecture of centralized monitoring and controlling system and its high-performance and interoperability protocol Li-can, Huang
2004
5 1 p. 22-30
article
2 An efficient algorithm for mining closed itemsets Jun-qiang, Liu
2004
5 1 p. 8-15
article
3 A novel method for tracking pedestrians from real-time video Jian-qiang, Huang
2004
5 1 p. 99-105
article
4 A robust tolerance design method based on process capability Yan-long, Cao
2004
5 1 p. 81-85
article
5 A simple channel estimator for space-time coded OFDM systems in rapid fading channels Shu-wei, Shan
2004
5 1 p. 45-49
article
6 A SISO mixedH2/l1 optimal control problem and its solution Jun, Wu
2004
5 1 p. 68-74
article
7 A UML profile for framework modeling Xiao-liang, Xu
2004
5 1 p. 92-98
article
8 A unified convergence theory of a numerical method, and applications to the replenishment policies Xiang-jiang, Mi
2004
5 1 p. 117-122
article
9 Hybrid internal model control and proportional control of chaotic dynamical systems Dong-lian, Qi
2004
5 1 p. 62-67
article
10 Image segmentation based on Mumford-Shah functional Xu-feng, Chen
2004
5 1 p. 123-128
article
11 Inversion of thicknesses of multi-layered structures from eddy current testing measurements Ping-jie, Huang
2004
5 1 p. 86-91
article
12 Large eddy simulation of the gas-particle turbulent wake flow Kun, Luo
2004
5 1 p. 106-110
article
13 Multiple descriptions based wavelet image coding Hai-lin, Chen
2004
5 1 p. 55-61
article
14 Neural network approach for modification and fitting of digitized data in reverse engineering Hua, Ju
2004
5 1 p. 75-80
article
15 Our deepest appreciation of international peer reviewers 2004
5 1 p. I-IV
article
16 Performance analysis of an iSCSI-based unified storage network Xiang-lin, Fu
2004
5 1 p. 1-7
article
17 Sedimentation of a single particle between two parallel walls Xue-ming, Shao
2004
5 1 p. 111-116
article
18 Super-proximity routing in structured peer-to-peer overlay networks Zeng-de, Wu
2004
5 1 p. 16-21
article
19 Untraceable partially blind signature based on DLOG problem Zheng, Huang
2004
5 1 p. 40-44
article
20 Using multi-class queuing network to solve performance models of e-business sites Xiao-ying, Zheng
2004
5 1 p. 31-39
article
21 Verifiable threshold signature schemes against conspiracy attack Yuan-ju, Gan
2004
5 1 p. 50-54
article
                             21 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands