Volume 49, Number 1, January 2006
- Ran Tao, Bing Deng, Yue Wang:
Research progress of the fractional Fourier transform in signal processing.
- Xianxian Li, Jinpeng Huai:
Cryptographic protocol security analysis based on bounded constructing algorithm.
- Jianru Xue, Nanning Zheng, Xiaopin Zhong:
Sequential stratified sampling belief propagation for multiple targets tracking.
- Maoguo Gong, Haifeng Du, Licheng Jiao:
Optimal approximation of linear systems by artificial immune response.
- Yiguang Hong, Jiankui Wang:
Non-smooth finite-time stabilization for a class of nonlinear systems.
- Jianwen Hu, Wei Ming Zhang, Zhong Liu, Xiaofeng Hu, Guangya Si:
A novel complex-system-view-based method for system effectiveness analysis: Monotonic indexes space.
- Kaidong Wang, Kechu Yi, Bin Tian, Chengke Wu:
Packet routing algorithm for polar orbit LEO satellite constellation network.
- Lizhong Peng, Xiaoyong Chu:
Design of smooth orthogonal wavelets with beautiful structure from 2-band to 4-band.
Volume 49, Number 2, April 2006
- Meiqin Liu:
Discrete-time delayed standard neural network model and its application.
- Sihan Qing, Gaicheng Li:
Formal analysis and design of multi-party fair exchange protocols.
- Xiaohong Zhang, Huacan He, Yang Xu:
A fuzzy logic system based on Schweizer-Sklar t-norm.
- Jiang Wang, Hanqiao Gao, Huiyan Li:
Adaptive robust control of nonholonomic systems with stochastic disturbances.
- Daiyuan Peng, Pingzhi Fan, Moon Ho Lee:
Lower bounds on the periodic Hamming correlations of frequency hopping sequences with low hit zone.
- Jingwei Zhang, Jianjuan Xiu, You He, Wei Xiong:
Distributed interacted multisensor joint probabilistic data association algorithm based on D-S theory.
- Gang Wang, Qishan Zhang:
The novel generating algorithm and properties of hybrid-P-ary generalized bridge functions.
- Shefeng Yan, Yuanliang Ma:
Optimal design and verification of temporal and spatial filters using second-order cone programming approach.
- Han Tao, Xiaojun Ji, Wenkang Shi:
Optimal pressure-sensitive cuts for surface acoustic waves on langasite.
- Yinhe Han, Huawei Li, Xiaowei Li, Anshuman Chandra:
Response compaction for system-on-a-chip based on advanced convolutional codes.
Volume 49, Number 3, June 2006
- Junhui He, Jiwu Huang:
Steganalysis of stochastic modulation steganography.
- Bin Zhang, Dengguo Feng:
Security analysis of a new stream cipher.
- Jiande Sun, Ju Liu:
A blind video watermarking scheme based on ICA and shot segmentation.
- Yao Zhao:
Geometrically robust video watermarking based on wavelet transform.
- Yanxia Zhang, Lei Guo:
Convergence analysis of cautious control.
- Hongxing Li:
Probability representations of fuzzy systems.
- Xiaozhu Lin, Yun Sha, Junwei Ji, Yanmin Wang:
A proof of image Euler Number formula.
- Minghu Ha, Yan Li, Jia Li, Da-Zeng Tian:
The key theorem and the bounds on the rate of uniform convergence of learning theory on Sugeno measure space.
- Hai Li, Zhenfang Li, Guisheng Liao, Zheng Bao:
An estimation method for InSAR interferometric phase combined with image auto-coregistration.
- Yuanyuan Xu, Shanhong Xia, Chao Bian, Shaofeng Chen:
A micro amperometric immunosensor for detection of human immunoglobulin.
Volume 49, Number 4, August 2006
- Yantai Shu, Huifang Feng, Hua Wang, Maode Ma:
Dynamic admission control in hybrid QoS networks with WiFi access.
- Guocheng Li, Shiji Song, Cheng Wu:
Subgradient-based feedback neural networks for non-differentiable convex optimization problems.
- Yanhong Liu, Chunwen Li, Rebing Wu:
Feedback control of nonlinear differential algebraic systems using Hamiltonian function method.
- Zongben Xu, Jianjun Wang:
The essential order of approximation for nearly exponential type neural networks.
- Xiao Lu, Wei Wang:
Kalman filtering for time-delayed linear systems.
- Jun Li, Guojun Wang:
Theory of truth degrees of propositions in the logic system Ln*.
- Qingwen Lü, Wufan Chen:
Unsupervised segmentation of medical image based on difference of mutual information.
- Feng Liu:
Diffusion filtering in image processing based on wavelet transform.
- Shouzhi Yang, Lizhong Peng:
Construction of high order balanced multiscaling functions via PTST.
- Jinbiao Xiao, Xu Liu, Chun Cai, Hehong Fan, Xiaohan Sun:
An improved three-dimensional full-vectorial finite-difference imaginary-distance beam propagation method.
- Bingyu Liao, Hong Yuan, Baojun Lin:
Smoother and Bayesian filter based semi-codeless tracking of dual-frequency GPS signals.
Volume 49, Number 5, October 2006
- Qingguang Ji, Sihan Qing, Yeping He:
A formal model for integrity protection based on DTE technique.
- Shaoji Feng, Dexing Feng:
Exact internal controllability for shallow shells.
- Liying Zhu, Yuzhen Wang:
Study on the stability of switched dissipative Hamiltonian systems.
- Bing Deng, Ran Tao, Yue Wang:
Convolution theorems for the linear canonical transform and their applications.
- Zhenfu Cao, Haojin Zhu, Rongxing Lu:
Provably secure robust threshold partial blind signature.
- Weidong Li, Wei Hong, Zhangcheng Hao, Houxing Zhou:
Hybrid algorithm for accelerating the double series of Floquet vector modes.
- Jimin Ye, Xianda Zhang, Xiaolong Zhu:
Blind source separation with unknown and dynamically changing number of source signals.
- Zhaoshui He, Shengli Xie, Yuli Fu:
Sparse representation and blind source separation of ill-posed mixtures.
- Zhizhong Zhang, Fang Cheng, Jiangtao Luo, Qijian Mao, Jun Wang, Shaofeng Qiu:
Preemptive and non-preemptive scheduling of optical switches with configuration delay.
- Zuying Luo, Yici Cai, Sheldon X.-D. Tan, Xianlong Hong, Xiaoyi Wang, Zhu Pan, Jingjing Fu:
Time-domain analysis methodology for large-scale RLC circuits and its applications.
Volume 49, Number 6, December 2006
Last update Wed May 22 17:08:25 2013
CET by the DBLP Team — Data released under the ODC-BY 1.0 license — See also our legal information page
- Xicheng Lu, Huaimin Wang, Ji Wang:
Internet-based virtual computing environment (iVCE): Concepts and architecture.
- Hong Mei, Gang Huang, Haiyan Zhao, Wenpin Jiao:
A software architecture centric engineering approach for Internetware.
- Jinpeng Huai, Chunming Hu, Jianxin Li, Hailong Sun, Tianyu Wo:
CROWN: A service grid middleware with trust management mechanism.
- Huaimin Wang, Yang-Bin Tang, Gang Yin, Lei Li:
Trustworthiness of Internet-based software.
- Tao Huang, Xiaoning Ding, Jun Wei:
An application-semantics-based relaxed transaction model for internetware.
- Lishan Hou, Zhi Jin, Budan Wu:
Modeling and verifying Web services driven by requirements: An ontology-based approach.
- Wei-Tek Tsai, Bingnan Xiao, Qian Huang, Yinong Chen:
Collaborative software design in an SOA environment.
- Jing Dong, Yongtao Sun, Sheng Yang, Kang Zhang:
Dynamic web service composition based on OWL-S.
- Jing Liu, Jifeng He, Zhiming Liu:
A strategy for service realization in service-oriented design.
- Jiannong Cao, Jingyang Zhou, Weiwei Zhu, Xuhui Li:
Mobile agent-enabled framework for structuring and building distributed systems on the internet.
- Weizhe Zhang, Binxing Fang, Mingzeng Hu, Xinran Liu, Hongli Zhang, Lei Gao:
Multisite co-allocation scheduling algorithms for parallel jobs in computing grid environments.