


Остановите войну!
for scientists:


default search action
SCIENCE CHINA Information Sciences, Volume 53
Volume 53, Number 1, January 2010
- Guofang Tu, Jianjun Liu, Can Zhang, Shaoshuai Gao, Shidong Li:
Studies and advances on joint source-channel encoding/decoding techniques in flow media communications. 1-17 - Wei Li, Wenqi Huang, Dongchen Jiang, Xianglong Liu
:
A heuristic algorithm for cube packing with time schedule. 18-29 - Binxing Fang, Yunchuan Guo, Yuan Zhou:
Information content security on the Internet: the control model and its evaluation. 30-49 - Xuanzhe Liu, Gang Huang, Hong Mei:
A community-centric approach to automated service composition. 50-63 - Ming Li, Wei Wang, Zhi-Hua Zhou:
Exploiting remote learners in Internet environment with agents. 64-76 - Xiaolin Wang, Yifeng Sun, Yingwei Luo, Zhenlin Wang, Yu Li, Binbin Zhang, Haogang Chen, Xiaoming Li:
Dynamic memory paravirtualization transparent to guest OS. 77-88 - Yongqiang Jin, Xiangdong Liu, Wei Qiu, Chaozhen Hou:
Time-varying sliding mode control for a class of uncertain MIMO nonlinear system subject to control input constraint. 89-100 - Yongming Li
:
Finite automata based on quantum logic and monadic second-order quantum logic. 101-114 - Mingxuan Sun, Danwei Wang, Pengnian Chen:
Repetitive learning control of nonlinear systems over finite intervals. 115-128 - Jie Xu, Pascal Chargé, Daniele Fournier-Prunaret, Abdel-Kaddous Taha, Keping Long:
Chaos generator for secure transmission using a sine map and an RLC series circuit. 129-136 - Dowon Hong, Je Yoon Kim, Sang-Uk Shin:
Authentication mechanism for fast handoff in cdma2000-WiBro interworking. 137-146 - Quanwei Cai, Ping Wei, Xianci Xiao:
Single-channel blind separation of overlapped multicomponents based on energy operator. 147-157 - Weile Zhang, Qinye Yin, Wei Han, Wenjie Wang:
Radio interferometric localization of WSNs based on Doppler effect. 158-167 - Wenzhe Fa
, Ya-Qiu Jin:
Analysis of microwave brightness temperature of lunar surface and inversion of regolith layer thickness: Primary results of Chang-E 1 multi-channel radiometer observation. 168-181 - Bo Zhu, Xianglin Yang:
The influence of higher-order effects on the transmission performances of the ultra-short soliton pulses and its suppression method. 182-190 - Xiaojun Tong, Minggen Cui:
Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation. 191-202 - Shang Ma, Jianhao Hu, Yanlong Ye, Lin Zhang, Xiang Ling:
A 2n scaling scheme for signed RNS integers and its VLSI implementation. 203-212
Volume 53, Number 2, February 2010
- Min Ren, Xiaohua Huo:
Asynchronous double-precision windows based unmanned aerial vehicle real-time path planning. 215-222 - Xiangyin Zhang, Haibin Duan, Yaxiang Yu:
Receding horizon control for multi-UAVs close formation control based on differential evolution. 223-235 - Xiaochen Wang, Hui Zhao, Kemao Ma, Xin Huo, Yu Yao:
Kinematics analysis of a novel all-attitude flight simulator. 236-247 - Chunyan Yang, Dewei Wu, Yane Lu, Yonglin Yu:
Research on network RTK positioning algorithm aided by quantum ranging. 248-257 - Yi Huang, Zongji Chen, Chen Wei:
Least trace extended set-membership filter. 258-270 - Jingping Shi, Weiguo Zhang, Guangwen Li, Xiaoxiong Liu:
Research on allocation efficiency of the redistributed pseudo inverse algorithm. 271-277 - Dengguo Feng, Weidong Chen:
Security model and modular design of fair authentication key exchange protocols. 278-287 - Dingyi Pei, Jun-Wu Dong, Chunming Rong
:
A novel key pre-distribution scheme for wireless distributed sensor networks. 288-298 - Chao Yang, Shulin He:
An accessibility measure for the combined travel demand model. 299-306 - Shaocheng Tong, Yongming Li:
Robust adaptive fuzzy backstepping output feedback tracking control for nonlinear system with dynamic uncertainties. 307-324 - YuLong Zou, Baoyu Zheng, Jia Zhu:
Performance evaluation of half-duplex relay-based opportunistic cooperation diversity. 325-334 - Haiyang Huang, Gang Wu, Lu Lu, Shaoqian Li:
An optimized non-unitary linear precoding design for OSTBCs. 335-343 - Bin Li, Zheng Zhou, Weixia Zou:
RPPK modulation with high data rates. 344-354 - Tao Liu, Gaoming Huang, XueSong Wang, Shunping Xiao:
Statistical assessment of H/A target decomposition theorems in radar polarimetry. 355-366 - Xia Bai, Jinping Sun, Wen Hong, Shiyi Mao:
On the TOPS mode spaceborne SAR. 367-378 - Jiancun Fan, Qinye Yin, Wenjie Wang:
Pilot-aided channel estimation for CDD-OFDM systems. 379-389 - Ou Xu, ShaoHua Lu, Shuisheng Jian:
Theoretical analysis of polarization properties for tilted fiber Bragg gratings. 390-397 - Anbang Wang, Yuncai Wang
:
Chaos correlation optical time domain reflectometry. 398-404
Volume 53, Number 3, March 2010
- Changxiang Shen, Huanguo Zhang, Huaimin Wang, Ji Wang, Bo Zhao, Fei Yan, Fajiang Yu, Liqiang Zhang, Mingdi Xu:
Research on trusted computing and its development. 405-433 - Huanguo Zhang, Fei Yan, Jianming Fu, Mingdi Xu, Yang Yang, Fan He, Jing Zhan:
Research on theory and key technology of trusted computing platform security testing and evaluation. 434-453 - Dengguo Feng, Yu Qin:
A property-based attestation protocol for TCM. 454-464 - Junwei Zhang, Jianfeng Ma, Sang-Jae Moon:
Universally composable secure TNC model and EAP-TNC protocol in IF-T. 465-482 - Yiming Zhang, Xicheng Lu, Dongsheng Li:
Embedded DHT overlays in virtual computing environments. 483-493 - Wei Wang, Guosun Zeng:
Bayesian cognitive trust model based self-clustering algorithm for MANETs. 494-505 - Xuejia Lai, MingXin Lu, Lei Qin, Junsong Han, Xiwen Fang:
Asymmetric encryption and signature method with DNA technology. 506-514 - Shuqin Zhong, Zhi Ma, Yajie Xu:
Constructing quantum error correcting code via logic function. 515-523 - Licheng Wang, Lihua Wang, Zhenfu Cao
, Yixian Yang, Xinxin Niu:
Conjugate adjoining problem in braid groups and new design of braid-based signatures. 524-536 - Shaojing Fu, Chao Li, Longjiang Qu
:
On the number of rotation symmetric Boolean functions. 537-545 - Meiqin Wang, Xiaoyun Wang, Lucas Chi Kwong Hui:
Differential-algebraic cryptanalysis of reduced-round of Serpent-256. 546-556 - Yinxia Sun, Hui Li:
Efficient signcryption between TPKC and IDPKC and its multi-receiver construction. 557-566 - Junwei Zhang, Jianfeng Ma, Sang-Jae Moon:
Universally composable one-time signature and broadcast authentication. 567-580 - Peng Xu, Guohua Cui, Cai Fu, Xueming Tang:
A more efficient accountable authority IBE scheme under the DL assumption. 581-592 - Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng
, Kefei Chen, Feng Bao:
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. 593-606 - Yong Wang, Jiwu Huang:
Robust AVS audio watermarking. 607-618 - Hongxia Wang, Mingquan Fan:
Centroid-based semi-fragile audio watermarking in hybrid domain. 619-633 - Xiangyang Luo, Fenlin Liu, Chunfang Yang, Daoshun Wang:
Image universal steganalysis based on best wavelet packet decomposition. 634-647 - Mingxing Luo, Yixian Yang, Licheng Wang, Xinxin Niu:
Secure network coding in the presence of eavesdroppers. 648-658 - Yu Zhang, Binxing Fang, Yongzheng Zhang:
Identifying heavy hitters in high-speed network monitoring. 659-676
Volume 53, Number 4, April 2010
- Wei Li:
Logical verification of scientific discovery. 677-684 - Puwei Wang, Zhi Jin, Hongyan Liu:
Capability description and discovery of Internetware entity. 685-703 - Ling Zhang, Bo Zhang:
Fuzzy tolerance quotient spaces and fuzzy subsets. 704-714 - Xin Du, Lixin Ding:
About the convergence rates of a class of gene expression programming. 715-728 - Zhiyong Liu, David Zhang
, Yugang Li:
Fast and convergence-guaranteed algorithm for linear separation. 729-737 - Zhiqiang Li
, Tao Fang, Hong Huo:
A saliency model based on wavelet transform and visual attention. 738-751 - Jutao Hao, Jingjing Zhao, Minglu Li:
Spatial continuity incorporated multi-attribute fuzzy clustering algorithm for blood vessels segmentation. 752-759 - Houzhen Wang, Huanguo Zhang, Haiming Guan, Haiqing Han:
A new perturbation algorithm and enhancing security of SFLASH signature scheme. 760-768 - Mo Zhou, Jianyu Zhang, Yafei Dai:
An implementation and optimization for scalable DHT crawler. 769-779 - Yusong Du, Dingyi Pei:
Construction of Boolean functions with maximum algebraic immunity and count of their annihilators at lowest degree. 780-787 - HongDa Li, Haixia Xu, Bao Li, Dengguo Feng:
On constant-round zero-knowledge proofs of knowledge for NP-relations. 788-799 - Min Wang, Siying Zhang, Bing Chen, Fei Luo:
Direct adaptive neural control for stabilization of nonlinear time-delay systems. 800-812 - Junchan Zhao, Junan Lu, Xiaoqun Wu:
Pinning control of general complex dynamical networks with optimization. 813-822 - Yuanlu Li, Yingchao Zhang, Huiqiang Tang:
Tsallis model-based separation of overlapped peak signals. 823-832 - Xuelan Zou, Weiyan Liu, Guangzeng Feng:
Performance of iteratively decoded bit-interleaved coded modulation with chaos based interleaving strategies. 833-841 - Xiaorong Xu, Baoyu Zheng:
novel multi-relay cross-layer cooperative communication strategy based on Jackson queuing model. 842-853 - Yu Zuo, Jia Xu, Yingning Peng, Xiang-Gen Xia:
Parameter estimation for SAR moving target in complex image domain. 854-866 - Hongxia Liu, Qianwei Kuang, Suzhen Luan, Aaron Zhao, Sai Tallavarjula:
Frequency dispersion effect and parameters extraction method for novel HfO2 as gate dielectric. 878-884 - Teng Long, Yang Li, Xin Guo:
A new approach of motion compensation for synthetic wideband radar under multitarget environment. 967-977
Volume 53, Number 5, May 2010
- Jingfa Liu, Gang Li:
Basin filling algorithm for the circular packing problem with equilibrium behavioral constraints. 885-895 - Bo Lang:
A computational trust model for access control in P2P. 896-910 - Hyeon-Joong Kim, Bernd Bickel
, Markus H. Gross, Soo-Mi Choi:
Subsurface scattering using splat-based diffusion in point-based rendering. 911-919 - Yoshinori Dobashi, Tsuyoshi Yamamoto, Tomoyuki Nishita:
An interactive rendering system using hierarchical data structure for earth-scale clouds. 920-931 - Jue Wang, Changjun Hu, Jilin Zhang, Jianjiang Li:
OpenMP compiler for distributed memory architectures. 932-944 - Jingwei Liu, Rong Sun, Kyungsup Kwak:
Fair exchange signature schemes. 945-953 - Hanwu Liu, Dongdai Lin:
A two-round honest-verifier zero-knowledge protocol. 954-963 - Wei Ren
, Yi Ren, Hui Zhang:
Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks. 964-979 - Bin Xin, Jie Chen, Zhihong Peng, Feng Pan:
An adaptive hybrid optimizer based on particle swarm and differential evolution for global optimization. 980-989 - Guocheng Li, Shiji Song, Cheng Wu:
Generalized gradient projection neural networks for nonsmooth optimization problems. 990-1005 - Min Wu, Lan Zhou, Jin-Hua She, Yong He:
Design of robust output-feedback repetitive controller for class of linear systems with uncertainties. 1006-1015 - Ding Wang, Ying Wu:
Array errors active calibration algorithm and its improvement. 1016-1033 - Jun Sun, Yingzhuang Liu, Guangxi Zhu:
On degrees of freedom of the cellular network. 1034-1043 - Jing Li, Jianhua Ge, Yong Wang, Hao Yao:
Performance analysis and partner selection for cooperative diversity based on MQAM modulation. 1044-1055 - Qinyu Zhang
, Bin Cao, Jian Wang, Naitong Zhang:
Polarization filtering technique based on oblique projections. 1056-1066 - Yue Wang, Ran Tao, Hao Zhang:
Research on distributed intrusion detection system based on multi-living agent. 1067-1077 - ShaoHua Lu, Ou Xu, Suchun Feng, XiaoWei Dong, Li Pei, Shuisheng Jian:
Analysis of coupling from core mode to counter-propagating radiation modes in tilted fiber Bragg gratings. 1078-1088 - Yongshun Wang, Xianliang Luo, Hairong Li, Ziting Wang, Rong Wu, Caizhen Zhang, Siyuan Li:
Improvements on radiation-hardened performance of static induction transistor. 1089-1096
Volume 53, Number 6, June 2010
- Haogang Chen, Xiaolin Wang, Zhenlin Wang, Binbin Zhang, Yingwei Luo, Xiaoming Li:
DMM: A dynamic memory mapping model for virtual machines. 1097-1108 - Weimin Zheng, Hongliang Yu, Guangyu Shi, Jian Chen:
Predicting the behavior of large scale P2P systems by parallel discrete event simulation. 1109-1121 - Ling Yang, Liqiang Zhang, Zhizhong Kang, Zhiqiang Xiao, Junhuan Peng, Xingming Zhang, Liu Liu:
An efficient rendering method for large vector data on large terrain models. 1122-1129 - Xianhai Meng, Jigang Li, Qin Yang, Qiang Cai, Qiming Chen:
Complex conforming Delaunay triangulation. 1130-1140 - Yong Hu, Yue Qi, Xin Tong:
Image-based modeling of inhomogeneous single-scattering participating media. 1141-1150 - Shijun Ren, Yadong Wang:
A proof of the convergence theorem of maximum-entropy clustering algorithm. 1151-1158 - Zongben Xu, Hai Zhang, Yao Wang, Xiangyu Chang, Yong Liang:
L1/2 regularization. 1159-1169 - Enliang Hu, Songcan Chen, Xuesong Yin:
Manifold contraction for semi-supervised classification. 1170-1187 - Qinghua Hu, Maozu Guo, Daren Yu, Jinfu Liu:
Information entropy for ordinal classification. 1188-1200 - Rong Mei, Qingxian Wu, Changsheng Jiang:
Robust adaptive backstepping control for a class of uncertain nonlinear systems based on disturbance observers. 1201-1215 - Yong Wang, Wei Wang, Guoping Liu
:
Stability of linear discrete switched systems with delays based on average dwell time method. 1216-1223 - Hong Zhang, Ying Mu, Yuhu You, Junwei Li:
Multi-scale sparse feature point correspondence by graph cuts. 1224-1232 - Chen Wang, Qinye Yin, Wenjie Wang:
An efficient ranging method based on Chinese remainder theorem for RIPS measurement. 1233-1241 - Yongquan Jiang, Minfen Shen, Yuanping Zhou:
Two-dimensional water-filling power allocation algorithm for MIMO-OFDM systems. 1242-1250 - Lin Mei, Xuejun Sha, Qinwen Ran, Naitong Zhang:
Research on the application of 4-weighted fractional Fourier transform in communication system. 1251-1260 - Yongjun Li, Jili Wu, Shanghong Zhao, Wen Meng, Lihua Ma, Lei Shi, Xingchun Chu, Rui Hou, Tian Li:
A novel two-layered optical satellite network of LEO/MEO with zero phase factor. 1261-1276 - Wei Yang, Jin Chen
, Bunkei Matsushita
, Miaogen Shen
, Xuehong Chen
:
Practical image fusion method based on spectral mixture analysis. 1277-1286
Volume 53, Number 7, July 2010
- Xuemei Li, Caiming Zhang, Yizhen Yue, Kunpeng Wang:
Cubic surface fitting to image by combination. 1287-1295 - Shaotong Gu, Gefei Feng, Xiaohu Ma, Yiming Yang:
Restoration method of characters on Jiagu rubbings based on Poisson distribution and fractal geometry. 1296-1304 - Lu Hong Diao, Hua Li, Sen Zhang, Lei Liu:
Analysis of moment invariants under general linear transformation. 1305-1311 - Shixue Zhang, Jinyu Zhao, Enhua Wu:
An improved method for progressive animation models generation. 1312-1321 - Zhu Xiao, Yongqiang Hei, Quan Yu, Kechu Yi:
A survey on impulse-radio UWB localization. 1322-1335 - Weidong Zhang, Feng Chen, Wenli Xu:
Learning interactions among multi-channel sequences with dynamical influence models. 1336-1344 - Shihong Yue, Jeen-Shing Wang, Tao Gao, Huaxiang Wang:
An unsupervised grid-based approach for clustering analysis. 1345-1357 - Jianying Cui, Xiaojia Tang:
A method for solving Nash equilibria of games based on public announcement logic. 1358-1368 - Cailing Dong, Yilong Yin, Xiukun Yang:
Detecting malignant patients via modified boosted tree. 1369-1378 - Meicheng Liu, Dingyi Pei, Yusong Du:
Identification and construction of Boolean functions with maximum algebraic immunity. 1379-1396 - Guofang Qiu, Jianmin Ma, Hong-Zhi Yang, Wen-Xiu Zhang:
A mathematical model for concept granular computing systems. 1397-1408