- Nianqiang Li, Yongbing Wang, Guoyi Zhao:
A Preferable Method on Digital Filter in ECG Signal's Processing Based on FPGA. IITSI 2010: 184-187 - Nianqiang Li, Yongbing Wang, Guoyi Zhao:
A New Scheme on Multifunction Wireless Medical Surveillance System Based on FPGA. IITSI 2010: 188-191 - Minghui Li, Jingbo Xia, Yaoguo Wang:
Research on MAC Communication Mechanism of Air-to-Ground Data Link Based on 3G: The MSDU Frame Subsection and RTS/CTS Handshake Mechanism. IITSI 2010: 54-57 - Dong Li, Chunhui Yang:
A Test Platform for Evaluation of Web Service Composition Algorithm. IITSI 2010: 302-305 - Dong Li, Chunhui Yang:
A Trust Evaluation Model for Web Service Selection. IITSI 2010: 306-310 - Yang Li, Chong-chong Zhao:
Aesthetic Evolution of Staged L-systems for Tiling Pattern Design. IITSI 2010: 488-492 - Ye Liang:
Mobile Intelligence Sharing Based on Agents in Mobile Peer-to-Peer Environment. IITSI 2010: 667-670 - Ying Lin, Yan Zhang, Yang-jia Ou:
The Design and Implementation of Host-Based Intrusion Detection System. IITSI 2010: 595-598 - Hailin Liu:
A Mixture Conjugate Gradient Method for Unconstrained Optimization. IITSI 2010: 26-29 - Yu Liu, Junchan Du, Feng Ji:
Design of Panoramic Mosaic Surveillance Platform in Severe Circumstance. IITSI 2010: 77-80 - Zenghui Liu, Liguo Guan:
Attack Simulation and Signature Extraction of Low-Rate DoS. IITSI 2010: 544-548 - Qiao Liu, Zhiguang Qin, Hongrong Cheng, Mingcheng Wan:
Efficient Modeling of Spam Images. IITSI 2010: 663-666 - Zhihua Liu, Hui Sun, Haizhi Hu:
Two Sub-swarms Quantum-Behaved Particle Swarm Optimization Algorithm Based on Exchange Strategy. IITSI 2010: 212-215 - Yanbin Liu, Ping Yuan:
A Study of User Downloading Behavior in Mobile Internet Using Clickstream Data. IITSI 2010: 255-257 - Chen Long, Huang Chen:
Comparative Study between the Magic Formula and the Neural Network Tire Model Based on Genetic Algorithm. IITSI 2010: 280-284 - Fang-jun Luan, Lan Lin, Yong-hui Wang:
4-Step Face Authentication Algorithm Based on SVM. IITSI 2010: 534-538 - Wen-lang Luo, An-dong Xie, Wen Ruan:
The Construction and Test for a Small Beowulf Parallel Computing System. IITSI 2010: 767-770 - Rong-jie Lv, Yu-hong An:
Dynamic Evolution Simulation of Corporate Governance Based on Swarm. IITSI 2010: 173-177 - ShanGuo Lv, Hongli Chen:
Study on Incremental Data Mining Based on Rough Set Theory. IITSI 2010: 101-104 - Xinqiang Ma, Youyuan Liu:
Electronic Commerce Technology and its Security Problems. IITSI 2010: 631-634 - Xiaojun Ma, Sa Li, Weihui Dai:
Modeling and Simulating of Ecological Community in Digital Creative Industry. IITSI 2010: 708-712 - Miao Ma, Jian-hui Liang, Li Sun, Min Wang:
SAR Image Segmentation Based on SWT and Improved AFSA. IITSI 2010: 146-149 - Gu Min, Yang Feng:
An Improved Genetic Algorithm Based on Polygymy. IITSI 2010: 371-373 - Lihui Ni, Zhijin Guan, Wenying Zhu:
A General Method of Constructing the Reversible Full-Adder. IITSI 2010: 109-113 - Ding Pan:
DW 2.0-Oriented Metadata Evolution Management. IITSI 2010: 311-314 - Ming-bao Pang, Fang Dong, Xin-ping Zhao:
Regional Logistics System Bi-level Programming with Elastic Demand by Using Fuzzy C-means Clustering. IITSI 2010: 160-164 - Yin Pang, Kan Li, Xin Sun, Kaili Bu:
Dynamic Replica Selection Using Improved Kernel Density Estimation. IITSI 2010: 470-474 - Xuange Peng, Ying Xiao, Bing Zhu:
Research of Image Acquisition Device for River Sediment. IITSI 2010: 771-776 - Teng Ping, He Ping:
Characteristics of Network Non-optimum and Extensionality Security Mode. IITSI 2010: 627-630 - Zhao Qiu, Mingrui Chen, Jun Huang:
A Study on CRL Issue by P2P Network. IITSI 2010: 526-529