


default search action
Science in China Series F: Information Sciences, Volume 49
Volume 49, Number 1, January 2006
- Ran Tao, Bing Deng, Yue Wang:

Research progress of the fractional Fourier transform in signal processing. 1-25 - Xianxian Li, Jinpeng Huai:

Cryptographic protocol security analysis based on bounded constructing algorithm. 26-47 - Jianru Xue, Nanning Zheng, Xiaopin Zhong:

Sequential stratified sampling belief propagation for multiple targets tracking. 48-62 - Maoguo Gong

, Haifeng Du, Licheng Jiao
:
Optimal approximation of linear systems by artificial immune response. 63-79 - Yiguang Hong, Jiankui Wang:

Non-smooth finite-time stabilization for a class of nonlinear systems. 80-89 - Jianwen Hu, Weiming Zhang, Zhong Liu, Xiaofeng Hu, Guangya Si:

A novel complex-system-view-based method for system effectiveness analysis: Monotonic indexes space. 90-102 - Kaidong Wang, Kechu Yi, Bin Tian, Chengke Wu:

Packet routing algorithm for polar orbit LEO satellite constellation network. 103-127 - Lizhong Peng, Xiaoyong Chu:

Design of smooth orthogonal wavelets with beautiful structure from 2-band to 4-band. 128-137
Volume 49, Number 2, April 2006
- Meiqin Liu:

Discrete-time delayed standard neural network model and its application. 137-154 - Sihan Qing, Gaicheng Li:

Formal analysis and design of multi-party fair exchange protocols. 155-174 - Xiaohong Zhang

, Huacan He, Yang Xu:
A fuzzy logic system based on Schweizer-Sklar t-norm. 175-188 - Jiang Wang, Hanqiao Gao, Huiyan Li:

Adaptive robust control of nonholonomic systems with stochastic disturbances. 189-207 - Daiyuan Peng, Pingzhi Fan, Moon Ho Lee:

Lower bounds on the periodic Hamming correlations of frequency hopping sequences with low hit zone. 208-218 - Jingwei Zhang, Jianjuan Xiu, You He, Wei Xiong:

Distributed interacted multisensor joint probabilistic data association algorithm based on D-S theory. 219-227 - Gang Wang, Qishan Zhang:

The novel generating algorithm and properties of hybrid-P-ary generalized bridge functions. 228-234 - Shefeng Yan, Yuanliang Ma:

Optimal design and verification of temporal and spatial filters using second-order cone programming approach. 235-253 - Tao Han, Xiaojun Ji, Wenkang Shi:

Optimal pressure-sensitive cuts for surface acoustic waves on langasite. 254-261 - Yinhe Han, Huawei Li

, Xiaowei Li, Anshuman Chandra:
Response compaction for system-on-a-chip based on advanced convolutional codes. 262-272
Volume 49, Number 3, June 2006
- Junhui He

, Jiwu Huang:
Steganalysis of stochastic modulation steganography. 273-285 - Bin Zhang, Dengguo Feng:

Security analysis of a new stream cipher. 286-301 - Jiande Sun, Ju Liu:

A blind video watermarking scheme based on ICA and shot segmentation. 302-312 - Yao Zhao:

Geometrically robust video watermarking based on wavelet transform. 313-327 - Yanxia Zhang, Lei Guo:

Convergence analysis of cautious control. 328-338 - Hongxing Li:

Probability representations of fuzzy systems. 339-363 - Xiaozhu Lin, Yun Sha, Junwei Ji, Yanmin Wang:

A proof of image Euler Number formula. 364-371 - Minghu Ha, Yan Li

, Jia Li, Da-Zeng Tian:
The key theorem and the bounds on the rate of uniform convergence of learning theory on Sugeno measure space. 372-385 - Hai Li, Zhenfang Li, Guisheng Liao, Zheng Bao:

An estimation method for InSAR interferometric phase combined with image auto-coregistration. 386-396 - Yuanyuan Xu, Shanhong Xia, Chao Bian

, Shaofeng Chen:
A micro amperometric immunosensor for detection of human immunoglobulin. 397-408
Volume 49, Number 4, August 2006
- Yantai Shu, Huifang Feng, Hua Wang, Maode Ma:

Dynamic admission control in hybrid QoS networks with WiFi access. 409-420 - Guocheng Li, Shiji Song, Cheng Wu:

Subgradient-based feedback neural networks for non-differentiable convex optimization problems. 421-435 - Yanhong Liu

, Chunwen Li, Rebing Wu:
Feedback control of nonlinear differential algebraic systems using Hamiltonian function method. 436-445 - Zongben Xu, Jianjun Wang:

The essential order of approximation for nearly exponential type neural networks. 446-460 - Xiao Lu, Wei Wang:

Kalman filtering for time-delayed linear systems. 461-470 - Jun Li, Guojun Wang:

Theory of truth degrees of propositions in the logic system Ln*. 471-483 - Qingwen Lü, Wufan Chen:

Unsupervised segmentation of medical image based on difference of mutual information. 484-493 - Feng Liu:

Diffusion filtering in image processing based on wavelet transform. 494-503 - Shouzhi Yang, Lizhong Peng:

Construction of high order balanced multiscaling functions via PTST. 504-515 - Jinbiao Xiao, Xu Liu, Chun Cai, Hehong Fan, Xiaohan Sun:

An improved three-dimensional full-vectorial finite-difference imaginary-distance beam propagation method. 516-532 - Bingyu Liao, Hong Yuan, Baojun Lin:

Smoother and Bayesian filter based semi-codeless tracking of dual-frequency GPS signals. 533-544
Volume 49, Number 5, October 2006
- Qingguang Ji, Sihan Qing, Yeping He:

A formal model for integrity protection based on DTE technique. 545-565 - Shaoji Feng, Dexing Feng:

Exact internal controllability for shallow shells. 566-577 - Liying Zhu, Yuzhen Wang:

Study on the stability of switched dissipative Hamiltonian systems. 578-591 - Bing Deng, Ran Tao, Yue Wang:

Convolution theorems for the linear canonical transform and their applications. 592-603 - Zhenfu Cao

, Haojin Zhu
, Rongxing Lu:
Provably secure robust threshold partial blind signature. 604-615 - Weidong Li, Wei Hong

, Zhangcheng Hao
, Houxing Zhou:
Hybrid algorithm for accelerating the double series of Floquet vector modes. 616-626 - Jimin Ye, Xianda Zhang, Xiao-Long Zhu:

Blind source separation with unknown and dynamically changing number of source signals. 627-638 - Zhaoshui He, Shengli Xie, Yuli Fu:

Sparse representation and blind source separation of ill-posed mixtures. 639-652 - Zhizhong Zhang, Fang Cheng, Jiangtao Luo, Qijian Mao, Jun Wang, Shaofeng Qiu:

Preemptive and non-preemptive scheduling of optical switches with configuration delay. 653-664 - Zuying Luo, Yici Cai, Sheldon X.-D. Tan, Xianlong Hong, Xiaoyi Wang, Zhu Pan, Jingjing Fu:

Time-domain analysis methodology for large-scale RLC circuits and its applications. 665-680
Volume 49, Number 6, December 2006
- Xicheng Lu, Huaimin Wang, Ji Wang:

Internet-based virtual computing environment (iVCE): Concepts and architecture. 681-701 - Hong Mei, Gang Huang, Haiyan Zhao, Wenpin Jiao:

A software architecture centric engineering approach for Internetware. 702-730 - Jinpeng Huai, Chunming Hu, Jianxin Li, Hailong Sun, Tianyu Wo:

CROWN: A service grid middleware with trust management mechanism. 731-758 - Huaimin Wang, Yang-Bin Tang, Gang Yin, Lei Li:

Trustworthiness of Internet-based software. 759-773 - Tao Huang, Xiaoning Ding, Jun Wei:

An application-semantics-based relaxed transaction model for internetware. 774-791 - Lishan Hou, Zhi Jin, Budan Wu:

Modeling and verifying Web services driven by requirements: An ontology-based approach. 792-820 - Wei-Tek Tsai, Bingnan Xiao, Qian Huang, Yinong Chen

:
Collaborative software design in an SOA environment. 821-842 - Jing Dong, Yongtao Sun, Sheng Yang, Kang Zhang:

Dynamic web service composition based on OWL-S. 843-863 - Jing Liu, Jifeng He, Zhiming Liu:

A strategy for service realization in service-oriented design. 864-884 - Jiannong Cao

, Jingyang Zhou, Weiwei Zhu, Xuhui Li:
Mobile agent-enabled framework for structuring and building distributed systems on the internet. 885-905 - Weizhe Zhang, Binxing Fang, Mingzeng Hu, Xinran Liu, Hongli Zhang, Lei Gao:

Multisite co-allocation scheduling algorithms for parallel jobs in computing grid environments. 906-926

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














