Journal: Science in China Series F: Information Sciences

Volume 50, Issue 2

137 -- 153Junzhou Luo, Ming Yang. Analysis of security protocols based on challenge-response
154 -- 169Daowen Qiu. Notes on automata theory based on quantum logic
170 -- 187WenHui Zhou, Lin Li, GuoHai Chen, AnXi Yu. Optimality analysis of one-step OOSM filtering algorithms in target tracking
188 -- 197Wenxiu Zhang, GuoFang Qiu, Weizhi Wu. A general approach to attribute reduction in rough set theory
198 -- 211Xiaobin Li, Zheng Tian. Multiscale stochastic hierarchical image segmentation by spectral clustering
212 -- 226Yunxia Liu, Yuhua Peng, Huaijing Qu, Yong Yin. Energy-based adaptive orthogonal FRIT and its application in image denoising
227 -- 240Zhirong Ge, Bin Wang, LiMing Zhang. Remote sensing image fusion based on Bayesian linear estimation
241 -- 250Bo Zhu, XiangLin Yang. Fiber soliton-form 3R regenerator and its performance analysis
251 -- 260Chu Gao, ZhiNing Chen, YunYi Wang, Ning Yang. Study on relationships of electromagnetic band gap structures and left/right handed structures
261 -- 272ZhiGuang Shi, JianXiong Zhou, HongZhong Zhao, Qiang Fu. Study on joint Bayesian model selection and parameter estimation method of GTD model