Journal: Science in China Series F: Information Sciences

Volume 50, Issue 6

793 -- 810Fei Pu, Wenhui Zhang. Combining search space partition and abstraction for LTL model checking
811 -- 830Amjad Mahmood. Dynamic replication of web contents
831 -- 845YiMin Sun, ShengWei Mei, Qiang Lu. On global controllability of affine nonlinear systems with a triangular-like structure
846 -- 866Dandan Song, Zhidong Deng. A fuzzy model of predicting RNA secondary structure
867 -- 877Guojun Wang, XiaoJing Hui. Randomization of classical inference patterns and its application
878 -- 888Xuanli Wu, Xuejun Sha, Naitong Zhang. Pulse shaping method to compensate for antenna distortion in ultra-wideband communications
897 -- 904Peng Zhang, Guangguo Bi, Xiuying Cao. Joint-state differential detection algorithm and its application in UWB wireless communication systems
905 -- 914Zhe Zhang, MaoLiu Lin, QingHua Xu, JiuBin Tan. Accurate and robust estimation of phase error and its uncertainty of 50 GHz bandwidth sampling circuit
915 -- 925Ming-e Jing, Dian Zhou, PuShan Tang, Xiaofang Zhou, Hua Zhang. Solving SAT problem by heuristic polarity decision-making algorithm

Volume 50, Issue 5

657 -- 670Yingzhou Zhang. A novel formal approach to program slicing
671 -- 685Yuzhen Wang, Shuzhi Sam Ge, Daizhan Cheng. On Hamiltonian realization of time-varying nonlinear systems
686 -- 696Zhisheng Wang, DaoBo Wang, Ziyang Zhen. Primary exploration of nonlinear information fusion control theory
697 -- 710Jinguo Liu, Yuechao Wang, Bin Li, Shugen Ma, Dalong Tan. Center-configuration selection technique for the reconfigurable modular robot
711 -- 718Feng Liu. Stabilization of switched linear systems with bounded disturbances and unobservable switchings
719 -- 731Qiang Guan, Long Wang, Bican Xia, Lu Yang, Wensheng Yu, Zhenbing Zeng. Solution to the Generalized Champagne Problem on simultaneous stabilization of linear systems
732 -- 746Bo Li, Jiandong Li, Roberto Battiti. Supporting service differentiation with enhancements of the IEEE 802.11 MAC protocol: Models and analysis
747 -- 759Zhendong Luo, Yuanan Liu, Jinchun Gao. Differential space-time block-diagonal codes
760 -- 770Qi Wu, Jingping Bi, Zihua Guo, Yongqiang Xiong, Qian Zhang, Zhongcheng Li. Cross-layer optimization in ultra wideband networks
771 -- 782Ming Xiao, Shengli Xie, Yuli Fu. Searching-and-averaging method of underdetermined blind speech signal separation in time domain
783 -- 792Jian Wang, Lin Zhang, Xiuming Shan, Yong Ren. New theoretical framework for OFDM/CDMA systems with peak-limited nonlinearities

Volume 50, Issue 4

521 -- 538Xiangyi Meng, Ran Tao, Yue Wang. Fractional Fourier domain analysis of decimation and interpolation
539 -- 550Jinhua Sun, Jiandong Li, Lijun Jin. A reduced state SISO iterative decoding algorithm for serially concatenated continuous phase modulation
551 -- 560Xiaohu Tang. On the linear span of the ::::p:::: -ary cascaded GMW sequences
561 -- 575XueMin Yin, JianHua Yuan, XiaoPeng Lu, MouYan Zou. De-interlacing technique based on total variation with spatial-temporal smoothness constraint
576 -- 586Ding Wang, Li Zhang, Ying Wu. Constrained total least squares algorithm for passive location based on bearing-only measurements
587 -- 599JianXing Fan, Huazhong Yang, Hui Wang, Xiaolang Yan, Chaohuan Hou. Phase noise analysis of oscillators with Sylvester representation for periodic time-varying modulus matrix by regular perturbations
600 -- 608Li Zhou, You He, Weihua Zhang. New optimal algorithm of data association for multi-passive-sensor location system
609 -- 614DanHui Wu, ChenFei Zhao, Yujie Zhang. Application research on the chaos synchronization self-maintenance characteristic to secret communication
615 -- 624XiuPing Han, Junan Lu. The changes on synchronizing ability of coupled networks from ring networks to chain networks
625 -- 635Long Wang, Feng Xiao. A new approach to consensus problems in discrete-time multiagent systems with time-delays
636 -- 656Meiqin Liu. Unified stabilizing controller synthesis approach for discrete-time intelligent systems with time delays by dynamic output feedback

Volume 50, Issue 3

273 -- 298ChangXiang Shen, HuangGuo Zhang, Dengguo Feng, Zhenfu Cao, Jiwu Huang. Survey of information security
299 -- 306Qingshu Meng, Huanguo Zhang, Min Yang, Zhang-yi Wang. Analysis of affinely equivalent Boolean functions
307 -- 317Na Li, Wen-Feng Qi. Boolean functions of an odd number of variables with maximum algebraic immunity
318 -- 323Jian Weng, Shengli Liu, Kefei Chen. Pirate decoder for the broadcast encryption schemes from Crypto 2005
324 -- 333MingXin Lu, Xuejia Lai, Guozhen Xiao, Lei Qin. Symmetric-key cryptosystem with DNA technology
334 -- 341YiWei Zhang, YuMin Wang, XuBang Shen. A chaos-based image encryption algorithm using alternate structure
342 -- 350Jie Chen, Yupu Hu, YueYu Zhang. Impossible differential cryptanalysis of Advanced Encryption Standard
351 -- 358Zongduo Dai, Xiutao Feng. Classification and counting on multi-continued fractions and its application to multi-sequences
359 -- 372Guang Zeng, Kaicheng He, Wenbao Han. A trinomial type of σ-LFSR oriented toward software implementation
373 -- 380Zhenchuan Chai, Zhenfu Cao, Xiaolei Dong. Identity-based signature scheme based on quadratic residues
381 -- 398Dengguo Feng, Weidong Chen. Modular approach to the design and analysis of password-based security protocols
399 -- 418Sihan Qing, ChangXiang Shen. Design of secure operating systems with high security levels
419 -- 439Hong Zhang, Yeping He, Zhiguo Shi. A formal model for access control with supporting spatial context
440 -- 455Fan Zhang, Jianfeng Ma, Sang-Jae Moon. Universally composable anonymous Hash certification model
456 -- 469Wei Wang, Guosun Zeng. Trusted dynamic level scheduling based on Bayes trust model
470 -- 490Hefei Ling, Wugang Yuan, Fuhao Zou, Zhengding Lu. Log-scaling magnitude modulated watermarking scheme
491 -- 509Miao Yu, HongJie He, Jiashu Zhang. A digital authentication watermarking scheme for JPEG images with superior localization and security
510 -- 520Xiangao Huang, Wei Huang, Chao Wang, ZeJun Lü, YanHua Hu. Blind reconnaissance of the pseudo-random sequence in DS/SS signal with negative SNR

Volume 50, Issue 2

137 -- 153Junzhou Luo, Ming Yang. Analysis of security protocols based on challenge-response
154 -- 169Daowen Qiu. Notes on automata theory based on quantum logic
170 -- 187WenHui Zhou, Lin Li, GuoHai Chen, AnXi Yu. Optimality analysis of one-step OOSM filtering algorithms in target tracking
188 -- 197Wenxiu Zhang, GuoFang Qiu, Weizhi Wu. A general approach to attribute reduction in rough set theory
198 -- 211Xiaobin Li, Zheng Tian. Multiscale stochastic hierarchical image segmentation by spectral clustering
212 -- 226Yunxia Liu, Yuhua Peng, Huaijing Qu, Yong Yin. Energy-based adaptive orthogonal FRIT and its application in image denoising
227 -- 240Zhirong Ge, Bin Wang, LiMing Zhang. Remote sensing image fusion based on Bayesian linear estimation
241 -- 250Bo Zhu, XiangLin Yang. Fiber soliton-form 3R regenerator and its performance analysis
251 -- 260Chu Gao, ZhiNing Chen, YunYi Wang, Ning Yang. Study on relationships of electromagnetic band gap structures and left/right handed structures
261 -- 272ZhiGuang Shi, JianXiong Zhou, HongZhong Zhao, Qiang Fu. Study on joint Bayesian model selection and parameter estimation method of GTD model

Volume 50, Issue 1

1 -- 20Ke Xu, Yuexuan Wang, Cheng Wu. Formal verification technique for grid service chain model and its application
21 -- 28Yu Huang, GuoZhao Wang. An orthogonal basis for the hyperbolic hybrid polynomial space
29 -- 40Bingru Yang, Wei Song, Zhangyan Xu. New construction for expert system based on innovative knowledge discovery technology
41 -- 45JunDe Wu, XuanChang Zhou, Minhyung Cho. An ideal topology type convergent theorem on scale effect algebras
46 -- 62Mingyi Zhang, Ying Zhang, Fangzhen Lin. A characterization of answer sets for logic programs
63 -- 81Zheng Tian, Xiaobin Li, Yanwei Ju. Spectral clustering based on matrix perturbation theory
82 -- 98ZhenYu Hu, Dongdai Lin, Wenling Wu, Dengguo Feng. Constructing parallel long-message signcryption scheme from trapdoor permutation
99 -- 104Linhua Ma, Yilin Chang, ShengDa Wang. Study on the distribution law of random code structure of irregular LDPC codes and its application in eliminating short cycles
105 -- 112QiHui Wu, Chunming Zhao, JinLong Wang. Turbo iterative equalization for HSDPA systems
113 -- 123Xuesong Wang, Jiancheng Liu, Wenming Zhang, QiXiang Fu, Zhong Liu, XiaoXia Xie. Mathematic principles of interrupted-sampling repeater jamming (ISRJ)
124 -- 134Zhen Peng, XinQing Sheng. Application of asymptotic waveform approximation technique to hybrid FE/BI method for 3D scattering