Journal: Science in China Series F: Information Sciences

Volume 53, Issue 9

1703 -- 1712Youhui Zhang, Li Liu, Guangwen Yang, Weimin Zheng. Efficient Monte Carlo-based options pricing on graphics processors and its optimizations
1713 -- 1726Dong Yang, Hongke Zhang, Fei Song, Shiyong Li. Network layered priority mapping theory
1727 -- 1737Lidong Fu, Lin Gao, Xiaoke Ma. A centrality measure based on spectral optimization of modularity density
1738 -- 1752Ning Ding, Dawu Gu. Precise bounded-concurrent zero-knowledge proofs for NP
1753 -- 1764Ping Zhu, GuoZhao Wang, Jingjing Yu. Degree elevation operator and geometric construction of C-B-spline curves
1765 -- 1773Chongyang Deng, GuoZhao Wang. Interpolating triangular meshes by Loop subdivision scheme
1774 -- 1784Wanhui Wen, Yuhui Qiu, Guangyuan Liu, Nanpu Cheng, Xiting Huang. Construction and cross-correlation analysis of the affective physiological response database
1785 -- 1799Zhenhua Huang, Yang Xiang, Ziyu Lin. ::::l::::-SkyDiv query: Effectively improve the usefulness of skylines
1800 -- 1815Lu Yang, Wensheng Yu, Ruyi Yuan. Mechanical decision for a class of integral inequalities
1816 -- 1825Changzhong Wang, Degang Chen, Qinghua Hu. Some invariant properties of ordered information systems under homomorphism
1826 -- 1832Yuan Li, Haibin Kan, Chen Yuan, Huanfei Ma. The maximal rates and minimal decoding delay of more general complex orthogonal designs
1833 -- 1847Rui Liu, Xiqi Gao, Wenjin Wang. A sub-block orthogonal single carrier frequency domain equalization system in fast Rayleigh fading channel
1848 -- 1859Bin Wang, Yanping Wang, Wen Hong, WeiXian Tan, Yirong Wu. Studies on MB-SAR 3D imaging algorithm using Yule-Walker method
1860 -- 1868Ming Jin, Guisheng Liao, Jun Li. Correlation analysis of target echoes using distributed transmit array
1869 -- 1879Guohong Wang, Shuyi Jia, Wenchao Du. Radial acceleration estimation within one pulse echo based on Hough-ambiguity transformation
1880 -- 1890Yanli Liu, LianLin Li, Fang Li. An auto-focus algorithm for imaging of objects under a lossy earth from multi-frequency and multi-monostatic data
1891 -- 1902Zhihua Mao, Jianyu Chen, Haiqing Huang, Xianqiang He, Fang Gong. Establishment of a hyperspectral evaluation model of ocean color satellite-measured reflectance
1903 -- 1907Laiyun Ji, Jie Ma, Jun Sun, Lang Wang, Yanqi Li, Kaiwei Xu, Guodong Xiao, Jiancheng Ren. Design and performance of superconducting filter with a linear phase for CDMA2000 communication system
1908 -- 1912Guopeng Zhang, Kun Yang, Enjie Ding. Power allocation scheme for selfish cooperative communications based on game theory and particle swarm optimizer
1913 -- 1916Ming Li. A fast algorithm for color image enhancement with total variation regularization

Volume 53, Issue 8

1487 -- 1496Nong Xiao, Wei Fu, Xicheng Lu. QoS-awared replica placement techniques in data grid applications
1497 -- 1510Wei Li, Bo Lang. A tetrahedral data model for unstructured data management
1511 -- 1518Lidong Han, Xiaoyun Wang, Guangwu Xu. On an attack on RSA with small CRT-exponents
1519 -- 1527Maoguo Gong, Licheng Jiao, Fang Liu, Jie Yang. Memetic computation based on regulation between neural and immune systems: the framework and a case study
1528 -- 1538Fangguo Zhang. Twisted Ate pairing on hyperelliptic curves and applications
1539 -- 1545Feng Liu, Wei Hua, Hujun Bao. GPU-based dynamic quad stream for forest rendering
1546 -- 1554Mei E Fang, GuoZhao Wang, Weiyin Ma. ::::N::::-way blending problem of circular quadrics
1555 -- 1565Jing Chen, Yongtian Wang, Junwei Guo, Wei Liu, Jingdun Lin, Kang Xue, Yue Liu, Gangyi Ding. Augmented reality registration algorithm based on nature feature recognition
1566 -- 1573Yu Wang, Bin Li, Bo Yuan. Hybrid of comprehensive learning particle swarm optimization and SQP algorithm for large scale economic load dispatch optimization of power system
1574 -- 1583Qi Luo, Xiaoxin Liao, Zhigang Zeng. Sufficient and necessary conditions for Lyapunov stability of Lorenz system and their application
1584 -- 1590Dianhua Wu, Minquan Cheng, Zhilin Chen, Haipeng Luo. The existence of balanced (::::υ::::, {3, 6}, 1) difference families
1591 -- 1602Hui Li, Chuankun Wu, Jikai Teng. Dynamic tree-based authenticated group key exchange protocol
1603 -- 1612Dengpeng Xing, Jianbo Su. Arm/trunk motion generation for humanoid robot
1613 -- 1621Dapeng Zhang, Ju Liu, Hongji Xu, Hui Ji. Pair-wise error probability and its Chernoff upper bound for unitary space-time code
1622 -- 1627Haiyou Guo, Honglin Hu, Yan Zhang. Waiting time in block fading MIMO systems with dynamic-depth interleaving
1628 -- 1640Lei Zhang, YaChao Li, Yan Liu, Mengdao Xing, Zheng Bao. Time-frequency characteristics based motion estimation and imaging for high speed spinning targets via narrowband waveforms
1641 -- 1652Chunmao Ye, Jia Xu, Yingning Peng, XiuTan Wang. Key parameter estimation for radar rotating object imaging with multi-aspect observations
1653 -- 1665Yi Liang, Hongxian Wang, Long Zhang, Zheng Bao. An approach to forward looking FMCW radar imaging based on two-dimensional Chirp-Z transform
1666 -- 1675Liping Wu, Zan Li, Jiandong Li, Chen Chen. A PN sequence estimation algorithm for DS signal based on average cross-correlation and eigenanalysis in lower SNR conditions
1676 -- 1681Ming Li, JinFeng Kang, Yangyuan Wang. A novel voltage-type sense amplifier for low-power nonvolatile memories
1682 -- 1696Shijie Zhang, Xibin Cao, Fan Zhang, Liang He. Monocular vision-based iterative pose estimation algorithm from corresponding feature points
1697 -- 1702Zhiyuan Ren, Hailin Zhang, Kai Guo. A novel method for the improvement of power efficiency in high peak-to-average-power ratio communication systems

Volume 53, Issue 7

1287 -- 1295Xuemei Li, Caiming Zhang, Yizhen Yue, Kunpeng Wang. Cubic surface fitting to image by combination
1296 -- 1304Shaotong Gu, Gefei Feng, Xiaohu Ma, Yiming Yang. Restoration method of characters on Jiagu rubbings based on Poisson distribution and fractal geometry
1305 -- 1311Lu Hong Diao, Hua Li, Sen Zhang, Lei Liu. Analysis of moment invariants under general linear transformation
1312 -- 1321Shixue Zhang, Jinyu Zhao, Enhua Wu. An improved method for progressive animation models generation
1322 -- 1335Zhu Xiao, YongQiang Hei, Quan Yu, Kechu Yi. A survey on impulse-radio UWB localization
1336 -- 1344Weidong Zhang, Feng Chen, Wenli Xu. Learning interactions among multi-channel sequences with dynamical influence models
1345 -- 1357Shihong Yue, Jeen-Shing Wang, Gao Tao, Huaxiang Wang. An unsupervised grid-based approach for clustering analysis
1358 -- 1368Jianying Cui, Xiaojia Tang. A method for solving Nash equilibria of games based on public announcement logic
1369 -- 1378Cailing Dong, Yilong Yin, Xiukun Yang. Detecting malignant patients via modified boosted tree
1379 -- 1396Meicheng Liu, Dingyi Pei, Yusong Du. Identification and construction of Boolean functions with maximum algebraic immunity
1397 -- 1408GuoFang Qiu, Jianmin Ma, Hong-Zhi Yang, Wen-Xiu Zhang. A mathematical model for concept granular computing systems
1409 -- 1416Jing Yang, Cheng Zhang, Jin Xu, Xiangrong Liu, Xiaoli Qiang. A novel computing model of the maximum clique problem based on circular DNA
1417 -- 1430Lei Zhang, Gang Wu, Shaoqian Li. Capacity bounds of transmit beamforming over MISO time-varying channels with imperfect feedback
1431 -- 1438Jianping Zheng, Baoming Bai, Xiao Ma, Xinmei Wang. Precoding scheme maximizing SINR for MIMO broadcast channels
1439 -- 1445Wenchi Cheng, Hailin Zhang. Approximating maximum likelihood performance reduced dimension VBLAST detection algorithm
1446 -- 1460Feng Chen, Hongwei Liu, Lan Du, Zheng Bao. Target classification with low-resolution radar based on dispersion situations of eigenvalue spectra
1461 -- 1469Xupu Geng, Yinghui Hu, Honghui Yan, Yanfei Wang. An improved imaging algorithm for fixed-receiver bistatic SAR
1470 -- 1480Yi Su, Yutao Zhu, Wenxian Yu, Hongbo Xu, Wentai Lei. Multi-channel radar array design method and algorithm
1481 -- 1486Weimin Zheng. An introduction to Tsinghua Cloud

Volume 53, Issue 6

1097 -- 1108Haogang Chen, Xiaolin Wang, Zhenlin Wang, Binbin Zhang, Yingwei Luo, Xiaoming Li. DMM: A dynamic memory mapping model for virtual machines
1109 -- 1121Weimin Zheng, Hongliang Yu, Guangyu Shi, Jian Chen. Predicting the behavior of large scale P2P systems by parallel discrete event simulation
1122 -- 1129Ling Yang, Liqiang Zhang, ZhiZhong Kang, Zhiqiang Xiao, Junhuan Peng, Xingming Zhang, Liu Liu. An efficient rendering method for large vector data on large terrain models
1130 -- 1140Xianhai Meng, Jigang Li, Qin Yang, Qiang Cai, Qiming Chen. Complex conforming Delaunay triangulation
1141 -- 1150Yong Hu, Yue Qi, Xin Tong. Image-based modeling of inhomogeneous single-scattering participating media
1151 -- 1158Shijun Ren, Yadong Wang. A proof of the convergence theorem of maximum-entropy clustering algorithm
1159 -- 1169ZongBen Xu, Hai Zhang, Yao Wang, Xiangyu Chang, Yong Liang. ::::L::::::1/2:: regularization
1170 -- 1187Enliang Hu, Songcan Chen, Xuesong Yin. Manifold contraction for semi-supervised classification
1188 -- 1200Qinghua Hu, Maozu Guo, Daren Yu, Jinfu Liu. Information entropy for ordinal classification
1201 -- 1215Rong Mei, Qingxian Wu, Changsheng Jiang. Robust adaptive backstepping control for a class of uncertain nonlinear systems based on disturbance observers
1216 -- 1223Yong Wang, Wei Wang, Guoping Liu. Stability of linear discrete switched systems with delays based on average dwell time method
1224 -- 1232Hong Zhang, Ying Mu, Yuhu You, Junwei Li. Multi-scale sparse feature point correspondence by graph cuts
1233 -- 1241Chen Wang, Qinye Yin, Wenjie Wang. An efficient ranging method based on Chinese remainder theorem for RIPS measurement
1242 -- 1250Yongquan Jiang, Minfen Shen, Yuanping Zhou. Two-dimensional water-filling power allocation algorithm for MIMO-OFDM systems
1251 -- 1260Lin Mei, Xuejun Sha, Qinwen Ran, Naitong Zhang. Research on the application of 4-weighted fractional Fourier transform in communication system
1261 -- 1276Yongjun Li, Jili Wu, Shanghong Zhao, Wen Meng, Lihua Ma, Lei Shi, Xingchun Chu, Rui Hou, Tian Li. A novel two-layered optical satellite network of LEO/MEO with zero phase factor
1277 -- 1286Wei Yang, Jin Chen, Bunkei Matsushita, Miaogen Shen, Xuehong Chen. Practical image fusion method based on spectral mixture analysis

Volume 53, Issue 5

885 -- 895Jingfa Liu, Gang Li. Basin filling algorithm for the circular packing problem with equilibrium behavioral constraints
896 -- 910Bo Lang. A computational trust model for access control in P2P
911 -- 919Hyeon-Joong Kim, Bernd Bickel, Markus H. Gross, Soo-Mi Choi. Subsurface scattering using splat-based diffusion in point-based rendering
920 -- 931Yoshinori Dobashi, Tsuyoshi Yamamoto, Tomoyuki Nishita. An interactive rendering system using hierarchical data structure for earth-scale clouds
932 -- 944Jue Wang, Changjun Hu, Jilin Zhang, Jianjiang Li. OpenMP compiler for distributed memory architectures
945 -- 953Jingwei Liu, Rong Sun, Kyungsup Kwak. Fair exchange signature schemes
954 -- 963Hanwu Liu, Dongdai Lin. A two-round honest-verifier zero-knowledge protocol
964 -- 979Wei Ren, Yi Ren, Hui Zhang. Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks
980 -- 989Bin Xin, Jie Chen, Zhihong Peng, Feng Pan. An adaptive hybrid optimizer based on particle swarm and differential evolution for global optimization
990 -- 1005Guocheng Li, Shiji Song, Cheng Wu. Generalized gradient projection neural networks for nonsmooth optimization problems
1006 -- 1015Min Wu, Lan Zhou, Jin-Hua She, Yong He. Design of robust output-feedback repetitive controller for class of linear systems with uncertainties
1016 -- 1033Ding Wang, Ying Wu. Array errors active calibration algorithm and its improvement
1034 -- 1043Jun Sun, Yingzhuang Liu, Guangxi Zhu. On degrees of freedom of the cellular network
1044 -- 1055Jing Li, Jianhua Ge, Yong Wang, Hao Yao. Performance analysis and partner selection for cooperative diversity based on MQAM modulation
1056 -- 1066Qinyu Zhang, Bin Cao, Jian Wang, Naitong Zhang. Polarization filtering technique based on oblique projections
1067 -- 1077Yue Wang, Ran Tao, Hao Zhang. Research on distributed intrusion detection system based on multi-living agent
1078 -- 1088ShaoHua Lu, Ou Xu, Suchun Feng, XiaoWei Dong, Li Pei, ShuiSheng Jian. Analysis of coupling from core mode to counter-propagating radiation modes in tilted fiber Bragg gratings
1089 -- 1096Yongshun Wang, Xianliang Luo, Hairong Li, Ziting Wang, Rong Wu, Caizhen Zhang, Siyuan Li. Improvements on radiation-hardened performance of static induction transistor

Volume 53, Issue 4

677 -- 684Wei Li. Logical verification of scientific discovery
685 -- 703Puwei Wang, Zhi Jin, Hongyan Liu. Capability description and discovery of Internetware entity
704 -- 714Ling Zhang, Bo Zhang. Fuzzy tolerance quotient spaces and fuzzy subsets
715 -- 728Xin Du, Lixin Ding. About the convergence rates of a class of gene expression programming
729 -- 737Zhiyong Liu, David Zhang, Yugang Li. Fast and convergence-guaranteed algorithm for linear separation
738 -- 751Zhiqiang Li, Tao Fang, Hong Huo. A saliency model based on wavelet transform and visual attention
752 -- 759Jutao Hao, Jingjing Zhao, Minglu Li. Spatial continuity incorporated multi-attribute fuzzy clustering algorithm for blood vessels segmentation
760 -- 768Houzhen Wang, Huanguo Zhang, Haiming Guan, Haiqing Han. A new perturbation algorithm and enhancing security of SFLASH signature scheme
769 -- 779Mo Zhou, Jianyu Zhang, Yafei Dai. An implementation and optimization for scalable DHT crawler
780 -- 787Yusong Du, Dingyi Pei. Construction of Boolean functions with maximum algebraic immunity and count of their annihilators at lowest degree
788 -- 799Hongda Li, Haixia Xu, Bao Li, Dengguo Feng. On constant-round zero-knowledge proofs of knowledge for NP-relations
800 -- 812Min Wang, Siying Zhang, Bing Chen, Fei Luo. Direct adaptive neural control for stabilization of nonlinear time-delay systems
813 -- 822Junchan Zhao, Junan Lu, Xiaoqun Wu. Pinning control of general complex dynamical networks with optimization
823 -- 832Yuanlu Li, Yingchao Zhang, Huiqiang Tang. Tsallis model-based separation of overlapped peak signals
833 -- 841Xuelan Zou, Weiyan Liu, Guangzeng Feng. Performance of iteratively decoded bit-interleaved coded modulation with chaos based interleaving strategies
842 -- 853Xiaorong Xu, Baoyu Zheng. novel multi-relay cross-layer cooperative communication strategy based on Jackson queuing model
854 -- 866Yu Zuo, Jia Xu, Yingning Peng, Xiang-Gen Xia. Parameter estimation for SAR moving target in complex image domain
878 -- 884Hongxia Liu, Qianwei Kuang, Suzhen Luan, Aaron Zhao, Sai Tallavarjula. Frequency dispersion effect and parameters extraction method for novel HfO::2:: as gate dielectric
967 -- 977Teng Long, Yang Li, Xin Guo. A new approach of motion compensation for synthetic wideband radar under multitarget environment

Volume 53, Issue 3

405 -- 433ChangXiang Shen, Huanguo Zhang, Huaimin Wang, Ji Wang, Bo Zhao, Fei Yan, Fajiang Yu, Liqiang Zhang, Mingdi Xu. Research on trusted computing and its development
434 -- 453Huanguo Zhang, Fei Yan, Jianming Fu, Mingdi Xu, Yang Yang, Fan He, Jing Zhan. Research on theory and key technology of trusted computing platform security testing and evaluation
454 -- 464Dengguo Feng, Yu Qin. A property-based attestation protocol for TCM
465 -- 482Junwei Zhang, Jianfeng Ma, Sang-Jae Moon. Universally composable secure TNC model and EAP-TNC protocol in IF-T
483 -- 493Yiming Zhang, Xicheng Lu, Dongsheng Li. Embedded DHT overlays in virtual computing environments
494 -- 505Wei Wang, Guosun Zeng. Bayesian cognitive trust model based self-clustering algorithm for MANETs
506 -- 514Xuejia Lai, MingXin Lu, Lei Qin, Junsong Han, Xiwen Fang. Asymmetric encryption and signature method with DNA technology
515 -- 523Shuqin Zhong, Zhi Ma, Yajie Xu. Constructing quantum error correcting code via logic function
524 -- 536Licheng Wang, Lihua Wang, Zhenfu Cao, Yixian Yang, Xinxin Niu. Conjugate adjoining problem in braid groups and new design of braid-based signatures
537 -- 545Shaojing Fu, Chao Li, Longjiang Qu. On the number of rotation symmetric Boolean functions
546 -- 556Meiqin Wang, Xiaoyun Wang, Lucas Chi Kwong Hui. Differential-algebraic cryptanalysis of reduced-round of Serpent-256
557 -- 566Yinxia Sun, Hui Li. Efficient signcryption between TPKC and IDPKC and its multi-receiver construction
567 -- 580Junwei Zhang, Jianfeng Ma, Sang-Jae Moon. Universally composable one-time signature and broadcast authentication
581 -- 592Peng Xu, Guohua Cui, Cai Fu, Xueming Tang. A more efficient accountable authority IBE scheme under the DL assumption
593 -- 606Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao. CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
607 -- 618Yong Wang, Jiwu Huang. Robust AVS audio watermarking
619 -- 633Hongxia Wang, Mingquan Fan. Centroid-based semi-fragile audio watermarking in hybrid domain
634 -- 647Xiangyang Luo, Fenlin Liu, Chunfang Yang, Daoshun Wang. Image universal steganalysis based on best wavelet packet decomposition
648 -- 658Mingxing Luo, Yixian Yang, Licheng Wang, Xinxin Niu. Secure network coding in the presence of eavesdroppers
659 -- 676Yu Zhang, Binxing Fang, Yongzheng Zhang 0002. Identifying heavy hitters in high-speed network monitoring

Volume 53, Issue 2

215 -- 222Min Ren, Xiaohua Huo. Asynchronous double-precision windows based unmanned aerial vehicle real-time path planning
223 -- 235Xiangyin Zhang, Haibin Duan, Yaxiang Yu. Receding horizon control for multi-UAVs close formation control based on differential evolution
236 -- 247Xiaochen Wang, Hui Zhao, Kemao Ma, Xin Huo, Yu Yao. Kinematics analysis of a novel all-attitude flight simulator
248 -- 257Chunyan Yang, Dewei Wu, Yane Lu, Yonglin Yu. Research on network RTK positioning algorithm aided by quantum ranging
258 -- 270Yi Huang, Zongji Chen, Chen Wei. Least trace extended set-membership filter
271 -- 277Jingping Shi, Weiguo Zhang, Guangwen Li, Xiaoxiong Liu. Research on allocation efficiency of the redistributed pseudo inverse algorithm
278 -- 287Dengguo Feng, Weidong Chen. Security model and modular design of fair authentication key exchange protocols
288 -- 298Dingyi Pei, Jun-Wu Dong, Chunming Rong. A novel key pre-distribution scheme for wireless distributed sensor networks
299 -- 306Chao Yang, Shulin He. An accessibility measure for the combined travel demand model
307 -- 324Shaocheng Tong, Yongming Li. Robust adaptive fuzzy backstepping output feedback tracking control for nonlinear system with dynamic uncertainties
325 -- 334YuLong Zou, Baoyu Zheng, Jia Zhu. Performance evaluation of half-duplex relay-based opportunistic cooperation diversity
335 -- 343Haiyang Huang, Gang Wu, Lu Lu, Shaoqian Li. An optimized non-unitary linear precoding design for OSTBCs
344 -- 354Bin Li, Zheng Zhou, Weixia Zou. RPPK modulation with high data rates
355 -- 366Tao Liu, Gaoming Huang, Xuesong Wang, ShunPing Xiao. Statistical assessment of H/A target decomposition theorems in radar polarimetry
367 -- 378Xia Bai, Jinping Sun, Wen Hong, Shiyi Mao. On the TOPS mode spaceborne SAR
379 -- 389Jiancun Fan, Qinye Yin, Wenjie Wang. Pilot-aided channel estimation for CDD-OFDM systems
390 -- 397Ou Xu, ShaoHua Lu, ShuiSheng Jian. Theoretical analysis of polarization properties for tilted fiber Bragg gratings
398 -- 404Anbang Wang, Yuncai Wang. Chaos correlation optical time domain reflectometry

Volume 53, Issue 12

2389 -- 2398Kun He, Wenqi Huang. A quasi-human algorithm for solving the three-dimensional rectangular packing problem
2399 -- 2414Shuiming Zhong, Xiaoqin Zeng, Huiyi Liu, Yan Xu. Approximate computation of Madaline sensitivity based on discrete stochastic technique
2415 -- 2428Suicheng Gu, Ying Tan, Xingui He. Laplacian smoothing transform for face recognition
2429 -- 2440Weiwei Kong, Yingjie Lei, Yang Lei, Jie Zhang. Technique for image fusion based on non-subsampled contourlet transform domain improved NMF
2441 -- 2451Lin Chen, Xiangxu Meng. Anisotropic resizing and deformation preserving geometric textures
2452 -- 2460Shujun Fu, Caiming Zhang. Adaptive bidirectional diffusion for image restoration
2461 -- 2471Pengtao Zhang, Wei Wang, Ying Tan. A malware detection model based on a negative selection algorithm with penalty factor
2472 -- 2484Xiangyang Luo, Fenlin Liu, Chunfang Yang, Shiguo Lian. Modification ratio estimation for a category of adaptive steganography
2485 -- 2494Chun Zhou, Wansu Bao, Xiangqun Fu. Decoy-state quantum key distribution for the heralded pair coherent state photon source with intensity fluctuations
2495 -- 2505Yangsheng Chen. A distributed estimator for on-road target tracking with lane estimation and identification
2506 -- 2513Likui Wang, Xiaodong Liu. Stabilization for discrete-time fuzzy systems with Takagi-Sugeno s models: reduce the complexity
2514 -- 2526Bencai Wang, You He, Guo-Hong Wang, Jianjuan Xiu. Optimal allocation of multi-sensor passive localization
2527 -- 2537Li Liu, Lian Li, Bin Hu. Algorithms for ::::k::::-fault tolerant power assignments in wireless sensor networks
2538 -- 2547Chuanyun Zou, Zygmunt J. Haas, Sheng Zou. Throughput maximization in UWB-based ad-hoc networks
2548 -- 2556Ting Li, Luxi Yang. MMSE relay precoding schemes based on quantization error compensation for multi-relay system
2557 -- 2566Dan Wu, Yueming Cai, Yanming Sheng. Joint subcarrier and power allocation in uplink OFDMA systems based on stochastic game
2567 -- 2575Feng Shu, Stevan M. Berber, Dongming Wang, Qinchuan Zhang, Mao Wang. ML integer frequency offset estimation for OFDM systems with null subcarriers: Estimation range and pilot design
2576 -- 2583Kunqi Guo, Lixin Sun, Yong Li, Shilou Jia. Channel-aware and queue-aware joint-layer resource optimization for cognitive radio networks
2584 -- 2599Bin Li, Zheng Zhou, Weixia Zou. A novel adaptive spectrum forming filter: Application in cognitive ultra-wideband
2600 -- 2609Pengcheng Mu, Qinye Yin, Jianguo Zhang. A wideband beamforming method based on directional uniform circular arrays
2610 -- 2619Dapeng Zhang, Ju Lu, Hongji Xu, Xingyu Zhang. Multiary turbo code fitting for unitary space-time modulation and its MAP decoding algorithm
2620 -- 2630Xuebin Zhuang, XiaoWei Cui, MingQuan Lu, Zhenming Feng. Numerically stable method of signal subspace estimation based on multistage Wiener filter
2631 -- 2641Lei Cao, Dacheng Yang, Hongwen Yang, Chao Feng, Xin Zhang. Asymptotic performance of amplify-and-forward MIMO relaying with transmit antenna selection
2642 -- 2652Hong Li, MingQuan Lu, Zhenming Feng. Mapping and overlapping based carrier frequency searching technique for rapid GNSS long PN-code acquisition
2653 -- 2663Chenxi Lu, Yunhua Tan, Bocheng Zhu, Lezhu Zhou. Improved innovation-based adaptive Kalman filter for dual-frequency navigation using carrier phase
2664 -- 2674You He, Caisheng Zhang, Jiahui Ding, Xiaoming Tang. The impact of time synchronization error on passive coherent pulsed radar system
2675 -- 2686Cheng Hu, Teng Long, Tao Zeng. Statistic characteristic analysis of forward scattering surface clutter in bistatic radar
2687 -- 2695Huanyao Dai, Xuesong Wang, YongZhen Li, Jia Luo, ShunPing Xiao. Spatial polarization characteristics and scattering matrix measurement of orthogonal polarization binary array radar
2696 -- 2704Hailiang Zhou, Jiang Jiang, Minxuan Zhang, Liang Fang. Opitimization of tunneling carbon nanotube-FETs based on stair-case doping strategy

Volume 53, Issue 11

2159 -- 2168Yi Jin, Yunfu Shen, Junjie Peng, Shiyi Xu, Guangtai Ding, Dongjian Yue, Haihang You. Principles and construction of MSD adder in ternary optical computer
2169 -- 2184Jing Jiang, Yongjun Li, Qinyuan Feng, Peng Huang, Yafei Dai. A multiple user sharing behaviors based approach for fake file detection in P2P environments
2185 -- 2194Liu Liu, Liqiang Zhang, Jingtao Ma, Liang Zhang, Xingming Zhang, Zhiqiang Xiao, Ling Yang. An improved line-of-sight method for visibility analysis in 3D complex landscapes
2195 -- 2204Liying Sun, Yuzhen Wang. ∞ control of a class of nonlinear Hamiltonian descriptor systems
2205 -- 2214Zhen Wu. A maximum principle for partially observed optimal control of forward-backward stochastic control systems
2215 -- 2229Hongxing Li, Xuehai Yuan, Jiayin Wang, Yucheng Li. The normal numbers of the fuzzy systems and their classes
2230 -- 2239Huixian Shi, Guojun Wang. Lattice-valued modal propositional logic and its completeness
2240 -- 2250Yan Zhuang, Mingwei Gu, Wei Wang, Haiyang Yu. Multi-robot cooperative localization based on autonomous motion state estimation and laser data interaction
2251 -- 2264Yingqun Xiao, Yigang He. A linear ridgelet network approach for fault diagnosis of analog circuit
2265 -- 2271Chuanfei Dong, Xu Ma, Binghong Wang. Advanced information feedback strategy in intelligent two-route traffic flow systems
2272 -- 2286Pengcheng Mu, Jean-François Nezan, Mickaël Raulet, Jean-Gabriel Cousin. Advanced list scheduling heuristic for task scheduling with communication contention for parallel embedded systems
2287 -- 2299Jun Lang, Ran Tao, Yue Wang 0001. The discrete multiple-parameter fractional Fourier transform
2300 -- 2309Shuiyuan Yu, Yudong Chen, Jieru Wu. Spectral integration and perception of Chinese back vowel /γ/
2310 -- 2322Teng Long, Cheng Hu, Tao Zeng, Xiaoliang Li. Physical modeling and spectrum spread analysis of surface clutter in forward scattering radar
2323 -- 2331Jun Luo, Ling-ge Jiang, Chen He. An analytical model for SMAC protocol in multi-hop wireless sensor networks
2332 -- 2342Kezhong Lu, Guoliang Chen, Yuhong Feng, Gang Liu, Rui Mao. Approximation algorithm for minimizing relay node placement in wireless sensor networks
2343 -- 2351You He, Tao Jian, Feng Su, Changwen Qu, Dianfa Ping. CFAR assessment of covariance matrix estimators for non-Gaussian clutter
2352 -- 2362Xin Li, Haiming Qi, Bin Hua, Hong Lei, Weidong Yu. A study of spaceborne SAR raw data compression error based on a statistical model of quantization interval transfer probability
2363 -- 2376Zhe Song, Houxing Zhou, Jun Hu, Weidong Li, Wei Hong. Accurate location of all surface wave modes for Green s functions of a layered medium by consecutive perturbations
2377 -- 2388Fengfeng Wu, Song Jia, Yuan Wang, Ganggang Zhang. Low swing drivers based on charge redistribution

Volume 53, Issue 10

1917 -- 1930Yu Wang, Xiangyang Ji, Qionghai Dai. Key technologies of light field capture for 3D reconstruction in microscopic scene
1931 -- 1946Huiba Li, Shengyun Liu, Yuxing Peng, Dongsheng Li, Hangjun Zhou, Xicheng Lu. Superscalar communication: A runtime optimization for distributed applications
1947 -- 1962Yong Cui, Youjian Zhao, Turgay Korkmaz, Tielei Zhang. Supporting multiple metrics in QoS-aware BGP
1963 -- 1976Yudong Zhang, Lenan Wu, Shuihua Wang, Geng Wei. Color image enhancement based on HVS and PCNN
1977 -- 1987Houzhen Wang, Huanguo Zhang, Qianhong Wu, Yu Zhang, Chunlei Li, Xinyu Zhang. Design theory and method of multivariate hash function
1988 -- 1995Bing Sun, Ruilin Li, Longjiang Qu, Chao Li. SQUARE attack on block ciphers with low algebraic degree
1996 -- 2004Hong Wen, Pin-Han Ho, Guang Gong. A framework of physical layer technique assisted authentication for vehicular communication networks
2005 -- 2015Yinxia Sun, Hui Li. Short-ciphertext and BDH-based CCA2 secure certificateless encryption
2016 -- 2021Fagen Li, Masaaki Shirase, Tsuyoshi Takagi. Cryptanalysis of efficient proxy signature schemes for mobile communication
2022 -- 2031Xiaodong Pan, Yang Xu. Semantic theory of finite lattice-valued propositional logic
2032 -- 2046Xiao-Sheng Si, Changhua Hu, Zhijie Zhou. Fault prediction model based on evidential reasoning approach
2047 -- 2061Quanquan Gao, Tingge Ren. A measuring method of effects of herbs based on classification used for intelligent calculation of efficacies of prescriptions
2062 -- 2074Wenxiong Kang, Huasong Li, Feiqi Deng. Direct gray-scale extraction of topographic features for vein recognition
2075 -- 2086Haibo Xu, Hui Tian, Bo Huang, Ping Zhang. An improved dynamic user equipment power saving mechanism for LTE system and performance analysis
2087 -- 2096Zhigang Liu, Jinkuan Wang. Unitary cyclic ESPRIT-like direction finding
2097 -- 2105Yao Zhou, Yueming Cai, Chengkang Pan. A novel multicluster V-MIMO PCR scheme in large-scale Ad Hoc networks
2106 -- 2115Xiangbin Yu, Huibin Shi. Performance analysis of variable-power adaptive modulation in space-time block coded MIMO diversity systems
2116 -- 2126Pinyi Ren, Rui Wang, Shijiao Zhang. Rectangle blocking matrices based unitary multistage Wiener reduced-rank joint detection algorithm for multiple input multiple output systems
2127 -- 2137Wei Xia, Zishu He, Yuyu Liao. On the maximum likelihood method for target localization using MIMO radars
2138 -- 2143JinCheng Zhang, Zhiming Li, Yue Hao, Hao Wang, Peixian Li. Finite element analysis and optimization of temperature field in GaN-MOCVD reactor
2144 -- 2158Zhaoxin Geng, Qing Li, Wei Wang, Zhihong Li. PDMS prism-glass optical coupling for surface plasmon resonance sensors based on MEMS technology

Volume 53, Issue 1

1 -- 17Guofang Tu, Jianjun Liu, Can Zhang, Shaoshuai Gao, Shidong Li. Studies and advances on joint source-channel encoding/decoding techniques in flow media communications
18 -- 29Wei Li, Wenqi Huang, Dongchen Jiang, Xianglong Liu. A heuristic algorithm for cube packing with time schedule
30 -- 49Binxing Fang, Yunchuan Guo, Yuan Zhou. Information content security on the Internet: the control model and its evaluation
50 -- 63Xuanzhe Liu, Gang Huang, Hong Mei. A community-centric approach to automated service composition
64 -- 76Ming Li, Wei Wang, Zhihua Zhou. Exploiting remote learners in Internet environment with agents
77 -- 88Xiaolin Wang, Yifeng Sun, Yingwei Luo, Zhenlin Wang, Yu Li, Binbin Zhang, Haogang Chen, Xiaoming Li. Dynamic memory paravirtualization transparent to guest OS
89 -- 100Yongqiang Jin, Xiangdong Liu, Wei Qiu, Chaozhen Hou. Time-varying sliding mode control for a class of uncertain MIMO nonlinear system subject to control input constraint
101 -- 114Yongming Li. Finite automata based on quantum logic and monadic second-order quantum logic
115 -- 128Mingxuan Sun, Danwei Wang, Pengnian Chen. Repetitive learning control of nonlinear systems over finite intervals
129 -- 136Jie Xu, Pascal Chargé, Daniele Fournier-Prunaret, Abdel-Kaddous Taha, Keping Long. Chaos generator for secure transmission using a sine map and an RLC series circuit
137 -- 146Do Won Hong, Je Yoon Kim, Sang Uk Shin. Authentication mechanism for fast handoff in cdma2000-WiBro interworking
147 -- 157Quanwei Cai, Ping Wei, Xianci Xiao. Single-channel blind separation of overlapped multicomponents based on energy operator
158 -- 167Weile Zhang, Qinye Yin, Wei Han, Wenjie Wang. Radio interferometric localization of WSNs based on Doppler effect
168 -- 181WenZhe Fa, Ya-Qiu Jin. Analysis of microwave brightness temperature of lunar surface and inversion of regolith layer thickness: Primary results of Chang-E 1 multi-channel radiometer observation
182 -- 190Bo Zhu, XiangLin Yang. The influence of higher-order effects on the transmission performances of the ultra-short soliton pulses and its suppression method
191 -- 202Xiaojun Tong, Minggen Cui. Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation
203 -- 212Shang Ma, JianHao Hu, Yanlong Ye, Lin Zhang, Xiang Ling. A 2:::::::n::::::: scaling scheme for signed RNS integers and its VLSI implementation