default search action
SCIENCE CHINA Information Sciences, Volume 48
Volume 48, Number 1, February 2005
- Guojun Wang, Kwai-Sang Chin, C. Y. Dang:
A unified approximate reasoning theory suitable for both propositional calculus system L* and predicate calculus system K*. 1-14 - Yong Tang, Min Rao, Lei Li, Yu Chen, Jianfeng Jiang, Mingde Zhang, Xiaohan Sun:
A novel model on dynamic resource allocation in optical networks. 15-27 - Daiyuan Peng, Pingzhi Fan:
New theoretical bounds on the aperiodic correlation functions of binary sequences. 28-45 - Qingguang Ji, Sihan Qing, Yeping He:
A new formal model for privilege control with supporting POSIX capability mechanism. 46-66 - Yuxi Fu:
A schematic axiom for open congruence. 67-77 - Wenling Wu, Dengguo Feng:
Collision attack on reduced-round Camellia. 78-90 - Feng Yang, Hai-Xin Duan, Xing Li:
Modeling and analyzing of the interaction between worms and antiworms during network worm propagation. 91-106 - Yi Jin, Huacan He, Lirong Ai:
Lane of parallel through carry in ternary optical adder. 107-116 - Xinghua Li, Jianfeng Ma, Sang-Jae Moon:
Security extension for the Canetti-Krawczyk model in identity-based systems. 117-124 - Liangliang Xiao, Mulan Liu:
Linear multi-secret sharing schemes. 125-136
Volume 48, Number 2, April 2005
- Zan Li, Yilin Chang, Lijun Jin, Jueping Cai:
A semi-blind joint data and channel estimation based receiver for meteor burst communication. 137-150 - Yadong Liu, Zongtan Zhou, Dewen Hu, Lirong Yan, Changlian Tan, Daxing Wu, Shuqiao Yao:
A novel method for spatio-temporal pattern analysis of brain fMRI data. 151-160 - Zhongzhi Shi, Mingkai Dong, Yuncheng Jiang, Haijun Zhang:
A logical foundation for the semantic Web. 161-178 - Hongbin Zhang, Feng Xie:
Registering multiple range images based on distance metric of surface-to-surface. 179-191 - Gennian Ge, Dianhua Wu:
Some new optimal quaternary constant weight codes. 192-200 - Daizhan Cheng, Qingxi Hu, Huashu Qin:
Feedback diagonal canonical form and its application to stabilization of nonlinear systems. 201-210 - Yuzhen Wang, Shuzhi Sam Ge, Daizhan Cheng:
Observer and observer-based H∞ control of generalized Hamiltonian systemscontrol of generalized Hamiltonian systems. 211-224 - Xin Guan, You He, Xiao Yi:
Attribute measure recognition approach and its applications to emitter recognition. 225-233 - Jinzhong Yu, Shaowu Chen, Jinsong Xia, Zhangtao Wang, Zhongchao Fan, Yanping Li, Jingwei Liu, Di Yang, Yuanyuan Chen:
Research progresses of SOI optical waveguide devices and integrated optical switch matrix. 234-246 - Junsong Yin, Dewen Hu, Shuang Chen, Zongtan Zhou:
DSOM: a novel self-organizing model based on NO dynamic diffusing mechanism. 247-262 - Caiming Zhang, Xiuhua Ji, Xingqiang Yang:
Constructing triangular patch by basic approximation operator plus additional interpolation operator. 263-272
Volume 48, Number 3, June 2005
- Yongli Li, Guizhong Liu, Zhongwei Zhang, Chenggui Wu:
A new fast friendly window-based congestion control for real-time streaming media transmission. 273-284 - Songhua Xu, Francis Chi-Moon Lau, Congfu Xu, Yunhe Pan:
Virtual hairy brush for digital painting and calligraphy. 285-303 - Xiaoxin Liao, Yuli Fu, Shengli Xie:
On the new results of global attractive set and positive invariant set of the Lorenz chaotic system and the applications to chaos control and synchronization. 304-321 - Junying Zhang, Zhijun Lu, Lin Shi, Jiyang Dong, Meihong Shi:
Filtering images contaminated with pep and salt type noise with pulse-coupled neural networks. 322-334 - Ji Li, Hongyue Zhang:
Analysis of fault detection method based on predictive filter approach. 335-353 - Zhongxuan Liu, Silong Peng:
Directional EMD and its application to texture segmentation. 354-365 - Min Ding, Pushan Tang, Dian Zhou:
Integrating advanced reasoning into a SAT solver. 366-378 - Feng Shu, Shixin Cheng, James Lee, Ming Chen, Xiaohu You:
Analysis of time and frequency synchronization error for wireless systems using OFDM. 379-396 - Haihong Tao, Jiang Yu, Hongyang Wang, Guisheng Liao:
A novel space-borne antenna anti-jamming technique based on immunity genetic algorithm-maximum likelihood. 397-408
Volume 48, Number 4, August 2005
- Peng Liu, Sanli Li, Francis C. M. Lau, Yao Shi, Feng Huang:
RAID-M: A high performance RAID Matrix mass storage. 409-420 - Dongsheng Li, Xicheng Lu:
A novel constant degree and constant congestion DHT scheme for peer-to-peer networks. 421-436 - Jie Tian, Yuliang He, Hong Chen, Xin Yang:
A fingerprint identification algorithm by clustering similarity. 437-451 - Li Zou, Yuping Zhao, Bing Wang, Qinglin Liang, Haige Xiang:
Dual constellations space-time modulation. 452-466 - Yanfei Wang, Xingfa Gu, Tao Yu, Shufang Fan:
Iterative lavrentiev regularization for symmetric kernel-driven operator equations: with application to digital image restoration problems. 467-483 - Peizhong Lu, Shen Li, Yan Zou, Xiangyang Luo:
Blind recognition of punctured convolutional codes. 484-498 - Sihan Qing, Gaicheng Li:
A formal model of fair exchange protocols. 499-512 - Kaile Su, Guanfeng Lv, Qingliang Chen:
Knowledge structure approach to verification of authentication protocols. 513-532 - Xiaolang Yan, Zheng Shi, Ye Chen, Yue Ma, Gensheng Gao:
Full-IC manufacturability check based on dense silicon imaging. 533-544
Volume 48, Number 5, October 2005
- Xiaoyun Wang, Dengguo Feng, Xiuyuan Yu:
An attack on hash function HAVAL-128. 545-556 - Tao Li:
An immunity based network security risk estimation. 557-578 - Haifeng Du, Maoguo Gong, Ruochen Liu, Licheng Jiao:
Adaptive chaos clonal evolutionary programming algorithm. 579-595 - Han-Fu Chen:
Recursive identification for multidimensional ARMA processes with increasing variances. 596-614 - Long Li, Haixia Liu, Yan Shi, Changhong Liang:
Generalized system function analysis of resonant behavior of electromagnetic open systems. 615-631 - Zhenfang Li, Zheng Bao, Fengfeng Yang:
Ground moving target detection and location based on SAR images for distributed spaceborne SAR. 632-646 - Donghua Zhao, Zhijie Cai, Jiong Ruan:
Inversion problem for the dimension of fractal rough surface. 647-655 - Yue Wang, Jianguo Wang, Dianhui Zhang:
Application of CPML to truncate the open boundaries of cylindrical waveguides in 2.5-dimensional problems. 656-669 - Yici Cai, Yan Xiong, Xianlong Hong, Yi Liu:
Reliable buffered clock tree routing algorithm with process variation tolerance. 670-680
Volume 48, Number 6, December 2005
- Shangmin Luan, Guozhong Dai, Wei Li:
A programmable approach to revising knowledge bases. 681-692 - Tailin Liu, Qiaoyan Wen, Zihui Liu:
Construction of nonbinary quantum cyclic codes by using graph method. 693-702 - Yimin Sun, Lei Guo:
On global asymptotic controllability of planar affine nonlinear systems. 703-712 - Wen-Xiu Zhang, Ling Wei, Jian-Jun Qi:
Attribute reduction theory and approach to concept lattice. 713-726 - Bijing Li, Guojun Wang:
Theory of truth degrees of formulas in Łukasiewicz n -valued propositional logic and a limit theorem. 727-736 - Jianping Yan, Yee Leung:
Truth-value transmittal fuzzy reasoning interpolator. 737-746 - Junyi Xu, Jian Yang, Yingning Peng:
A new approach to dual-band polarimetric radar remote sensing image classification. 747-760 - Xieping Gao, Siwang Zhou:
A study of orthogonal, balanced and symmetric multi-wavelets on the interval. 761-781 - Jian Bai, Xiangchu Feng:
Digital ridgelet reconstruction based on local dual frame. 782-794 - Xiaoyan Yu, Jiaqing Wang, Luxi Yang, Zhenya He:
Doubly selective fading channel estimation in MIMO OFDM systems. 795-807 - Xiaoliang Wang, Cuimei Wang, Guoxin Hu, Junxi Wang, Junxue Ran, Cebao Fang, Jianping Li, Yiping Zeng, Jinmin Li, Xinyu Liu, He Qian:
Growth and characterization of 0.8-µm gate length AlGaN/GaN HEMTs on sapphire substrates. 808-814
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.