Sort by:
Publication Type:
Open access:
Publication Date:
Periodicals:
Search results
Online since: April 2014
Authors: Yong Shi, Jun Ke, Qi Dong Zhao, Xin Yong Li, Nan Zheng, Fang Hong Xue
[5] Hou Yang, Li Xinyong, Zhao Qidong, etc.
[7] Hou Yang, Li Xinyong, Zhao Qidong, etc.
[10] Hou Yang, Li Xinyong, Zou Xuejun, etc.
[18] Kang Qing, Yang Lixia,†, Chen Yufang, etc.
[22] Zhou Ji, Ji Tian-hao, Li Li, etc.
[7] Hou Yang, Li Xinyong, Zhao Qidong, etc.
[10] Hou Yang, Li Xinyong, Zou Xuejun, etc.
[18] Kang Qing, Yang Lixia,†, Chen Yufang, etc.
[22] Zhou Ji, Ji Tian-hao, Li Li, etc.
Online since: December 2014
Authors: Hai Rong Guo, Meng Meng Wei, Xiao Fei Wang, Li Jun Chen, Gui Ping Xu
(In Chinese)
[4] Peng Ma, Changxiao Li, Ming Lei, Yujing Yang ang Jun Ma.
[8] Litao Yang, Fenglian Mo, Qiuzhen Zhu, Nan Li, Zongxi Ou ang Yangrui Li.
(In Chinese) [10] Jiao R Z.Yang C D.
[11] Shangdong Yang, Jun Wu, Jiucheng Zhao, Hongwei Tan and Yangrui Li.
Guangxi Agricultural Sciences41(2010), p.795-799 [13] Haitao Tian, Xisheng Hu, Shaofeng Zhang, Jian Xie, Dong Zhang and Jinsong An.
[8] Litao Yang, Fenglian Mo, Qiuzhen Zhu, Nan Li, Zongxi Ou ang Yangrui Li.
(In Chinese) [10] Jiao R Z.Yang C D.
[11] Shangdong Yang, Jun Wu, Jiucheng Zhao, Hongwei Tan and Yangrui Li.
Guangxi Agricultural Sciences41(2010), p.795-799 [13] Haitao Tian, Xisheng Hu, Shaofeng Zhang, Jian Xie, Dong Zhang and Jinsong An.
Online since: June 2013
Authors: Gang Liu, Fang Li
Tian Zhong[3] studied traditional testability allocation approach[4], focusing on engineering practicality, but only a few influencing factors are considered, and resource constraint is not considered.
[3]Tian Zhong.
[8]Yang J E, Hwang M J, Sung T Y, Jin Y.
[3]Tian Zhong.
[8]Yang J E, Hwang M J, Sung T Y, Jin Y.
Online since: February 2014
Authors: Fei Wang, Yu Wang, Yuan Tian
Research of Improved network access authorization mechanism based on Elliptic Curve
Fei Wang 1, a, Yu Wang 1, a and Yuan Tian 2, b
1 Department of Information Equipment, Academy of Equipment, Beijing 101416, China
2Company of Postgraduate Management, Academy of Equipment, Beijing 101416, China
awangfei791009@163.com, baashin@126.com
Keywords:. network access; mutual authorization; Elliptic Curve Cryptosystem
Abstract.
Security integration of WAPI based on WLAN and 3G[J].Chinese journal of computer. 2010,9: 1675-1685 [4] Wang hao, Yang jian, Liu jie, et al.
Security integration of WAPI based on WLAN and 3G[J].Chinese journal of computer. 2010,9: 1675-1685 [4] Wang hao, Yang jian, Liu jie, et al.
Online since: August 2013
Authors: Hao Chen, Tian Liang, Juan Yao
The Processing Algorithms and EML Modeling of True Color Synthesis for SPOT5 Image
Hao Chen1,a, Tian Liang1 and Juan Yao1
1 Hunan State Engineering Laboratory of Geospatial Information, Hunan University of Science and Technology, Xiangtan, Hunan, China, 411201
ach_chenhao@163.com
Keywords: SPOT-5 Image, EML Modeling, True-color Processing.
[2] Y.L.Yang and X.F.Qiu: Journal of Qinghai Environment.Vol.47(2007), p.46(in Chinese)
[2] Y.L.Yang and X.F.Qiu: Journal of Qinghai Environment.Vol.47(2007), p.46(in Chinese)
Online since: April 2013
Authors: Xin Peng, Tian Qi, Zuo Chang Zhang
Research on Linear Features Change Detection Based on Remote Sensing Image and Vector Data
Zuochang Zhanga, Xin Pengb and Tian Qic
Guangxi University of Finance and Economics, Nanning, Guangxi, China
ageozzc@163.com, b395714816@qq.com, cwinterfell@qq.com
Keywords: Remote sensing image, GIS vector, Linear features, Change detection, Ziplock Snake
Abstract.
[6] Han Min, Sun Yang, Tang Xiaoliang.
[6] Han Min, Sun Yang, Tang Xiaoliang.