-
1561
-
1562
Multiplierless discrete Fourier transform based on moments
Published 2009-01-01“…Tongxin xuebao…”
Get full text
Article -
1563
Realization of Raman amplifier with reverse multi - wavelength pumping
Published 2006-01-01“…Tongxin xuebao…”
Get full text
Article -
1564
-
1565
-
1566
Research and design of the protection scheme on bluetooth location privacy
Published 2011-01-01“…Tongxin xuebao…”
Get full text
Article -
1567
-
1568
-
1569
Cryptanalysis of an efficient group signature schemen
Published 2007-01-01“…Tongxin xuebao…”
Get full text
Article -
1570
Research onconvolutional neural network for reservoir parameter prediction
Published 2016-10-01“…Tongxin xuebao…”
Get full text
Article -
1571
-
1572
-
1573
Mimic storage scheme based on regenerated code
Published 2018-04-01“…Tongxin xuebao…”
Get full text
Article -
1574
-
1575
Performance analysis of generalized processor sharing based on fractal leaky bucket regulators
Published 2006-01-01“…Tongxin xuebao…”
Get full text
Article -
1576
-
1577
-
1578
Simple power analysis attack on random pseudo operations
Published 2012-05-01“…Tongxin xuebao…”
Get full text
Article -
1579
-
1580
Least entropy based randomized strategy for wideband spectrum sensing with cooperation
Published 2010-01-01“…Tongxin xuebao…”
Get full text
Article