Citation: | Li Qianmu, You Jing, Zhang Hong, et al. Research and design of a datalink user's safeguard strategy[J]. Journal of Beijing University of Aeronautics and Astronautics, 2004, 30(11): 1029-1032. (in Chinese) |
[1] Lin P, Lin Y B, Feng V, et al. GPRS-based WLAN authentication and auto-configuration[J]. Computer Communications, 2004, 27(2):739~742 [2]Lin P, Lin Y B, Chlamtac I. Module count-based overflow control scheme for UMTS high speed downlink packet access[J]. IEEE Transactions on Vehicular Technology, 2004, 3(2):524~533 [3]Zhou L, Zygmunt J H. Securing Ad Hoc networks[J]. IEEE Network, 1999,13(6):24~30 [4]Niu Zhisheng, Shu Tao, Yoshitaka Takahashi. A vacation queue with setup and close-down times and batch Markovian arrival processes[J]. Performance Evaluation, 2003,54(2):225~248 [5]Hung H N. Lin Y B, Peng N F, et al. Repacking on demand for two-tier wireless local loop[J]. IEEE Trans on Wireless Communications, 2004, 3(3):745~757 [6]Hsu S J, Maria C, Yuang. Efficient computation of marginal reliability-i mportance for reducible networks[J], IEEE Transaction on Reliability, 2001, 1(50):98~106 [7]Yang Heng, Zhang Xianda. A fast maximum likelihood sequence decoding method for multi-carrier DS-CDMA using frequency spread coding[J]. IEEE Transactions on Wireless Communications,2004, 3(3):770~780 [8]Chen J F, Zhang X D, Wu Y T. An algorithm for joint estimating range, DOA and frequency of near-field sources[J]. Chinese J Electronics,2004, 13(1):19~23
|