• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

A Network Security Situational Awareness Model Based on Information Fusion
Wei Yong, Lian Yifeng, and Feng Dengguo
2009, 46(3): 353-362.
Abstract PDF
Study of Mobile Agent Protection Based on Data Obfuscation and Time Checking
Wu Jiehong, Chang Guiran, Gao Fuxiang, Yin Hang
2009, 46(3): 363-369.
Abstract PDF
Power Analysis Attacks Against AES Based on Maximal Bias Signal
Liu Zhenglin, Han Yu, Zou Xuecheng, and ChenYicheng
2009, 46(3): 370-376.
Abstract PDF
A DPA and HO-DPA Resistant Implementation of AES
Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi
2009, 46(3): 377-383.
Abstract PDF
A Traitor Tracing Scheme Based on Bilinear Map
Wang Qinglong, Han Zhen, Yang Bo
2009, 46(3): 384-389.
Abstract PDF
A Time Model for Complex Event in InforSIB
Liu Jiahong, Wu Quanyuan, Gan Liang, Zhang Bing
2009, 46(3): 390-397.
Abstract PDF
A Cooperative Monitoring Model of Migrating Workflow
Lu Zhaoxia, Zeng Guangzhou
2009, 46(3): 398-406.
Abstract PDF
Internet Traffic Classification Using Support Vector Machine
Xu Peng, Liu Qiong, and Lin Sen
2009, 46(3): 407-414.
Abstract PDF
A Structured Peer to Peer File Sharing Model with Non-DHT Searching Algorithm
Xiong Wei, Xie Dongqing, Jiao Bingwang, Liu Jie
2009, 46(3): 415-424.
Abstract PDF
A Distributed Anchor-Free Localization Algorithm in Sensor Networks
Cui Xunxue, Liu Jianjun, Fan Xiumei
2009, 46(3): 425-433.
Abstract PDF
Traffic Prediction Models of Traffics at Application Layer in Metro Area Network
Yuan Xiaofang, Chen Nannan, Wang Dong, Xie Gaogang, Zhang Dafang
2009, 46(3): 434.
Abstract PDF
An Ontology Learning Method Based on Double VSM and Fuzzy FCA
Xing Jun, Han Min
2009, 46(3): 443-451.
Abstract PDF
Study of an Epistemic Description Logic with Transitive Roles
Cao Yi, Xu Dezhi, Chen Jianer, and Guan Qinghua
2009, 46(3): 452-458.
Abstract PDF
Model Counting and Planning Using Extension Rule
Lai Yong, Ouyang Dantong, Cai Dunbo, and Lü Shuai
2009, 46(3): 459-469.
Abstract PDF
Integration of Multiple Fuzzy Decision Trees Based on Fuzzy Integral
Zhai Junhai, Wang Xizhao, Zhang Sufang
2009, 46(3): 470-477.
Abstract PDF
An Affine-Invariant Objects Recognition Method Employing Features in Frequency Domain
Lü Wenxian, Peng Qimin, Lü Yuzeng, Li Jun
2009, 46(3): 478-484.
Abstract PDF
A Register Pressure Sensitive Instruction Speculative Scheduling Technology
Huang Lei, Feng Xiaobing, and Lü Fang
2009, 46(3): 485-491.
Abstract PDF
A Mapping Algorithm for Replicated Data in LargeScale Storage System
Mu Fei, Xue Wei, Shu Jiwu, and Zheng Weimin
2009, 46(3): 492-497.
Abstract PDF
A Privacy-Preserving Data Perturbation Algorithm Based on Neighborhood Entropy
Ni Weiwei, Xu Lizhen, Chong Zhihong, Wu Yingjie, Liu Tengteng, and Sun Zhihui
2009, 46(3): 498-504.
Abstract PDF
A Dynamic-Fit Heuristic Algorithm for the Rectangular Strip Packing Problem
Jiang Xingbo, Lü Xiaoqing, Liu Chengcheng, Li Monan
2009, 46(3): 505-512.
Abstract PDF
Equivalence Verification of High-Level Datapaths Based on Polynomial Symbolic Algebra
Yang Zhi, Ma Guangsheng, Zhang Shu
2009, 46(3): 513-520.
Abstract PDF
Segmentation of Brain MR Images Based on the Measurement of Difference of Mutual Information and Gauss-Markov Random Field Model
Wang Wenhui, Feng Qianjin, Chen Wufan
2009, 46(3): 521-527.
Abstract PDF