Advanced Search

    column
    A Network Security Situational Awareness Model Based on Information Fusion
    Wei Yong, Lian Yifeng, and Feng Dengguo
    2009, 46(3): 353-362.
    Abstract PDF
    Study of Mobile Agent Protection Based on Data Obfuscation and Time Checking
    Wu Jiehong, Chang Guiran, Gao Fuxiang, Yin Hang
    2009, 46(3): 363-369.
    Abstract PDF
    Power Analysis Attacks Against AES Based on Maximal Bias Signal
    Liu Zhenglin, Han Yu, Zou Xuecheng, and ChenYicheng
    2009, 46(3): 370-376.
    Abstract PDF
    A DPA and HO-DPA Resistant Implementation of AES
    Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi
    2009, 46(3): 377-383.
    Abstract PDF
    A Traitor Tracing Scheme Based on Bilinear Map
    Wang Qinglong, Han Zhen, Yang Bo
    2009, 46(3): 384-389.
    Abstract PDF
    A Time Model for Complex Event in InforSIB
    Liu Jiahong, Wu Quanyuan, Gan Liang, Zhang Bing
    2009, 46(3): 390-397.
    Abstract PDF
    A Cooperative Monitoring Model of Migrating Workflow
    Lu Zhaoxia, Zeng Guangzhou
    2009, 46(3): 398-406.
    Abstract PDF
    Internet Traffic Classification Using Support Vector Machine
    Xu Peng, Liu Qiong, and Lin Sen
    2009, 46(3): 407-414.
    Abstract PDF
    A Structured Peer to Peer File Sharing Model with Non-DHT Searching Algorithm
    Xiong Wei, Xie Dongqing, Jiao Bingwang, Liu Jie
    2009, 46(3): 415-424.
    Abstract PDF
    A Distributed Anchor-Free Localization Algorithm in Sensor Networks
    Cui Xunxue, Liu Jianjun, Fan Xiumei
    2009, 46(3): 425-433.
    Abstract PDF
    Traffic Prediction Models of Traffics at Application Layer in Metro Area Network
    Yuan Xiaofang, Chen Nannan, Wang Dong, Xie Gaogang, Zhang Dafang
    2009, 46(3): 434.
    Abstract PDF
    An Ontology Learning Method Based on Double VSM and Fuzzy FCA
    Xing Jun, Han Min
    2009, 46(3): 443-451.
    Abstract PDF
    Study of an Epistemic Description Logic with Transitive Roles
    Cao Yi, Xu Dezhi, Chen Jianer, and Guan Qinghua
    2009, 46(3): 452-458.
    Abstract PDF
    Model Counting and Planning Using Extension Rule
    Lai Yong, Ouyang Dantong, Cai Dunbo, and Lü Shuai
    2009, 46(3): 459-469.
    Abstract PDF
    Integration of Multiple Fuzzy Decision Trees Based on Fuzzy Integral
    Zhai Junhai, Wang Xizhao, Zhang Sufang
    2009, 46(3): 470-477.
    Abstract PDF
    An Affine-Invariant Objects Recognition Method Employing Features in Frequency Domain
    Lü Wenxian, Peng Qimin, Lü Yuzeng, Li Jun
    2009, 46(3): 478-484.
    Abstract PDF
    A Register Pressure Sensitive Instruction Speculative Scheduling Technology
    Huang Lei, Feng Xiaobing, and Lü Fang
    2009, 46(3): 485-491.
    Abstract PDF
    A Mapping Algorithm for Replicated Data in LargeScale Storage System
    Mu Fei, Xue Wei, Shu Jiwu, and Zheng Weimin
    2009, 46(3): 492-497.
    Abstract PDF
    A Privacy-Preserving Data Perturbation Algorithm Based on Neighborhood Entropy
    Ni Weiwei, Xu Lizhen, Chong Zhihong, Wu Yingjie, Liu Tengteng, and Sun Zhihui
    2009, 46(3): 498-504.
    Abstract PDF
    A Dynamic-Fit Heuristic Algorithm for the Rectangular Strip Packing Problem
    Jiang Xingbo, Lü Xiaoqing, Liu Chengcheng, Li Monan
    2009, 46(3): 505-512.
    Abstract PDF
    Equivalence Verification of High-Level Datapaths Based on Polynomial Symbolic Algebra
    Yang Zhi, Ma Guangsheng, Zhang Shu
    2009, 46(3): 513-520.
    Abstract PDF
    Segmentation of Brain MR Images Based on the Measurement of Difference of Mutual Information and Gauss-Markov Random Field Model
    Wang Wenhui, Feng Qianjin, Chen Wufan
    2009, 46(3): 521-527.
    Abstract PDF