Advanced Search

    column
    Advances in the Component Verification Technology Based on Model Checking
    Jia Yangli, Li Zhoujun, Xing Jianying, Chen Shikun
    2011, 48(6): 913-922.
    Abstract PDF
    Survey of Software Tamper Proofing Technique
    Wang Chaokun, Fu Junning, Wang Jianmin, Yu Zhiwei
    2011, 48(6): 923-933.
    Abstract PDF
    Trust Evaluation Model Based on Node Behavior Character
    Tian Junfeng, Du Ruizhong, Liu Yuling
    2011, 48(6): 934-944.
    Abstract PDF
    A Hierarchical Evaluation Approach for Network Security Based on Threat Spread Model
    Chen Feng, Liu Dehui, Zhang Yi, Su Jishu
    2011, 48(6): 945-954.
    Abstract PDF
    Cache Based AES Attack Implementation and Its Theoretical Analysis
    Zhang Suiyu, Han Jun, Lu Shiting, and Zeng Xiaoyang
    2011, 48(6): 955-963.
    Abstract PDF
    Filtering Intrusion Forensic Data Based on Attack Signatures
    Fu Xiao, Xie Li
    2011, 48(6): 964-973.
    Abstract PDF
    A Fine-Grain Trust Model Based on Domain and Bayesian Network for P2P E-Commerce System
    Tian Junfeng and Tian Rui
    2011, 48(6): 974-982.
    Abstract PDF
    An Environment-Adaptive Role-Based Access Control Model
    Wu Xinsong, He Yeping, Zhou Zhouyi, Liang Hongliang
    2011, 48(6): 983-990.
    Abstract PDF
    A Congestion Aware Routing Protocol Based on Network Coding in Wireless Sensor Networks
    Fu Bin, Li Renfa, Liu Caiping, and Xiao Xiongren
    2011, 48(6): 991-999.
    Abstract PDF
    CAMR: Network Coding-Aware Multicast Routing Protocol in Wireless Mesh Networks
    Huang Chuanhe, Yang Wenzhong, Wang Bo, Zhang Zhenyu, Xu Liya
    2011, 48(6): 1000-1009.
    Abstract PDF
    An Identification Method Combining Data Streaming Counting with Probabilistic Fading for Heavy-Hitter Flows
    Li Zhen, Yang Yahui, Xie Gaogang, Qin Guangcheng
    2011, 48(6): 1010-1017.
    Abstract PDF
    Collaborative Classification Mechanism for Privacy-Preserving
    Zhang Zhancheng, Wang Shitong, Fu-Lai Chung
    2011, 48(6): 1018-1028.
    Abstract PDF
    A Feature Selection Method for TWSVM via a Regularization Technique
    Ye Qiaolin, Zhao Chunxia, and Chen Xiaobo
    2011, 48(6): 1029-1037.
    Abstract PDF
    Maximum Entropy Relief Feature Weighting
    Zhang Xiang, Deng Zhaohong, Wang Shitong, Choi Kupsze
    2011, 48(6): 1038-1048.
    Abstract PDF
    Uniform Design and Reconstructive BLX-α Based Scatter Search for Continuous Optimization Problem
    Fan Tiehu, Qin Guihe, Zhao Qi
    2011, 48(6): 1049-1058.
    Abstract PDF
    QoS-Aware Semantic Web Service Modeling and Discovery
    Wan Changlin, Shi Zhongzhi, Hu Hong, Zhang Dapeng
    2011, 48(6): 1059-1066.
    Abstract PDF
    The Translation Mining of the Out of Vocabulary Based on Wikipedia
    Sun Changlong, Hong Yu, Ge Yundong, Yao Jianmin, and Zhu Qiaoming
    2011, 48(6): 1067-1076.
    Abstract PDF
    An Efficient Ontology Ranking Algorithm—MIDSRank
    Zhang Zhiqiang, Song Weitao, Xie Xiaoqin
    2011, 48(6): 1077-1088.
    Abstract PDF
    A Tiered Storage System for Massive Data: TH-TS
    Ao Li, Yu Deshui, Shu Jiwu, Xue Wei
    2011, 48(6): 1089-1100.
    Abstract PDF
    An Optimal Storage Strategy for Static Path Labeling Scheme
    Chen Ziyang and Zhou Junfeng
    2011, 48(6): 1101-1108.
    Abstract PDF