• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

Cache Attacks on Block Ciphers
Zhao Xinjie, Wang Tao, Guo Shize, Liu Huiying
2012, 49(3): 453-468.
Abstract PDF
Cache Attacks on Block Ciphers
Zhao Xinjie, Wang Tao, Guo Shize, Liu Huiying
2012, 49(3): 453-468.
Abstract PDF
A Survey of CAPTCHA Technology
Li Qiujie, Mao Yaobin, and Wang Zhiquan
2012, 49(3): 469-480.
Abstract PDF
IRC Botnets’ Homology Identifying Method Based on Dynamic Time Warping Distance of Communication Feature Curves
Jin Xin, Li Runheng, Gan Liang, Li Zhengyi
2012, 49(3): 481-490.
Abstract PDF
A DPA Resistant Technology Based on Register Switching Time Randomization
Yue Daheng, Qi Shubo, Li Shaoqing, and Zhang Minxuan
2012, 49(3): 491-498.
Abstract PDF
A Multi-Policies Threshold Signature Scheme with Group Verifiability
Wang Feng, Zhou Yousheng, Gu Lize, Yang Yixian
2012, 49(3): 499-505.
Abstract PDF
EasiTest: A Multi-Radio Testbed for Heterogeneous Wireless Sensor Networks
Zhao Ze, Liu Qiang, Li Dong, and Cui Li
2012, 49(3): 506-517.
Abstract PDF
An Architecture of Mobile Delay Tolerant Networks and Its Application
Zhou Xinyun, Li Zhi, Li Liqun, Sun Limin
2012, 49(3): 518-528.
Abstract PDF
A Distributed Planar t-Spanner Topology Control Algorithm in Wireless Sensor Networks
Chen Zhigang, Xu Pengfei, Deng Xiaoheng
2012, 49(3): 529-540.
Abstract PDF
Design of Mobile Sink Node for SDMA Applications in WSN
Zhang Xiwei, Chen Guihai
2012, 49(3): 541-549.
Abstract PDF
Survivability Research on the Impact of Node Failure in MANET
Ma Chi, Li Zhi, Zhang Hong, and Liu Fengyu
2012, 49(3): 550-557.
Abstract PDF
Environment-Aware Quantitative Assessment Model for Service Availability in MANET
Wang Wenbin, Sun Qibo, and Yang Fangchun
2012, 49(3): 558-564.
Abstract PDF
An Interpolation Method Using an Improved Markov Model
Du Yi, Zhang Ting, Lu Detang, Li Daolun
2012, 49(3): 565-571.
Abstract PDF
A PSVM-Based Active Learning Method for Mass Detection
Wang Ying, Gao Xinbo, Li Jie, and Wang Xiumei
2012, 49(3): 572-578.
Abstract PDF
CSMP: Compressive Sensing Matching Pursuit Based on Restricted Isometry Property
Xie Zhipeng, Chen Songcan
2012, 49(3): 579-588.
Abstract PDF
Multi-resolution Data Storage Method for Region Query in Sensor Networks
Ning Zhao, Shi Shengfei, Li Jianzhong, Wang Chaokun
2012, 49(3): 589-597.
Abstract PDF
An Incremental Method for Mining Generalized Association Rules Based on Extended Canonical-Order Tree
Mao Yuxing and Shi Baile
2012, 49(3): 598-606.
Abstract PDF
Logical Encoding Methods in Intelligent Planning
Lü Shuai, Liu Lei, Wei Wei, and Gao Bingbing
2012, 49(3): 607-619.
Abstract PDF
An Ant Colony Optimization Algorithm Based on Dynamic Evaporation Rate and Amended Heuristic
Liu Quan, Chen Hao, Zhang Yonggang, Li Jiao, Zhang Shenbin
2012, 49(3): 620-627.
Abstract PDF
Structured Ensemble Learning for Email Spam Filtering
Liu Wuying, Wang Ting
2012, 49(3): 628-635.
Abstract PDF
Logical Volume High Performance Snapshot Based on Out-of-Band Storage Virtualization
Zhou Wei, Tan Huailiang, Yi Letian, Shu Jiwu
2012, 49(3): 636-645.
Abstract PDF
Dynamic Reconfiguration in Reconfigurable System-on-Chip Design Flow
Chen Yu, Li Renfa, Zhu Hai, and Yuan Hu
2012, 49(3): 646-660.
Abstract PDF
Fast and Live Whole-System Migration of Virtual Machines
Zhang Xiang, Huo Zhigang, Ma Jie, Meng Dan
2012, 49(3): 661-668.
Abstract PDF
A High-Speed Delay-Independent Synchronous to Asynchronous Interface
Peng Yao, Yang Yintang, Zhu Zhangming, Zhou Duan
2012, 49(3): 669-678.
Abstract PDF