Advanced Search

    column
    Cache Attacks on Block Ciphers
    Zhao Xinjie, Wang Tao, Guo Shize, Liu Huiying
    2012, 49(3): 453-468.
    Abstract PDF
    Cache Attacks on Block Ciphers
    Zhao Xinjie, Wang Tao, Guo Shize, Liu Huiying
    2012, 49(3): 453-468.
    Abstract PDF
    A Survey of CAPTCHA Technology
    Li Qiujie, Mao Yaobin, and Wang Zhiquan
    2012, 49(3): 469-480.
    Abstract PDF
    IRC Botnets’ Homology Identifying Method Based on Dynamic Time Warping Distance of Communication Feature Curves
    Jin Xin, Li Runheng, Gan Liang, Li Zhengyi
    2012, 49(3): 481-490.
    Abstract PDF
    A DPA Resistant Technology Based on Register Switching Time Randomization
    Yue Daheng, Qi Shubo, Li Shaoqing, and Zhang Minxuan
    2012, 49(3): 491-498.
    Abstract PDF
    A Multi-Policies Threshold Signature Scheme with Group Verifiability
    Wang Feng, Zhou Yousheng, Gu Lize, Yang Yixian
    2012, 49(3): 499-505.
    Abstract PDF
    EasiTest: A Multi-Radio Testbed for Heterogeneous Wireless Sensor Networks
    Zhao Ze, Liu Qiang, Li Dong, and Cui Li
    2012, 49(3): 506-517.
    Abstract PDF
    An Architecture of Mobile Delay Tolerant Networks and Its Application
    Zhou Xinyun, Li Zhi, Li Liqun, Sun Limin
    2012, 49(3): 518-528.
    Abstract PDF
    A Distributed Planar t-Spanner Topology Control Algorithm in Wireless Sensor Networks
    Chen Zhigang, Xu Pengfei, Deng Xiaoheng
    2012, 49(3): 529-540.
    Abstract PDF
    Design of Mobile Sink Node for SDMA Applications in WSN
    Zhang Xiwei, Chen Guihai
    2012, 49(3): 541-549.
    Abstract PDF
    Survivability Research on the Impact of Node Failure in MANET
    Ma Chi, Li Zhi, Zhang Hong, and Liu Fengyu
    2012, 49(3): 550-557.
    Abstract PDF
    Environment-Aware Quantitative Assessment Model for Service Availability in MANET
    Wang Wenbin, Sun Qibo, and Yang Fangchun
    2012, 49(3): 558-564.
    Abstract PDF
    An Interpolation Method Using an Improved Markov Model
    Du Yi, Zhang Ting, Lu Detang, Li Daolun
    2012, 49(3): 565-571.
    Abstract PDF
    A PSVM-Based Active Learning Method for Mass Detection
    Wang Ying, Gao Xinbo, Li Jie, and Wang Xiumei
    2012, 49(3): 572-578.
    Abstract PDF
    CSMP: Compressive Sensing Matching Pursuit Based on Restricted Isometry Property
    Xie Zhipeng, Chen Songcan
    2012, 49(3): 579-588.
    Abstract PDF
    Multi-resolution Data Storage Method for Region Query in Sensor Networks
    Ning Zhao, Shi Shengfei, Li Jianzhong, Wang Chaokun
    2012, 49(3): 589-597.
    Abstract PDF
    An Incremental Method for Mining Generalized Association Rules Based on Extended Canonical-Order Tree
    Mao Yuxing and Shi Baile
    2012, 49(3): 598-606.
    Abstract PDF
    Logical Encoding Methods in Intelligent Planning
    Lü Shuai, Liu Lei, Wei Wei, and Gao Bingbing
    2012, 49(3): 607-619.
    Abstract PDF
    An Ant Colony Optimization Algorithm Based on Dynamic Evaporation Rate and Amended Heuristic
    Liu Quan, Chen Hao, Zhang Yonggang, Li Jiao, Zhang Shenbin
    2012, 49(3): 620-627.
    Abstract PDF
    Structured Ensemble Learning for Email Spam Filtering
    Liu Wuying, Wang Ting
    2012, 49(3): 628-635.
    Abstract PDF
    Logical Volume High Performance Snapshot Based on Out-of-Band Storage Virtualization
    Zhou Wei, Tan Huailiang, Yi Letian, Shu Jiwu
    2012, 49(3): 636-645.
    Abstract PDF
    Dynamic Reconfiguration in Reconfigurable System-on-Chip Design Flow
    Chen Yu, Li Renfa, Zhu Hai, and Yuan Hu
    2012, 49(3): 646-660.
    Abstract PDF
    Fast and Live Whole-System Migration of Virtual Machines
    Zhang Xiang, Huo Zhigang, Ma Jie, Meng Dan
    2012, 49(3): 661-668.
    Abstract PDF
    A High-Speed Delay-Independent Synchronous to Asynchronous Interface
    Peng Yao, Yang Yintang, Zhu Zhangming, Zhou Duan
    2012, 49(3): 669-678.
    Abstract PDF