• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

Secure Information Flow in Java by Optimized Reachability Analysis of Weighted Pushdown System
Sun Cong, Tang Liyong, Chen Zhong, Ma Jianfeng
2012, 49(5): 901-912.
Abstract PDF
A QI Weight-Aware Approach to Privacy Preserving Publishing Data Set
Xu Yong, Qin Xiaolin, Yang Yitao, Yang Zhongxue, Huang Can
2012, 49(5): 913-924.
Abstract PDF
Construction of Transformation Matrix with a Given Period Modulo N
Liu Duo, Dai Yiqi
2012, 49(5): 925-931.
Abstract PDF
Two Identity Based Threshold Cryptosystem with Reduced Trust in PKG
Long Yu, Xu Xian, Chen Kefei
2012, 49(5): 932-938.
Abstract PDF
Trusted Intra-Domain Fast Authentication Protocol Based on Split Mechanism Network
Zheng Lijuan, Han Zhen
2012, 49(5): 939-948.
Abstract PDF
Research on Unknown Malicious Code Automatic Detection Based on Space Relevance Features
Li Peng, Wang Ruchuan, Wu Ning
2012, 49(5): 949-957.
Abstract PDF
Security Analysis of an RFID Protocol Based on Insubvertible Encryption
Wei Yongzhuang, Ouyang Ning, Ma Chunbo
2012, 49(5): 958-961.
Abstract PDF
A Group Proxy Signature Scheme Based on Sub-Secret Evolution
Gu Ke, Jia Weijia, Jiang Chunlin
2012, 49(5): 962-973.
Abstract PDF
Intrusion Detection System Using CVM Algorithm with Extensive Kernel Methods
Wang Qi'an and Chen Bing
2012, 49(5): 974-982.
Abstract PDF
A Method of Disjoint Quantitative Analysis for Dynamic Fault Tree
Zhang Honglin, Zhang Chunyuan, Liu Dong, Fu Jian
2012, 49(5): 983-995.
Abstract PDF
XenRPC:Design and Implementation of Security VM Remote Procedure Call
Chen Hao, Peng Cuifen, Sun Jianhua, and Shi Lin
2012, 49(5): 996-1004.
Abstract PDF
A Division Based Composite Service Selection Approach
Zhang Mingwei, Zhang Bin, Zhang Xizhe, Zhu Zhiliang
2012, 49(5): 1005-1017.
Abstract PDF
Energy-Aware Scheduling of Hard Real-Time Tasks in VFD-Based Multi-Core Systems
Wu Xiaodong, Han Jianjun, Wang Tianjiang
2012, 49(5): 1018-1027.
Abstract PDF
A Dependability Evaluation Model for Internetware Based on Bayesian Network
Si Guannan, Ren Yuhan, Xu Jing, and Yang Jufeng
2012, 49(5): 1028-1038.
Abstract PDF
Automated Test Data Generation Using Evolutionary Algorithm Based on Maintaining Population Diversity
Wang Jianmin and Cai Yuan
2012, 49(5): 1039-1048.
Abstract PDF
A Cache Replacement Policy Based on Reuse Distance Prediction and Stream Detection
Lin Junmin, Wang Wei, Qiao Lin, and Tang Zhizhong
2012, 49(5): 1049-1060.
Abstract PDF
A Bus Arbitration Scheme for Memory Access Performance Optimization
Liu Dan, Feng Yi, Tong Dong, Cheng Xu, and Wang Keyi
2012, 49(5): 1061-1071.
Abstract PDF
Anaphoricity Determination for Coreference Resolution in English and Chinese Languages
Kong Fang, Zhu Qiaoming, and Zhou Guodong
2012, 49(5): 1072-1085.
Abstract PDF
Double Center Particle Swarm Optimization Algorithm
Tang Kezong, Liu Bingxiang, Yang Jingyu, Sun Tingkai
2012, 49(5): 1086-1094.
Abstract PDF
Privacy-Preserving Data Publication for Clustering
Ni Weiwei, Chen Geng, Chong Zhihong, Wu Yingjie
2012, 49(5): 1095-1104.
Abstract PDF
Frequent Patterns Mining over Uncertain Data Streams Based on Probability Decay Window Model
Liao Guoqiong, Wu Lingqin, Wan Changxuan
2012, 49(5): 1105-1115.
Abstract PDF
Piecewise Linear Approximation of Rational Triangular Surfaces
Zhou Lian, Wang Guojin
2012, 49(5): 1116-1122.
Abstract PDF
A Data-Clustering Based Robust SIFT Feature Matching Method
Fan Zhiqiang and Zhao Qinping
2012, 49(5): 1123-1129.
Abstract PDF
A Distributed Parallel Algorithm for SIFT Feature Extraction
Jiang Guiyuan, Zhang Guiling, and Zhang Dakun
2012, 49(5): 1130-1141.
Abstract PDF
Two Novel Directional Filter Banks with Diamond Structure for Fingerprint Enhancement
Cai Xiumei, Fan Jiulun
2012, 49(5): 1142-1148.
Abstract PDF