• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

Research on Countermeasures Against Tag Spam
Wang Yonggang, Yan Hanbing, Xu Junfeng, Hu Jianbin, Chen Zhong
2013, 50(10): 2029-2043.
Abstract PDF
Protocol Reverse Engineering Using Grammatical Inference
Xiao Mingming, Yu Shunzheng
2013, 50(10): 2044-2058.
Abstract PDF
Variable-Width Channel Allocation Based on Game Theory in 802.11 Networks
Huang Tingpei, Chen Haiming, Zhang Zhaoliang, Cui Li
2013, 50(10): 2059-2069.
Abstract PDF
An Efficient Property-Based Attestation Scheme with Flexible Checking Mechanisms of Property Certificate Status
Zhou Fucai, Yue Xiaohan, Bai Hongbo, Xu Jian
2013, 50(10): 2070-2081.
Abstract PDF
A Practical Dynamic Integrity Protection Model
Yang Tao, Wang Yonggang, Tang Liyong, Kong Lingbo, Hu Jianbin, Chen Zhong
2013, 50(10): 2082-2091.
Abstract PDF
Cryptanalysis and Modification of a Traitor Tracing Scheme
Wang Xiaoming, Yao Guoxiang, and Liao Zhiwei
2013, 50(10): 2092-2099.
Abstract PDF
Artificial-Neural-Network-Based DDoS Defense Effectiveness Evaluation
Huang Liang, Feng Dengguo, Lian Yifeng, Chen Kai
2013, 50(10): 2100-2108.
Abstract PDF
M-IBE Based Key Management Protocol for Heterogeneous Sensor Networks
Ma Chunguang, Wang Jiuru, Wu Peng, Zhang Hua
2013, 50(10): 2109-2116.
Abstract PDF
Integral Attack of Reduced-Round MIBS Block Cipher
Yu Xiaoli, Wu Wenling, Li Yanjun
2013, 50(10): 2117-2125.
Abstract PDF
Performance Evaluation of Cognitive Radio Networks with Parallel Channels
Chen Xin, Xu Tong, Xiang Xudong, Wan Jianxiong
2013, 50(10): 2126-2132.
Abstract PDF
Attack Graph Generation Algorithm for Large-Scale Network System
Ye Yun, Xu Xishan, Qi Zhichang, Wu Xueyang
2013, 50(10): 2133-2139.
Abstract PDF
Community Mining in Complex Networks
Liu Dayou, Jin Di, He Dongxiao, Huang Jing, Yang Jianning, Yang Bo
2013, 50(10): 2140-2154.
Abstract PDF
Topical Influence Analysis Based on the Multi-Relational Network in Microblogs
Ding Zhaoyun, Zhou Bin, Jia Yan, Zhang Lumin
2013, 50(10): 2155-2175.
Abstract PDF
An Optimized Dyna Architecture Algorithm with Prioritized Sweeping
Sun Hongkun, Liu Quan, Fu Qiming, Xiao Fei, Gao Long
2013, 50(10): 2176-2184.
Abstract PDF
Context-Aware Recommendation Algorithm Based on Fuzzy C-Means Clustering
Zhang Fuzhi, Chang Junfeng, and Zhou Quanqiang
2013, 50(10): 2185-2194.
Abstract PDF
Identifying the Influential Users in Network Forum
Zhang Yue, Zhang Hongli, Zhang Weizhe, and Lu Junjia
2013, 50(10): 2195-2205.
Abstract PDF
A Running Pattern Generation Based on ZMP for Humanoid Robot
Wang Xianfeng, Li Jianping,and Wang Hui
2013, 50(10): 2206-2211.
Abstract PDF
Survey on Partitioning and Scheduling Policies of Shared Resources in Chip-Multiprocessor
Wang Lei, Liu Daofu, Chen Yunji, Chen Tianshi, Li Ling
2013, 50(10): 2212-2227.
Abstract PDF
Study of Ahead Branch Prediction Architecture and Algorithm
Jin Wenbing, Shi Feng, Zuo Qi, Zhang Yang
2013, 50(10): 2228-2238.
Abstract PDF
A High-Performance Variable-Length Instruction Issue Mechanism Based on VLIW Architecture
Yang Hui and Chen Shuming
2013, 50(10): 2239-2246.
Abstract PDF
Memory Virtulization on MIPS Architecture
Cai Wanwei, Tai Yunfang, Liu Qi, Zhang Ge
2013, 50(10): 2247-2252.
Abstract PDF