Advanced Search

    column
    Research on Countermeasures Against Tag Spam
    Wang Yonggang, Yan Hanbing, Xu Junfeng, Hu Jianbin, Chen Zhong
    2013, 50(10): 2029-2043.
    Abstract PDF
    Protocol Reverse Engineering Using Grammatical Inference
    Xiao Mingming, Yu Shunzheng
    2013, 50(10): 2044-2058.
    Abstract PDF
    Variable-Width Channel Allocation Based on Game Theory in 802.11 Networks
    Huang Tingpei, Chen Haiming, Zhang Zhaoliang, Cui Li
    2013, 50(10): 2059-2069.
    Abstract PDF
    An Efficient Property-Based Attestation Scheme with Flexible Checking Mechanisms of Property Certificate Status
    Zhou Fucai, Yue Xiaohan, Bai Hongbo, Xu Jian
    2013, 50(10): 2070-2081.
    Abstract PDF
    A Practical Dynamic Integrity Protection Model
    Yang Tao, Wang Yonggang, Tang Liyong, Kong Lingbo, Hu Jianbin, Chen Zhong
    2013, 50(10): 2082-2091.
    Abstract PDF
    Cryptanalysis and Modification of a Traitor Tracing Scheme
    Wang Xiaoming, Yao Guoxiang, and Liao Zhiwei
    2013, 50(10): 2092-2099.
    Abstract PDF
    Artificial-Neural-Network-Based DDoS Defense Effectiveness Evaluation
    Huang Liang, Feng Dengguo, Lian Yifeng, Chen Kai
    2013, 50(10): 2100-2108.
    Abstract PDF
    M-IBE Based Key Management Protocol for Heterogeneous Sensor Networks
    Ma Chunguang, Wang Jiuru, Wu Peng, Zhang Hua
    2013, 50(10): 2109-2116.
    Abstract PDF
    Integral Attack of Reduced-Round MIBS Block Cipher
    Yu Xiaoli, Wu Wenling, Li Yanjun
    2013, 50(10): 2117-2125.
    Abstract PDF
    Performance Evaluation of Cognitive Radio Networks with Parallel Channels
    Chen Xin, Xu Tong, Xiang Xudong, Wan Jianxiong
    2013, 50(10): 2126-2132.
    Abstract PDF
    Attack Graph Generation Algorithm for Large-Scale Network System
    Ye Yun, Xu Xishan, Qi Zhichang, Wu Xueyang
    2013, 50(10): 2133-2139.
    Abstract PDF
    Community Mining in Complex Networks
    Liu Dayou, Jin Di, He Dongxiao, Huang Jing, Yang Jianning, Yang Bo
    2013, 50(10): 2140-2154.
    Abstract PDF
    Topical Influence Analysis Based on the Multi-Relational Network in Microblogs
    Ding Zhaoyun, Zhou Bin, Jia Yan, Zhang Lumin
    2013, 50(10): 2155-2175.
    Abstract PDF
    An Optimized Dyna Architecture Algorithm with Prioritized Sweeping
    Sun Hongkun, Liu Quan, Fu Qiming, Xiao Fei, Gao Long
    2013, 50(10): 2176-2184.
    Abstract PDF
    Context-Aware Recommendation Algorithm Based on Fuzzy C-Means Clustering
    Zhang Fuzhi, Chang Junfeng, and Zhou Quanqiang
    2013, 50(10): 2185-2194.
    Abstract PDF
    Identifying the Influential Users in Network Forum
    Zhang Yue, Zhang Hongli, Zhang Weizhe, and Lu Junjia
    2013, 50(10): 2195-2205.
    Abstract PDF
    A Running Pattern Generation Based on ZMP for Humanoid Robot
    Wang Xianfeng, Li Jianping,and Wang Hui
    2013, 50(10): 2206-2211.
    Abstract PDF
    Survey on Partitioning and Scheduling Policies of Shared Resources in Chip-Multiprocessor
    Wang Lei, Liu Daofu, Chen Yunji, Chen Tianshi, Li Ling
    2013, 50(10): 2212-2227.
    Abstract PDF
    Study of Ahead Branch Prediction Architecture and Algorithm
    Jin Wenbing, Shi Feng, Zuo Qi, Zhang Yang
    2013, 50(10): 2228-2238.
    Abstract PDF
    A High-Performance Variable-Length Instruction Issue Mechanism Based on VLIW Architecture
    Yang Hui and Chen Shuming
    2013, 50(10): 2239-2246.
    Abstract PDF
    Memory Virtulization on MIPS Architecture
    Cai Wanwei, Tai Yunfang, Liu Qi, Zhang Ge
    2013, 50(10): 2247-2252.
    Abstract PDF