中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 31-40 of 186)

Filters        
Items/Page:    Sort:
a vickrey-type multi-attribute auction model [会议论文]
4th International Conference on Machine Learning and Cybernetics, Guangzhou, PEOPLES R CHINA, AUG 18-21,
Chen Xiang; Hu Shan-li
  |  
 
a process-agent construction method for software process modeling in softpm [会议论文]
1st Joint Conference of the Software Process Workshop/International Workshop on Software Process Simulation and Modeling (SPW/ProSim 2006), Shanghai, PEOPLES R CHINA, MAY 20-21,
Wang Qing; Xiao Junchao; Li Mingshu; Nisar M. Wasif; Yuan Rong; Zhang Lei
  |  
 
certificateless public-key signature: security model and efficient construction [会议论文]
4th International Conference on Applied Cryptography and Network Security, Singapore, SINGAPORE, JUN 06-09,
Zhang Zhenfeng; Wong Duncan S.; Xu Jing; Feng Dengguo
  |  
 
an improved poly1305 mac [会议论文]
4th International Conference on Applied Cryptography and Network Security, Singapore, SINGAPORE, JUN 06-09,
Wang Dayin; Lin Dongdai; Wu Wenling
  |  
 
applying little-jil to describe process-agent knowledge in softpm [会议论文]
1st Joint Conference of the Software Process Workshop/International Workshop on Software Process Simulation and Modeling (SPW/ProSim 2006), Shanghai, PEOPLES R CHINA, MAY 20-21,
Xiao Junchao; Osterweil Leon J.; Zhang Lei; Wise Alexander; Wang Qing
  |  
 
integral cryptanalysis of reduced fox block cipher [会议论文]
8th International Conference on Information Security an Cryptology (ICISC 2005), Seoul, SOUTH KOREA, DEC 01-02,
Wu Wenling; Zhang Wentao; Feng Dengguo
  |  
 
study of neural networks for electric power load forecasting [会议论文]
3rd International Symposium on Neural Networks (ISNN 2006), Chengdu, PEOPLES R CHINA, MAY 28-31,
Wang Hui; Li Bao-Sen; Han Xin-Yang; Wang Dan-Li; Jin Hong
  |  
 
high performance soap processing driven by data mapping template [会议论文]
6th International Conference on Distributed Applications and Interoperable Systems, Bologna, ITALY, JUN 14-16,
Jun Wei; Lei Hua; Niu Chunlei; Zheng Haoran
  |  
 
key replacement attack against a generic construction of certificateless signature [会议论文]
11th Australasian Conference on Information Security and Privacy, Melbourne, AUSTRALIA, JUL 03-05,
Hu Bessie C.; Wong Duncan S.; Zhang Zhenfeng; Deng Xiaotie
  |  
 
using a neural networking method to predict the protein phosphorylation sites with specific kinase [会议论文]
3rd International Symposium on Neural Networks (ISNN 2006), Chengdu, PEOPLES R CHINA, MAY 28-31,
Zhang Kunpeng; Xu Yun; Shen Yifei; Chen Guoliang
  |  
 

previous 1 2 3 4 5 6 7 8 9 10 11 12 13 next

 

Valid XHTML 1.0!
Copyright © 2007-2020  中国科学院软件研究所 - Feedback
Powered by CSpace