中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
软件所图书馆 [30]
作者
王俊杰 [1]
Content Type
会议论文 [28]
期刊论文 [2]
Issued Date
Language
英语 [30]
Source
lecture n... [16]
lecture no... [3]
lecture no... [2]
computatio... [1]
computer n... [1]
更多...
Project
Indexed
EI [30]
Spnsorship
ieee compu... [2]
national n... [2]
united nat... [2]
beijing in... [1]
deakin uni... [1]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 1-10 of 30)
Filters
Indexed:EI
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
some improvements to the cost-based framework for analyzing denial of service attacks
[会议论文]
Trusted Systems Third International Conference, INTRUST 2011, Beijing China, 2011
Yue Qinggang
;
Liu Feng
;
Xue Rui
attacking the dimensionality problem of parameterized systems via bounded reachability graphs
[会议论文]
4th IPM International Conference on Fundamentals of Software Engineering, FSEN 2011, Tehran, Iran, April 20, 2011 - April 22, 2011
Yang Qiusong
;
Zhang Bei
;
Zhai Jian
;
Li Mingshu
a probabilistic variant of projection temporal logic
[会议论文]
Recent Advances in Computer Science and Information Engineering Volume 3, Changchun, China, June 17, 2011 - June 19, 2011
Yang Xiaoxiao
derivatives of regular expressions and an application
[会议论文]
International Workshop on Theoretical Computer Science, WTCS 2012, Auckland, New zealand, February 21, 2012 - February 24, 2012
Chen Haiming
;
Yu Sheng
principles of network computing
[会议论文]
9th Annual Conference on Theory and Applications of Models of Computation, TAMC 2012, Beijing, China, May 16, 2012 - May 21, 2012
Pan Yicheng
runtime verification of data-centric properties in service based systems
[会议论文]
2nd International Conference on Runtime Verification, RV 2011, San Francisco, CA, United states, September 27, 2011 - September 30, 2011
Wu Guoquan
;
Wei Jun
;
Ye Chunyang
;
Shao Xiaozhe
;
Zhong Hua
;
Huang Tao
toward real-life implementation of signature schemes from the strong rsa assumption
[会议论文]
15th International Conference on Financial Cryptography and Data Security, FC 2011, St. Lucia, QLD, Australia, February 28, 2011 - March 4, 2011
Yu Ping
;
Xue Rui
biclique cryptanalysis of reduced-round piccolo block cipher
[会议论文]
8th International Conference on Information Security Practice and Experience, ISPEC 2012, Hangzhou, China, April 9, 2012 - April 12, 2012
Wang Yanfeng
;
Wu Wenling
;
Yu Xiaoli
a simulation approach for impact analysis of requirement volatility considering dependency change
[会议论文]
18th Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2012, Essen, Germany, March 19, 2012 - March 22, 2012
Wang, JunJie(王俊杰)
;
Li Juan
;
Wang Qing
;
Zhang He
;
Wang Haitao
efficient loop-extended model checking of data structure methods
[会议论文]
Software Engineering, Business Continuity, and Education International Conferences ASEA, DRBC and EL 2011, Jeju Island, Korea, Republic of, FGIT 2011
Yi Qiuping
;
Liu Jian
;
Shen Wuwei
1
2
3
next
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace