中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 17)

Filters    
Items/Page:    Sort:
attacking the dimensionality problem of parameterized systems via bounded reachability graphs [会议论文]
4th IPM International Conference on Fundamentals of Software Engineering, FSEN 2011, Tehran, Iran, April 20, 2011 - April 22, 2011
Yang Qiusong; Zhang Bei; Zhai Jian; Li Mingshu

 
derivatives of regular expressions and an application [会议论文]
International Workshop on Theoretical Computer Science, WTCS 2012, Auckland, New zealand, February 21, 2012 - February 24, 2012
Chen Haiming; Yu Sheng

 
principles of network computing [会议论文]
9th Annual Conference on Theory and Applications of Models of Computation, TAMC 2012, Beijing, China, May 16, 2012 - May 21, 2012
Pan Yicheng

 
runtime verification of data-centric properties in service based systems [会议论文]
2nd International Conference on Runtime Verification, RV 2011, San Francisco, CA, United states, September 27, 2011 - September 30, 2011
Wu Guoquan; Wei Jun; Ye Chunyang; Shao Xiaozhe; Zhong Hua; Huang Tao

 
toward real-life implementation of signature schemes from the strong rsa assumption [会议论文]
15th International Conference on Financial Cryptography and Data Security, FC 2011, St. Lucia, QLD, Australia, February 28, 2011 - March 4, 2011
Yu Ping; Xue Rui

 
biclique cryptanalysis of reduced-round piccolo block cipher [会议论文]
8th International Conference on Information Security Practice and Experience, ISPEC 2012, Hangzhou, China, April 9, 2012 - April 12, 2012
Wang Yanfeng; Wu Wenling; Yu Xiaoli

 
a simulation approach for impact analysis of requirement volatility considering dependency change [会议论文]
18th Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2012, Essen, Germany, March 19, 2012 - March 22, 2012
Wang Junjie; Li Juan; Wang Qing; Zhang He; Wang Haitao

 
analysis of telephone call detail records based on fuzzy decision tree [会议论文]
3rd International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-Forensics 2010, Shanghai, China, November 1
Ding Liping; Gu Jian; Wang Yongji; Wu Jingzheng

 
improvement and analysis of vdp method in time/memory tradeoff applications [会议论文]
13th International Conference on Information and Communications Security, ICICS 2011, Beijing, China, November 2
Wang Wenhao; Lin Dongdai; Li Zhenqi; Wang Tianze

 
computational soundness about formal encryption in the presence of secret shares and key cycles [会议论文]
13th International Conference on Information and Communications Security, ICICS 2011, Beijing, China, November 2
Lei Xinfeng; Xue Rui; Yu Ting

 

1 2 next

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace