中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
软件所图书馆 [37]
基础软件国家工程研... [17]
信息安全国家重点实验... [9]
计算机科学国家重点实... [7]
并行计算实验室 [6]
更多...
作者
王俊杰 [1]
Content Type
期刊论文 [46]
会议论文 [33]
Issued Date
Language
英语 [37]
Source
lecture n... [17]
journal o... [10]
science in... [9]
science in... [4]
lecture no... [3]
更多...
Project
Indexed
SPRINGER [52]
EI [30]
SCI [17]
ISTP [14]
SPRINGER,... [14]
更多...
Spnsorship
ieee compu... [2]
ieee compu... [2]
national n... [2]
united nat... [2]
beijing in... [1]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 11-20 of 79)
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
a simulation approach for impact analysis of requirement volatility considering dependency change
[会议论文]
18th Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2012, Essen, Germany, March 19, 2012 - March 22, 2012
Wang, JunJie(王俊杰)
;
Li Juan
;
Wang Qing
;
Zhang He
;
Wang Haitao
efficient loop-extended model checking of data structure methods
[会议论文]
Software Engineering, Business Continuity, and Education International Conferences ASEA, DRBC and EL 2011, Jeju Island, Korea, Republic of, FGIT 2011
Yi Qiuping
;
Liu Jian
;
Shen Wuwei
the initialization stage analysis of zuc v1.5
[会议论文]
Cryptology and Network Security 10th International Conference, CANS 2011, Sanya China, 2011
Zhou Chunfang
;
Feng Xiutao
;
Lin Dongdai
efficient pairing computation on ordinary elliptic curves of embedding degree 1 and 2
[会议论文]
Cryptography and Coding 13th IMA International Conference, IMACC 2011, Oxford UK, 2011
Zhang Xusheng
;
Lin Dongdai
analysis of telephone call detail records based on fuzzy decision tree
[会议论文]
3rd International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-Forensics 2010, Shanghai, China, November 1
Ding Liping
;
Gu Jian
;
Wang Yongji
;
Wu Jingzheng
improvement and analysis of vdp method in time/memory tradeoff applications
[会议论文]
13th International Conference on Information and Communications Security, ICICS 2011, Beijing, China, November 2
Wang Wenhao
;
Lin Dongdai
;
Li Zhenqi
;
Wang Tianze
computational soundness about formal encryption in the presence of secret shares and key cycles
[会议论文]
13th International Conference on Information and Communications Security, ICICS 2011, Beijing, China, November 2
Lei Xinfeng
;
Xue Rui
;
Yu Ting
updating preconditioner for iterative method in time domain simulation of power systems
[期刊论文]
Science China Technological Sciences, 2011-01-01, 卷号: 54, 期号: 4, 页码: 1024-1034
Wang Ke
;
Xue Wei
;
Lin Haixiang
;
Xu Shiming
;
Zheng Weimin
  |  
zero-knowledge argument for simultaneous discrete logarithms
[会议论文]
16th Annual International Computing and Combinatorics Conference, COCOON 2010, Nha Trang, Viet nam, 37456
Chow Sherman S. M.
;
Ma Changshe
;
Weng Jian
  |  
transmission scheduling for multi-homed transport protocols with network failure tolerance
[期刊论文]
Telecommunication Systems, 2010-01-01, 卷号: 43, 期号: 1, 页码: 39-48
Yuansong Qiao
;
Enda Fallon
;
John Murphy
;
Liam Murphy
;
Shi Zhiqiang
;
Austin Hanley
  |  
previous
1
2
3
4
5
6
7
8
next
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace