中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 81-90 of 184)

Filters        
Items/Page:    Sort:
Type-based analysis of protected storage in the TPM [会议论文]
15th International Conference on Information and Communications Security, ICICS 2013, Beijing, China, November 20, 2013 - November 22, 2013
Shao, Jianxiong (1); Feng, Dengguo (1); Qin, Yu (1)

 
A study on software effort prediction using machine learning techniques [会议论文]
6th International Conference Evaluation of Novel Approaches to Software Engineering, ENASE 2011, Beijing, China, June 8, 2011 - June 11, 2011
Zhang, Wen (1); Yang, Ye (1); Wang, Qing (1)

 
Robust and efficient covert channel communications in operating systems: Design, implementation and evaluation [会议论文]
7th International Conference on Software Security and Reliability, SERE-C 2013, Gaithersburg, MD, United states, June 18, 2013 - June 20, 2013
Lin, Yuqi (1); Ding, Liping (1); Wu, Jingzheng (1); Xie, Yalong (1); Wang, Yongji (1)

 
Mining explicit rules for software process evaluation [会议论文]
2013 International Conference on Software and Systems Process, ICSSP 2013, San Francisco, CA, United states, May 18, 2013 - May 19, 2013
Sun, Chengnian (1); Du, Jing (2); Chen, Ning (1); Khoo, Siau-Cheng (1); Yang, Ye (2)

 
Analyzing and handling local bias for calibrating parametric cost estimation models [会议论文]
Yang, Ye (1); He, Zhimin (1); Mao, Ke (1); Li, Qi (3); Nguyen, Vu (3); Boehm, Barry (3); Valerdi, Ricardo (4)

 
Camera based cross devices manipulating with augmented reality [会议论文]
2013 IEEE International Conference on Multimedia and Expo Workshops, ICMEW 2013, San Jose, CA, United states, July 15, 2013 - July 19, 2013
Li, Teng (1); Hu, Wei (2); Wu, Jun (3); Bai, Jinfeng (4)

 
Cryptanalysis of Helix and Phelix revisited [会议论文]
18th Australasian Conference on Information Security and Privacy, ACISP 2013, Brisbane, QLD, Australia, July 1, 2013 - July 3, 2013
Shi, Zhenqing (1); Zhang, Bin (2); Feng, Dengguo (1)

 
Leaked-state-forgery attack against the authenticated encryption algorithm ALE [会议论文]
19th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2013, Bengaluru, India, December 1, 2013 - December 5, 2013
Wu, Shengbao (1); Wu, Hongjun (2); Huang, Tao (2); Wang, Mingsheng (4); Wu, Wenling (1)

 
Can requirements dependency network be used as early indicator of software integration bugs? [会议论文]
2013 21st IEEE International Requirements Engineering Conference, RE 2013, Rio de Janeiro, Brazil, July 15, 2013 - July 19, 2013
Wang, Junjie (1); Li, Juan (1); Wang, Qing (1); Yang, Da (1); Zhang, He (4); Li, Mingshu (1)

 
Image enlargement by patch-based seam synthesis [会议论文]
2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2013, Kaohsiung, Taiwan, October 29, 2013 - November 1, 2013
Wang, Qi (1); Liu, Zhengzhe (1); Li, Chen (1); Sheng, Bin (1)

 

previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 next

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace