中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
软件所图书馆 [150]
作者
王健 [2]
Content Type
会议论文 [150]
Issued Date
2014 [4]
2013 [8]
2012 [4]
2011 [1]
Language
英语 [150]
Source
lecture n... [35]
lecture n... [22]
lecture no... [6]
computer a... [2]
chinese jo... [1]
更多...
Project
Indexed
SCI [150]
Spnsorship
ieee compu... [8]
chinese ac... [5]
nanjing un... [5]
china comp... [3]
ifip worki... [3]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 41-50 of 150)
Filters
Community:软件所图书馆
Indexed:SCI
Content Type:会议论文
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
iwws: a reliability-based www collaborative recommender system
[会议论文]
7th Asia-Pacific Web Conference, Shanghai, PEOPLES R CHINA, MAR 29-APR
Che HY
;
Zhang JC
;
Yu SQ
;
Gu J
  |  
mining quantitative associations in large database
[会议论文]
7th Asia-Pacific Web Conference, Shanghai, PEOPLES R CHINA, MAR 29-APR
Hui CY
;
Wang YJ
;
Zhang BY
;
Yang Q
;
Wang Q
;
Zhou JH
;
He R
;
Yan Y
  |  
a formal framework for ontology integration based on a default extension to ddl
[会议论文]
1st International Colloquium on Theoretical Aspects of Computing (ICTAC 2004), Guiyang, PEOPLES R CHINA, SEP 20-24,
Ma YL
;
Wei J
;
Jin BH
;
Liu SH
  |  
parallel multi-party computation from linear multi-secret sharing schemes
[会议论文]
11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, INDIA, DEC 04-08,
Zhang ZF
;
Liu ML
;
Xiao LL
  |  
security analysis of some threshold signature schemes and multi-signature schemes
[会议论文]
1st SKLOIS Conference on Information Security and Cryptology, Beijing, PEOPLES R CHINA, DEC 15-17,
Cao TJ
;
Lin DD
  |  
covert channel identification founded on information flow analysis
[会议论文]
International Conference on Computational Intelligence and Security, Xian, PEOPLES R CHINA, DEC 15-19,
Shen JJ
;
Qing SH
;
Shen QN
;
Li LP
  |  
energy-efficient target localization based on a prediction model
[会议论文]
International Conference on Embedded and Ubiquitous Computing, Nagasaki, JAPAN, DEC 06-09,
Gu Y
;
Zhang W
;
Liu HC
;
Zhao BH
;
Qu YG
  |  
hctr: a variable-input-length enciphering mode
[会议论文]
1st SKLOIS Conference on Information Security and Cryptology, Beijing, PEOPLES R CHINA, DEC 15-17,
Wang P
;
Feng DG
;
Wu WL
  |  
spiral pro: a project plan generation framework and support tool
[会议论文]
International Software Process Workshop (SPW 2005), Beijing, PEOPLES R CHINA, MAY 25-27,
Wang JZ
;
Meyers S
  |  
software testing process automation based on utp - a case study
[会议论文]
International Software Process Workshop (SPW 2005), Beijing, PEOPLES R CHINA, MAY 25-27,
Chen W
;
Ying Q
;
Xue YZ
;
Zhao C
  |  
previous
1
2
3
4
5
6
7
8
9
10
11
12
13
14
next
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace