中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
软件所图书馆 [150]
作者
王健 [2]
Content Type
会议论文 [150]
Issued Date
2014 [4]
2013 [8]
2012 [4]
2011 [1]
Language
英语 [150]
Source
lecture n... [35]
lecture n... [22]
lecture no... [6]
computer a... [2]
chinese jo... [1]
更多...
Project
Indexed
SCI [150]
Spnsorship
ieee compu... [8]
chinese ac... [5]
nanjing un... [5]
china comp... [3]
ifip worki... [3]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 51-60 of 150)
Filters
Community:软件所图书馆
Indexed:SCI
Content Type:会议论文
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
evaluation of the capability of personal software process based on data envelopment analysis
[会议论文]
International Software Process Workshop (SPW 2005), Beijing, PEOPLES R CHINA, MAY 25-27,
Ding LP
;
Yang QS
;
Sun L
;
Tong J
;
Wang YJ
  |  
a predicate spatial logic and model checking for mobile processes
[会议论文]
1st International Colloquium on Theoretical Aspects of Computing (ICTAC 2004), Guiyang, PEOPLES R CHINA, SEP 20-24,
Lin HM
  |  
a development process for building oss-based applications
[会议论文]
International Software Process Workshop (SPW 2005), Beijing, PEOPLES R CHINA, MAY 25-27,
Huang M
;
Yang LG
;
Yang Y
  |  
enforcing the principle of least privilege with a state-based privilege control model
[会议论文]
1st Information Security Practice and Experience Conference, Singapore, SINGAPORE, APR 11-14,
Liang B
;
Liu H
;
Shi WC
;
Wu YJ
  |  
on the security of some nonrepudiable threshold proxy signature schemes
[会议论文]
1st Information Security Practice and Experience Conference, Singapore, SINGAPORE, APR 11-14,
Tan ZW
;
Liu ZJ
;
Wang MS
  |  
on the security of tweakable modes of operation: tbc and tae
[会议论文]
8th International Conference on Information Security, Singapore, SINGAPORE, SEP 20-23,
Wang P
;
Feng DG
;
Wu WL
  |  
the inductive approach to strand space
[会议论文]
25th International Conference on Formal Techniques for Networked and Distributed Systems, Taipei, TAIWAN, OCT 02-05,
Li YJ
  |  
intrusion tolerant ca scheme with cheaters detection ability
[会议论文]
ISPA 2005 International Workshops AEPP, ASTED, BIOS, GCIC, IASD, MASN, SGCA and WISA, Nanjing, PEOPLES R CHINA, NOV 02-05,
Zhang LW
;
Feng DG
  |  
hyper-erlang based model for network traffic approximation
[会议论文]
3rd International Conference on Parallel and Distributed Processing and Applications, Nanjing, PEOPLES R CHINA, NOV 02-05,
Wang JF
;
Zhou HX
;
Xu FJ
;
Li L
  |  
id-based proxy signature using bilinear pairings
[会议论文]
ISPA 2005 International Workshops AEPP, ASTED, BIOS, GCIC, IASD, MASN, SGCA and WISA, Nanjing, PEOPLES R CHINA, NOV 02-05,
Xu J
;
Zhang ZF
;
Feng DG
  |  
previous
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
next
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace