中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
软件所图书馆 [629]
信息安全国家重点实... [63]
计算机科学国家重点... [45]
互联网软件技术实验... [23]
基础软件国家工程研... [22]
更多...
作者
王健 [5]
马雷 [2]
陈美会 [2]
刘宇 [1]
殷宪晨 [1]
更多...
Content Type
期刊论文 [626]
会议论文 [186]
Issued Date
2018 [2]
2017 [1]
2016 [77]
2015 [11]
2014 [68]
更多...
Language
英语 [644]
中文 [3]
Source
journal o... [45]
lecture n... [36]
science i... [32]
lecture n... [22]
science c... [18]
更多...
Project
descriptio... [2]
Indexed
SCI [812]
Spnsorship
ieee compu... [8]
chinese ac... [6]
chinese ac... [5]
nanjing un... [5]
china comp... [3]
更多...
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 81-90 of 812)
Filters
Indexed:SCI
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Author Ascending
Author Descending
Title Ascending
Title Descending
Issue Date Ascending
Issue Date Descending
Submitted Time Ascending
Submitted Time Descending
Using simulation to evaluate error detection strategies: A case study of cloud-based deployment processes
[期刊论文]
JOURNAL OF SYSTEMS AND SOFTWARE, 2015-01-01, 卷号: 110, 页码: 205-221
Chen, J
;
Xu, XW
;
Osterweil, LJ
;
Zhu, LM
;
Brun, Y
;
Bass, L
;
Xiao, JC
;
Li, MS
;
Wang, Q
  |  
Counting K-4-subdivisions
[期刊论文]
DISCRETE MATHEMATICS, 2015-01-01, 卷号: 338, 期号: 12, 页码: 2387-2392
Miltzow, T
;
Schmidt, JM
;
Xia, MJ
  |  
Transient Reward Approximation for Continuous-Time Markov Chains
[期刊论文]
IEEE TRANSACTIONS ON RELIABILITY, 2015-01-01, 卷号: 64, 期号: 4, 页码: 1254-1275
Hahn, EM
;
Hermanns, H
;
Wimmer, R
;
Becker, B
  |  
VEGAS: Visual influEnce GrAph Summarization on Citation Networks
[期刊论文]
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2015-01-01, 卷号: 27, 期号: 12, 页码: 3417-3431
Shi, L
;
Tong, HH
;
Tang, J
;
Lin, C
  |  
Integer valued betting strategies and Turing degrees
[期刊论文]
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2015-01-01, 卷号: 81, 期号: 7, 页码: 1387-1412
Barmpalias, G
;
Downey, RG
;
McInerney, M
  |  
Zero-Correlation Linear Cryptanalysis of Reduced-Round SIMON
[期刊论文]
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2015-01-01, 卷号: 30, 期号: 6, 页码: 1358-1369
Yu, XL
;
Wu, WL
;
Shi, ZQ
;
Zhang, J
;
Zhang, L
;
Wang, YF
Deciding determinism of unary languages
[期刊论文]
INFORMATION AND COMPUTATION, 2015-01-01, 卷号: 245, 页码: 181-196
Lu, P
;
Peng, FF
;
Chen, HM
;
Zheng, LX
  |  
An iterated randomized search algorithm for large-scale texture synthesis and manipulations
[期刊论文]
VISUAL COMPUTER, 2015-01-01, 卷号: 31, 期号: 11, 页码: 1447-1458
Hao, CY
;
Chen, YD
;
Wu, W
;
Wu, EH
Practical-time related-key attack on Hummingbird-2
[期刊论文]
IET INFORMATION SECURITY, 2015-01-01, 卷号: 9, 期号: 6, 页码: 321-327
Shi, ZQ
;
Zhang, B
;
Feng, DG
  |  
An integrated framework of formal methods for interaction behaviors among industrial equipments
[期刊论文]
MICROPROCESSORS AND MICROSYSTEMS, 2015-01-01, 卷号: 39, 期号: 8, 页码: 1296-1304
Deng, P
;
Ren, G
;
Yuan, W
;
Chen, F
;
Hua, QS
  |  
previous
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
next
Copyright © 2007-2022
中国科学院软件研究所
-
Feedback
Powered by
CSpace