中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-9 of 9)

Items/Page:    Sort:
Performance testing and analysis of MAGMA library on hybrid architecture (CPU+GPU) [期刊论文]
Ruan Jian Xue Bao/Journal of Software, 2013-01-01, 卷号: 24, 期号: SUPPL.2, 页码: 118-126
Xiao, Xuan-Ji (1); Zhang, Yun-Quan (1); Li, Yu-Cheng (1); Yuan, Liang (1)

 
A linear-time complexity algorithm for solving the dyck-cfl reachability problem on bi-directed trees [会议论文]
5th International Conference on Machine Vision: Computer Vision, Image Analysis and Processing, ICMV 2012, Wuhan, China, October 20, 2012 - October 21, 2012
Sun, Xiaoshan (1); Zhang, Yang (2); Cheng, Liang (2)

 
Quantitatively Measure Access Control Mechanisms Across Different Operating Systems [会议论文]
7th IEEE International Conference on Software Security and Reliability (SERE), Gaithersburg, MD, JUN 18-20, 2013
Cheng, Liang; Zhang, Yang; Han, Zhihui

 
Heuristic path pruning algorithm based on error handling pattern recognition in detecting vulnerability [会议论文]
2013 IEEE 37th Annual Computer Software and Applications Conference Workshops, COMPSACW 2013, Kyoto, Japan, July 22, 2013 - July 26, 2013
Chen, Dong (1); Zhang, Yang (1); Cheng, Liang (1); Deng, Yi (1); Sun, Xiaoshan (1)

 
script-to-movie: a computational framework for story movie composition [期刊论文]
IEEE Transactions on Multimedia, 2013-01-01, 卷号: 15, 期号: 2, 页码: 401-414
Liang Chao; Xu Changsheng; Cheng Jian; Min Weiqing; Lu Hanqing

 
numerical simulation of high-efficiency ingap/gaas/ingaas triple-junction solar cells grown on gaas substrate [会议论文]
12th International Conference on Numerical Simulation of Optoelectronic Devices, NUSOD 2012, Shanghai, China, August 28, 2012 - August 31, 2012
Liang J.; Hu W.D.; Chen X.S.; Xia C.S.; Cheng L.W.

 
model checking security policy model using both uml static and dynamic diagrams [会议论文]
4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 1
Cheng Liang; Zhang Yang

 
a covert timing channel via algorithmic complexity attacks: design and analysis [会议论文]
2011 IEEE International Conference on Communications, ICC 2011, Kyoto, Japan, 5-Jun-20
Sun Xiaoshan; Cheng Liang; Zhang Yang
  |  
 
a language for secure requirement description based on information flow [会议论文]
2010 IEEE International Conference on Intelligent Computing and Intelligent Systems, ICIS 2010, Xiamen, China, 40845
Cheng Liang; Zhang Yang; Feng Dengguo
  |  
 

1

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace