中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
软件所图书馆 [9]
作者
Content Type
期刊论文 [7]
会议论文 [2]
Issued Date
2016 [1]
Language
英语 [8]
Source
iet inform... [3]
internatio... [2]
automation... [1]
iet commun... [1]
proceeding... [1]
Project
Indexed
IEEE [3]
SCI [3]
EI [2]
ISTP [2]
ACM [1]
更多...
Spnsorship
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 1-9 of 9)
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
Random table and hash coding-based binary code obfuscation against stack trace analysis
[期刊论文]
IET INFORMATION SECURITY, 2016-01-01, 卷号: 10, 期号: 1, 页码: 18-27
Xie, X
;
Lu, B
;
Gong, DF
;
Luo, XY
;
Liu, FL
  |  
load-aware and position-aided routing in satellite ip networks
[期刊论文]
INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2012-01-01, 卷号: 7, 期号: 1, 页码: 163-172
Wang L.
;
Liu L.
;
Hu X.
  |  
effective retransmission in network coding for tcp
[期刊论文]
INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2011-01-01, 卷号: 6, 期号: 1, 页码: 53-62
Chen J.
;
Liu L. X.
;
Hu X. H.
;
Tan W.
cheating immune visual cryptography scheme
[期刊论文]
IET Information Security, 2011-01-01, 卷号: 5, 期号: 1, 页码: 51-59
Liu F.
;
Wu C.
;
Lin X.
  |  
knitsketch: a sketch pad for conceptual design of 2d garment patterns
[期刊论文]
Automation Science and Engineering, IEEE Transactions on, 2010-01-01, 卷号: PP, 期号: 99, 页码: 40550
Ma C.-X.
;
Liu Y.-J.
;
Yang H.-Y.
;
Teng D.-X.
;
Wang H.-A.
;
Dai G.-Z.
analysis of an authenticated identity-based multicast scheme
[期刊论文]
IET COMMUNICATIONS, 2008-01-01, 卷号: 2, 期号: 7, 页码: 935-937
Lin X. -J.
;
Wu C. -K
;
Liu F.
  |  
colour visual cryptography schemes
[期刊论文]
IET INFORMATION SECURITY, 2008-01-01, 卷号: 2, 期号: 4, 页码: 151-165
Liu F.
;
Wu C. K.
;
Lin X. J.
  |  
study on application of a quantitative evaluation approach for software architecture adaptability
[会议论文]
5th International Conference on Quality Software (QSIC 2005), Melbourne, AUSTRALIA, SEP 19-20,
Liu X
;
Wang Q
  |  
real-time 3d fluid simulation on gpu with complex obstacles
[会议论文]
12th Pacific Conference on Computer Graphics and Applications (PG 2004), Seoul, SOUTH KOREA, OCT 06-08,
Liu Y
;
Liu X
;
Wui E
  |  
1
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace