中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-9 of 9)

Items/Page:    Sort:
Random table and hash coding-based binary code obfuscation against stack trace analysis [期刊论文]
IET INFORMATION SECURITY, 2016-01-01, 卷号: 10, 期号: 1, 页码: 18-27
Xie, X;  Lu, B;  Gong, DF;  Luo, XY;  Liu, FL
  |  
 
load-aware and position-aided routing in satellite ip networks [期刊论文]
INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2012-01-01, 卷号: 7, 期号: 1, 页码: 163-172
Wang L.; Liu L.; Hu X.
  |  
 
effective retransmission in network coding for tcp [期刊论文]
INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2011-01-01, 卷号: 6, 期号: 1, 页码: 53-62
Chen J.; Liu L. X.; Hu X. H.; Tan W.

 
cheating immune visual cryptography scheme [期刊论文]
IET Information Security, 2011-01-01, 卷号: 5, 期号: 1, 页码: 51-59
Liu F.; Wu C.; Lin X.
  |  
 
knitsketch: a sketch pad for conceptual design of 2d garment patterns [期刊论文]
Automation Science and Engineering, IEEE Transactions on, 2010-01-01, 卷号: PP, 期号: 99, 页码: 40550
Ma C.-X.; Liu Y.-J.; Yang H.-Y.; Teng D.-X.; Wang H.-A.; Dai G.-Z.

 
analysis of an authenticated identity-based multicast scheme [期刊论文]
IET COMMUNICATIONS, 2008-01-01, 卷号: 2, 期号: 7, 页码: 935-937
Lin X. -J.; Wu C. -K; Liu F.
  |  
 
colour visual cryptography schemes [期刊论文]
IET INFORMATION SECURITY, 2008-01-01, 卷号: 2, 期号: 4, 页码: 151-165
Liu F.; Wu C. K.; Lin X. J.
  |  
 
study on application of a quantitative evaluation approach for software architecture adaptability [会议论文]
5th International Conference on Quality Software (QSIC 2005), Melbourne, AUSTRALIA, SEP 19-20,
Liu X; Wang Q
  |  
 
real-time 3d fluid simulation on gpu with complex obstacles [会议论文]
12th Pacific Conference on Computer Graphics and Applications (PG 2004), Seoul, SOUTH KOREA, OCT 06-08,
Liu Y; Liu X; Wui E
  |  
 

1

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace