中国科学院软件研究所机构知识库
Log In
Register
Email:
Passwd
验 证:
换一张
Have you forgotten your password?
Stay signed in
Log In
ALL
Title
Author
Keyword
Sponsors
Type
Publication date
Submitted Time
Subject
Conference Name
Source
Categories
KOS Subject
Advisor
ORCID
Advanced
在结果中检索
Communities
Subjects
All Items
Community
软件所图书馆 [9]
信息安全国家重点实验... [2]
互联网软件技术实验室... [2]
中科院软件所 [2]
并行计算实验室 [1]
更多...
作者
Content Type
会议论文 [8]
期刊论文 [6]
学位论文 [3]
Issued Date
Language
英语 [8]
中文 [4]
Source
lecture no... [3]
计算机工程与设计 [2]
computer a... [1]
proceeding... [1]
science in... [1]
更多...
Project
Indexed
EI [6]
SCI [2]
WANFANG,CN... [2]
CPCI [1]
CSCD,CNKI,... [1]
更多...
Spnsorship
minist inf... [1]
xi'an tech... [1]
ISCAS OpenIR
Search Results
Help
Item hits:
(Results 1-10 of 17)
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Submitted Time Ascending
Submitted Time Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Issue Date Ascending
Issue Date Descending
Low data complexity inversion attacks on stream ciphers via truncated compressed preimage sets
[会议论文]
19th Australasian Conference on Information Security and Privacy, ACISP 2014, Wollongong, NSW, Australia, July 7, 2014 - July 9, 2014
Zhong, Xiao (1)
;
Wang, Mingsheng (3)
;
Zhang, Bin (1)
;
Wu, Shengbao (1)
Image enlargement by patch-based seam synthesis
[会议论文]
2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2013, Kaohsiung, Taiwan, October 29, 2013 - November 1, 2013
Wang, Qi (1)
;
Liu, Zhengzhe (1)
;
Li, Chen (1)
;
Sheng, Bin (1)
Predicate Index Matching Algorithm Based on History Experience
[会议论文]
International Conference on Computer Science and Artificial Intelligence (ICCSAI), Chengdu, PEOPLES R CHINA, NOV 16-17, 2013
Wu, Yu-bin
;
Wang, Hai-bo
tracking end-effectors for marker-less 3d human motion estimation in multi-view image sequences
[会议论文]
15th International Conference on Human-Computer Interaction, HCI International 2013, Las Vegas, NV, United states, July 21, 2013 - July 26, 2013
Wang Wenzhong
;
Wang Zhaoqi
;
Deng Xiaoming
;
Luo Bin
an improved time-memory-data trade-off attack against irregularly clocked and filtered keystream generators
[会议论文]
8th China International Conference on Information Security and Cryptology, INSCRYPT 2012, Beijing, China, November 28, 2012 - November 30, 2012
Jiao Lin
;
Wang Mingsheng
;
Zhang Bin
;
Li Yongqiang
a new variant of time memory trade-off on the improvement of thing and ying's attack
[会议论文]
14th International Conference on Information and Communications Security, ICICS 2012, Hong Kong, China, October 29, 2012 - October 31, 2012
Li Zhenqi
;
Lu Yao
;
Wang Wenhao
;
Zhang Bin
;
Lin Dongdai
virtualization detection based on data fusion
[会议论文]
2012 International Conference on Computer Science and Information Processing, CSIP 2012, Xi'an, Shaanxi, China, August 24, 2012 - August 26, 2012
Wang Jia-Bin
;
Lian Yi-Feng
;
Chen Kai
基于D-S证据理论的主机违规行为检查方法
[期刊论文]
Computer Applications and Software, 2012-01-01, 卷号: 29, 期号: 2, 页码: 90-93,148
王斌
;
连一峰
;
陈恺
  |  
基于D-S证据理论的主机违规行为检查方法
[学位论文]
硕士, 北京: 中国科学院研究生院, 2011-05-25
王斌
  |  
adjoint code generator
[期刊论文]
SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2009-01-01, 卷号: 52, 期号: 6, 页码: 926-941
Cheng Qiang
;
Cao JianWen
;
Wang Bin
;
Zhang HaiBin
1
2
next
Copyright © 2007-2021
中国科学院软件研究所
-
Feedback
Powered by
CSpace