中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-10 of 26)

Items/Page:    Sort:
Minimum-risk training for semi-Markov conditional random fields with application to handwritten Chinese/Japanese text recognition [期刊论文]
Pattern Recognition, 2014-01-01, 卷号: 47, 期号: 5, 页码: 1904-1916
Zhou, Xiang-Dong (1); Zhang, Yan-Ming (2); Tian, Feng (3); Wang, Hong-An (3); Liu, Cheng-Lin (2)

 
A Novel privacy-preserving group matching scheme in social networks [会议论文]
15th International Conference on Web-Age Information Management, WAIM 2014, Macau, China, June 16, 2014 - June 18, 2014
Chi, Jialin (1); Lv, Zhiquan (1); Zhang, Min (1); Li, Hao (1); Hong, Cheng (1); Feng, Dengguo (1)

 
Performance testing and analysis of MAGMA library on hybrid architecture (CPU+GPU) [期刊论文]
Ruan Jian Xue Bao/Journal of Software, 2013-01-01, 卷号: 24, 期号: SUPPL.2, 页码: 118-126
Xiao, Xuan-Ji (1); Zhang, Yun-Quan (1); Li, Yu-Cheng (1); Yuan, Liang (1)

 
A survey on resource allocation in high performance distributed computing systems [期刊论文]
PARALLEL COMPUTING, 2013-01-01, 卷号: 39, 期号: 11, 页码: 709-736
Hussain, Hameed; Malik, Saif Ur Rehman; Hameed, Abdul; Khan, Samee Ullah; Bickler, Gage; Min-Allah, Nasro; Qureshi, Muhammad Bilal; Zhang, Limin; Wang Yongji; Ghani, Nasir; Kolodziej, Joanna; Zomaya, Albert Y.; Xu, Cheng-Zhong; Balaji, Pavan; Vishnu, Abhinav; Pinel, Fredric; Pecero, Johnatan E.; Kliazovich, Dzmitry; Bouvry, Pascal; Li, Hongxiang; Wang, Lizhe; Chen, Dan; Rayes, Ammar

 
A linear-time complexity algorithm for solving the dyck-cfl reachability problem on bi-directed trees [会议论文]
5th International Conference on Machine Vision: Computer Vision, Image Analysis and Processing, ICMV 2012, Wuhan, China, October 20, 2012 - October 21, 2012
Sun, Xiaoshan (1); Zhang, Yang (2); Cheng, Liang (2)

 
Quantitatively Measure Access Control Mechanisms Across Different Operating Systems [会议论文]
7th IEEE International Conference on Software Security and Reliability (SERE), Gaithersburg, MD, JUN 18-20, 2013
Cheng, Liang; Zhang, Yang; Han, Zhihui

 
Heuristic path pruning algorithm based on error handling pattern recognition in detecting vulnerability [会议论文]
2013 IEEE 37th Annual Computer Software and Applications Conference Workshops, COMPSACW 2013, Kyoto, Japan, July 22, 2013 - July 26, 2013
Chen, Dong (1); Zhang, Yang (1); Cheng, Liang (1); Deng, Yi (1); Sun, Xiaoshan (1)

 
Towards a Secure Certificateless Proxy Re-Encryption Scheme [会议论文]
7th International Conference on Provable Security (ProvSec), Melaka, MALAYSIA, OCT 23-25, 2013
Guo, Hui; Zhang, Zhenfeng; Zhang, Jiang; Chen, Cheng

 
fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures [会议论文]
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Chen Cheng; Chen Jie; Lim Hoon Wei; Zhang Zhenfeng; Feng Dengguo; Ling San; Wang Huaxiong

 
forgeability of wang-zhu-feng-yau's attribute-based signature with policy-and-endorsement mechanism [期刊论文]
Journal of Computer Science and Technology, 2013-01-01, 卷号: 28, 期号: 4, 页码: 743-748
Ge Ai-Jun; Huang Xin-Yi; Chen Cheng; Ma Chuan-Gui; Zhang Rui

 

1 2 3 next

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace