|
已选(0)清除
条数/页: 排序方式: |
| mobile scheduling for spatiotemporal detection in wireless sensor networks 期刊论文 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2010, 卷号: 21, 期号: 12, 页码: 1851-1866 作者: Xing Guoliang; Wang Jianping; Yuan Zhaohui; Tan Rui; Sun Limin; Huang Qingfeng; Jia Xiaohua; So Hing Cheung
Adobe PDF(2197Kb)  |   收藏  |  浏览/下载:31/0  |  提交时间:2011/05/23 Data FusionAlgorithm/protocol Design And AnalysisWireless Sensor Networks |
| bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round 期刊论文 IET Information Security, 2010, 卷号: 4, 期号: 3, 页码: 167-184 作者: Zhao X.; Feng D.
Adobe PDF(659Kb)  |   收藏  |  浏览/下载:40/0  |  提交时间:2011/05/23 Multivariate Public Key CryptosystemQuadratic RoundsSecurity ImprovementTwo-round SchemePublic Key Cryptography |
| a heuristic approach to positive root isolation for multiple power sums 期刊论文 JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2010, 卷号: 16, 期号: 14, 页码: 1912-1926 作者: Xu Ming; Mu Chuandong; Zeng Zhenbing; Li Zhi-bin
Adobe PDF(174Kb)  |   收藏  |  浏览/下载:43/0  |  提交时间:2011/05/23 Multiple Power SumsRoot IsolationRoot BoundsDescartes Sign RuleFouriers Theorem |
| expected values for the rational complexity of finite binary sequences 期刊论文 DESIGNS CODES AND CRYPTOGRAPHY, 2010, 卷号: 55, 期号: 1, 页码: 65-79 作者: Tian Tian; Qi Wen-Feng
Adobe PDF(232Kb)  |   收藏  |  浏览/下载:36/0  |  提交时间:2011/05/23 Feedback With Carry Shift Registers2-adic ComplexityRational Complexity |
| detecting double jpeg compression with the same quantization matrix 期刊论文 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 卷号: 5, 期号: 4, 页码: 848-856 作者: Huang Fangjun; Huang Jiwu; Shi Yun Qing
Adobe PDF(894Kb)  |   收藏  |  浏览/下载:39/0  |  提交时间:2011/05/23 Digital ForensicDouble Joint Photographic Experts Group (Jpeg) CompressionQuantization Matrix |
| the lu-lc conjecture is false 期刊论文 QUANTUM INFORMATION & COMPUTATION, 2010, 卷号: 10, 期号: 40545, 页码: 97-108 作者: Ji Zhengfeng; Chen Jianxin; Wei Zhaohui; Ying Mingsheng
Adobe PDF(380Kb)  |   收藏  |  浏览/下载:49/0  |  提交时间:2011/05/23 EntanglementStabilizer StatesGraph StatesLu-lc Conjecture |
| detection of quantization artifacts and its applications to transform encoder identification 期刊论文 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 卷号: 5, 期号: 4, 页码: 810-815 作者: Luo Weiqi; Wang Yuangen; Huang Jiwu
Adobe PDF(795Kb)  |   收藏  |  浏览/下载:66/0  |  提交时间:2011/05/23 Digital Image ForensicsQuantization ArtifactsSource Encoder Identification |
| step construction of visual cryptography schemes 期刊论文 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 卷号: 5, 期号: 1, 页码: 27-38 作者: Liu Feng; Wu Chuankun; Lin Xijun
Adobe PDF(450Kb)  |   收藏  |  浏览/下载:46/0  |  提交时间:2011/05/23 Secret SharingStep ConstructionVisual Cryptography |
| a problem reduction based approach to discrete optimization algorithm design 期刊论文 COMPUTING, 2010, 卷号: 88, 期号: 40545, 页码: 31-54 作者: Zheng Yujun; Xue Jinyun
Adobe PDF(312Kb)  |   收藏  |  浏览/下载:51/0  |  提交时间:2011/05/23 Discrete OptimizationProgram CalculationProblem Reduction Graph (Prg)Algorithm Design |
| on hierarchically developing reactive systems 期刊论文 INFORMATION AND COMPUTATION, 2010, 卷号: 208, 期号: 9, 页码: 997-1019 作者: Zhan Naijun; Majster-Cederbaum Mila
Adobe PDF(447Kb)  |   收藏  |  浏览/下载:41/0  |  提交时间:2011/05/24 Action RefinementModal LogicsSpecificationVerificationReactive Systems |