论文题目 |
第一作者 |
发表年度 |
刊物/会议名称 |
Value-Risk Trade-off Analysis for Iteration Planning in eXtreme Programming |
董鑫 |
2011 |
APSEC2011 |
Multithread Replay Using Virtual Machine |
于佳耕 |
2011 |
APSys 2011 |
A New Security Scheme for Online Banking Based on Virtual Machine |
关贝 |
2011 |
APSys 2011 |
InDriver: Using In-VM Isolation to Implement Drivers |
丁保增 |
2011 |
APSys 2011 |
Loop-Extended Model Checking of Data Structure Methods |
易秋萍 |
2011 |
ASEA 2011 |
Resettable Cryptography in Constant Rounds-- The Case of Zero Knowledge |
邓燚 |
2011 |
|
一种面向Mashup自动构造的目标分解方法 |
白琳 |
2011 |
CCF NCSC 2011(2011年中国计算机学会服务计算学术会议) |
Obtaining the integrity of your virtual machine in the cloud |
于爱民 |
2011 |
|
The Initialization Stage Analysis of ZUC v1.5 |
周春芳 |
2011 |
|
Design and Evaluation of a Pub/Sub Service in the Cloud |
房文静 |
2011 |
CSC2011, 2011 International Conference on Cloud and Service Computing |
A Collaborative Sketch Animation Creation System on Mobile Devices |
王丹力 |
2011 |
CSCW2012 |
Indexing Frequently Updated Trajectories of Network-constrained Moving Objects |
丁治明 |
2011 |
DEXA2011 |
Collecting and Managing Network-Matched Trajectories of Moving Objects in Databases |
丁治明 |
2011 |
DEXA2011 |
On the Predictability of Software Efforts using Machine Learning Techniques |
张文 |
2011 |
ENASE’11 |
“Is It Really a Defect?” -An empirical study on measuring and improving the process of software defect reporting |
王丹丹 |
2011 |
ESEM'11 |
Modeling the Number of Active Software users |
杨达 |
2011 |
ESEM2011 |
Linear Approximations of Addition Modulo |
周春芳 |
2011 |
|
Attacking Dimensionality Problem of Parameterized Systems via Bounded Reachability Graph |
杨秋松 |
2011 |
FSEN2011 |
A Recognition System for On-line Hand-written Tibetan Characters |
马龙龙 |
2011 |
GREC2011( 9th IAPR International Worshop on Graphic Recognition) |
Face Sketch Synthesis via Multivariate Output Regression |
邓小明 |
2011 |
HCI International |
Automatic Acquisition of Chinese-Tibetan Multi-Word Equivalent Pair from Bilingual Corpora |
诺明花 |
2011 |
IALP2011 |
A Covert Timing Channel via Algorithmic Complexity Attacks: Design and Analysis |
孙晓山 |
2011 |
|
MRG-OHTC Database for Online Handwritten Tibetan Character Recognition |
马龙龙 |
2011 |
ICDAR2011(11th International Conference on Document Analysis and Recognition) |
Improvement and Analysis of VDP Method in Time/Memory Tradeoff Applications |
王文浩 |
2011 |
|
Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles |
雷新锋 |
2011 |
|
A Linear-Time Complexity Algorithm for Solving the Dyck-CFL Reachability Problem on Bi-directed Trees |
孙晓山 |
2011 |
|
Preimage Attacks on Step-Reduced SM3 Hash Function |
邹剑 |
2011 |
ICISC 2011 |
Estimating Software Maintenance Effort form Use Cases:an Industrial Case Study |
库燕 |
2011 |
ICSM2011 |
Automatic Mining of Change Set Size Information from Repository for Precise Productivity Estimation |
黄辉 |
2011 |
ICSSP2011 |
Runtime Monitoring of Data-centric Temporal Properties for Web Services |
吴国全 |
2011 |
ICWS 2011 : IEEE International Conference on Web Services |