论文题目 |
第一作者 |
发表年度 |
刊物/会议名称 |
Improving Word Sense Induction by Exploiting Semantic Relevance |
张振中 |
2011 |
the 5th International Joint Conference on Natural Language Processing |
Checking compatibility of context-aware service protocols |
高楚舒 |
2011 |
The 6th International Symposium on Service-Oriented System Engineering |
Scalability studies of an implicit shallow water solver for the Rossby-Haurwitz problem |
杨超 |
2011 |
Lecture Notes in Computer Science |
PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers |
张立廷 |
2011 |
|
A Benefit-aware On-demand Provisioning Approach for Cloud Computing |
吴恒 |
2011 |
Third Asia Pacific Symposium on Internetware 2011 Nanning |
Detecting Class Loading Problems in Java Web Applications |
周晓炜 |
2011 |
Third Asia Pacific Symposium on Internetware 2011 Nanning |
Toward Highly Concurrent Process Virtual Machine Based on Event-driven Architecture |
吴东尧 |
2011 |
Third Asia Pacific Symposium on Internetware 2011 Nanning |
Runtime Monitoring of Composite Web Services with BC-Mon4BPEL |
邵小哲 |
2011 |
Third Asia Pacific Symposium on Internetware 2011 Nanning |
Enhancing Flexibility of TCG’s TNC through Layered Property Attestation |
于爱民 |
2011 |
|
A DRTM-based Method for Trusted Network Connection |
冯伟 |
2011 |
|
CoolMag: a tangible interaction tool to customize instruments for children in music education |
张诚 |
2011 |
UbiComp '11 Proceedings of the 13th international conference on Ubiquitous computing |
空间事件检测的加速策略研究 |
胡佳锋 |
2011 |
第7届全国普适计算学术会议 |
第三届中文倾向性分析评测ISCAS-Opinion系统报告 |
韩先培 |
2011 |
第三届中文倾向性分析评测论文集 |
Security of the SMS4 Block Cipher Against Differential Cryptanalysis |
Su,BZ |
2011 |
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY |
IOT Gateway: Bridging Wireless Sensor Networks into Internet of Things |
朱倩 |
2010 |
|
FireGuide: A Context-Aware Fire Response Guide for the Building Occupants |
李元平 |
2010 |
|
information security and cryptology |
林东岱 |
2010 |
|
Recent Advances in Program Verification through Computer Algebra |
|
2010 |
Frontiers of Computer Science in China |
On Hierarchically Developing Reactive Systems |
|
2010 |
INFORMATION AND COMPUTATION |
Congruence Formats for Weak Readiness Equivalence and Weak Possible Future Equivalence |
Xiaowei Huang |
2010 |
THE COMPUTER JOURNAL |
采用了剪枝优化的子类型关系判定算法 |
戴晓君 |
2010 |
软件学报 |
改进的以SMT为基础的实时系统限界模型检测 |
徐亮 |
2010 |
软件学报 |
A Heuristic Approach to Positive Root Isolation for Multiple Power Sums |
|
2010 |
Journal of Universal Computer Science |
The Computational SLR: A Logic for Reasoning about Computational Indistinguishability |
|
2010 |
Math. Struct.in Comp. Science |
Loop Formulas for Description Logic Programs |
|
2010 |
Theory and Practice of Logic Programming |
Extending the Strand Space Method with Timestamps: Part I the Theory |
李勇坚 |
2010 |
Jounal of Information Security |
Extending the Strand Space Method with Timestamps: Part II Application to Kerberos V |
李勇坚 |
2010 |
Jounal of Information Security |
基于复用计算的大纹理实时合成 |
陈昕 |
2010 |
计算机学报 |
用圆锥体拟合线性模型点云数据的优化计算 |
孙春娟 |
2010 |
计算机辅助设计与图形学学报 |
Parametric Search: Three New Applications |
王文成 |
2010 |
Front. Math. China |