| 论文题目 | 第一作者 | 发表年度 | 刊物/会议名称 |
|---|---|---|---|
| Value-Risk Trade-off Analysis for Iteration Planning in eXtreme Programming | 董鑫 | 2011 | APSEC2011 |
| Multithread Replay Using Virtual Machine | 于佳耕 | 2011 | APSys 2011 |
| A New Security Scheme for Online Banking Based on Virtual Machine | 关贝 | 2011 | APSys 2011 |
| InDriver: Using In-VM Isolation to Implement Drivers | 丁保增 | 2011 | APSys 2011 |
| Loop-Extended Model Checking of Data Structure Methods | 易秋萍 | 2011 | ASEA 2011 |
| Resettable Cryptography in Constant Rounds-- The Case of Zero Knowledge | 邓燚 | 2011 | |
| 一种面向Mashup自动构造的目标分解方法 | 白琳 | 2011 | CCF NCSC 2011(2011年中国计算机学会服务计算学术会议) |
| Obtaining the integrity of your virtual machine in the cloud | 于爱民 | 2011 | |
| The Initialization Stage Analysis of ZUC v1.5 | 周春芳 | 2011 | |
| Design and Evaluation of a Pub/Sub Service in the Cloud | 房文静 | 2011 | CSC2011, 2011 International Conference on Cloud and Service Computing |
| A Collaborative Sketch Animation Creation System on Mobile Devices | 王丹力 | 2011 | CSCW2012 |
| Indexing Frequently Updated Trajectories of Network-constrained Moving Objects | 丁治明 | 2011 | DEXA2011 |
| Collecting and Managing Network-Matched Trajectories of Moving Objects in Databases | 丁治明 | 2011 | DEXA2011 |
| On the Predictability of Software Efforts using Machine Learning Techniques | 张文 | 2011 | ENASE’11 |
| “Is It Really a Defect?” -An empirical study on measuring and improving the process of software defect reporting | 王丹丹 | 2011 | ESEM'11 |
| Modeling the Number of Active Software users | 杨达 | 2011 | ESEM2011 |
| Linear Approximations of Addition Modulo | 周春芳 | 2011 | |
| Attacking Dimensionality Problem of Parameterized Systems via Bounded Reachability Graph | 杨秋松 | 2011 | FSEN2011 |
| A Recognition System for On-line Hand-written Tibetan Characters | 马龙龙 | 2011 | GREC2011( 9th IAPR International Worshop on Graphic Recognition) |
| Face Sketch Synthesis via Multivariate Output Regression | 邓小明 | 2011 | HCI International |
| Automatic Acquisition of Chinese-Tibetan Multi-Word Equivalent Pair from Bilingual Corpora | 诺明花 | 2011 | IALP2011 |
| A Covert Timing Channel via Algorithmic Complexity Attacks: Design and Analysis | 孙晓山 | 2011 | |
| MRG-OHTC Database for Online Handwritten Tibetan Character Recognition | 马龙龙 | 2011 | ICDAR2011(11th International Conference on Document Analysis and Recognition) |
| Improvement and Analysis of VDP Method in Time/Memory Tradeoff Applications | 王文浩 | 2011 | |
| Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles | 雷新锋 | 2011 | |
| A Linear-Time Complexity Algorithm for Solving the Dyck-CFL Reachability Problem on Bi-directed Trees | 孙晓山 | 2011 | |
| Preimage Attacks on Step-Reduced SM3 Hash Function | 邹剑 | 2011 | ICISC 2011 |
| Estimating Software Maintenance Effort form Use Cases:an Industrial Case Study | 库燕 | 2011 | ICSM2011 |
| Automatic Mining of Change Set Size Information from Repository for Precise Productivity Estimation | 黄辉 | 2011 | ICSSP2011 |
| Runtime Monitoring of Data-centric Temporal Properties for Web Services | 吴国全 | 2011 | ICWS 2011 : IEEE International Conference on Web Services |