论文题目 |
第一作者 |
发表年度 |
刊物/会议名称 |
Value-Risk Trade-off Analysis for Iteration Planning in eXtreme Programming
|
董鑫
|
2011
|
APSEC2011
|
Multithread Replay Using Virtual Machine
|
于佳耕
|
2011
|
APSys 2011
|
A New Security Scheme for Online Banking Based on Virtual Machine
|
关贝
|
2011
|
APSys 2011
|
InDriver: Using In-VM Isolation to Implement Drivers
|
丁保增
|
2011
|
APSys 2011
|
Loop-Extended Model Checking of Data Structure Methods
|
易秋萍
|
2011
|
ASEA 2011
|
Resettable Cryptography in Constant Rounds-- The Case of Zero Knowledge
|
邓燚
|
2011
|
|
一种面向Mashup自动构造的目标分解方法
|
白琳
|
2011
|
CCF NCSC 2011(2011年中国计算机学会服务计算学术会议)
|
Obtaining the integrity of your virtual machine in the cloud
|
于爱民
|
2011
|
|
The Initialization Stage Analysis of ZUC v1.5
|
周春芳
|
2011
|
|
Design and Evaluation of a Pub/Sub Service in the Cloud
|
房文静
|
2011
|
CSC2011, 2011 International Conference on Cloud and Service Computing
|
A Collaborative Sketch Animation Creation System on Mobile Devices
|
王丹力
|
2011
|
CSCW2012
|
Indexing Frequently Updated Trajectories of Network-constrained Moving Objects
|
丁治明
|
2011
|
DEXA2011
|
Collecting and Managing Network-Matched Trajectories of Moving Objects in Databases
|
丁治明
|
2011
|
DEXA2011
|
On the Predictability of Software Efforts using Machine Learning Techniques
|
张文
|
2011
|
ENASE’11
|
“Is It Really a Defect?” -An empirical study on measuring and improving the process of software defect reporting
|
王丹丹
|
2011
|
ESEM'11
|
Modeling the Number of Active Software users
|
杨达
|
2011
|
ESEM2011
|
Linear Approximations of Addition Modulo
|
周春芳
|
2011
|
|
Attacking Dimensionality Problem of Parameterized Systems via Bounded Reachability Graph
|
杨秋松
|
2011
|
FSEN2011
|
A Recognition System for On-line Hand-written Tibetan Characters
|
马龙龙
|
2011
|
GREC2011( 9th IAPR International Worshop on Graphic Recognition)
|
Face Sketch Synthesis via Multivariate Output Regression
|
邓小明
|
2011
|
HCI International
|
Automatic Acquisition of Chinese-Tibetan Multi-Word Equivalent Pair from Bilingual Corpora
|
诺明花
|
2011
|
IALP2011
|
A Covert Timing Channel via Algorithmic Complexity Attacks: Design and Analysis
|
孙晓山
|
2011
|
|
MRG-OHTC Database for Online Handwritten Tibetan Character Recognition
|
马龙龙
|
2011
|
ICDAR2011(11th International Conference on Document Analysis and Recognition)
|
Improvement and Analysis of VDP Method in Time/Memory Tradeoff Applications
|
王文浩
|
2011
|
|
Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles
|
雷新锋
|
2011
|
|
A Linear-Time Complexity Algorithm for Solving the Dyck-CFL Reachability Problem on Bi-directed Trees
|
孙晓山
|
2011
|
|
Preimage Attacks on Step-Reduced SM3 Hash Function
|
邹剑
|
2011
|
ICISC 2011
|
Estimating Software Maintenance Effort form Use Cases:an Industrial Case Study
|
库燕
|
2011
|
ICSM2011
|
Automatic Mining of Change Set Size Information from Repository for Precise Productivity Estimation
|
黄辉
|
2011
|
ICSSP2011
|
Runtime Monitoring of Data-centric Temporal Properties for Web Services
|
吴国全
|
2011
|
ICWS 2011 : IEEE International Conference on Web Services
|