论文题目 |
第一作者 |
发表年度 |
刊物/会议名称 |
Improving Word Sense Induction by Exploiting Semantic Relevance
|
张振中
|
2011
|
the 5th International Joint Conference on Natural Language Processing
|
Checking compatibility of context-aware service protocols
|
高楚舒
|
2011
|
The 6th International Symposium on Service-Oriented System Engineering
|
Scalability studies of an implicit shallow water solver for the Rossby-Haurwitz problem
|
杨超
|
2011
|
Lecture Notes in Computer Science
|
PolyE+CTR: A Swiss-Army-Knife Mode for Block Ciphers
|
张立廷
|
2011
|
|
A Benefit-aware On-demand Provisioning Approach for Cloud Computing
|
吴恒
|
2011
|
Third Asia Pacific Symposium on Internetware 2011 Nanning
|
Detecting Class Loading Problems in Java Web Applications
|
周晓炜
|
2011
|
Third Asia Pacific Symposium on Internetware 2011 Nanning
|
Toward Highly Concurrent Process Virtual Machine Based on Event-driven Architecture
|
吴东尧
|
2011
|
Third Asia Pacific Symposium on Internetware 2011 Nanning
|
Runtime Monitoring of Composite Web Services with BC-Mon4BPEL
|
邵小哲
|
2011
|
Third Asia Pacific Symposium on Internetware 2011 Nanning
|
Enhancing Flexibility of TCG’s TNC through Layered Property Attestation
|
于爱民
|
2011
|
|
A DRTM-based Method for Trusted Network Connection
|
冯伟
|
2011
|
|
CoolMag: a tangible interaction tool to customize instruments for children in music education
|
张诚
|
2011
|
UbiComp '11 Proceedings of the 13th international conference on Ubiquitous computing
|
空间事件检测的加速策略研究
|
胡佳锋
|
2011
|
第7届全国普适计算学术会议
|
第三届中文倾向性分析评测ISCAS-Opinion系统报告
|
韩先培
|
2011
|
第三届中文倾向性分析评测论文集
|
Security of the SMS4 Block Cipher Against Differential Cryptanalysis
|
Su,BZ
|
2011
|
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY
|
IOT Gateway: Bridging Wireless Sensor Networks into Internet of Things
|
朱倩
|
2010
|
|
FireGuide: A Context-Aware Fire Response Guide for the Building Occupants
|
李元平
|
2010
|
|
information security and cryptology
|
林东岱
|
2010
|
|
Recent Advances in Program Verification through Computer Algebra
|
|
2010
|
Frontiers of Computer Science in China
|
On Hierarchically Developing Reactive Systems
|
|
2010
|
INFORMATION AND COMPUTATION
|
Congruence Formats for Weak Readiness Equivalence and Weak Possible Future Equivalence
|
Xiaowei Huang
|
2010
|
THE COMPUTER JOURNAL
|
采用了剪枝优化的子类型关系判定算法
|
戴晓君
|
2010
|
软件学报
|
改进的以SMT为基础的实时系统限界模型检测
|
徐亮
|
2010
|
软件学报
|
A Heuristic Approach to Positive Root Isolation for Multiple Power Sums
|
|
2010
|
Journal of Universal Computer Science
|
The Computational SLR: A Logic for Reasoning about Computational Indistinguishability
|
|
2010
|
Math. Struct.in Comp. Science
|
Loop Formulas for Description Logic Programs
|
|
2010
|
Theory and Practice of Logic Programming
|
Extending the Strand Space Method with Timestamps: Part I the Theory
|
李勇坚
|
2010
|
Jounal of Information Security
|
Extending the Strand Space Method with Timestamps: Part II Application to Kerberos V
|
李勇坚
|
2010
|
Jounal of Information Security
|
基于复用计算的大纹理实时合成
|
陈昕
|
2010
|
计算机学报
|
用圆锥体拟合线性模型点云数据的优化计算
|
孙春娟
|
2010
|
计算机辅助设计与图形学学报
|
Parametric Search: Three New Applications
|
王文成
|
2010
|
Front. Math. China
|