- Baojiang Cui, Ce Bian, Tao Guo, Yongle Hao, Jianxin Wang:
Synthesis Algorithm of Homologous Detection Based on Analytic Hierarchy Process. CIS 2011: 826-830 - Meiyin Dai, Fanzhang Li:
Dynamic Fuzzy Semisupervised Multitask Learning. CIS 2011: 450-454 - Qing Dai, Xiufeng Zhao, Qiuliang Xu, Han Jiang:
A New Cross-realm Group Password-based Authenticated Key Exchange Protocol. CIS 2011: 856-860 - Guang Deng, Zengyuan Li:
The Study of Improved Marker-Controlled Watershed Crown Segmentation Algorithm. CIS 2011: 1576-1579 - Chao Deng, Sulin Pang:
The BSC Alarm Management System Based on Rough Set Theory in Mobile Communication. CIS 2011: 1557-1561 - Yi Ding, Lei Fan:
Traitor Tracing and Revocation Mechanisms with Privacy-Preserving. CIS 2011: 842-846 - Yi Ding, Lei Fan:
Efficient Password-Based Authenticated Key Exchange from Lattices. CIS 2011: 934-938 - Salvatore Distefano, Antonio Puliafito:
Achieving Distributed System Information Security. CIS 2011: 526-530 - Yun-yuan Dong, Yang Jun, Qi-jun Liu, Yong-Xian Wang, Zhenghua Wang:
Exploring Centrality-Lethality Rule from Evolution Constraint on Essential Hub and Nonessential Hub in Yeast Protein-Protein Interaction Network. CIS 2011: 63-65 - Mengxuan Dong, Fanzhang Li:
The Estimation Algorithm of Laplacian Eigenvalues for the Tangent Bundle. CIS 2011: 492-496 - Ning Dong, Yuping Wang:
A Hybrid Multiobjective Differential Evolution Algorithm Based on Improved έ-Dominance. CIS 2011: 24-28 - Jinling Du, Chunxiao Wang, Feng Zhang:
Multi-objective Optimization of Bus Dispatching Based on Improved Genetic Algorithm. CIS 2011: 106-109 - Yuhong Duan, Yuelin Gao:
A New Improved Particle Swarm Optimization Algorithm. CIS 2011: 42-46 - Xiaoyi Duan, Ronglei Hu, Xiu Ying Li:
Research and Implementation of DPA-resistant SMS4 Block Cipher. CIS 2011: 1033-1036 - Xiang Fan, William W. Guo, Mark Looi:
Modeling and Simulating the Propagation of Unstructured Peer-to-Peer Worms. CIS 2011: 573-577 - Qiuxiang Feng, Degen Huang, Xiuying Li, Rongpei Wang:
DBS Application to Chinese Adjectives. CIS 2011: 1466-1470 - Tianxiang Feng, Hongxia Liu:
Computer Realization of Quadratic Spline Interpolation. CIS 2011: 1447-1450 - Xiaobo Feng, Mingqiang Wang:
Attack on the Cryptosystem Based on DLP. CIS 2011: 896-899 - J. Q. Feng, C. Xu, W. X. Xie:
Monitoring the PSO Process Based on Fuzzy Random Variables. CIS 2011: 101-105 - Huamin Feng, Xinghua Yang, Biao Liu, Chao Jiang:
A Spam Filtering Method Based on Multi-modal Features Fusion. CIS 2011: 421-426 - Chuanyi Fu, Huandong Chen, Jieqing Xing:
Spectral Clustering and its Research Progress. CIS 2011: 1367-1369 - Wei Fu, Guang-liang Liu:
An ID-based (k, t, n) Threshold Group Signature Scheme. CIS 2011: 878-881 - Yanjun Fu, Weiqiang Wang:
Fast and Effectively Identify Pornographic Images. CIS 2011: 1122-1126 - Chuanyi Fu, Jinmei Zhan, Juntao Chen:
Design and Implement of SerialPort class on Upper machine System. CIS 2011: 1471-1473 - Yingchun Fu, Xiantie Zeng, Xueyu Lu:
Spatial Prediction of Dissolved Organic Carbon Using GIS and ANN Modeling in River Networks. CIS 2011: 401-406 - Guolong Gan, Jian Cheng:
Pedestrian Detection Based on HOG-LBP Feature. CIS 2011: 1184-1187 - Xin Gao, Qingxuan Jia, Huan Hu, Hanxu Sun, Jingzhou Song:
A Human-Computer Interaction Method with Multi-Dimensional Information in the Teleoperation Augmented Reality System. CIS 2011: 180-184 - Sheng Gao, Guohui Li, Pei Zhao:
Marshmallow: A Content-Based Publish-Subscribe System over Structured P2P Networks. CIS 2011: 290-294 - Xingbao Gao, Jing Wang:
A Neural Network for a Class of Horizontal Linear Complementary Problems. CIS 2011: 353-357 - Chao-Qin Gao, Chuang-Bai Xiao:
A Security Model for Information Systems with Multi-level Security. CIS 2011: 620-624