信息与工程学部 > 软件工程国家工程研究中心 [162]

Subscribe to this field to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
(Sorted by Submit Date in Descending order): 1 to 20 of 162
Issue DateTitleAuthor(s)
2018CoBOT: Static C/C++ bug detection in the presence of incomplete codeGao, Qing; Ma, Sen; Shao, Sihao; Sui, Yulei; Zhao, G.; Ma, Luyao; Ma, Xiao; Duan, Fuyao; Deng, Xiao; Zhang, Shikun; Chen, Xianglong
2018MODE: A context-aware iot middleware supporting on-demand deployment for mobile devicesHe, Wei; Zhang, Jingbin; Ma, Meng; Wang, Ping
2018Building efficient and available distributed transaction with Paxos-based coding consensusLi, Shenglong; Zhang, Quanlu; Yang, Zhi; Zhao, Hanyu; Dai, Yafei
2018Shaping program repair space with existing patches and similar codeJiang, Jiajun; Xiong, Yingfei; Zhang, Hongyu; Gao, Qing; Chen, Xiangqun
2018CloudRanger: Root cause identification for cloud native systemsWang, Ping; Xu, Jingmin; Ma, Meng; Lin, Weilan; Pan, Disheng; Wang, Yuan; Chen, Pengfei
2018Design and implementation of E-government oriented rapid BPM OA platformWang, Yukun; Lei, Kai; Wu, Jincheng; Huang, Xiaohui; Lu, Yuming
2018Practical large universe attribute-set based encryption in the standard modelFeng, Xinyu; Jin, Cancan; Li, Cong; Fang, Yuejian; Shen, Qingni; Wu, Zhonghai
2018Fully secure hidden ciphertext-policy attribute-based proxy re-encryptionFeng, Xinyu; Li, Cong; Li, Dan; Fang, Yuejian; Shen, Qingni
2018A novel image preprocessing strategy for foreground extraction in person re-identificationWang, Daiyin; Yao, Wenbin; Zhu, Yuesheng
2018Refining traceability links between vulnerability and software component in a vulnerability knowledge graphDu, Dongdong; Ren, Xingzhang; Wu, Yupeng; Chen, Jien; Ye, Wei; Sun, Jinan; Xi, Xiangyu; Gao, Qing; Zhang, Shikun
2018Re-design the BitTorrent Protocol in Next Generation Expressive Internet ArchitectureMeng, Ziqian; Chen, Zhong; Guan, Zhi
2018Statically defend network consumption against acker failure vulnerability in stormQian, Wenjun; Shen, Qingni; Yang, Yizhe; Yang, Yahui; Wu, Zhonghai
2018Discussion on fast and accurate sketches for skewed data streams: A case studySun, Shuhao; Li, Dagang
2018Long-Term Event Processing over Data Streams in Cyber-Physical SystemsWang, Ping; Ma, Meng; Chu, Chao-Hsien
2018CAPED: Context-Aware Powerlet-Based Energy DisaggregationGao, Jingyue; Wang, Yasha; Chu, Xu; He, Yuanduo; Mao, Ziqing
2018集成学习的泛化误差和AUC分解理论及其在权重优化中的应用姜正申; 刘宏志; 付彬; 吴中海
2018一种基于One-Class SVM和GP安全事件关联规则生成方法研究杜栋栋; 任星彰; 陈坤; 叶蔚; 赵文; 张世琨
2018不经意随机访问机研究综述吴鹏飞; 沈晴霓; 秦嘉; 钱文君; 李聪; 吴中海
2018Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor NetworksLi, Wenting; Li, Bin; Zhao, Yiming; Wang, Ping; Wei, Fushan
2018GP-selector: a generic participant selection framework for mobile crowdsourcing systemsWang, Jiangtao; Wang, Yasha; Wang, Leye; He, Yuanduo
(Sorted by Submit Date in Descending order): 1 to 20 of 162