1 | -- | 14 | Guojun Wang, K. S. Chin, C. Y. Dang. A unified approximate reasoning theory suitable for both propositional calculus system ::::L:::::::*::: and predicate calculus system ::::K:::::::*::: |
15 | -- | 27 | Yong Tang, Min Rao, Lei Li, Yu Chen, Jianfeng Jiang, Mingde Zhang, Xiaohan Sun. A novel model on dynamic resource allocation in optical networks |
28 | -- | 45 | Daiyuan Peng, Pingzhi Fan. New theoretical bounds on the aperiodic correlation functions of binary sequences |
46 | -- | 66 | Qingguang Ji, Sihan Qing, Yeping He. A new formal model for privilege control with supporting POSIX capability mechanism |
67 | -- | 77 | Yuxi Fu. A schematic axiom for open congruence |
78 | -- | 90 | Wenling Wu, Dengguo Feng. Collision attack on reduced-round Camellia |
91 | -- | 106 | Feng Yang, Hai-Xin Duan, Xing Li. Modeling and analyzing of the interaction between worms and antiworms during network worm propagation |
107 | -- | 116 | Yi Jin, Huacan He, Lirong Ai. Lane of parallel through carry in ternary optical adder |
117 | -- | 124 | Xinghua Li, Jianfeng Ma, Sang-Jae Moon. Security extension for the Canetti-Krawczyk model in identity-based systems |
125 | -- | 136 | Liangliang Xiao, Mulan Liu. Linear multi-secret sharing schemes |