Journal: Science in China Series F: Information Sciences

Volume 57, Issue 7

1 -- 19Bo Wei, Zhi Jin, Didar Zowghi, Bin Yin. Implementation decision making for internetware driven by quality requirements
1 -- 20Wei Zhang, Yicheng Pan, Pan Peng, Jiankou Li, Xuechen Li, Angsheng Li. Global core, and galaxy structure of networks
1 -- 11Jialin Huang, Xuejia Lai. What is the effective key length for a block cipher: an attack on every practical block cipher
1 -- 14Xue-Jun Xie, Cong-Ran Zhao, Na Duan. Further results on state feedback stabilization of stochastic high-order nonlinear systems
1 -- 12Jianxin Wang, Wenjun Li, Shaohua Li, Jianer Chen. On the parameterized vertex cover problem for graphs with perfect matching
1 -- 8Yupu Hu, Hao Lei, Fenghe Wang, Wenzheng Zhang. Gaussian sampling of lattices for cryptographic applications
1 -- 12Min Xia, Liguo Weng, Zhijie Wang, Jian-An Fang. Sequence memory based on an oscillatory neural network
1 -- 11Wenming Cao, Ning Liu, Qicong Kong, Hao Feng. Content-based image retrieval using high-dimensional information geometry
1 -- 19Yifei Pu, Patrick Siarry, Jiliu Zhou, Yiguang Liu, Ni Zhang, Guo Huang, Yizhi Liu. Fractional partial differential equation denoising models for texture image
1 -- 15Bixin Li, Lulu Wang, Hareton Leung. Profiling selected paths with loops
1 -- 11Huajun Liu, Fazhi He, Fuxi Zhu, Qing Zhu. Real-time control of human actions using inertial sensors
1 -- 12Yuping Shen, Xishun Zhao. Proof systems for planning under 0-approximation semantics
1 -- 18Lin Chen, Ju Qian, Yuming Zhou, Peng Wang, Baowen Xu. Identifying extract class refactoring opportunities for internetware
1 -- 7Xiong Wang, Guanrong Chen. Generating Lorenz-like and Chen-like attractors from a simple algebraic structure
1 -- 16Xuhao Chen, Li Shen, Zhiying Wang, Zhong Zheng, Wei Chen. Binary compatibility for embedded systems using greedy subgraph mapping
1 -- 5Dehua Zhou, Jian Weng, Chaowen Guan, Robert Deng, Min-Rong Chen, Kefei Chen. Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext
1 -- 12Jaekwan Park, Jeyun Park, Youngki Kim. System lifecycle processes for cyber security in a research reactor facility
1 -- 11Xiaochun Cao, Yujie Zhang, Xiaojie Guo, Yiu-ming Cheung. Video color conceptualization using optimization
1 -- 12Qing Gu, Shijie Xiong, Daoxu Chen. Correlations between characteristics of maximum influence and degree distributions in software networks
1 -- 9Ping Huang, Minghao Yin. An upper (lower) bound for Max (Min) CSP