1 | -- | 19 | Bo Wei, Zhi Jin, Didar Zowghi, Bin Yin. Implementation decision making for internetware driven by quality requirements |
1 | -- | 20 | Wei Zhang, Yicheng Pan, Pan Peng, Jiankou Li, Xuechen Li, Angsheng Li. Global core, and galaxy structure of networks |
1 | -- | 11 | Jialin Huang, Xuejia Lai. What is the effective key length for a block cipher: an attack on every practical block cipher |
1 | -- | 14 | Xue-Jun Xie, Cong-Ran Zhao, Na Duan. Further results on state feedback stabilization of stochastic high-order nonlinear systems |
1 | -- | 12 | Jianxin Wang, Wenjun Li, Shaohua Li, Jianer Chen. On the parameterized vertex cover problem for graphs with perfect matching |
1 | -- | 8 | Yupu Hu, Hao Lei, Fenghe Wang, Wenzheng Zhang. Gaussian sampling of lattices for cryptographic applications |
1 | -- | 12 | Min Xia, Liguo Weng, Zhijie Wang, Jian-An Fang. Sequence memory based on an oscillatory neural network |
1 | -- | 11 | Wenming Cao, Ning Liu, Qicong Kong, Hao Feng. Content-based image retrieval using high-dimensional information geometry |
1 | -- | 19 | Yifei Pu, Patrick Siarry, Jiliu Zhou, Yiguang Liu, Ni Zhang, Guo Huang, Yizhi Liu. Fractional partial differential equation denoising models for texture image |
1 | -- | 15 | Bixin Li, Lulu Wang, Hareton Leung. Profiling selected paths with loops |
1 | -- | 11 | Huajun Liu, Fazhi He, Fuxi Zhu, Qing Zhu. Real-time control of human actions using inertial sensors |
1 | -- | 12 | Yuping Shen, Xishun Zhao. Proof systems for planning under 0-approximation semantics |
1 | -- | 18 | Lin Chen, Ju Qian, Yuming Zhou, Peng Wang, Baowen Xu. Identifying extract class refactoring opportunities for internetware |
1 | -- | 7 | Xiong Wang, Guanrong Chen. Generating Lorenz-like and Chen-like attractors from a simple algebraic structure |
1 | -- | 16 | Xuhao Chen, Li Shen, Zhiying Wang, Zhong Zheng, Wei Chen. Binary compatibility for embedded systems using greedy subgraph mapping |
1 | -- | 5 | Dehua Zhou, Jian Weng, Chaowen Guan, Robert Deng, Min-Rong Chen, Kefei Chen. Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext |
1 | -- | 12 | Jaekwan Park, Jeyun Park, Youngki Kim. System lifecycle processes for cyber security in a research reactor facility |
1 | -- | 11 | Xiaochun Cao, Yujie Zhang, Xiaojie Guo, Yiu-ming Cheung. Video color conceptualization using optimization |
1 | -- | 12 | Qing Gu, Shijie Xiong, Daoxu Chen. Correlations between characteristics of maximum influence and degree distributions in software networks |
1 | -- | 9 | Ping Huang, Minghao Yin. An upper (lower) bound for Max (Min) CSP |