Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
Software Product Lines Composition through Partial Derivation
Amina Guendouz, Djamal Bennouar
An Efficient Framework for Creating Twitter Mart on a Hybrid Cloud
Imran Khan, S. Kazim Naqvi, Mansaf Alam, Mohammad Najmud Doja, S. Nasir Aziz Rizvi
Model Driven Approach for Test Data Optimization Using Activity Diagram Based On Cuckoo Search Algorithm
Rajesh Ku. Sahoo, Durga Prasad Mohapatra, Manas Ranjan Patra
Real Time Recognition of Handwritten Devnagari Signatures without Segmentation Using Artificial Neural Network
Shailendra Kumar Dewangan
Video Analytics Algorithm for Automatic Vehicle Classification (Intelligent Transport System)
ArtaIftikhar, Ali Javed
Application of PKI in Encrypting Communications and Verifying Identities of Users in the Internet Banking
Xingyu Gong, Shangfu Gong
Application of Digital Mockup Technology
Gaoming Ding
Detecting Polymorphic Buffer Overflow Exploits with a Static Analysis Approach
Guo Fan, Lu JiaXing, Yu Min
A Group-oriented Access Control Scheme for P2P Networks
Wang Xiaoming, Cheng Fan
Research and Design of The Firewall Penetration Technology Serving to Informati on Sharing Systems
GAO Shou-ping, WANG Lu-da
A Security Routing Protocol Protecting Mobile Agent Against Cluster Attack
Wenbing Wang, Zhifeng Zhang
A Comprhensive CBVR System Based on Spatiotemporal Features Such as Motion,Quantized Color and Edge Density Features
Kalpana S.Thakre, Archana M.Rajurkar
A Scalable Simulation Method for Network Attack
Jinsong Wang, Wenchao Dou, Kai Shi
Compose Real-world Service With Context
Guoping Zhang, Jiazheng Tian
The Study on Formal Verification of OS Kernel
Zhang Yu, Dong Yunwei, Zhang Zhongqiu, Huo Hong, Zhang Fan
Study on the Distribution of Networked Devices’ Clock Skew
Jiao Chengbo, Zheng Hui
Privacy Preserving Similarity Measurement
ZHANG Guo-rong
The Empirical Study on the Relationship between Knowledge Integration and IT Project Performance
Ying Cui
An Improved Dynamic Probabilistic Packet Marking Algorithm
Qiao Yan, Xiaoming He, Tuwen Ning
A Trust Evaluation Model for Industrial Control Ethernet Network
ZHOU Sen-xin, HAN Jiang-hong, TANG Hao
Design and Implementation of Anti-phishing Authentication System
Wang Binjun, Wei Yang, Yang Yanyan, Han Jia
Defending Against LDoS Attacks Using Fair AQM
Bianqin Wang, Shunzheng Yu
Identifying Sentiment in Web Multi-topic Documents
Na Fan
Efficient Proxy Re-encryption with Private Searching in the Untrusted Cloud
Xi Chen, Yong Li
Research on Diffusion Strategy About Resource Index of MP2P
Fangfang Guo, Jing Xu
The Comparison of Machine Learning Algorithms on Online Classification of Network Flows
Keji Wei, Shaolong Cao, Jian Yu
A Multi-step Attack Recognition and Prediction Method Via Mining Attacks Conversion Frequencies
MAN Da-peng, LI Xue-zhen, YANG Wu, WANG Wei, XUAN Shi-chang
The Selective Forwarding Attack in Sensor Networks: Detections and Countermeasures
Wazir Zada Khan, Yang Xiang, Mohammed Y Aalsalem, Quratulain Arshad
The Research and Application of Webpage Temper-proofing System
Wu Beihua, Wang Yongquan
Two Noise Addition Methods For Privacy-Preserving Data Mining
Likun Liu, liang Hu, Di Wang, Yanmei Huo, Lei Yang, Kexin Yang
A Data Flow Behavior Constraints Model for Branch Decision-making Variables
Lu Yan, Wang Dan, Zhao Wen Bing
Research on Trustworthy Distributed System
LUO Chen, HE Ming, LIU Xiao-Ming, LI Yuan
The Study of Access Control for Service-Oriented Computing in Internet of Things
Guoping Zhang, Jing Liu
Securing Peer-to-Peer Distributions with Trusted Platform Modules
Hao Li, Yu Qin, Qianying Zhang, Shijun Zhao
A New Secure Strategy for Small-Scale IEEE 802.11 Wireless Local Area Network
Huiting Liu, Hua Zhang, Weilin Xu, Yigang Yang
A Novel Method of Web Services Selection Based on Weighted Grey Relational Model in Ubiquitous Computing Environments
Yiming He, Xianyi Qian
A modified semi-supervised color image segmentation method
Wei Hongru, Chai Fangyong
Empirical Network Performance Evaluation of Security Protocols on Operating Systems
Shaneel Narayan, Michael Fitzgerald
Keywords Review of IT Security Literature in Recent 20 Years
QIAN Liping, LIN Yan, WANG Lidong
Crash Recovery for Embedded Main Memory Database
Yi-bing Li, Shuang Wang, Fang Ye