CORC

浏览/检索结果: 共14条,第1-10条 帮助

限定条件                
已选(0)清除 条数/页:   排序方式:
application-level cpu consumption estimation: towards performance isolation of multi-tenancy web applications 会议论文
2012 IEEE 5th International Conference on Cloud Computing, CLOUD 2012, Honolulu, HI, United states, June 24, 2012 - June 29, 2012
Wang Wei; Huang Xiang; Qin Xiulei; Zhang Wenbo; Wei Jun; Zhong Hua
收藏  |  浏览/下载:13/0  |  提交时间:2013/09/22
simulation of ingan/gan light-emitting diodes with a non-local quantum well transport model 会议论文
12th International Conference on Numerical Simulation of Optoelectronic Devices, NUSOD 2012, Shanghai, China, August 28, 2012 - August 31, 2012
Xia Chang Sheng; Simon Li Z.M.; Sheng Yang; Cheng Li Wen; Da Hu Wei; Lu Wei
收藏  |  浏览/下载:8/0  |  提交时间:2013/09/22
simulation of ingan/gan light-emitting diodes with patterned sapphire substrate 会议论文
12th International Conference on Numerical Simulation of Optoelectronic Devices, NUSOD 2012, Shanghai, China, August 28, 2012 - August 31, 2012
Sheng Yang; Xia Chang Sheng; Simon Li Z.M.; Cheng Li Wen
收藏  |  浏览/下载:10/0  |  提交时间:2013/09/22
key management scheme of wireless sensor networks based on polynomial and ring-tree network topology 会议论文
3rd International Conference on Multimedia Information Networking and Security, MINES 2011, Shanghai, China, November 4
Wei Hongru; Yang Kejia; Wu Rui; Chen Cui
收藏  |  浏览/下载:13/0  |  提交时间:2013/10/08
a smart card based generic construction for anonymous authentication in mobile networks 会议论文
International Conference on Security and Cryptography, SECRYPT 2011, Seville, Spain, July 18, 2
Xu Jing; Zhu Wen-Tao; Feng Deng-Guo
收藏  |  浏览/下载:10/0  |  提交时间:2013/10/08
searching for doubly self-orthogonal latin squares 会议论文
17th International Conference on Principles and Practice of Constraint Programming, CP 2011, Perugia, Italy, September
Lu Runming; Liu Sheng; Zhang Jian
收藏  |  浏览/下载:18/0  |  提交时间:2011/10/10
an enhanced password authenticated key agreement protocol for wireless mobile network 会议论文
5th International Conference on Information Security and Cryptology, Inscrypt 2009, Beijing, China, 40878
Gao Zhigang; Feng Dengguo
收藏  |  浏览/下载:12/0  |  提交时间:2011/03/31
a new client-to-client password-authenticated key agreement protocol 会议论文
2nd International Workshop on Coding and Cryptology, Zhangjiajie, PEOPLES R CHINA, JUN 01-05,
Feng Deng-Guo; Xu Jing
收藏  |  浏览/下载:8/0  |  提交时间:2011/03/20
an efficient and provably secure cross-realm client-to-client password-authenticated key agreement protocol with smart cards 会议论文
8th International Conference on Cryptology and Network Security, CANS 2009, Kanazawa, Japan, 40878
Jin Wenting; Xu Jing
收藏  |  浏览/下载:13/0  |  提交时间:2011/03/20
sla monitoring based on semantic web 会议论文
1st International Conference on Future Computer and Communication, Wuhan, PEOPLES R CHINA, JUN 06-07,
Dong Wenli
收藏  |  浏览/下载:8/0  |  提交时间:2011/03/20


©版权所有 ©2017 CSpace - Powered by CSpace