2010年论文
- Ruixuan Li, Cuihua Zuo,Haiying Shen,Kunmei Wen,Xiwu Gu.. PercolationNET: a Multi-tree P2P Overlay Netw.... The 11th International Conference on Web-Age Information Management (WAIM 2010), Jiuzhai Valley, Sichuan, China, July 2010, pp.74-85
- Ruixuan Li, Jianfeng Lu,Zhengding Lu,Xiaopu Ma.. Consistency Checking of Safety and Availabili.... IEICE Transactions on Information and Systems, 2010, E93-D(3):491-502
- Guoqiang Gao,Ruixuan Li,Xiwu Gu,Kunmei Wen,Zhengding Lu, Kun Yan. Mimir: Term-Distributed Indexing and Search f.... The 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010), Chicago, IL, USA, October 9-12,2010
- Ruixuan Li,Meng Dong,Bin Liu,Jianfeng Lu, Xiaopu Ma,kai Li. SecTag: A Multi-Policy Supported Secure Web T.... The 17th ACM Conference on Computer and Communications Security (CCS 2010) (Demo), Chicago, IL, USA, October 4-8, 2010, pp.633-635
- Yang ShuangYuan,Lu ZhengDing,Han ShuiHua. A Novel Asymmetric Image Encrypation Scheme b.... IEEE International Symposium on Communications and Information Technologies(ISCIT 2004), Sapporo, Japan, October 26-29 ,2010, pp.66-69
- Jinwei , Yan Zhang,Ruixuan Li. Towards Automatic Update of Access Control Po.... The 24th USENIX Large Installation System Administration Conference (LISA 2010), San Jose, CA, USA, November 7-12,2010, pp.59-74
- Yuhua Li,Quan Lin,Ruixuan Li,Dongsheng Duan. TGP: Mining Top-K Frequent Closed Graph Patte.... The International Conference on Advanced Data Mining and Applications (ADMA 2010), Chongqing, China, November 19-21, 2010, pp.537-548
- Kunmei Wen,Ruixuan Li,Bing Li. Searching Concepts and Association Relationsh.... The 9th International Conference on Grid and Cloud Computing (GCC 2010), Nanjang, Jiangsu, China, November 1-5,2010, pp.432-437
- Xiaopu Ma,Ruixuan Li,Zhengding Lu. Role Mining Based on Weights. The 15th ACM Symposium on Access Control Models and Technologies (SACMAT 2010), Pittsburgh, PA, USA, June 2010, pp.65-74
- Jinwei Hu,Yan Zhang,Ruixuan Li,Zhengding Lu. Role Updating for Assignments. The 15th ACM Symposium on Access Control Models and Technologies (SACMAT 2010), Pittsburgh, PA, USA, June 2010, pp.89-98
- Yan. Semantic Grounding of Hybridization for Tag R.... The 11th International Conference on Web-Age Information Management (WAIM 2010), Jiuzhai Valley,Sichuan, China, July 2010, pp.139-150
- Guoqiang Gao, Ruixuan Li, Kunmei Wen, Xiwu Gu, Zhengding Lu. Proactive Replication and Search for Rare Obj.... The 11th International Conference on Web-Age Information Management (WAIM 2010), Jiuzhai Valley, Sichuan, China, July 2010, pp.74-85
- Jin Xia,Kunmei Wen,Ruixuan Li,Xiwu Gu. Optimizing Academic Conference Classification.... The 13th International Conference on Computational Science and Engineering (CSE 2010), Hong Kong, China, December 11-13,2010, pp.289-294
- Yan. Topic-sensitive Tag Ranking. The 20th International Conference on Pattern Recognition (ICPR 2010), Istanbul, Turkey, August 2010, pp.629-632
- Huang Xiaotao, Cai Liang, Wu Chi,Huang Liqun. The research of information security risk ass.... International Conference on Networked Computing and Advanced Information Management(NCM 2010), Seoul, Korea (South), Aug 16-18,2010, pp.370-375
- Jinwei Hu,Yan Zhang,Ruixuan Li,Zhengding Lu. A Logic for Authorization Provenance. The 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), Beijing, China, April 2010, pp.238-249
- Huang Xiao Tao , Li Sha ,Huang Li Qun. A Layered Multi-agent Detection Model for. International Conference on Biomedical Engineering and Computer Science (ICBECS 2010), 23-25 April 2010
- 李开,李瑞轩,鲁剑锋,卢正鼎. 一种不依赖于协商策略的信任协商协议. 计算机科学, 2010, 37(11):34-37
- 吴炜,苏永红,李瑞轩,卢正鼎. 基于DHT的分布式索引技术研究与实现. 计算机科学, 2010, 37(2):65-70
- 鲍洋,卢正鼎,,黄保华,李瑞轩,胡和平,路松峰. 结构化P2P系统中副本一致性管理的一种新算法. 小型微型计算机系统, 2010, 31(3):385-390
- 靳延安,李瑞轩,文坤梅,辜希武,卢正鼎,段东圣. 社会标注及其在信息检索中的应用研究综述. 中文信息学报, 2010, 24(4):52-62
- 李开,卢正鼎,李瑞轩,刘百灵. 自动信任协商中的攻击与防范. 计算机科学, 2010, 37(8):67-71
- 鲍洋,卢正鼎,黄保华,李瑞轩,胡和平,路松峰. 适合 P2P 环境的动态多秘密共享方案. 计算机科学, 2010, 37(9):40-43
- 李开,李瑞轩,章华娟,卢正鼎. P2P网络中基于信任的风险计算方法. 计算机科学, 2010, 37(10):102-104
|