计算机网络和信息集成教育部重点实验室2012年发表论文一览表 | ||||||||||||||||||||
2012年期刊论文: | ||||||||||||||||||||
序号 | 第一作者 | 文章名称 | 发表刊物名称及期卷号 | 论文级别 | 检索情况 | |||||||||||||||
1 | Jiuchuan Jiang |
|
| SCI,EI |
| |||||||||||||||
2 | Darong Lai | Learning Overlapping Communities in Complex Networks via Non-negative Matrix Factorization | International Journal of Modern Physics C, Vol. 22, No. 10, pp.1173-1190, 2011 | SCI | SCI:000297308200008 | |||||||||||||||
3 | Feng Zhang | Method for detecting breast cancer by electrical impedance scanning | Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition),42(1):45-49 | EI | Accession number: 20120914812601 | |||||||||||||||
4 | Jiasong Wu | Sliding Conjugate Symmetric Sequency-Ordered Complex Hadamard Transform: Fast Algorithm and Applications | IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS 卷: 59 期: 6 页: 1321-1334 DOI: 10.1109/TCSI.2011.2173386 出版年: JUN 2012 | SCI | IDS 号: 952WO | |||||||||||||||
5 | Yang Chen | Thoracic low-dose CT image processing using an artifact suppressed large-scale nonlocal means | 来源出版物: PHYSICS IN MEDICINE AND BIOLOGY 卷: 57 期: 9 DOI: 10.1088/0031-9155/57/9/2667 出版年: MAY 7 2012 | SCI | IDS 号: 929FH | |||||||||||||||
6 | 朱晓建 | 基于粒子群优化的ad hoc网络最小能耗多播路由算法 | 通信学报,第33卷第3期 | EI | 20121614955556 | |||||||||||||||
7 | Weiwei Ni | HilAnchor: Location Privacy Protection in the Presence of Users' Preferences | JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY,27(2),2012 | SCI,EI | WOS:000301446900013 | |||||||||||||||
8 | 倪巍伟 | 面向聚类的数据隐藏发布研究 | 计算机研究与发展,49(5),2012 | EI | 20122615179091 | |||||||||||||||
9 | Fang Dong | An Effective Data Aggregation based Adaptive Long Term CPU Load Prediction Mechanism on Computational Grid | FUTURE GENERATION COMPUTER SYSTEMS 2011年,卷: 28 期: 7 页: 1030-1044 | SCI/EI | SCI:000304636600007 EI: 20121814983506 | |||||||||||||||
10 | Bixin Li | Profiling All Paths: A New Profiling Technique for Both Cyclic and Acyclic Paths | the Journal of Systems and Software, Elsevier, July 2012, 85(7):1558-1576 | SCI | SCI检索IDS号:951LO | |||||||||||||||
11 | Bixin Li | Automatic Test Case Selection for Regression Testing of Composite Service Based on Extensible BPEL Flow Graph | the Journal of Systems and Software, Elsevier, June 2012, 85(7):1300-1321. | SCI | SCI检索IDS号:936YQ | |||||||||||||||
12 | Chunli Xie | Combining Control Structure and Composition Condition for Web Services Reliability Prediction | Chinese Journal of Electronics 2012, 22(3): 425-429. | SCI | SCI检索IDS号:976WS | |||||||||||||||
13 | Min Zhu | Transforming HybridUML to hybrid program for CPS property verification | Tien Tzu Hsueh Pao/Acta Electronica Sinica, v 40, n 6, p 1126-1132, June 2012 | EI | EI检索号:20123615396196 | |||||||||||||||
14 | Xiaobing Sun | Using LoCMD to support software change analysis | Ruan Jian Xue Bao/Journal of Software, v 23, n 6, p 1368-1381, June 2012 | EI | EI检索号:20122915260121 | |||||||||||||||
15 | Lulu Wang | Profiling all paths | Ruan Jian Xue Bao/Journal of Software, v 23, n 6, p 1413-1428, June 2012 | EI | EI检索号:20122915260124 | |||||||||||||||
16 | Cuicui Liu | Test path generation and prioritization of WS-CDL | Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), v 42, n 3, p 428-434, May 2012 | EI | EI检索号:20122715214981 | |||||||||||||||
17 | Xiang Zhou | A partition-based candidate network generation algorithm for keyword search on relational databases | Journal of Southeast University (Natural Science Edition),v 42, n 4, p 609-613, July 2012 | EI | 20123715424345 | |||||||||||||||
18 | Jiaji Zhou | Degree-based sampling method with partition-based subgraph finder for larger motif detection | Applied Mechanics and Materials, v 135-136, p 509-515, 2012, Advances in Science and Engineering II | EI | 20114914578867 | |||||||||||||||
19 | Chaojun Li | A novel core-attachment based greedy search method for mining functional modules in protein interaction networks | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v 6674 LNBI, p 332-343, 2011, Bioinformatics Research and Applications - 7th International Symposium, ISBRA 2011, Proceedings | EI | 20112013980768 | |||||||||||||||
20 | Jieyue He | An efficient algorithm for discovering probability motifs in biological networks | Journal of Southeast University (Natural Science Edition), v 42, n 1, p 35-39, January 2012 Language: Chinese | EI | 20120914812599 | |||||||||||||||
21 | Jieyue He | Efficient and accurate greedy search methods for mining functional modules in protein interaction networks | BMC Bioinformatics 2012, 13(Suppl 10):S19 http://www.biomedcentral.com/1471-2105-13-S10-S19 | SCI | 入藏号: WOS:000306140100019 | |||||||||||||||
22 | Xiaoping Li | Adaptive hybrid algorithms for the sequence-dependent setup time permutation flow shop scheduling problem | IEEE Transactions on Automation Science and Engineering | EI | 20122815226636 | |||||||||||||||
23 | 朱洁 | A divide and conquer-based greedy search for two-machine no-wait job shop problems with makespan minimisation | INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH | SCI | ‘000304824400009 | |||||||||||||||
24 | 朱洁 | An effective meta-heuristic for no-wait job shops to minimize makespan | IEEE Transactions on Automation Science and Engineering | SCI | ‘000304754400018 | |||||||||||||||
25 | 张毅 | Estimation of distribution algorithm for permutation flow shops with total flowtime minimization | COMPUTERS & INDUSTRIAL ENGINEERING | SCI | ‘000289395500025 | |||||||||||||||
26 | Junzhou Luo | An interval centroid based spread spectrum watermarking scheme for multi-flow traceback | Journal of Network and Computer Applications (JNCA) 35 (2012):60–71 | SCI | UT WOS:000298338600006 | |||||||||||||||
27 | Junzhou Luo | A trust degree based access control in grid environments | Information SciencesVolume 179 Issue 15, July, 2009 Pages 2618-2628 | SCI | UT WOS: 000298338600006 | |||||||||||||||
28 | Junzhou Luo | A clustering analysis and agent-based trust model in a grid environment supporting virtual organisations | INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES(IJWGS)卷: 5期: 1页: 3-16出版年: 2009 | SCI | UT WOS:000271426900002 | |||||||||||||||
29 | Junzhou Luo | Optimization of Gateway Deployment with Load Balancing and Interference Minimization in Wireless Mesh Networks | Journal of Universal Computer Science, 2011, 17(14) | SCI | WOS:000304607900011 | |||||||||||||||
30 | 王维 | 基于网络编码的多射频无线Mesh网组播时延建模与分析 | 计算机研究与发展 | EI | (EI)Compendex: 20123215308660 | |||||||||||||||
31 | 王维 | 多射频无线Mesh网络组播端到端时延建模与优化 | 计算机学报 | EI | (EI)Compendex: 20123615396358 | |||||||||||||||
32 | Xiaogang Wang | A potential HTTP-based application-level attack against Tor | Future Generation Computer Systems 27 (2011) 67-77 | SCI | UT ISI:000282246000008 | |||||||||||||||
33 | 郑啸 | 面向机会社会网络的服务广告分发机制 | 计算机学报,2012,35(6) | EI | 20123215308651 | |||||||||||||||
34 | Tian Tian | Cooperative Replica Prefetching Mechanism for Virtual Organization in Grid | Journal of Software,2011,22(10):2372−2384 | EI | doi: 10.3724/SP.J.1001.2011.03925 | |||||||||||||||
35 | 顾军 | 基于排队Petri网的服务系统性能建模与分析方法 (Performance Modeling and Analysis of Service Systems Using Queueing Petri Nets) | 计算机学报, 第34卷第12期, 2011年12月, 2435-2455 | EI | 20120214672609, | |||||||||||||||
36 | 顾军 | 一种基于执行力模型的服务平台自主控制方法 (Autonomic Control Approach Based on Performability Model) | 计算机学报, 第35卷第2期, 2012年2月, 282-297 | EI | 20121214874186 | |||||||||||||||
37 | Zhen Ling | A new cell-counting-based attack against tor | IEEE/ACM Transactions on Networking,20(4): 1245-1261 | EI | 20123515378167 | |||||||||||||||
38 | 吴文甲 | 干扰约束和负载均衡的无线Mesh网络网关部署策略 | 计算机学报, 2012, 35(5) | EI | 20122815240369 | |||||||||||||||
39 | Juan Xu | Quantum secret sharing without exclusive OR of qubits’ measuring results | CEC 2012. Brisbane, Australia, June 10-15, 2012 613-616 | EI | ||||||||||||||||
40 | Juan Xu | A simple and secure quantum secret sharing scheme based on product states | International Journal of Quantum Information, 2012, 10(3) | SCI | 000304611800006 | |||||||||||||||
41 | Zhihao Liu | Deterministic Secure Quantum Communication with Mutual Authentication Based on Bell Measurement | CEC 2012. Brisbane, Australia, June 10-15, 2012 726-730 | EI | ||||||||||||||||
42 | Zhihao Liu | Mutually Authenticated Deterministic Secure Quantum Communication without Unitary Operations | 2011AQIS, Busan, Korea. August 23-27, 2011, Seoul, Korea, August 29-30, 2011. 185-186 | EI | ||||||||||||||||
43 | Zhihao Liu | High-dimensional deterministic multiparty quantum secret sharing without unitary operations | Quantum Information Processing | SCI | ||||||||||||||||
44 | Zhihao Liu | Quantum secure direct communication with optimal quantum superdense coding by using general four-qubit states | Quantum Information Processing | SCI | ||||||||||||||||
45 | Zhihao Liu | Unitary operations are not required for message encoding or decoding in deterministic secure quantum communication | TQC 2012, Tokyo, Japan, May 17-19, 2012 | EI | ||||||||||||||||
46 | Zhihao Liu | Deterministic secure quantum communication without unitary operation based on high-dimensional entanglement swapping (基于高维纠缠交换的无酉操作确定性安全量子通信) | 中国科学(F), Vol. 41 (12): 1474-1482,Dec. 2011. | EI | ||||||||||||||||
47 | 杨忠明 | 基于二分法量子可逆逻辑电路综合 | 电子学报, Vol. 40 (5): 1045-1049,May.2012 | EI | ||||||||||||||||
2012年会议论文: | ||||||||||||||||||||
48 | Pinzheng Zhang |
|
| EI |
| |||||||||||||||
49 | Jiasong Wu | Sliding conjugate symmetric sequency-ordered complex Hadamard transform: fast algorithm and applications | European Signal Processing Conference, Aalborg, Denmark, 2010 : 1742-1746. | EI | Accession number: 20122915261956 | |||||||||||||||
50 | Honglin Wang | Customizable and scalable network architecture modeling and analysis | 2010 2nd International Conference on Information Science and Engineering (ICISE) | EI | 20110913704293 | |||||||||||||||
51 | Hongbing Wang | Collaborative approaches to complementing qualitative preferences of agents for effective service selection | Proceedings - 2011 23rd IEEE International Conference on Tools with Artificial Intelligence, ICTAI 2011 | EI | 20120314693983 | |||||||||||||||
52 | Hongbing Wang | Web service selection with quantitative and qualitative user preferences | Proceedings - 2011 IEEE/WIC/ACM International Conference on Web Intelligence, WI 2011 | EI | 20114514485626 | |||||||||||||||
53 | Fang Dong | Load-aware based Adaptive Rescheduling Mechanism for Workflow Application | Proceedings of the 2011 15th International Conference on Computer Supported Cooperative Work in Design,400-407 | EI | ‘20113614293894 | |||||||||||||||
54 | Wanzhi Wen | Software fault localization based on program slicing spectrum | International Conference on Software Engineering, p 1511-1514, 2012 | EI | EI检索号:20123115287983 | |||||||||||||||
55 | Peng Yang | Study on the Historical Development and Current Status of Computer Fundamentals Education of Liberal Arts in China | 2011 International Conference on Education and Education Management (EEM 2011) | CPCI-SSH | WOS: 000302661400056 | |||||||||||||||
56 | 李旻旻 | A memory and variable neighborhood structure based complete local search for the no-wait job shop problem | Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design | EI | ’20123115289470 | |||||||||||||||
57 | 侯培英 | An improved harmony search algorithm for blocking job shop to minimize makespan | Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design | EI | 20123115289466 | |||||||||||||||
58 | 徐涛 | Efficient iterated greedy algorithm to minimize makespan for the no-wait flowshop with sequence dependent setup times | Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design | EI | ‘20123115289469 | |||||||||||||||
59 | Xiaogang Wang | An efficient sequential watermark detection model for tracing network attack flows | IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2012) | EI | 20123115289384 | |||||||||||||||
60 | Xudong Ni | A trust aware access control in service oriented grid environment | Sixth International Conference on Grid and Cooperative Computing (GCC 2007) | EI | Accession number: 10021587 | |||||||||||||||
61 | Xudong Ni | A trust degree based access control for multi-domains in grid environment | 11th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2007 | EI | Accession number: 20083011404918 | |||||||||||||||
62 | Xudong Ni | MPSL: A Mobile Phone-Based Physical-Social Location Verification System | Wireless Algorithms, Systems, and Applications. 7th International Conference, WASA 2012 | EI | Accession number: 12949346 | |||||||||||||||
63 | Zhen Ling | Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery | Proceedings of the 30th IEEE International Conference on Computer Communications (INFOCOM'12) | EI | 20122315083313 | |||||||||||||||
64 | Zhen Ling | A novel network delay based side-channel attack: Modeling and defense | Proceedings of the 30th IEEE International Conference on Computer Communications (INFOCOM'12) | EI | 20122315083314 | |||||||||||||||
65 | Yuxiang Wang | Improving Online Aggregation Performance for Skewed Data Distribution | The 17th International Conference on Database Systems for Advanced Applications (DASFAA 2012) | EI | 20121915010233 | |||||||||||||||
66 | Hanwu Chen | A New Construction Method of Quantum Error-Correcting Codes Based on Elementary Transformation | Asian Conference on Quantum Information Science 2010 (AQIS 2010), Tokyo, Japan, August 27–31, 2010, 167-168. | EI | ||||||||||||||||
67 | Yichuan Jiang | The Rich Get Richer: Preferential Attachment in the Task Allocation of Cooperative Networked Multiagent Systems With Resource Caching | IEEE Transactions on Systems Man and Cybernetics Part A-Systems and Humans | SCI、EI | SCI, IDS Number: 993XM; EI Number: 20123515384857 |