限定检索结果

检索条件"机构=Institute of Software"
41 条 记 录,以下是1-10 订阅
视图:
排序:
Design of secure operating systems with high security levels
收藏 引用
《Science in China(Series F)》2007年 第3期50卷 399-418页
作者:QING SiHan1,2 & SHEN ChangXiang3 1 institute of software, Chinese Academy of Sciences, Beijing 100080, China 2 School of software and Microelectronics, Peking University, Beijing 102600, China 3 institute of Computing Technology, Navy, Beijing 100841, ChinaInstitute of Software Chinese Academy of Sciences Beijing China School of Software and Microelectronics Peking University Beijing China Institute of Computing Technology Navy Beijing China 
Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national an...
来源:详细信息评论
Towards a Methodology for Formal Design and Analysis of Agent Interaction Protocols ——An Investigation in Electronic Commerce
收藏 引用
《Wuhan University Journal of Natural Sciences》2001年 第Z1期6卷 126-139页
作者:Wei Jun 1,2 , Cheung Shing Chi 1, Wang Xu 1 1. Department of Computer Science, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong, China 2. institute of software, Chinese Academy of Science, Beijing 100080, ChDepartment of Computer Science Hong Kong University of Science and Technology Kowloon Hong Kong China Institute of Software Chinese Academy of Science Beijing China 
Various extensions of UML have been developed to meet the challenges of designing modern software systems, such as agent based electronic commerce applications. Recent advances in model checking technology have led i...
来源:详细信息评论
Formal analysis and design of multi-party fair exchange protocols
收藏 引用
《Science in China(Series F)》2006年 第2期49卷 155-174页
作者:QING Sihan1,2,3 & LI Gaicheng1,3 1. Engineering Research Center for Information Security Technology, institute of software, Chinese Academy of Sciences, Beijing 100080, China 2. Beijing Zhongke Ansheng Corporation of Information Technology, Beijing 100080, China 3. Graduate School of the Chinese Academy of Sciences, Beijing 100039, ChinaEngineering Research Center for Information Security Technology Institute of Software Chinese Academy of Sciences Beijing China Beijing Zhongke Ansheng Corporation of Information Technology Beijing China Graduate School of the Chinese Academy of Sciences Beijing China 
Based on the origin of message items and channel combination between transacting parties, and events and relations among events, this paper presents a concise, precise, and hierarchical model for general fair exchange...
来源:详细信息评论
Deadlock Detection in FPGA Design: A Practical Approach
收藏 引用
《Tsinghua Science and Technology》2015年 第2期20卷 212-218页
作者:Dexi Wang Fei He Yangdong Deng Chao Su Ming Gu Jiaguang Sunthe Institute of Software Theory and Systems School of Software Tsinghua University 
Formal verification of VHSIC Hardware Description Language (VHDL) in Field-Programmable Gate Array (FPGA) design has been discussed for many years. In this paper we provide a practical approach to do so. We presen...
来源:详细信息评论
Design Rationale for a Wide Spectrum Specification Language FGSPEC
收藏 引用
《Journal of Computer Science & Technology》1993年 第2期8卷 138-146页
作者:吕建 徐家福Institute of Computer SoftwareNanjing UniversityNanjing 210008 
FGSPEC is a wide spectrum specification language intended to facilitate the software specification and the expression of transformation process from the functional specification which describes“what to do”to the cor...
来源:详细信息评论
Design and Implementation of Java Just-in-Time Compiler
收藏 引用
《Journal of Computer Science & Technology》2000年 第6期15卷 584-590页
作者:丁宇新 梅嘉 程虎Institute of Software Chinese Academy of Sciences Beijing P.R. China 
Early Java implementations relied on interpretation, leading to poor performance compared to compiled programs. Java just-in-time (JIT) compiler can compile Java programs at runtime, so it not only improves Java's...
来源:详细信息评论
A strategy for service realization in service-oriented design
收藏 引用
《Science in China(Series F)》2006年 第6期49卷 864-884页
作者:LIU Jing HE Jifeng LIU ZhimingSoftware Engineering Institute East China Normal University Shanghai 200062 China International Institute of Software Technology United Nations University Macao China 
Recently service orientation is becoming a mainstream approach for building large scale software systems. A key requirement in service-oriented design is the dependability of service. It stipulates that the behavior o...
来源:详细信息评论
Parallel Algorithm Design on Some Distributed Systems
收藏 引用
《Journal of Computer Science & Technology》1997年 第2期12卷 97-104页
作者:孙家昶 迟学斌 张林波 曹建文Institute of Software Chinese Academy of Sciences Beijing Institute of Computational Mathematics and Scientific/Engineering Computing Chinese Academy of Sciences Beijing 
Some testing results on DAWNING-1000, Paragon and workstation cluster are described in this paper. On the home-made parallel system DAWNING-1000 with 32 computational processors, the practical performance of 1.117 Gfl...
来源:详细信息评论
Modular approach to the design and analysis of password-based security protocols
收藏 引用
《Science in China(Series F)》2007年 第3期50卷 381-398页
作者:FENG DengGuo CHEN WeiDongState Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing100080 China 
In this paper, a general framework for designing and analyzing password-based security protocols is presented. First we introduce the concept of "weak computational indistinguishability" based on current progress of...
来源:详细信息评论
Budget Allocation for Maximizing Viral Advertising in Social Networks
收藏 引用
《Journal of Computer Science & Technology》2016年 第4期31卷 759-775页
作者:Bo—LeiZhang Zhu-Zhong Qian Wen-Zhong Li Bin Tang Sang-Lu Lu Xiaoming FuState Key Laboratory for Novel Software Technology Nanjing University Nanjing 210023 China Institute of Computer Science University of G5ttingen G5ttingen 37077 Germany 
Viral advertising in social networks has arisen as one of the most promising ways to increase brand awareness and product sales. By distributing a limited budget, we can incentivize a set of users as initial adopters ...
来源:详细信息评论
聚类工具 回到顶部