智能与分布计算实验室
 

2010年论文

  1. Ruixuan Li, Cuihua Zuo,Haiying Shen,Kunmei Wen,Xiwu Gu.. PercolationNET: a Multi-tree P2P Overlay Netw.... The 11th International Conference on Web-Age Information Management (WAIM 2010), Jiuzhai Valley, Sichuan, China, July 2010, pp.74-85
  2. Ruixuan Li, Jianfeng Lu,Zhengding Lu,Xiaopu Ma.. Consistency Checking of Safety and Availabili.... IEICE Transactions on Information and Systems, 2010, E93-D(3):491-502
  3. Guoqiang Gao,Ruixuan Li,Xiwu Gu,Kunmei Wen,Zhengding Lu, Kun Yan. Mimir: Term-Distributed Indexing and Search f.... The 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010), Chicago, IL, USA, October 9-12,2010
  4. Ruixuan Li,Meng Dong,Bin Liu,Jianfeng Lu, Xiaopu Ma,kai Li. SecTag: A Multi-Policy Supported Secure Web T.... The 17th ACM Conference on Computer and Communications Security (CCS 2010) (Demo), Chicago, IL, USA, October 4-8, 2010, pp.633-635
  5. Yang ShuangYuan,Lu ZhengDing,Han ShuiHua. A Novel Asymmetric Image Encrypation Scheme b.... IEEE International Symposium on Communications and Information Technologies(ISCIT 2004), Sapporo, Japan, October 26-29 ,2010, pp.66-69
  6. Jinwei , Yan Zhang,Ruixuan Li. Towards Automatic Update of Access Control Po.... The 24th USENIX Large Installation System Administration Conference (LISA 2010), San Jose, CA, USA, November 7-12,2010, pp.59-74
  7. Yuhua Li,Quan Lin,Ruixuan Li,Dongsheng Duan. TGP: Mining Top-K Frequent Closed Graph Patte.... The International Conference on Advanced Data Mining and Applications (ADMA 2010), Chongqing, China, November 19-21, 2010, pp.537-548
  8. Kunmei Wen,Ruixuan Li,Bing Li. Searching Concepts and Association Relationsh.... The 9th International Conference on Grid and Cloud Computing (GCC 2010), Nanjang, Jiangsu, China, November 1-5,2010, pp.432-437
  9. Xiaopu Ma,Ruixuan Li,Zhengding Lu. Role Mining Based on Weights. The 15th ACM Symposium on Access Control Models and Technologies (SACMAT 2010), Pittsburgh, PA, USA, June 2010, pp.65-74
  10. Jinwei Hu,Yan Zhang,Ruixuan Li,Zhengding Lu. Role Updating for Assignments. The 15th ACM Symposium on Access Control Models and Technologies (SACMAT 2010), Pittsburgh, PA, USA, June 2010, pp.89-98
  11. Yan. Semantic Grounding of Hybridization for Tag R.... The 11th International Conference on Web-Age Information Management (WAIM 2010), Jiuzhai Valley,Sichuan, China, July 2010, pp.139-150
  12. Guoqiang Gao, Ruixuan Li, Kunmei Wen, Xiwu Gu, Zhengding Lu. Proactive Replication and Search for Rare Obj.... The 11th International Conference on Web-Age Information Management (WAIM 2010), Jiuzhai Valley, Sichuan, China, July 2010, pp.74-85
  13. Jin Xia,Kunmei Wen,Ruixuan Li,Xiwu Gu. Optimizing Academic Conference Classification.... The 13th International Conference on Computational Science and Engineering (CSE 2010), Hong Kong, China, December 11-13,2010, pp.289-294
  14. Yan. Topic-sensitive Tag Ranking. The 20th International Conference on Pattern Recognition (ICPR 2010), Istanbul, Turkey, August 2010, pp.629-632
  15. Huang Xiaotao, Cai Liang, Wu Chi,Huang Liqun. The research of information security risk ass.... International Conference on Networked Computing and Advanced Information Management(NCM 2010), Seoul, Korea (South), Aug 16-18,2010, pp.370-375
  16. Jinwei Hu,Yan Zhang,Ruixuan Li,Zhengding Lu. A Logic for Authorization Provenance. The 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), Beijing, China, April 2010, pp.238-249
  17. Huang Xiao Tao , Li Sha ,Huang Li Qun. A Layered Multi-agent Detection Model for. International Conference on Biomedical Engineering and Computer Science (ICBECS 2010), 23-25 April 2010
  18. 李开,李瑞轩,鲁剑锋,卢正鼎. 一种不依赖于协商策略的信任协商协议. 计算机科学, 2010, 37(11):34-37
  19. 吴炜,苏永红,李瑞轩,卢正鼎. 基于DHT的分布式索引技术研究与实现. 计算机科学, 2010, 37(2):65-70
  20. 鲍洋,卢正鼎,,黄保华,李瑞轩,胡和平,路松峰. 结构化P2P系统中副本一致性管理的一种新算法. 小型微型计算机系统, 2010, 31(3):385-390
  21. 靳延安,李瑞轩,文坤梅,辜希武,卢正鼎,段东圣. 社会标注及其在信息检索中的应用研究综述. 中文信息学报, 2010, 24(4):52-62
  22. 李开,卢正鼎,李瑞轩,刘百灵. 自动信任协商中的攻击与防范. 计算机科学, 2010, 37(8):67-71
  23. 鲍洋,卢正鼎,黄保华,李瑞轩,胡和平,路松峰. 适合 P2P 环境的动态多秘密共享方案. 计算机科学, 2010, 37(9):40-43
  24. 李开,李瑞轩,章华娟,卢正鼎. P2P网络中基于信任的风险计算方法. 计算机科学, 2010, 37(10):102-104