Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Wuhan University Journal of Natural Sciences
1007-1202
2016 Issue 3
Inequalities for Mixed Width-Integrals
ZHANG Ting;WANG Weidong;College of Science;China Three Gorges University;
..............page:185-190
Fault-Tolerant Cycles Embedding in Folded Hypercubes
LIU Hongmei;TANG Maozeng;College of Science;China Three Gorges University;
..............page:191-198
Gracefulness of Several Unconnected Graphs with Wheel
WEI Jing;WANG Tao;SUN Caiyun;Department of Basic Course;North China Institute of Science and Technology;
..............page:199-203
Generalized Interior Shock Layer Solution of Nonlinear Singularly Perturbed Elliptic Equation for Higher Order
SHI Juanrong;SHI Lanfang;MO Jiaqi;Department of Basic Teaching;Anhui Technical College of Mechanical and Electrical Engineering;College of Mathematics and Statistics;Nanjing University of Information Science and Technology;Department of Mathematics;Anhui Normal University;
..............page:204-208
Cryptanalysis of Schemes Based on Pseudoinverse Matrix
LIU Jinhui;ZHANG Huanguo;JIA Jianwei;School of Computer;Wuhan University;Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education;
..............page:209-213
A Novel Vulnerability Prediction Model to Predict Vulnerability Loss Based on Probit Regression
GENG Jinkun;LUO Ping;Institute of Computer Networks;Tsinghua University;School of Software;Tsinghua University;
..............page:214-220
Multiple Input Multiple Output CDSK Chaotic Communication System and Its Performance Analysis
DUAN Junyi;JIANG Guoping;YANG Hua;School of Communication and Signal;Nanjing Institute of Railway Technology;School of Communication and Information Engineering;Nanjing University of Posts and Telecommunications;
..............page:221-228
Construction of Minimum Bandwidth Regenerating Codes with Combinatorial Design
CAI Feng;GUO Wangmei;State Key Laboratory of Integrated Services Networks;Xidian University;
..............page:229-234
Research and Design of Reconfigurable Composite Field Multiplication in Symmetric Cipher Algorithms
SU Yang;ZHANG Mingshu;YANG Kai;Key Laboratory of Information Security;Engineering University of Chinese People’s Armed Police Force;
..............page:235-241
Evaluation Method of Software Reliability Based on SPN Model
PAN Ping;MAO Xinyue;ZHU Xuan;College of Computer Science and Technology;Guizhou University;
..............page:242-248
Capability-Aware Data Placement for Heterogeneous Active Storage Systems
LI Xiangyu;HE Shuibing;XU Xianbin;WANG Yang;School of Computer;Wuhan University;State Key Laboratory of High Performance Computing;National University of Defense Technology;School of Computer Science;Wuhan Donghu University;Shenzhen Institute of Advanced Technology;Chinese Academy of Science;
..............page:249-256
Software Watermarking Scheme Based on Multivariate Public Key Cryptosystem
SUN Xiaoyan;ZHANG Maosheng;MAO Shaowu;REN Zhengwei;ZHANG Huanguo;Guangxi Universities Key Laboratory of Complex System Optimization and Big Data Processing;Yulin Normal University;School of Computer;Wuhan University;Wuhan Digital and Engineering Institute;
..............page:257-261
Structural iMoSIFT for Human Action Recognition
CHEN Huafeng;CHEN Jun;HU Ruimin;National Engineering Research Center for Multimedia Software;Wuhan University;The Key Laboratory of Multimedia and Network Communication Engineering;Wuhan University;
..............page:262-266
A New Method for Identifying Influential Nodes and Important Edges in Complex Networks
ZHANG Wei;XU Jia;LI Yuanyuan;School of Science;East China Jiaotong University;School of Mechatronic Engineering;East China Jiaotong University;School of Science;Wuhan Institute of Technology;
..............page:267-276