Home | Survey | Payment| Talks & Presentations | Job Opportunities
Journals   A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Journal of the Graduate School of the Chinese Academy of Sciences
1002-1175
2015 Issue 5
zheng gao jian ze
..............page:576
A further discussion on the conservatism of robust linear optimization problems
LIU Pengfei;YANG Wenguo;School of Mathematical Sciences;University of Chinese Academy of Sciences;Key Laboratory of Big Data Mining and Knowledge Management;Chinese Academy of Sciences;
..............page:577-581
The number of solutions of some equations over finite fields
SONG Jia;CHEN Yufu;School of Mathematical Sciences;University of Chinese Academy of Sciences;
..............page:582-587
Prediction of length-of-day variation using grey relational analysis and extreme learning machine
LEI Yu;CAI Hongbing;ZHAO Danning;National Time Service Center;Chinese Academy of Sciences;Key Laboratory of Time and Frequency Primary Standards;Chinese Academy of Sciences;University of Chinese Academy of Sciences;
..............page:588-593+604
Shape-dependent effects of nanoceria on the activity of Pd/CeO2 catalysts for CO oxidation
WANG Lei;MAO Junyi;YUAN Qing;HUANG Tao;Research Institute of Petroleum Processing;Sinopec;
..............page:594-604
Influence factors of electrochemical removal of nitrogen from stored urine
ZANG Haixing;HU Zhengyi;LIU Xiaoning;WEN Guoqi;University of Chinese Academy of Sciences;
..............page:605-611
Spatial change and its influence factors of rural settlements in Xiji of Ningxia in Loess Plateau area
SUN Guiyan;WANG Chuansheng;XIAO Lei;LIU Yi;Key Laboratory of Regional Sustainable Development Modeling;Institute of Geographic Sciences and Natural Resources Research;Chinese Academy of Sciences;University of Chinese Academy of Sciences;Western Institute of China Academy of Urban Planning and Design;
..............page:612-619
Dynamic calculation and driving force analysis of energy footprint in Yangtze River Delta region from 1990 to 2012
CHEN Xiaofei;ZHANG Luocheng;YAN Renhua;Nanjing Institute of Geography and Limnology;Chinese Academy of Sciences;University of Chinese Academy of Sciences;
..............page:620-626
Efficiency evaluation of equipment manufacturing industries in Northeast China based on DEA model
MA Xiaolei;MA Yanji;Northeast Institute of Geography and Agroecology;Chinese Academy of Sciences;University of Chinese Academy of Sciences;
..............page:627-634
Coordination between quality and scale of urbanization in oasis cities in Xinjiang
FU Qian;YANG Degang;ZHANG Xinhuan;YIN Jingjing;Xinjiang Institute of Ecology and Geography;Chinese Academy of Sciences;University of Chinese Academy of Sciences;
..............page:635-643
Numerical simulation of temperature evolution during rock deformation process based on experimental data
LIU Xuyao;HU Caibo;SHI Yaolin;Key Laboratory of Computational Geodynamics of Chinese Academy of Sciences;College of Earth Science;University of Chinese Academy of Sciences;
..............page:644-651
Estimation of slip distribution for the M_w7.8 Kunlunshan earthquake by coseismic displacements
MI Qi;LI Yanheng;SHEN Wenhao;SHI Baoping;University of Chinese Academy of Sciences;Engineering Design & Research Institute of the Second Artillery Corps;
..............page:652-660
A joint resource allocation and ABS power control algorithm with QoS constraints
YU Linhao;LU Hancheng;HONG Peilin;Information Network Lab;University of Science and Technology of China;
..............page:661-666
A new mitigation approach for covert channel of Android operating system based on permission mechanism
WU Jingzheng;WU Yanjun;LUO Tianyue;WU Zhifei;YANG Mutian;WANG Yongji;Institute of Software;Chinese Academy of Sciences;State Key Laboratory of Computer Science;Institute of Software;Chinese Academy of Sciences;National Engineering Research Center for Fundamental Software;Institute of Software;Chinese Academy of Sciences;
..............page:667-675
An AD-based private cloud storage access control scheme
LI Congwu;PAN Wuqiong;LIN Jingqiang;Data Assurance and Communication Security Research Center of Chinese Academy of Sciences;
..............page:676-681
Unified authentication technology in cloud storage environment
WANG Lei;WANG Pingjian;XIANG Ji;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;
..............page:682-688
An easy-to-deploy behavior monitoring scheme for Android applications
WANG Xueqiang;LEI Lingguang;WANG Yuewu;Institute of Information Engineering;Chinese Academy of Sciences;Data Assurance and Communication Security Research Center;Chinese Academy of Sciences;University of Chinese Academy of Sciences;
..............page:689-694
Signature private key generation method based on the physical properties of Nand Flash and its applications
JIA Shijie;XIA Luning;WEN Nan;Data Assurance and Communication Security Center;Chinese Academy of Sciences;Institute of Information Engineering;Chinese Academy of Sciences;University of Chinese Academy of Sciences;Beijing Jiang Nan Tian An Technology Company;LTD;
..............page:695-700
China standard cryptographic algorithm implementation in virtual desktop system
LIN Xueyan;LIN Jingqiang;GUAN Le;WANG Lei;Data Assurance and Communication Security Center;Chinese Academy of Sciences;State Key Laboratory of Information Security;Institute of Information Engineering;Chinese Academy of Sciences;University of Chinese Academy of Sciences;
..............page:701-707
Efficient attribute-based signature with constant signature size
ZHANG Yan;ZHANG Liwu;ZHANG Moli;Trusted Computing and Information Assurance Laboratory;Insitute of Software;Chinese Academy of Sciences;China United Network Communications Corporation Limited;
..............page:708-713
An anti-lost scheme for confidential files based on trusted computation
LI Fenghai;ZHANG Bailong;DU Jiao;SONG Yan;LI Shuang;Science and Technology on Information Assurance Laboratory;Jiangsu Information and Technology College;
..............page:714-720