2010年论文

2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2005 2004 2002

  1. [1] Zhao H, Xu M, Zheng N, et al. Malicious executables classification based on behavioral factor analysis[C]. Sanya, China: IEEE Computer Society, 2010. [PDF]
  2. [2] Ming Xu, Hong-Rong Yang,et al.An Adaptive Method to Identify Disk Cluster Size Based on Block Content[J].Digital Investigation 2010.
  3. [3] Jin Z P, Xu J, Xu M, et al. An attribute-oriented model for identity management[C]. Sanya, China: IEEE Computer Society, 2010. [PDF]
  4. [4] Zhen'Gang Y, Ning Z, Ming X. Automatic positive sentiment word extraction for Chinese text classification[C]. Computer Design and Applications (ICCDA), 2010. [PDF]
  5. [5] Shanhu Shang,Ning Zheng.Detecting Malware Variants via Function-call Graph Similarity.5th IEEE International Conference on Malicious and Unwanted Software (Malware 2010), Nancy Francy. 19th Oct. 2010.(accept) [PDF] [BibTex] [RIS]
  6. [6] Yingjie W, Ning Z, Ming X. An Automatic Carving Method for RAR File Based on Content and Structure[C].The 2nd International Conference on Information Technology and Computer Science (ITCS2010) , 2010. [PDF]
  7. [7] Z.P Jin Jian Xu et al. Mobile-aware anonymous peer selecting algorithm for enhancing privacy and connectivity in location-based service [C] (2010ICEBE).(accept) [PDF] [BibTex] [RIS]
  8. [8] Z.P Jin Jian Xu et al. A Location Privacy Preserving Algorithm Based on Linkage Protection[C](2010ICITIS).(accept) [PDF]
  9. [9] Minglong Yi, MingXu.A Blog Advertising Comments Detecting Approach Based on Behavior Analysis.[C](2010 APCIP).
  10. [10] Xu, Ye. ; Xu, Ming.Width extraction of JPEG fragment via frequency coefficients scale similarity measuring[C].(ICFCC2010). [PDF]
  11. [11] Tao Xu,Ming Xu.BBS Topic’s Hotness Forecast Based on Back-Propagation Neural Network[C].(WISM'10-AICI'10 ). [PDF]
  12. [12] 汪霞,郑宁,徐明,等. 基于中文变形词匹配的贝叶斯邮件过滤模型[J]. 计算机应用与软件. 2010(01): 105-107. [PDF]
  13. [13] 陈亮,郑宁,郭艳华,等. 朴素贝叶斯增量学习在病毒上报分析中的应用[J]. 计算机应用与软件. 2010(01): 92-95. [PDF]
  14. [14] 范轩苗,郑宁,范渊. 一种基于Ajax的爬虫模型的设计与实现[J]. 计算机应用与软件. 2010(01): 96-99. [PDF]
  15. [15] 陈默,郑宁,徐明,等. 一种基于内容特征的Word文件雕复方法[J]. 计算机应用与软件. 2010(01): 100-102. [PDF]
  16. [16] Xu Jian,Guo Ming,Xu Ming,Lin Xin. User fairness of IEEE802.11 WLAN downlink [C].Future Computer and Communication (ICFCC), 2010 2nd International Conferenc,IEEE,2010. [PDF]
  17. [17] Xu Jian,Guo Ming,Xu Ming,Lin Xin. Shadow Queue Based Fair Scheduling in Multi-Hop Wireless Networks [C]. Wireless Communications Networking and Mobile Computing (WiCOM), 2010 6th International Conference on ,IEEE,2010. [PDF]