相关期刊:《China Communications》《Science China(Information Sciences)》《Journal of Systems Engineering and Electronics》《Wuhan University Journal of Natural Sciences》更多>>
supported by National High Technology Research and Development Program of China(863 Program)(Grant Nos.2012AA01A301,2012AA010901);Program for New Century Excellent Talents in University and National Natural Science Foundation of China(Grant Nos.61402486,61402492,61272142);Moreover,it is a part of Innovation Fund Sponsor Project of Excellent Postgraduate Student(Grant No.B130608)
Concurrency bugs widely exist in concurrent programs and have caused severe failures in the real world. Researchers have made significant progress in detecting concurrency bugs, which improves software reliability. In...
supported in part by National Natural Science Foundation of China(Grant Nos.90818018,9111800)
Multicore and multi-threaded processors have become the norm for modern processors. Accordingly, concurrent programs have become more and more prevalent despite being difficult to write and understand. Although errors...
Manuscript Received Nov. 2010; Accepted Feb. 2011. This work is supported by the National Key Technologies R&D Program of China (No.2008BAH24B03), the National Natural Science Foundation of China (No.60673122, No.60940033), the Postdoctoral Sci- ence Foundation of China (No.20080440121), the Natural Science Foundation of Province (No.06017089, No.60940033), the Science and Technology Planning Project of Hunan Province (No.2010GK3020).
With the advanced Internet technology, business applications across multiple enterprises based on Composition web services (CWS) paradigm are widely used. Since business processes among enterprises become complex, l...
sponsored and financial supported by National Natural Science Foundation of China (NSFC), grant No.61003121;Sichuan Province High Technology Program under No.2009CD00014
Simple power analysis is the most devastating attack on the security of elliptic curve scalar multiplication and can probably retrieve the secret key. In this paper,we analyze the formulas of point doubling and additi...
This work was supported by the Major State Basic Research Development Program of China (973 Program) (Grant No. 2002CB312005);the National Natural Science Foundation of China (Grant No. 60573126).
An internetware application is composed by existing individual services, while transaction processing is a key mechanism to make the composition reliable. The existing research of transactional composite service (TCS...
A new class of atomicity, namely contract atomicity is presented. A newtechnical strategy based on convertible signature and two-phase commitment is proposed forimplementing atomicity of electronic contract protocol. ...
Atomicity and anonymity are desirable properties for reliable and security e-Cash transaction and the guarantee of the participants’ interests. But there are conflicts between these two properties. In this paper, an ...
This project was supported by the National Natural Science Foundation of China (70031020).
Atomicity is necessary for reliable and secure electronic commerce transaction and to guarantee the participants' interests. An atomic and efficient e-cash (electronic cash) transaction protocol based on the classical...
Let E and F be Banach lattices. It is known that if every continuous linear operator from E into F is regular, then, under some mild assumptions on E or F, either E is lattice isomorphic to an AL-space or F is lattice...