Search results for: Dianxi Shi
Personal and Ubiquitous Computing > 2017 > 21 > 3 > 427-441
Lecture Notes in Computer Science > Computer Network Security > Information Flow Analysis, Covert Channels and Trust Management > 245-258
Lecture Notes in Computer Science > Digital Libraries: For Cultural Heritage, Knowledge Dissemination, and Future Creation > Information Mining/Extraction > 98-107
Lecture Notes in Computer Science > Web Information Systems and Mining > Web Content Mining > 113-121
Lecture Notes in Computer Science > Grid and Cooperative Computing - GCC 2005 > Session 4: Resource Management > 719-724
Lecture Notes in Computer Science > Information and Communications Security > Access Control > 222-237
Science China Information Sciences > 2015 > 58 > 9 > 1-15