Institute of Software, EECS, Peking University, Beijing, China,MoE Key Lab of High Confidence Software Technologies (PKU), China,MoE Key Lab of Network and Software Security Assurance (PKU), China
valid path;path-checking protocol;path-checking solution;privacy-preserving path-checking solution;message authentication code;mutual authentication;sequential aggregate message authentication;RFID-Based supply chainsIn;privacy analysis;privacy consideration
Institute of Software, EECS, Peking University, Beijing, China,MoE Key Lab of High Confidence Software Technologies (PKU), China,MoE Key Lab of Network and Software Security Assurance (PKU), China
valid path;path-checking protocol;path-checking solution;privacy-preserving path-checking solution;message authentication code;mutual authentication;sequential aggregate message authentication;RFID-Based supply chainsIn;privacy analysis;privacy consideration
Shandong Institute of Business and Technology, Shandong, China;China University of Mining and Technology, Beijing, China,National Laboratory of Pattern Recognition, Institute of Automation, CAS, China,Shandong Institute of Business and Technology, China
horror video scene recognition;test image;training image;local region;horror scene;horror scene recognition;horror video dataset;web horror content;bilayer sparse representation;bilayer sparse representationIn image
School of Computer, National University of Defense Technology, Changsha, China;Beijing Institute of System Engineerring, Beijing, China and National Key Laboratory of Science and Technology on Information System Security, Beijing, China;Beijing Institute of System Engineering, Beijing, China, National Key Laboratory of Science and Technology on Information System Security, Beijing, China
OS isolation;host OS;untrusted code;virtual machine;OS image;OS resource;booted OS;dynamic OS migration;explicit OS implementation information;preinstalled OS
Department of Computer and Information Science, The Ohio State University, Columbus, OH;Harvard University;York Univ. at North York, Ontario, Canada;University of Washington, Seattle;Univ. of Waterloo, Ontario, CANADA;Univ. of Rhode Island, Kingston;Department of Computer Science, City University of Hong Kong, Kowloon, Hong Kong;Department of Computer Science, Worcester Polytechnic Institute, Worcester, MA;Univ. of California, Santa Barbara, CA;Microsoft Research China, Beijing, China;Microsoft Research, Beijing, China;The University of Texas at Dallas, Richardson, Texas;Oakland University Rochester, MI;Department of Automation, University of Science and Technology of China, Hefei 230027, China. email:
unlabeled data;proposed method;data quality requirement;multimedia data;random data;sensor data;source data;experimental result;data analysis;data quality
Beijing Institute of System and Engineering, Beijing, China;National Key Laboratory of Science and Technology on Information System Security, Beijing, China;Beijing Institute of System Engineer, Beijing, China;National Key Laboratory of Science and Technology on Information System Security, Beijing, China, Beijing Institute of System Engineering, China
network survivability;survivable network;Index System;Network Security;clustering algorithm;control network;different network layer;different network system;network application;network condition
Tsinghua Univ., Beijing, China;State Key Lab of Intelligent Technology and Systems, Beijing, China;Microsoft Research Asia, Beijing, China;State Key Lab of Intelligent Technol. & Syst., Beijing, China;NeoGrid Inc, Beijing, China;Tencent Research Center, Beijing, China;State Key Lab. of Intelligent Technol. & Syst., Beijing, China
experimental result;relevance feedback;similar image;Web image;general-purpose image;general-purposed image;image retrieval;vertical image search engine;web image retrieval;commercial Web image search
College of Management, Shenzhen, China,Hefei Institute of Intelligent Machines, Chinese Academy of Sciences, Hefei, China,Institute for Cultural Industries, Shenzhen University, Shenzhen, China
RFID network;BF-PSORFID network planning;RFID network planning problem;Bacteria Foraging Optimization;Particle Swarm Optimization;economic efficiency;new mathematical model;proposed model;Self-adaptive ES;carbon emission
MIT Media Lab and Tsinghua University;MIT Media Lab, China, Department of Automation, Tsinghua University, China, Graduate School at Shenzhen, Tsinghua University, China
free space propagation;frequency domain;angular light variation;light pulse;transient light transport;relativistic ultrafast rendering;ultrafast exposure;ultrafast movie;ultrafast repeatable event;effective exposure time
SKLOIS, Institute of Software, Chinese Academy of Sciences, Beijing, China;SKLOIS, Institute of Software, Chinese Academy of Sciences, Beijing, China,Graduate University of Chinese Academy of Sciences, Beijing, China
embedding degree;elliptic curve;extension field;Selmer curves case;Tate pairing;pairing lattice;efficient pairings;tate pairing computation;ordinary elliptic curve;RSA ring