北京科技大学期末,北京科技大学计算机与通信工程学院"/>
计算机导论北京科技大学期末,北京科技大学计算机与通信工程学院
[1] Huang Qiming, “Reveal the key factors in affacting the spoc-supported course: Data and survey analysis for data structures course in USTB”, IEEE 16th International Conference on Advanced Learning Technologies, ICALT 2016.
[2] X.Jiang,Q.Huang,“Efficiently preserving the privacy of the semantic routing in Named Data Network”,the 32th International conference on advanced and trusted computing,2015.
[3] X.Jiang,Q.Huang,“Protect the Semantic Network Identity: Attribute-based Searchable Encryption over Routing in Name Data Network”,Inter. Conf. on Network Security and Comm.Engineering,2014.
[4] X.Chen,Q.Huang,“The data protection of MapReduce using homomorphic encryption”,4th IEEE International Conference on Software Engineering and Service Science (ICSESS), 2013.
[5] F.Nzanywayingoma,Q.Huang,“Securable Personal Health Records using Ciphertext Policy Attribute Based Encryption”,IEEE 14th International Conference on e-health Networking, Applications and Services, 2012.
[6] Q.Huang,X.Yang,S.Li,“Identity Authentication and Context Privacy Preservation in Wireless
Health Monitoring System”,International Journal of Computer Network and Information
Security,2011,3.
[7] Q.Huang,“Game Theory”,Sciyo Publishing,2010.
[8] Q.Huang, Q.Yang, J.Huang, M.Ng, “Mining of web page visiting patterns with Continuous-time Markov models”, the Eighth Pacific-Asia Conference on Knowledge Discovery and Data Mining(PAKDD04), Sydney, Australia, 2004.
[9] 黄旗明,LOM型快速成形网格的变尺寸设计,计算机辅助设计与图形学学报,2000,3.
[10] 黄旗明,LOM成形中粘胶形变模型及修正,制造技术与机床,2000,1.
更多推荐
计算机导论北京科技大学期末,北京科技大学计算机与通信工程学院
发布评论