當前位置:編程學習大全網 - 編程語言 - 王建新的發表論文

王建新的發表論文

[1] 王新輝, 王建新, 張玉婷. 開發指令並行的分支控制技術. 計算機工程與應用, 第35卷第12期, 1999, pp25-35.

[2] Baozhu Guo, Jianxin Wang. The Unbounded Energy Solution for Free Vibration of an Axially Moving String. Journal of Vibration and Control, Vol. 6, No. 5, 2000, pp651-665.

[3] 王建新, 吳戰江, 王許書. 對數據結構空間局部性的存儲保真度的研究(I). 計算機工程與應用, 第37卷第13期, 2001, pp5-36.

[4] 王建新, 王新輝, 張野. 對數據結構空間局部性的存儲保真度的研究(II). 計算機工程與應用, 第37卷第15期, 2001, pp58-60.

[5] 王建新, 夏宏, 張野. 對數據結構空間局部性的存儲保真度的研究(III). 計算機工程與應用, 第37卷第17期, 2001, pp46-47.

[6] 楊炳儒, 王建新. KDD中雙庫協同機制的研究(I). 中國工程科學, 第4卷第4期, 2002, pp41-51.

[6] 楊炳儒, 王建新, 孫海洪. KDD中雙庫協同機制的研究(II). 中國工程科學, 第4卷第5期, 2002, pp34-43.

[7] 孟建良, 王曉華, 龐春江, 王建新. 全局時變權組合預測方法. 計算機工程與應用, 第38卷第10期, 2002, pp98-99.

[8] Jianxin Wang, Geng Zhao, Wei Wei, Peng Ye. TTT Language and TTT Security Log Analyzer. International Conference of Applied Cryptography and Network Security (ACNS), pp316-324. Huangshan, China, 2004.

[9] Jianxin Wang, Geng Zhao, Weidong Zhang. A Subjective Distance for Clustering Security Events. International Conference on Communications, Circuits and Systems Proceedings (ICCCAS), pp74-78. Hongkong, China, May 27-30, 2005.

[10] Gengzhao, Jianxin Wang, Fangfang Liu. Analysis of Some Recently Proposed Chaos-based Public Key Encryption Algorithms. International Conference on Communications, Circuits and Systems Proceedings (ICCCAS), pp1573-1576. Guilin, China, June 25-28, 2006.

[11] Jianxin Wang, Hongzhou Wang, Geng Zhao. A GA-based Solution to an NP-hard Problem of Clustering Security Events. International Conference on Communications, Circuits and Systems Proceedings (ICCCAS), pp2093-2097. Guilin, China, June 25-28, 2006.

[12] 肖政, 王建新, 侯紫峰, 韋衛. 基於搜索樹的告警高效聚類算法和Bayes分類器的設計和研究. 計算機科學, Vol.33, No.8, 2006, p190-194.

[13] 王建新, 陳誌泊, 王春玲, 張海燕, 孫俏. ACM編程賽題在《數據結構》教學中的應用研究. 《北京林業大學學報》社會科學版教改論文集.

[14] Yun-Qing Xia, Jian-Xin Wang, Fang Zheng, Yi Liu, “A binarization approach to email categorization using binary decision tree,” Proceedings of the 6th International Conference on Machine Learning and Cybernetics (ICMLC) , Vol.6, 3459-3464, 19-22 August 2007, Hong Kong.

[15] Jianxin Wang, Yunqing Xia, Hongzhou Wang. Mining Intrusion Detection Alarms with an SA-based Clustering Approach. Proceedings of 2007 International Conference on Communications, Circuits and Systems, p905-909, Kokura, Fukuoka Japan. July 11-13, 2007. (EI)

[16] Jianxin Wang, Geng Zhao, Yunqing Xia. A More General Form of Apriori and Its Application in Clustering Security Events. Proceedings of 2007 International Conference on Communications, Circuits and Systems, p954-958, Kokura, Fukuoka Japan. July 11-13, 2007.

[17] 朱金清, 王建新, 陳誌泊. 基於APRIORI的層次化聚類算法及其在IDS日誌分析中的應用. 計算機研究與發展, 第44卷增刊, 2007年10月. pp326-330.

[18] 王娜, 王建新, 胡湧. 層次分析法在高校專業設置中的應用. 計算機應用與軟件. 第26卷第9期, 2009年9月. P126-128,141

[19] Jianxin Wang, Baojiang Cui. Clustering IDS Alarms with an IGA-based Approach. 2009 International Conference on Communications, Circuits and Systems Proceedings, San Jose, USA and Chengdu, China, July 23-25, 2009, p586-590.

[20] Jianxin Wang. Reducing the Overlap among Hierarchical Clusters with a GA-based Approach. The 1st International Conference on Information Science and Engineering (ICISE2009), Nanjing, China, December 26th to 28th, 2009, p221-226.

[21] 崔寶江, 郭鵬飛, 王建新. 基於符號執行與實際執行的二進制代碼執行路徑分析. 清華大學學報, 自然科學版(增刊), 2009年S2期.

[22] 王建新, 李力人. 用“三段論”原理講解Java語法中的兩個難點. 計算機教育, 2010年第10期(總第118期), p85-87.

[23] Jianxin Wang, Haiyan Zhang, Xiaoli Dong, Ben Xu, Benjin Mei. An Effective Hybrid Crossover Operator for Genetic Algorithms to Solve K-means Clustering Problem. Proceedings of 2010 Sixth International Conference on Natural Computation, p2271-2275.

[24] Haiyan Zhang, Jianxin Wang, Wei Meng. An Improved 3D Object Feature Points Correspondence Algorithm. Proceedings of 2010 Sixth International Conference on Natural Computation, p101-105.

  • 上一篇:C++編程,定義壹個復數類
  • 下一篇:妳會選擇什麽樣的專業呢?
  • copyright 2024編程學習大全網