{"title":"Capability-aware data placement for heterogeneous active storage systems","authors":"Xiangyu Li, Shuibing He, Xianbin Xu, Yang Wang","doi":"10.1007/s11859-016-1167-4","DOIUrl":"https://doi.org/10.1007/s11859-016-1167-4","url":null,"abstract":"","PeriodicalId":23976,"journal":{"name":"Wuhan University Journal of Natural Sciences","volume":"21 1","pages":"249-256"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11859-016-1167-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52955678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation method of software reliability based on SPN model","authors":"Ping Pan, Xinyue Mao, Xu Zhu","doi":"10.1007/s11859-016-1166-5","DOIUrl":"https://doi.org/10.1007/s11859-016-1166-5","url":null,"abstract":"","PeriodicalId":23976,"journal":{"name":"Wuhan University Journal of Natural Sciences","volume":"21 1","pages":"242-248"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11859-016-1166-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52955617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software watermarking scheme based on multivariate public key cryptosystem","authors":"Xiaoyan Sun, Maosheng Zhang, Shaowu Mao, Zhengwei Ren, Huanguo Zhang","doi":"10.1007/s11859-016-1168-3","DOIUrl":"https://doi.org/10.1007/s11859-016-1168-3","url":null,"abstract":"","PeriodicalId":23976,"journal":{"name":"Wuhan University Journal of Natural Sciences","volume":"21 1","pages":"257-261"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11859-016-1168-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52955704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptanalysis of schemes based on pseudoinverse matrix","authors":"Jinhui Liu, Huanguo Zhang, Jianwei Jia","doi":"10.1007/s11859-016-1161-x","DOIUrl":"https://doi.org/10.1007/s11859-016-1161-x","url":null,"abstract":"","PeriodicalId":23976,"journal":{"name":"Wuhan University Journal of Natural Sciences","volume":"21 1","pages":"209-213"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11859-016-1161-x","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52955376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction of minimum bandwidth regenerating codes with combinatorial design","authors":"Feng Cai, Wangmei Guo","doi":"10.1007/s11859-016-1164-7","DOIUrl":"https://doi.org/10.1007/s11859-016-1164-7","url":null,"abstract":"","PeriodicalId":23976,"journal":{"name":"Wuhan University Journal of Natural Sciences","volume":"21 1","pages":"229-234"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11859-016-1164-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52955446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel vulnerability prediction model to predict vulnerability loss based on probit regression","authors":"Jinkun Geng, Ping Luo","doi":"10.1007/s11859-016-1162-9","DOIUrl":"https://doi.org/10.1007/s11859-016-1162-9","url":null,"abstract":"","PeriodicalId":23976,"journal":{"name":"Wuhan University Journal of Natural Sciences","volume":"116 1","pages":"214-220"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11859-016-1162-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52955398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research and design of reconfigurable composite field multiplication in symmetric cipher algorithms","authors":"Yang Su, Mingshu Zhang, Kai Yang","doi":"10.1007/s11859-016-1165-6","DOIUrl":"https://doi.org/10.1007/s11859-016-1165-6","url":null,"abstract":"","PeriodicalId":23976,"journal":{"name":"Wuhan University Journal of Natural Sciences","volume":"21 1","pages":"235-241"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11859-016-1165-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52955520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple input multiple output CDSK chaotic communication system and its performance analysis","authors":"Junyi Duan, Guoping Jiang, Hua Yang","doi":"10.1007/s11859-016-1163-8","DOIUrl":"https://doi.org/10.1007/s11859-016-1163-8","url":null,"abstract":"","PeriodicalId":23976,"journal":{"name":"Wuhan University Journal of Natural Sciences","volume":"21 1","pages":"221-228"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11859-016-1163-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52955421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fault-tolerant cycles embedding in folded hypercubes","authors":"Hongmei Liu, M. Tang","doi":"10.1007/s11859-016-1158-5","DOIUrl":"https://doi.org/10.1007/s11859-016-1158-5","url":null,"abstract":"","PeriodicalId":23976,"journal":{"name":"Wuhan University Journal of Natural Sciences","volume":"118 1","pages":"191-198"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11859-016-1158-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52955194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gracefulness of several unconnected graphs with wheel","authors":"Jing Wei, Tao-Ming Wang, Caiyun Sun","doi":"10.1007/s11859-016-1159-4","DOIUrl":"https://doi.org/10.1007/s11859-016-1159-4","url":null,"abstract":"","PeriodicalId":23976,"journal":{"name":"Wuhan University Journal of Natural Sciences","volume":"21 1","pages":"199-203"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/s11859-016-1159-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52955311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}