共 36 条
[1]
Abd-El-Hafiz S.K., 2011, P INT C SOFTW ENG, P88
[2]
A Metrics-Based Data Mining Approach for Software Clone Detection
[J].
2012 IEEE 36TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC),
2012,
:35-41
[3]
Addison P.S., 1997, Fractals and chaos. An illustrated course, Vfirst
[4]
Agaian S.S., 2006, P IEEE REG 5 C SAN A, P312
[5]
Using IFS as an Encryption method
[J].
2009 INTERNATIONAL CONFERENCE ON EDUCATION TECHNOLOGY AND COMPUTER, PROCEEDINGS,
2009,
:275-278
[6]
Some basic cryptographic requirements for chaos-based cryptosystems
[J].
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS,
2006, 16 (08)
:2129-2151
[8]
[Anonymous], P IROS 2008 WORKSH G
[9]
Avalos Pedro A. Hernandez, 2009, Proceedings of the Tenth Mexican International Conference on Computer Science (ENC 2009), P339, DOI 10.1109/ENC.2009.58