SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.
Citation: | Li Jintao, Min Yinghua. Product-Oriented Test-Pattern Generation for Programmable Logic Arrays[J]. Journal of Computer Science and Technology, 1990, 5(2): 164-174. |
[1] |
H.Fleisher and L.I.Maissel. An introduction to array logic, IBM J. Res. Develop., l9 (1975). 98-109.
|
[2] |
Signetics Field Programmable Logic Array, Sunnyvale. CA: Signetics. Mar. 1976.
|
[3] |
C.W.Cha, A testing strategy for PLAs, Proc. l5th Design Auto. Conf., 1978, 83-89.
|
[4] |
E.J.Muelhdorf and T.W.Williams. Optimized stuck-fault test pattern generation for PLA macro. Dig. IEEE semiconductor test symp., Cherry Hill. Oct.1977, 88-101.
|
[5] |
D.L.Ostapko and S.J.Hong, Fault analysis and test pattern generation for programmable logic arrays, IEEE Trans.on Compur.,C-28(1979). 617-626. ……….
|
[1] | Yong-Dong Zhang, Sheng Tang, Jin-Tao Li. Secure and Incidental Distortion Tolerant Digital Signature for Image Authentication[J]. Journal of Computer Science and Technology, 2007, 22(4): 618-625. |
[2] | Duo Liu, Ping Luo, Yi-Qi Dai. Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem[J]. Journal of Computer Science and Technology, 2007, 22(1): 92-94. |
[3] | Xin-Yi Huang, Willy Susilo, Yi Mu, Fu-Tai Zhang. Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt 2004[J]. Journal of Computer Science and Technology, 2007, 22(1): 71-74. |
[4] | Yu-Chun Ma, Xian-Long Hong, She-Qin Dong, C. K. Cheng, Jun Gu. General Floorplans with L/T-Shaped Blocks Using Corner Block List[J]. Journal of Computer Science and Technology, 2006, 21(6): 922-926. |
[5] | Hong-Bin Zhang, Cheng Yang, Xiao-Mei Quan. Image Authentication Based on Digital Signature and Semi-Fragile Watermarking[J]. Journal of Computer Science and Technology, 2004, 19(6). |
[6] | LI JiGuo, CAO ZhenFu, ZHANG YiChen. Nonrepudiable Proxy Multi-Signature Scheme[J]. Journal of Computer Science and Technology, 2003, 18(3). |
[7] | WANG ChangJie, ZHANG FangGuo, WANG YuMin. Secure Web Transaction with Anonymous MobileAgent over Internet[J]. Journal of Computer Science and Technology, 2003, 18(1). |
[8] | LI Xianxian, HUAI Jinpeng. Efficient Non-Repudiation Multicast Source Authentication Schemes[J]. Journal of Computer Science and Technology, 2002, 17(6). |
[9] | Guan Weiguang, Xie Lin, Ma Songde. Deformable Registration of Digital Images[J]. Journal of Computer Science and Technology, 1998, 13(3): 246-260. |
[10] | Shen Li, Stephen Y.H.Su. Generalized Parallel Signature Analyzers with External Exclusive-OR Gates[J]. Journal of Computer Science and Technology, 1986, 1(4): 49-61. |