[1] 王新辉, 王建新, 张玉婷 开发指令并行的分支控制技术 计算机工程与应用, 第35卷第12期, 1999, pp25-[2] Baozhu Guo, Jianxin W The Unbounded Energy Solution for Free Vibration of an Axially Moving S Journal of Vibration and Control, V 6, N 5, 2000, pp651-[3] 王建新, 吴战江, 王许书 对数据结构空间局部性的存储保真度的研究(I) 计算机工程与应用, 第37卷第13期, 2001, pp5-[4] 王建新, 王新辉, 张野 对数据结构空间局部性的存储保真度的研究(II) 计算机工程与应用, 第37卷第15期, 2001, pp58-[5] 王建新, 夏宏, 张野 对数据结构空间局部性的存储保真度的研究(III) 计算机工程与应用, 第37卷第17期, 2001, pp46-[6] 杨炳儒, 王建新 KDD中双库协同机制的研究(I) 中国工程科学, 第4卷第4期, 2002, pp41-[6] 杨炳儒, 王建新, 孙海洪 KDD中双库协同机制的研究(II) 中国工程科学, 第4卷第5期, 2002, pp34-[7] 孟建良, 王晓华, 庞春江, 王建新 全局时变权组合预测方法 计算机工程与应用, 第38卷第10期, 2002, pp98-[8] Jianxin Wang, Geng Zhao, Wei Wei, Peng Y TTT Language and TTT Security Log A International Conference of Applied Cryptography and Network Security (ACNS), pp316- Huangshan, China, [9] Jianxin Wang, Geng Zhao, Weidong Z A Subjective Distance for Clustering Security E International Conference on Communications, Circuits and Systems Proceedings (ICCCAS), pp74- Hongkong, China, May 27-30, [10] Gengzhao, Jianxin Wang, Fangfang L Analysis of Some Recently Proposed Chaos-based Public Key Encryption A International Conference on Communications, Circuits and Systems Proceedings (ICCCAS), pp1573- Guilin, China, June 25-28, [11] Jianxin Wang, Hongzhou Wang, Geng Z A GA-based Solution to an NP-hard Problem of Clustering Security E International Conference on Communications, Circuits and Systems Proceedings (ICCCAS), pp2093- Guilin, China, June 25-28, [12] 肖政, 王建新, 侯紫峰, 韦卫 基于搜索树的告警高效聚类算法和Bayes分类器的设计和研究 计算机科学, V33, N8, 2006, p190-[13] 王建新, 陈志泊, 王春玲, 张海燕, 孙俏 ACM编程赛题在《数据结构》教学中的应用研究 《北京林业大学学报》社会科学版教改论文集[14] Yun-Qing Xia, Jian-Xin Wang, Fang Zheng, Yi Liu, “A binarization approach to email categorization using binary decision tree,” Proceedings of the 6th International Conference on Machine Learning and Cybernetics (ICMLC) , V6, 3459-3464, 19-22 August 2007, Hong K[15] Jianxin Wang, Yunqing Xia, Hongzhou W Mining Intrusion Detection Alarms with an SA-based Clustering A Proceedings of 2007 International Conference on Communications, Circuits and Systems, p905-909, Kokura, Fukuoka J July 11-13, (EI)[16] Jianxin Wang, Geng Zhao, Yunqing X A More General Form of Apriori and Its Application in Clustering Security E Proceedings of 2007 International Conference on Communications, Circuits and Systems, p954-958, Kokura, Fukuoka J July 11-13, [17] 朱金清, 王建新, 陈志泊 基于APRIORI的层次化聚类算法及其在IDS日志分析中的应用 计算机研究与发展, 第44卷增刊, 2007年10月 pp326-[18] 王娜, 王建新, 胡涌 层次分析法在高校专业设置中的应用 计算机应用与软件 第26卷第9期, 2009年9月 P126-128,141[19] Jianxin Wang, Baojiang C Clustering IDS Alarms with an IGA-based A 2009 International Conference on Communications, Circuits and Systems Proceedings, San Jose, USA and Chengdu, China, July 23-25, 2009, p586-[20] Jianxin W Reducing the Overlap among Hierarchical Clusters with a GA-based A The 1st International Conference on Information Science and Engineering (ICISE2009), Nanjing, China, December 26th to 28th, 2009, p221-[21] 崔宝江, 郭鹏飞, 王建新 基于符号执行与实际执行的二进制代码执行路径分析 清华大学学报, 自然科学版(增刊), 2009年S2期[22] 王建新, 李力人 用“三段论”原理讲解Java语法中的两个难点 计算机教育, 2010年第10期(总第118期), p85-[23] Jianxin Wang, Haiyan Zhang, Xiaoli Dong, Ben Xu, Benjin M An Effective Hybrid Crossover Operator for Genetic Algorithms to Solve K-means Clustering P Proceedings of 2010 Sixth International Conference on Natural Computation, p2271-[24] Haiyan Zhang, Jianxin Wang, Wei M An Improved 3D Object Feature Points Correspondence A Proceedings of 2010 Sixth International Conference on Natural Computation, p101-