王建新的发表论文
[1] 王新辉, 王建新, 张玉婷. 开发指令并行的分支控制技术. 计算机工程与应用, 第35卷第12期, 1999, pp25-35.
[2] Baozhu Guo, Jianxin Wang. The Unbounded Energy Solution for Free Vibration of an Axially Moving String. Journal of Vibration and Control, Vol. 6, No. 5, 2000, pp651-665.
[3] 王建新, 吴战江, 王许书. 对数据结构空间局部性的存储保真度的研究(I). 计算机工程与应用, 第37卷第13期, 2001, pp5-36.
[4] 王建新, 王新辉, 张野. 对数据结构空间局部性的存储保真度的研究(II). 计算机工程与应用, 第37卷第15期, 2001, pp58-60.
[5] 王建新, 夏宏, 张野. 对数据结构空间局部性的存储保真度的研究(III). 计算机工程与应用, 第37卷第17期, 2001, pp46-47.
[6] 杨炳儒, 王建新. KDD中双库协同机制的研究(I). 中国工程科学, 第4卷第4期, 2002, pp41-51.
[6] 杨炳儒, 王建新, 孙海洪. KDD中双库协同机制的研究(II). 中国工程科学, 第4卷第5期, 2002, pp34-43.
[7] 孟建良, 王晓华, 庞春江, 王建新. 全局时变权组合预测方法. 计算机工程与应用, 第38卷第10期, 2002, pp98-99.
[8] Jianxin Wang, Geng Zhao, Wei Wei, Peng Ye. TTT Language and TTT Security Log Analyzer. International Conference of Applied Cryptography and Network Security (ACNS), pp316-324. Huangshan, China, 2004.
[9] Jianxin Wang, Geng Zhao, Weidong Zhang. A Subjective Distance for Clustering Security Events. International Conference on Communications, Circuits and Systems Proceedings (ICCCAS), pp74-78. Hongkong, China, May 27-30, 2005.
[10] Gengzhao, Jianxin Wang, Fangfang Liu. Analysis of Some Recently Proposed Chaos-based Public Key Encryption Algorithms. International Conference on Communications, Circuits and Systems Proceedings (ICCCAS), pp1573-1576. Guilin, China, June 25-28, 2006.
[11] Jianxin Wang, Hongzhou Wang, Geng Zhao. A GA-based Solution to an NP-hard Problem of Clustering Security Events. International Conference on Communications, Circuits and Systems Proceedings (ICCCAS), pp2093-2097. Guilin, China, June 25-28, 2006.
[12] 肖政, 王建新, 侯紫峰, 韦卫. 基于搜索树的告警高效聚类算法和Bayes分类器的设计和研究. 计算机科学, Vol.33, No.8, 2006, p190-194.
[13] 王建新, 陈志泊, 王春玲, 张海燕, 孙俏. ACM编程赛题在《数据结构》教学中的应用研究. 《北京林业大学学报》社会科学版教改论文集.
[14] Yun-Qing Xia, Jian-Xin Wang, Fang Zheng, Yi Liu, “A binarization approach to email categorization using binary decision tree,” Proceedings of the 6th International Conference on Machine Learning and Cybernetics (ICMLC) , Vol.6, 3459-3464, 19-22 August 2007, Hong Kong.
[15] Jianxin Wang, Yunqing Xia, Hongzhou Wang. Mining Intrusion Detection Alarms with an SA-based Clustering Approach. Proceedings of 2007 International Conference on Communications, Circuits and Systems, p905-909, Kokura, Fukuoka Japan. July 11-13, 2007. (EI)
[16] Jianxin Wang, Geng Zhao, Yunqing Xia. A More General Form of Apriori and Its Application in Clustering Security Events. Proceedings of 2007 International Conference on Communications, Circuits and Systems, p954-958, Kokura, Fukuoka Japan. July 11-13, 2007.
[17] 朱金清, 王建新, 陈志泊. 基于APRIORI的层次化聚类算法及其在IDS日志分析中的应用. 计算机研究与发展, 第44卷增刊, 2007年10月. pp326-330.
[18] 王娜, 王建新, 胡涌. 层次分析法在高校专业设置中的应用. 计算机应用与软件. 第26卷第9期, 2009年9月. P126-128,141
[19] Jianxin Wang, Baojiang Cui. Clustering IDS Alarms with an IGA-based Approach. 2009 International Conference on Communications, Circuits and Systems Proceedings, San Jose, USA and Chengdu, China, July 23-25, 2009, p586-590.
[20] Jianxin Wang. Reducing the Overlap among Hierarchical Clusters with a GA-based Approach. The 1st International Conference on Information Science and Engineering (ICISE2009), Nanjing, China, December 26th to 28th, 2009, p221-226.
[21] 崔宝江, 郭鹏飞, 王建新. 基于符号执行与实际执行的二进制代码执行路径分析. 清华大学学报, 自然科学版(增刊), 2009年S2期.
[22] 王建新, 李力人. 用“三段论”原理讲解Java语法中的两个难点. 计算机教育, 2010年第10期(总第118期), p85-87.
[23] Jianxin Wang, Haiyan Zhang, Xiaoli Dong, Ben Xu, Benjin Mei. An Effective Hybrid Crossover Operator for Genetic Algorithms to Solve K-means Clustering Problem. Proceedings of 2010 Sixth International Conference on Natural Computation, p2271-2275.
[24] Haiyan Zhang, Jianxin Wang, Wei Meng. An Improved 3D Object Feature Points Correspondence Algorithm. Proceedings of 2010 Sixth International Conference on Natural Computation, p101-105.