咨询与建议

限定检索结果

文献类型

  • 604 篇 会议
  • 114 册 图书

馆藏范围

  • 707 篇 电子文献
  • 12 种 纸本馆藏

日期分布

学科分类号

  • 19 篇 工学
    • 9 篇 计算机科学与技术...
    • 8 篇 电子科学与技术(可...
    • 6 篇 软件工程
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 环境科学与工程(可...
    • 1 篇 风景园林学(可授工...
    • 1 篇 网络空间安全
  • 10 篇 管理学
    • 5 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 1 篇 农林经济管理
    • 1 篇 公共管理
  • 6 篇 经济学
    • 4 篇 应用经济学
  • 6 篇 法学
    • 3 篇 法学
    • 3 篇 政治学
    • 2 篇 公安学
    • 1 篇 社会学
    • 1 篇 马克思主义理论
  • 3 篇 农学
    • 2 篇 畜牧学
    • 1 篇 林学
  • 1 篇 文学
    • 1 篇 中国语言文学
    • 1 篇 外国语言文学
  • 1 篇 理学
    • 1 篇 生态学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
  • 1 篇 军事学

主题

  • 95 篇 mobile robots
  • 84 篇 robot sensing sy...
  • 75 篇 humans
  • 61 篇 control systems
  • 60 篇 hardware
  • 56 篇 orbital robotics
  • 51 篇 computer science
  • 45 篇 cameras
  • 44 篇 robot vision sys...
  • 44 篇 robot kinematics
  • 43 篇 robot control
  • 42 篇 robots
  • 42 篇 navigation
  • 42 篇 costs
  • 40 篇 manipulators
  • 39 篇 application soft...
  • 36 篇 motion control
  • 35 篇 intelligent robo...
  • 35 篇 robotics and aut...
  • 34 篇 kinematics

机构

  • 6 篇 the robotics ins...
  • 5 篇 department of me...
  • 4 篇 university colle...
  • 4 篇 robotics institu...
  • 3 篇 manchester visua...
  • 3 篇 institute of ind...
  • 3 篇 department of me...
  • 3 篇 school of engine...
  • 3 篇 department of co...
  • 3 篇 mechanical engin...
  • 3 篇 department of ae...
  • 3 篇 department of co...
  • 3 篇 intelligent auto...
  • 3 篇 jet propulsion l...
  • 3 篇 department of el...
  • 3 篇 department of sy...
  • 3 篇 institute of tel...
  • 3 篇 department of el...
  • 2 篇 department of co...
  • 2 篇 department of el...

作者

  • 6 篇 l. jozwiak
  • 5 篇 m. asada
  • 5 篇 yangsheng xu
  • 4 篇 y. shirai
  • 4 篇 d.m. howard
  • 3 篇 c. laugier
  • 3 篇 m. hebert
  • 3 篇 t. shibata
  • 3 篇 s. payandeh
  • 3 篇 t. fukuda
  • 3 篇 hyung suck cho
  • 3 篇 m. kaneko
  • 3 篇 b. hannaford
  • 3 篇 p.d. lawrence
  • 3 篇 s.k. tso
  • 3 篇 k. kuchcinski
  • 3 篇 andy oram
  • 3 篇 y. kuno
  • 3 篇 d.n. nenchev
  • 3 篇 y. nakamura

语言

  • 683 篇 英文
  • 34 篇 中文
  • 1 篇 其他
检索条件"丛书名=Theory in Practice"
718 条 记 录,以下是101-110 订阅
排序:
Acknowledgements
Acknowledgements
收藏 引用
IEEE (first ITW conference of the year) Information theory Workshop (ITW)
The conference organizers greatly appreciate the support of the various corporate sponsors listed.
来源: 评论
Cryptography and decoding Reed-Solomon codes as a hard problem
Cryptography and decoding Reed-Solomon codes as a hard probl...
收藏 引用
IEEE (first ITW conference of the year) Information theory Workshop (ITW)
作者: A. Kiayias Moti Yung University of Connecticut Storrs CT USA Columbia University New York NY USA RSA Laboratories Bedford MA USA
Some recent developments in employing Reed-Solomon codes in cryptography are surveyed, including the design of symmetric ciphers and what provable properties one can argue based on suitable hardness assumptions (for p... 详细信息
来源: 评论
Dynamic access policies for unconditionally secure secret sharing schemes
Dynamic access policies for unconditionally secure secret sh...
收藏 引用
IEEE (first ITW conference of the year) Information theory Workshop (ITW)
作者: K.M. Martin Information Security Group University of London Egham UK
Secret sharing schemes are cryptographic primitives that can be employed in any situation where it is desirable to distribute information relating to secret data amongst a number of entities. Following a secure initia... 详细信息
来源: 评论
Relationship of three cryptographic channels in the UC framework
Relationship of three cryptographic channels in the UC frame...
收藏 引用
IEEE (first ITW conference of the year) Information theory Workshop (ITW)
作者: T. Okamoto NTT Laboratories Nippon Telegraph and Telephone Corporation Yokosuka Kanagawa Japan
This paper shows that three cryptographic channels, secure channels (SC), anonymous channels (AC) and direction-indeterminable channels (DIC), are reduced to each other in the UC (universally composable) framework. We... 详细信息
来源: 评论
How to attain the ordinary channel capacity securely in wiretap channels
How to attain the ordinary channel capacity securely in wire...
收藏 引用
IEEE (first ITW conference of the year) Information theory Workshop (ITW)
作者: D. Kobayashi H. Yamamoto T. Ogawa NTT Data Corporation Limited Minato Tokyo Japan Graduate School of Frontier Science University of Tokyo Kashiwa Chiba Japan Graduate School of Information Science and Technology University of Tokyo Bunkyo Tokyo Japan
It is known that a message can be transmitted safely against any wiretap per via a noisy channel without a secret key if the coding rate is less than the so-called secrecy capacity Cs, which is usually smaller than th... 详细信息
来源: 评论
Fast correlation attacks against stream ciphers and related open problems
Fast correlation attacks against stream ciphers and related ...
收藏 引用
IEEE (first ITW conference of the year) Information theory Workshop (ITW)
作者: Anne Canteaut B.P. 105 INRIA Projet Codes Chesnay France
Fast correlation attacks have been considerably improved recently, based on efficient decoding algorithms dedicated to very large linear codes in the case of a highly noisy channel. However, a better adaptation of the... 详细信息
来源: 评论
Unconditionally private and reliable communication in an untrusted network
Unconditionally private and reliable communication in an unt...
收藏 引用
IEEE (first ITW conference of the year) Information theory Workshop (ITW)
作者: Y. Desmedt University College London UK
Most successful attacks that occur today against computer networks are targeted against the computers connected to the network, but not against the routers. At the BlackHat 2005 conference it was shown that potential ... 详细信息
来源: 评论
Brief history of quantum cryptography: a personal perspective
Brief history of quantum cryptography: a personal perspectiv...
收藏 引用
IEEE (first ITW conference of the year) Information theory Workshop (ITW)
作者: G. Brassard Département dinformatique et de recherche opérationnelle Université de Montreal Montreal Canada
Quantum cryptography is the only approach to privacy ever proposed that allows two parties (who do not share a long secret key ahead of time) to communicate with provably perfect secrecy under the nose of an eavesdrop... 详细信息
来源: 评论
Cryptography in the bounded quantum-storage model
Cryptography in the bounded quantum-storage model
收藏 引用
IEEE (first ITW conference of the year) Information theory Workshop (ITW)
作者: I.B. Damgard S. Fehr L. Salvail C. Schaffner FICS Computer Science Dept. University of Aarhus DK CWI Center for Mathematics and Computer Science CWI Amsterdam NL Netherlands Computer Science Dept. University of Aarhus DK Denmark Computer Science Department University of Aarhus Denmark BRICS CWI Amsterdam NL
We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary's quantum memory is of bounded size. We show that oblivious transfer and bit commitment can be i... 详细信息
来源: 评论
Coding theorems on the threshold scheme for a general source
Coding theorems on the threshold scheme for a general source
收藏 引用
IEEE (first ITW conference of the year) Information theory Workshop (ITW)
作者: H. Koga Graduate School of Systems and Information Engineering University of Tsukuba Tsukuba Japan
This paper is concerned with basic properties of the (t, m)-threshold scheme, where m denotes the number of shares and t a threshold. We are interested in the case where a secret information is generated from a source... 详细信息
来源: 评论