咨询与建议

限定检索结果

文献类型

  • 1,526 篇 会议
  • 4 册 图书
  • 2 篇 期刊文献

馆藏范围

  • 1,532 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,137 篇 工学
    • 965 篇 计算机科学与技术...
    • 824 篇 软件工程
    • 268 篇 信息与通信工程
    • 206 篇 控制科学与工程
    • 170 篇 生物工程
    • 150 篇 电气工程
    • 91 篇 电子科学与技术(可...
    • 84 篇 动力工程及工程热...
    • 81 篇 生物医学工程(可授...
    • 75 篇 机械工程
    • 66 篇 光学工程
    • 64 篇 安全科学与工程
    • 54 篇 交通运输工程
    • 38 篇 化学工程与技术
    • 34 篇 环境科学与工程(可...
    • 29 篇 仪器科学与技术
  • 537 篇 理学
    • 258 篇 数学
    • 180 篇 生物学
    • 120 篇 物理学
    • 77 篇 统计学(可授理学、...
    • 69 篇 系统科学
    • 41 篇 化学
  • 316 篇 管理学
    • 208 篇 管理科学与工程(可...
    • 137 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 70 篇 法学
    • 59 篇 社会学
  • 59 篇 医学
    • 55 篇 临床医学
    • 51 篇 基础医学(可授医学...
    • 34 篇 药学(可授医学、理...
  • 52 篇 经济学
    • 52 篇 应用经济学
  • 24 篇 农学
  • 19 篇 教育学
  • 6 篇 文学
  • 5 篇 军事学

主题

  • 35 篇 software
  • 32 篇 internet of thin...
  • 32 篇 computer softwar...
  • 27 篇 application soft...
  • 26 篇 computer archite...
  • 24 篇 software enginee...
  • 24 篇 real-time system...
  • 20 篇 deep learning
  • 20 篇 cloud computing
  • 20 篇 computer vision
  • 19 篇 computational mo...
  • 17 篇 costs
  • 17 篇 convolutional ne...
  • 16 篇 feature extracti...
  • 16 篇 machine learning
  • 16 篇 training
  • 15 篇 programming
  • 15 篇 recommender syst...
  • 14 篇 computer science
  • 14 篇 object detection

机构

  • 22 篇 wuhan donghu uni...
  • 17 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 school of inform...
  • 8 篇 university of ta...
  • 8 篇 school of electr...
  • 7 篇 school of comput...
  • 7 篇 college of compu...
  • 6 篇 school of electr...
  • 6 篇 school of electr...
  • 6 篇 school of automa...
  • 6 篇 school of inform...
  • 5 篇 chitkara univers...
  • 5 篇 beijing key labo...
  • 5 篇 beijing universi...
  • 4 篇 college of engin...
  • 4 篇 school of comput...
  • 4 篇 school of big da...
  • 4 篇 school of comput...
  • 4 篇 beijing engineer...

作者

  • 8 篇 lian ren-zun
  • 7 篇 zhang bo
  • 5 篇 wang jing
  • 5 篇 li zixin
  • 5 篇 li jiawen
  • 5 篇 li jianqiang
  • 4 篇 mirchandani sanj...
  • 4 篇 liang meiyu
  • 4 篇 zhang rui
  • 4 篇 surendran r.
  • 4 篇 chen xiangning
  • 4 篇 li weixin
  • 4 篇 li jian
  • 4 篇 zhang li
  • 4 篇 liu hai
  • 4 篇 meiyu liang
  • 3 篇 wang lei
  • 3 篇 yawen li
  • 3 篇 li yang
  • 3 篇 dai fei

语言

  • 1,513 篇 英文
  • 16 篇 中文
  • 14 篇 其他
  • 3 篇 土耳其文
  • 1 篇 德文
检索条件"任意字段=8th IEEE International Conference on Software Engineering and Computer Systems, ICSECS 2023"
1532 条 记 录,以下是1361-1370 订阅
排序:
A note on homogeneous bent functions
A note on homogeneous bent functions
收藏 引用
SNPD 2007: 8th ACIS international conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: Wang, Xiaolin Zhou, Jianqin Zang, Yubing Department of Computer Science Anhui University of Technology Ma'anshan 243002 China Yanzhou College Shandong TV University Yanzhou 272100 China
Bent functions are used to build blocks for cryptographically strong S-boxes and spread spectrum systems. the concept of semi bent functions and quarter bent functions is presented. Based on the new concept, an approa... 详细信息
来源: 评论
Research on the knowledge-based decision support system for the safety of rockets
Research on the knowledge-based decision support system for ...
收藏 引用
SNPD 2007: 8th ACIS international conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: Li, Wei College of Computer and Information Chongqing Jiaotong University Chongqing 400074 China
In the traditional system, for some indigenous error in the measurement and trajectory track, the precision of trajectory parameters is not enough high so that it often results in some false alarms for the safety of r... 详细信息
来源: 评论
An efficient ID-based restrictive partially blind signature scheme
An efficient ID-based restrictive partially blind signature ...
收藏 引用
SNPD 2007: 8th ACIS international conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: Xiaoming, Hu Shangteng, Huang Department of Computer Science and Engineering Shanghai Jiao Tong Univeristy 200240 Shanghai China
Many restrictive partially blind signatures have been proposed till now. But all existing restrictive partially blind signature schemes were constructed under certificate-based public key systems. Recently, Chen et al... 详细信息
来源: 评论
An improved identity-based fault-tolerant conference key distribution scheme
An improved identity-based fault-tolerant conference key dis...
收藏 引用
SNPD 2007: 8th ACIS international conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: Yongquan, Cai Xiuying, Li College of Computer Science and Technology Beijing University of Technology Beijing China
Fault-tolerance is an important property of conference key distribution protocol. Recently, Yang et al. proposed an identity-based fault-tolerant conference key distribution scheme which is much different to the tradi... 详细信息
来源: 评论
A connection degree-based rough sets model and its application to knowledge reduction
A connection degree-based rough sets model and its applicati...
收藏 引用
SNPD 2007: 8th ACIS international conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: Liuling, Dai Bing, Huang Dongxiao, Yang School of Software Beijing Institute of Technology Beijing 100081 China School of Computer Science and Technology Nanjing Audit University Nanjing 210029 China School of Management and Engineering Nanjing University Nanjing 210093 China Dept. of Information Science and Technology Jining Medical College Jining 272013 China
Knowledge reduction is one of the most important issues in rough sets theory. Many works are related to connection-degree-based rough sets model to treat incomplete information systems. However, the model is not used ... 详细信息
来源: 评论
Survey of public key digital watermarking systems
Survey of public key digital watermarking systems
收藏 引用
SNPD 2007: 8th ACIS international conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: Xie, Rongsheng Wu, Keshou Du, Jiangbo Li, Chunguang Department of Computer Science and Technology Xiamen University of Technology Xiamen Fujian Province 361005 China
In traditional symmetric watermarking schemes, the key used for watermark embedding must be available at the watermark detector. this leads to a security problem if the detectors are implemented in consumer devices th... 详细信息
来源: 评论
A new threshold group signature scheme based on discrete logarithm problem
A new threshold group signature scheme based on discrete log...
收藏 引用
SNPD 2007: 8th ACIS international conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: Fengyin, Li Jiguo, Yu Hongwei, Ju College of Computer Science Qufu Normal University Rizhao 276826 China Department of Assets Management Qufu Normal University Rizhao 276826 China
the threshold group signature is an important kind of signature. So far, many threshold group signature schemes have been proposed, but most of them suffer from conspiracy attack and are insecure. In this paper, based... 详细信息
来源: 评论
Two certificateless aggregate signatures from bilinear maps
Two certificateless aggregate signatures from bilinear maps
收藏 引用
SNPD 2007: 8th ACIS international conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: Zheng, Gong Yu, Long Xuan, Hong Kefei, Chen Department of Computer Science and Engineering Shanghai Jiaotong University Shanghai 200240 China State Key Laboratory of Information Security Graduate School Chinese Academy of Sciences Beijing 100049 China
In this paper, we propose two certificateless aggregate signature schemes, which are the first aggregate signature schemes in the CL-PKC. the first scheme CAS -1 reduces the costs of communication and signer-side comp... 详细信息
来源: 评论
Performance evaluation of TriBA - A novel scalable architecture for high performance applications
Performance evaluation of TriBA - A novel scalable architect...
收藏 引用
SNPD 2007: 8th ACIS international conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: Khan, Haroon-Ur-Rashid Shi, Feng Department of Computer Science and Engineering Beijing Institute of Technology Beijing-100081 China
this paper evaluates the performance of TriBA - a new idea in multiprocessor architectures. TriBA is considered to be a high performance, scalable parallel computing architecture, therefore, its performance is evaluat... 详细信息
来源: 评论
P2P trust model: the resource chain model
P2P trust model: The resource chain model
收藏 引用
SNPD 2007: 8th ACIS international conference on software engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
作者: Sinjae, Lee Shaojian, Zhu Yanggon, Kim Department of Computer and Information Sciences Towson University MD United States
As is well known, computer security has been given more attention;many mechanisms have been developed to increase P2P security like encryption, sandboxing, reputation, and firewall. Among those technologies, reputatio... 详细信息
来源: 评论