咨询与建议

限定检索结果

文献类型

  • 26 篇 会议
  • 23 篇 期刊文献

馆藏范围

  • 49 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 43 篇 工学
    • 21 篇 计算机科学与技术...
    • 12 篇 软件工程
    • 10 篇 机械工程
    • 6 篇 网络空间安全
    • 4 篇 电子科学与技术(可...
    • 4 篇 控制科学与工程
    • 2 篇 仪器科学与技术
    • 2 篇 信息与通信工程
    • 1 篇 电气工程
    • 1 篇 建筑学
    • 1 篇 化学工程与技术
    • 1 篇 生物医学工程(可授...
  • 11 篇 管理学
    • 11 篇 管理科学与工程(可...
  • 8 篇 理学
    • 4 篇 物理学
    • 2 篇 数学
    • 1 篇 大气科学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 2 篇 医学
    • 1 篇 临床医学
    • 1 篇 医学技术(可授医学...
  • 1 篇 军事学
    • 1 篇 军队指挥学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 2 篇 运行支撑系统
  • 2 篇 可靠性
  • 2 篇 数据分发管理
  • 2 篇 区域匹配
  • 2 篇 分布式交互仿真
  • 2 篇 cloud computing
  • 2 篇 网格
  • 2 篇 高层体系结构
  • 2 篇 带宽
  • 1 篇 computer simulat...
  • 1 篇 complex surface,...
  • 1 篇 inverse autocorr...
  • 1 篇 编码
  • 1 篇 normal filter
  • 1 篇 network security...
  • 1 篇 启动程序
  • 1 篇 灵活性
  • 1 篇 bilinear pairing
  • 1 篇 innovative desig...
  • 1 篇 window function

机构

  • 8 篇 西安交通大学
  • 3 篇 西安工业学院
  • 3 篇 西安电子科技大学
  • 3 篇 西安理工大学
  • 2 篇 西北大学
  • 1 篇 2. national key ...
  • 1 篇 departmentofcard...
  • 1 篇 department of co...
  • 1 篇 collegeoflifesci...
  • 1 篇 北京科技大学
  • 1 篇 华中理工大学
  • 1 篇 西安陆军学院
  • 1 篇 国防科技大学
  • 1 篇 生物信息学教育部...
  • 1 篇 清华大学
  • 1 篇 西安工程科技学院
  • 1 篇 哈尔滨工业大学
  • 1 篇 吉林大学
  • 1 篇 3. computer cent...
  • 1 篇 1. department of...

作者

  • 3 篇 严海蓉
  • 3 篇 张亚崇
  • 3 篇 钱德沛
  • 3 篇 孙国基
  • 3 篇 钟联炯
  • 2 篇 qinlu he zhanhua...
  • 2 篇 张兴军
  • 2 篇 张亚玲
  • 1 篇 张烨
  • 1 篇 zhanxiang zhao t...
  • 1 篇 3. computer cent...
  • 1 篇 赵宇峰
  • 1 篇 huangye-cho
  • 1 篇 郑有才
  • 1 篇 胡庆丰
  • 1 篇 张毅坤
  • 1 篇 梁文静
  • 1 篇 张文杰
  • 1 篇 张晓亮
  • 1 篇 张建军

语言

  • 30 篇 英文
  • 19 篇 中文
检索条件"作者=Yaling Zhang Department of Computer Science Xi’an Science and Technology University Xi’an"
49 条 记 录,以下是1-10 订阅
排序:
A Successive Linear Programming Multiuser Detector
A Successive Linear Programming Multiuser Detector
收藏 引用
2011 4th IEEE International Conference on computer science and Information technology(ICCSIT 2011)
作者: yaling zhang department of computer science xi’an science and technology university xi’an 710054 China
Based on the semidefinite programming relaxation model of the code division multiple access maximum likelihood multiuser detection problem,a detection strategy by successive linear programming method is *** proposed m... 详细信息
来源: 评论
Access Control Based on Group Signatures in Cloud Service
Access Control Based on Group Signatures in Cloud Service
收藏 引用
2012 IEEE International Conference on computer science and Automation Engineering(CSAE 2012)
作者: Han Zheng department of computer science xi'an Jiaotong university xi'an,China Shijiazhuang Non-commissioned Officer School of Chinese People's Armed Police Force Shijiazhuang,China Zhongmeng Zhao department of computer science xi'an Jiaotong university xi'an,China Xuanping zhang department of computer science xi'an Jiaotong university xi'an,China
As the user's identity and sensitive information are regularly used in the process of cloud service access control,there will be a need to protect the user privacy from disclosing to cloud *** paper describes a ne... 详细信息
来源: 评论
An overview about pinning control of complex networks
An overview about pinning control of complex networks
收藏 引用
4th International Conference on Modelling,Identification and Control(ICMIC 2012)
作者: xi Chen, Associate professor in the Institute of System engineering, Huazhong university of science & technology, Image Processing and Intelligent Control Key Laboratory of Education Ministry of China, Wuhan, Hubei, China, 430074 Lan zhang, Candidate for Master of System engineering, Huazhong university of science & technology, Image Processing and Intelligent Control Key Laboratory of Education Ministry of China Wei Li: Associate professor in the department of Control science & Engineering, Image Processing and Intelligent Control Key Laboratory of Education Ministry of China
Synchronization and pinning control of complex networks is to regulate the agents' behavior and improve network performance. In this article, we review some recent developments in pinning control. Stability algori... 详细信息
来源: 评论
The Comparison of Environmental Time Series Statistical Prediction Methods
The Comparison of Environmental Time Series Statistical Pred...
收藏 引用
2012 Asia Pacific Conference on Environmental science and technology(APEST 2012)
作者: Jing zhang1,a,Hongqiang Jiang1,b,Zhijing Chen2,c,Xuxiang Li2,d and yaling Lu1,e 1 Key Laboratory of Environmental Planning and Policy Simulation,Chinese Academy for Environmental Planning,Beijing,100012,China 2 department of Environmental science and technology,School of Human Settlement and Civil Engineering,xi'an Jiaotong university,xi'an,710049,China
Four approaches of time-series analysis,neural network,wavelet analysis,nonparametric regression were briefly outlined in the beginning of this *** daily average concentrations of SO2,NO2 and PM10 in xi'an during ... 详细信息
来源: 评论
Security Mediated Certificateless Signatures in the Standard Model
Security Mediated Certificateless Signatures in the Standard...
收藏 引用
2011 3rd IEEE International Conference on Information Management and Engineering(ICIME 2011)
作者: Zhongmei Wan College of science, Hohai university, Nanjing, 210098, P.R. China xi zhang College of computer and Software, Shenzhen university, Shenzhen 518060, P.R. China Ying Cao department of computer science, Jinan university, Guangzhou 510632, P.R. China
Security-mediated certificateless (SMC) signature not only addresses the issues about instantaneous revocation of keys in certificateless signature (CLS) but also resolves the key escrow problem in identity-based sign... 详细信息
来源: 评论
A Pipelined Beamforming Delay Calculation Architecture in Ultrasound Imaging System
A Pipelined Beamforming Delay Calculation Architecture in Ul...
收藏 引用
2011 IEEE International Conference on computer science and Automation Engineering(CSAE 2011)
作者: Zhanxiang Zhao,Tian xiang,Ming Gao,Chenghao He,xin zhang,xi Jin department of Physics university of science and technology of China Hefei,Anhui Province,China
In the beamformers of modern digital ultrasound imaging system,to avoid storing amount of precalculated parameters,real time delay calculation has to be *** paper describes the design and implementation of a calculato... 详细信息
来源: 评论
A Novel Adaptive Filter Algorithm Based on DFP Technique
A Novel Adaptive Filter Algorithm Based on DFP Technique
收藏 引用
第三十届中国控制会议
作者: zhang Yumei~1,BAI Shulin~(2,3) 1.department of computer science,Shaanxi Normal university,xi'an 710062,P.R.China 2.School of Electronics and Information,Northwestern Polytechnical university,xi'an 710072,P.R.China 3.xi'an Electronic Engineering Research Institute,xi'an 710100,P.R.China
Applying a variable convergence factor technique,we derive an adaptive filter based on Davidon-Fletcher-Powell (DFP) algorithm and present update recursion of the inverse autocorrelation matrix *** MATLAB 7.0,DFP algo... 详细信息
来源: 评论
ID-based Ring Signature Scheme with Revocable Anonymity and Its Application in VANETs
ID-based Ring Signature Scheme with Revocable Anonymity and ...
收藏 引用
2010 International Conference on Computational Intelligence and Vehicular System (CIVS2010)
作者: Shangping Wang and Lijun Liu School of science xi'an university of technology xi'an,Shannxi Province,710048,China yaling zhang College of computer science and Engineering xi'an university of technology xi'an,Shannxi Province,710048,China
In this paper,according to the security and privacy requirements in VANETs,we propose an ID-based ring signature scheme with revocable anonymity,which means that an entity that has the power can revoke anonymity of th... 详细信息
来源: 评论
A Brief Survey on the Security Model of Cloud Computing
A Brief Survey on the Security Model of Cloud Computing
收藏 引用
The Ninth International Symposium on Distributed Computing and Applications to Business,Engineering and science
作者: Xue Jing 1 department of Information science and technology Northwest university xi’an,China zhang Jian-jun2 department of Information science and technology Northwest university xi’an,China
Being proposed in 2007,cloud computing has been a hot researching area of computer network *** giant companies can offer the cloud services *** the development of cloud computing,a set of security problem appears,such... 详细信息
来源: 评论
Analysis of the key technology on cloud storage
Analysis of the key technology on cloud storage
收藏 引用
2010 International Conference on Future Information technology and Management Engineering (FITME 2010)
作者: Qinlu He,Zhanhuai Li,xiao zhang department of computer science Northwestern Polytechnical university xi'an,P.R.China
This paper put foreword a general architecture of cloud storage system,and discusses the key *** is a new network storage services,cloud storage is an extension of the concept of cloud computing and developed a new **... 详细信息
来源: 评论