咨询与建议

限定检索结果

文献类型

  • 852 篇 会议
  • 654 篇 期刊文献
  • 23 册 图书

馆藏范围

  • 1,529 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,003 篇 工学
    • 787 篇 计算机科学与技术...
    • 662 篇 软件工程
    • 167 篇 信息与通信工程
    • 109 篇 控制科学与工程
    • 92 篇 生物工程
    • 75 篇 电气工程
    • 66 篇 电子科学与技术(可...
    • 65 篇 机械工程
    • 63 篇 生物医学工程(可授...
    • 60 篇 光学工程
    • 42 篇 化学工程与技术
    • 38 篇 网络空间安全
    • 35 篇 仪器科学与技术
    • 31 篇 安全科学与工程
    • 29 篇 交通运输工程
    • 25 篇 土木工程
  • 446 篇 理学
    • 263 篇 数学
    • 108 篇 生物学
    • 100 篇 物理学
    • 73 篇 统计学(可授理学、...
    • 45 篇 系统科学
    • 41 篇 化学
  • 274 篇 管理学
    • 187 篇 管理科学与工程(可...
    • 106 篇 图书情报与档案管...
    • 58 篇 工商管理
  • 54 篇 医学
    • 50 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
  • 35 篇 法学
    • 32 篇 社会学
  • 24 篇 经济学
    • 24 篇 应用经济学
  • 12 篇 教育学
  • 12 篇 农学
  • 12 篇 军事学
  • 7 篇 文学
  • 7 篇 艺术学
  • 2 篇 哲学

主题

  • 40 篇 computer science
  • 35 篇 computational mo...
  • 33 篇 machine learning
  • 31 篇 semantics
  • 31 篇 feature extracti...
  • 31 篇 training
  • 29 篇 software enginee...
  • 29 篇 accuracy
  • 26 篇 data mining
  • 26 篇 software
  • 24 篇 deep learning
  • 23 篇 predictive model...
  • 20 篇 testing
  • 19 篇 authentication
  • 18 篇 convolution
  • 18 篇 artificial intel...
  • 17 篇 cloud computing
  • 16 篇 optimization
  • 16 篇 analytical model...
  • 14 篇 conferences

机构

  • 178 篇 state key labora...
  • 120 篇 university of ch...
  • 96 篇 institute of sof...
  • 54 篇 college of compu...
  • 45 篇 academy of compu...
  • 40 篇 jd explore acade...
  • 39 篇 technology cente...
  • 36 篇 school of comput...
  • 29 篇 academy of compu...
  • 28 篇 institute of inf...
  • 25 篇 institute of com...
  • 23 篇 shenzhen institu...
  • 21 篇 department of co...
  • 19 篇 school of comput...
  • 19 篇 school of electr...
  • 19 篇 state key labora...
  • 18 篇 school of comput...
  • 16 篇 college of infor...
  • 16 篇 school of comput...
  • 15 篇 graduate univers...

作者

  • 38 篇 tao dacheng
  • 34 篇 du bo
  • 19 篇 fan heng
  • 19 篇 zhang libo
  • 18 篇 wu enhua
  • 17 篇 jun yan
  • 17 篇 marijke coetzee
  • 15 篇 wei jun
  • 15 篇 yan jun
  • 15 篇 wang hongan
  • 15 篇 zhang jian
  • 15 篇 jian zhang
  • 14 篇 luo yong
  • 14 篇 liu juhua
  • 13 篇 shen li
  • 13 篇 jiwei yan
  • 13 篇 tian feng
  • 13 篇 bin sheng
  • 11 篇 zheng changwen
  • 11 篇 dai guozhong

语言

  • 1,316 篇 英文
  • 171 篇 其他
  • 46 篇 中文
检索条件"机构=Academy of Computer Science and Software Engineering name"
1529 条 记 录,以下是1221-1230 订阅
排序:
Fault detection on the software implementation of CLEFIA lightweight cipher
收藏 引用
Journal of Networks 2012年 第8期7卷 1288-1294页
作者: Li, Wei Gu, Dawu Xia, Xiaoling Liu, Ya Liu, Zhiqiang School of Computer Science and Technology Donghua University Shanghai China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China
CLEFIA is an efficient lightweight cipher that delivers advanced copyright protection and authentication in computer networks. It is also applied in the secure protocol for transmission including SSL and TLS. Since it... 详细信息
来源: 评论
Greedy clique decomposition for symbolic satisfiability solving
收藏 引用
International Journal of Advancements in Computing Technology 2012年 第10期4卷 174-184页
作者: Xu, Yanyan Chen, Wei Su, Kaile Zhang, Wenhui School of Information Science and Technology Beijing Forestry University China Naveen Jindal School of Management The University of Texas at Dallas United States College of Mathematics Physics and Information Engineering Zhejiang Normal University Jinhua China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences China
Motivated by the recent theoretical results regarding OBDD proof system, this paper applies a new variable grouping heuristic called greedy clique decomposition to symbolic satisfiability solving. Experimental results... 详细信息
来源: 评论
Numen: Network risk evaluation based on naïve bayes-based attack tree
收藏 引用
International Journal of Advancements in Computing Technology 2012年 第21期4卷 466-472页
作者: Wang, Hongbing Jing, Qi Liu, Heng Wang, Zhao Cheng, Li National Computer network Emergency Response technical Team Coordination Center of China Beijing China School of Software and Microelectronics Peking University Beijing China Institute Of Computing Technology Chinese Academy Of Sciences Beijing China School of Electronics Engineering and Computer Science Peking University Beijing China Key Lab of NSSA MoE China
Attack Tree has been widely used in network risk evaluation. However, in most situations attack trees can only describe the network risk in a visualized way and without any analysis of risk probabilities. This paper p... 详细信息
来源: 评论
Societally connected multimedia across cultures
收藏 引用
Frontiers of Information Technology & Electronic engineering 2012年 第12期13卷 875-880页
作者: Zhongfei ZHANG Tao MEI Nicu SEBE Yonghong TIAN Vincent S.TSENG Qing WANG Changsheng XU Huimin YU Shiwen YU Zhengyou ZHANG Ramesh JAIN Yueting ZHUANG Noshir CONTRACTOR Alexander G.HAUPTMANN Alejandro (Alex)JAIMES Wanqing LI Alexander C.LOUI Department of Information Science & Electronic Engineering Zhejiang University Hangzhou 310027 China Microsoft Research Asia China Department of Information Engineering and Computer Science University of Trento Italy Institute of Computational Linguistics Peking UniversityBeijing 100871 China Institute of Computer Science and Information National Cheng Kung University Taiwan 701 Tainan School of Computer Science Northwestern Polytechnical University Xi'an 710129 China Institute of Automation Chinese Academy of Sciences Beijing 100080 China Institute of Computational Linguistics Peking University Beijing 100871 China Microsoft Research Redmond WA USA Department of Computer Science University of California IrvineCA USA College of Computer Science and Technology Zhejiang UniversityHangzhou 310027 China School of Communication Northwestern University Evanston ILUSA Informedia Group CMU Pittsburgh PA Yahoo! Research Spain School of Computer Science and Software Engineering University of Wollongong NSW Australia Kodak Research Labs USA
The advance of the Internet in the past decade has radically changed the way people communicate and collaborate with each other. Physical distance is no more a barrier in online social networks, but cultural differenc... 详细信息
来源: 评论
Productive information system oriented trust chain scheme
收藏 引用
Telkomnika 2012年 第5期10卷 1093-1100页
作者: Tian, Li-Ye Shen, Chang-Xiang Department of Electronic and Information Engineering Naval Aeronautical and Astronautical University China Beijing Key Laboratory of Trusted Computing College of Computer Science and Technology Beijing University of Technology China State Key Laboratory of Information Security Chinese Academy of Sciences Institute of Software China
Productive information system has high-level security requirements, but Trusted Computing Group's solution of trust chain isn't competent. After analysis and comparison of two different trust transfer ways, a ... 详细信息
来源: 评论
Implementing rootkits to address operating system vulnerabilities
Implementing rootkits to address operating system vulnerabil...
收藏 引用
2011 Conference on Information Security for South Africa, ISSA 2011
作者: Corregedor, Manuel Von Solms, Sebastiaan Academy of Computer Science and Software Engineering University of Johannesburg Johannesburg South Africa
Statistics show that although malware detection techniques are detecting and preventing malware, they do not guarantee a 100% detection and / or prevention of malware. This is especially the case when it comes to root... 详细信息
来源: 评论
Web services security policy assertion trade-offs
Web services security policy assertion trade-offs
收藏 引用
2011 6th International Conference on Availability, Reliability and Security, ARES 2011
作者: Lavarack, Tristan Coetzee, Marijke Academy of Computer Science and Software Engineering University of Johannesburg Gauteng South Africa
Web services security requirements and capabilities are described in security policies. To enable the seamless interoperation between services, security policy intersection aims to provide a security policy that will ... 详细信息
来源: 评论
Enhancing digital business ecosystem trust and reputation with centrality measures
Enhancing digital business ecosystem trust and reputation wi...
收藏 引用
2011 Conference on Information Security for South Africa, ISSA 2011
作者: Isherwood, Donovan Coetzee, Marijke Academy of Computer Science and Software Engineering University of Johannesburg Johannesburg South Africa
Digital Business Ecosystem (DBE) is a decentralised environment where very small enterprises (VSEs) and small to medium sized enterprises (SMEs) interoperate by establishing collaborations with each other. Collaborati... 详细信息
来源: 评论
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2012年 7287 LNCS卷 V-VI页
作者: Agrawal, Manindra Cooper, S. Barry Li, Angsheng Indian Institute of Technology Kanpur Department of Computer Science and Engineering Resource Planning and Generation 208016 Kanpur India University of Leeds Department of Pure Mathematics Leeds LS2 9JT United Kingdom Chinese Academy of Sciences Institute of Software P.O. Box 8718 Beijing 100190 China
来源: 评论
Using formal concept analysis to support change analysis  11
Using formal concept analysis to support change analysis
收藏 引用
2011 26th IEEE/ACM International Conference on Automated software engineering, ASE 2011
作者: Sun, Xiaobing Li, Bixin Southeast University School of Computer Science and Engineering Nanjing China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences China
software needs to be maintained and changed to cope with new requirement, existing faults and change requests as software evolves. One particular issue in software maintenance is how to deal with a change proposal bef... 详细信息
来源: 评论