咨询与建议

限定检索结果

文献类型

  • 2,132 篇 期刊文献
  • 2,032 篇 会议
  • 9 册 图书

馆藏范围

  • 4,173 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,004 篇 工学
    • 1,764 篇 计算机科学与技术...
    • 1,443 篇 软件工程
    • 520 篇 信息与通信工程
    • 315 篇 土木工程
    • 306 篇 控制科学与工程
    • 297 篇 电气工程
    • 240 篇 电子科学与技术(可...
    • 235 篇 材料科学与工程(可...
    • 217 篇 建筑学
    • 216 篇 机械工程
    • 216 篇 化学工程与技术
    • 215 篇 生物工程
    • 158 篇 交通运输工程
    • 136 篇 网络空间安全
    • 134 篇 安全科学与工程
    • 131 篇 动力工程及工程热...
    • 118 篇 力学(可授工学、理...
    • 115 篇 光学工程
    • 105 篇 仪器科学与技术
    • 88 篇 生物医学工程(可授...
  • 1,446 篇 理学
    • 746 篇 数学
    • 407 篇 物理学
    • 241 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 176 篇 化学
    • 152 篇 系统科学
    • 122 篇 地球物理学
  • 631 篇 管理学
    • 423 篇 管理科学与工程(可...
    • 232 篇 图书情报与档案管...
    • 115 篇 工商管理
  • 108 篇 法学
  • 79 篇 医学
  • 40 篇 军事学
  • 37 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 15 篇 艺术学
  • 11 篇 文学

主题

  • 74 篇 semantics
  • 72 篇 cryptography
  • 70 篇 feature extracti...
  • 67 篇 training
  • 66 篇 authentication
  • 63 篇 deep learning
  • 61 篇 security
  • 57 篇 privacy
  • 53 篇 laboratories
  • 50 篇 computational mo...
  • 49 篇 protocols
  • 47 篇 information secu...
  • 45 篇 data mining
  • 42 篇 accuracy
  • 42 篇 cloud computing
  • 41 篇 machine learning
  • 41 篇 software
  • 40 篇 optimization
  • 35 篇 blockchain
  • 35 篇 robustness

机构

  • 225 篇 state key labora...
  • 170 篇 school of cyber ...
  • 154 篇 key laboratory o...
  • 105 篇 university of ch...
  • 96 篇 institute of inf...
  • 91 篇 key laboratory o...
  • 84 篇 state key labora...
  • 78 篇 state key labora...
  • 76 篇 information secu...
  • 75 篇 department of co...
  • 75 篇 school of softwa...
  • 72 篇 school of comput...
  • 67 篇 national key lab...
  • 64 篇 state key labora...
  • 56 篇 beijing key labo...
  • 54 篇 state key labora...
  • 51 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 44 篇 school of electr...
  • 39 篇 the key laborato...

作者

  • 74 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 34 篇 xiuli du
  • 30 篇 cao xiaochun
  • 30 篇 yingmin jia
  • 26 篇 limin sun
  • 24 篇 wang wei
  • 23 篇 zhao mi
  • 22 篇 huang qingming
  • 21 篇 wang bin
  • 20 篇 guo li
  • 20 篇 yang yixian
  • 18 篇 zhang lei
  • 18 篇 du junping
  • 18 篇 yuehui jin
  • 17 篇 tan yang
  • 17 篇 jia yingmin
  • 17 篇 li bo
  • 17 篇 zhao jinjing

语言

  • 3,507 篇 英文
  • 474 篇 其他
  • 196 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4173 条 记 录,以下是3561-3570 订阅
排序:
Parallel spatial hashing for collision detection of deformable surfaces
Parallel spatial hashing for collision detection of deformab...
收藏 引用
12th International Conference on Computer-Aided Design and Computer Graphics, CAD/Graphics 2011
作者: Fan, Wenshan Wang, Bin Zhou, Jianliang Sun, Jiaguang School of Software Tsinghua University China Beijing Aerospace Control Center China Department of Computer Science and Technology Tsinghua University China Key Laboratory for Information System Security Ministry of Education of China China Tsinghua National Laboratory for Information Science and Technology China
We present a fast collision detection method for deformable surfaces with parallel spatial hashing on GPU architecture. The efficient update and access of the uniform grid are exploited to accelerate the performance i... 详细信息
来源: 评论
The construction of fuzzy concept lattices based on (θ, σ)-fuzzy rough approximation operators
The construction of fuzzy concept lattices based on (θ, σ)...
收藏 引用
作者: Yao, Yanqing Mi, Jusheng Li, Zhoujun Xie, Bin State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing 100191 China College of Mathematics and Information Science Hebei Normal University Shijiazhuang Hebei 050016 China Beijing Key Laboratory of Network Technology Beihang University Beijing China
Formal concept analysis and rough set analysis are two complementary approaches for analyzing data. This paper studies approaches to constructing fuzzy concept lattices based on generalized fuzzy rough approximation o... 详细信息
来源: 评论
Runtime-based boot components re-measurement scheme for trusted platform
Runtime-based boot components re-measurement scheme for trus...
收藏 引用
作者: Weiping, Peng Yajian, Zhou Cong, Wang Yixian, Yang Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China School of Computer Science and Technology Henan Polytechnic University Jiaozuo Henan 454001 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
Integrity measurement is just one of the most important features in a trusted computing platform to provide evidence of platform configuration and behavior. Each set of software instructions (binary code) is measured ... 详细信息
来源: 评论
Progressive collapse resistance demand of RC frame structures based on energy method II: Catenary mechanism
收藏 引用
Jianzhu Jiegou Xuebao/Journal of Building Structures 2011年 第11期32卷 9-16页
作者: Li, Yi Lu, Xinzheng Ye, Lieping Key Laboratory of Urban Security and Disaster Engineering of China Ministry of Education Beijing University of Technology Beijing 100124 China Key Laboratory of Civil Engineering Safety and Durability of China Ministry of Education Tsinghua University Beijing 100084 China
The key issue of the progressive collapse (PC) design of RC frame structures at large deformation stage is to calculate the PC resistance demand of the structure under catenary mechanism. The existing design codes for... 详细信息
来源: 评论
Test on embedded perforated steel plate shear wall with concrete filled steel tube columns
收藏 引用
1st International Conference on Civil engineering, Architecture and Building Materials, CEABM 2011
作者: Cao, Wanlin Zhang, Wenjiang Zhang, Jianwei Dong, Hongying College of Architecture and Civil Engineering Beijing University of Technology Zhongguan Village South Avenue 5 Beijing 100124 China Key Laboratory of Urban Security and Disaster Engineering Ministry of Education Beijing 100124 China College of Architecture and Civil Engineering Hebei University Baoding 071002 China
In view of the proposal of embedded steel plate concrete shear wall with concrete filled steel tube columns which contains a new kind shear connector of tie-bars through the circular holes linking concrete layers on b... 详细信息
来源: 评论
Nonlinear analysis of the seismic performance of concrete beams prestressed with FRP tendons
收藏 引用
beijing Gongye Daxue Xuebao/Journal of beijing University of technology 2011年 第SUPPL. 1期37卷 26-33+55页
作者: Wang, Zuo-Hu Du, Xiu-Li Liu, Jing-Bo Department of Civil Engineering Tsinghua University Beijing 100084 China The Key Laboratory of Urban Security and Disaster Engineering of Ministry of Education Beijing University of Technology Beijing 100124 China
As a new structural material, fiber reinforced plastics (FRP) has characteristics of light weight, high strength, corrosion resistance, etc., and has a bright future when used for a new type of prestressing tendon in ... 详细信息
来源: 评论
Proving computational geometry algorithms in TLA+2
Proving computational geometry algorithms in TLA+2
收藏 引用
5th International Conference on Theoretical Aspects of software engineering, TASE 2011
作者: Kong, Hui Zhang, Hehua Song, Xiaoyu Gu, Ming Sun, Jiaguang Dept.CST Tsinghua Unviersity Beijing China School of Software Tsinghua University Beijing China Dept.ECE Portland State University OR United States Key Laboratory for Information System Security Ministry of Education China Singhua National Laboratory for Information Science and Technology China
Geometric algorithms are widely used in many scientific fields like computer vision, computer graphics. To guarantee the correctness of these algorithms, it's important to apply formal method to them. In this pape... 详细信息
来源: 评论
Strong security enabled certificateless aggregate signatures applicable to mobile computation
Strong security enabled certificateless aggregate signatures...
收藏 引用
3rd IEEE International Conference on Intelligent Networking and CollaborativeSystems, INCoS 2011
作者: Hu, Xiong Wu, Qianhong Chen, Zhong Key Laboratory of Network and Software Security Assurance of the Ministry of Education School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan University Ministry of Education China Universitat Rovira i Virgili Department of Computer Engineering and Mathematics UNESCO Av. Països Catalans 26 E-43007 Tarragona Spain
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that ... 详细信息
来源: 评论
Performance evaluation of atrium smoke exhaust system in atria with irregular shape
收藏 引用
beijing Gongye Daxue Xuebao/Journal of beijing University of technology 2011年 第SUPPL. 1期37卷 120-124+131页
作者: Li, Jun-Mei Li, Fu-Mei Li, Yan-Feng Zhang, Ning The Key Laboratory of Urban Security and Disaster Engineering Ministry of Education Beijing University of Technology Beijing 100124 China Luoyang Institute of Science and Technology Luoyang 471023 China
A high-efficiency smoke exhaust system is very important for the occupants' safe escape from a large-space building in fire. The smoke exhaust rates are determined by the theory of the two-layer model and some emp... 详细信息
来源: 评论
Simple power analysis attacks using chosen message against ECC hardware implementations
Simple power analysis attacks using chosen message against E...
收藏 引用
作者: Li, Huiyun Wu, Keke Xu, Guoqing Yuan, Hai Luo, Peng Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences Chinese University of Hong Kong Shenzhen 518055 China State Key Laboratory of Information Security Institute of Software Graduate University of Chinese Academy of Sciences Beijing 100049 China
Chosen-message simple power analysis (SPA) attacks were powerful against public-key cryptosystem based on modular exponentiation, due to the special results of modular square and modular multiplication for input pair ... 详细信息
来源: 评论