咨询与建议

限定检索结果

文献类型

  • 2,110 篇 期刊文献
  • 2,010 篇 会议
  • 10 册 图书

馆藏范围

  • 4,130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,994 篇 工学
    • 1,765 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 515 篇 信息与通信工程
    • 318 篇 土木工程
    • 307 篇 控制科学与工程
    • 275 篇 电气工程
    • 236 篇 电子科学与技术(可...
    • 235 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 217 篇 生物工程
    • 215 篇 建筑学
    • 215 篇 化学工程与技术
    • 151 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 128 篇 安全科学与工程
    • 126 篇 网络空间安全
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 105 篇 仪器科学与技术
    • 90 篇 生物医学工程(可授...
  • 1,442 篇 理学
    • 749 篇 数学
    • 405 篇 物理学
    • 241 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 173 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 619 篇 管理学
    • 410 篇 管理科学与工程(可...
    • 233 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 13 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 60 篇 deep learning
  • 59 篇 security
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 41 篇 machine learning
  • 40 篇 software
  • 40 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 accuracy
  • 36 篇 blockchain
  • 33 篇 computer science

机构

  • 226 篇 state key labora...
  • 161 篇 school of cyber ...
  • 152 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 39 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 33 篇 xiuli du
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 24 篇 wang wei
  • 24 篇 limin sun
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 zhang lei
  • 17 篇 xu chengshun
  • 17 篇 tan yang

语言

  • 3,721 篇 英文
  • 209 篇 中文
  • 201 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4130 条 记 录,以下是3751-3760 订阅
排序:
A new forward-secure proxy signature scheme
A new forward-secure proxy signature scheme
收藏 引用
2010 International Forum on Information technology and Applications, IFITA 2010
作者: He, Jun Li, Ximei Li, Lijuan Tang, Chunming Computer and Information Engineering Department HuaiHua Vocational and Technical College Huaihua Hunan 418000 China School of Computer and Communication Hunan University Changsha Hunan 410082 China School of Mathematics and Information Science Guangzhou University Guangzhou Guangdong 510006 China State Key Laboratory of Information Security Institute of Software Science CAS Beijing 100080 China
Based on the shortcomings of WCF scheme, this paper proposed an improved forward-secure proxy signature scheme. The new scheme does not evolve the authorized keys, but the proxy signer's private key, making it hav... 详细信息
来源: 评论
Towards Runtime Plug-and-Play software
Towards Runtime Plug-and-Play Software
收藏 引用
International Conference on Quality software
作者: Tao Wang Xiaowei Zhou Jun Wei Wenbo Zhang State Key Laboratory of Computer Science Institute of Software Chinese Academy and Sciences Beijing China Chinese Academy and Sciences Beijing China Chinese Academy of Sciences Beijing Beijing CN Technology Center of Software Engineering China
As applications grow more and more complex, the current software faces a great challenge in dynamism. This paper proposes to modernize legacy software towards runtime plug-and-play architecture using service-oriented ... 详细信息
来源: 评论
The Transition Between Sharp and Rounded Features and the Manipulation of Incompatible Boundary in Filling n-sided Holes
The Transition Between Sharp and Rounded Features and the Ma...
收藏 引用
International Conference on Shape Modeling and Applications
作者: Kan-Le Shi Jun-Hai Yong Peng Liu Jia-Guang Sun Jean-Claude Paul Key Laboratory of Information System Security Ministry of Education of China Beijing China Department of Computer Science and Technology Tsinghua University Beijing China Tsinghua National Laboratory for Information Science and Technology Beijing China School of Software Tsinghua University Beijing China Tsinghua University Beijing Beijing CN INRIA France
N-sided hole filling plays an important role in vertex blending. Piegl and Tiller presented an algorithm to interpolate the given boundary and cross-boundary derivatives in B-spline form. To deal with the incompatible... 详细信息
来源: 评论
Nova: A Robustness-oriented Byzantine Fault Tolerance Protocol
Nova: A Robustness-oriented Byzantine Fault Tolerance Protoc...
收藏 引用
The Ninth International Conference on Grid and Cloud Computing(第九届网格与云计算国际学术会议 GCC 2010)
作者: Xiang Pei Yongjian Wang Zhongzhi Luan Sino-German Joint Software Institute School of Computer Science and Engineering Beihang University 100191 Beijing Beijing Key Laboratory of Network Technology Beihang University 100191 Beijing
With the increased complexity, malicious faults have become an important reasons that affect the reliability of the distributed system, especially the web-scale infrastructures, i.e. Amazon S3, Google AppEngine etc. M... 详细信息
来源: 评论
A Petri Net-Based Method for Data Validation of Web Services Composition
A Petri Net-Based Method for Data Validation of Web Services...
收藏 引用
IEEE Annual International Computer software and Applications Conference (COMPSAC)
作者: Chunxiang Xu Wanling Qu Hanpin Wang Zizhen Wang Xiaojuan Ban Institute of software School of EECS Peking University Beijing China Ministry of Education Key laboratory of High Confidence Software Technologies China Information Engineering School University of Science and Technology Beijing China
For some time, the modeling and verification of web services composition are focused on control flow. Recent years, data validation has gained researchers' attention too, as it is important to the correct executio... 详细信息
来源: 评论
An Extensible Hash Function Construction Based on Embedded Chaos Maps
An Extensible Hash Function Construction Based on Embedded C...
收藏 引用
International Conference on Computer and Information technology (CIT)
作者: Xiaohong Zhang Yixian Yang Lixiang Li Haipeng Peng School of Information Engineering Jiangxi University of Science and Technology Ganzhou China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
Based on chaotic Tent map, this paper proposed a new 5×L (L≥32) bits extensible Hash function with symmetric keys. The structure only performed Boolean algorithm and shift operation. In order to generate fast di... 详细信息
来源: 评论
Performance enhancement of localization in wireless sensor network by self-adaptive algorithm based on difference
Performance enhancement of localization in wireless sensor n...
收藏 引用
Global Mobile Congress
作者: Guo-fang Dong Liu Chang Gao Fei Wan-sheng Wang Xiaoling Niu Peng Gong Key Laboratory of Wireless Sensor Networks Yunnan Nationalities University Yunnan China School of Software and Information Management Beijing City University China National Key Laboratory of Mechatronic Engineering and Control Beijing Institute of Technology Beijing China
In this paper, we present a self-adaptive localization algorithm based on difference for the node localization in wireless sensor network. We first divide the sensing area into several small regions according to the d... 详细信息
来源: 评论
Tourism information navigation system based on SoftMan
Tourism information navigation system based on SoftMan
收藏 引用
International Conference on Control, Automation and Systems ( ICCAS)
作者: Yipeng Zhou Junping Du Yang Yang Guangping Zeng Xuyan Tu Information Engineering School University of Science and Technology Beijing Beijing China Computer and Information Engineering School Beijing Technology and Business University Beijing China Beijing Key Laboratory of Intelligent Telecommunication Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing China
This paper provides a navigation system model and some critical implementation techniques. Softman is introduced into this system, and its migration model and strategy are all proposed, which can improve the Softman&#... 详细信息
来源: 评论
Stability Analysis of Continuous-time Iterative Learning Control Systems with Multiple State Delays
收藏 引用
自动化学报 2010年 第5期36卷 696-703页
作者: MENG De-Yuan JIA Ying-Min DU Jun-Ping YU Fa-Shan The Seventh Research Division Beihang University (BUAA) Beijing 100083 P. R. China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 P.R. China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo 454000 P. R. China
This paper presents a stability analysis of the iterative learning control (ILC) problem for continuous-time systems with multiple state delays, especially when system parameters are subject to polytopic-type uncertai... 详细信息
来源: 评论
Incremental intrusion detecting method based on SOM/RBF
Incremental intrusion detecting method based on SOM/RBF
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Li-Ye Tian Wei-Peng Liu Department of Electronic and Information Engineering Naval Aeronautical and Astronautical University Yantai China Trusted Computing Laboratory College of Computer Beijing University of Technology Beijing China The State Key Laboratory of Information Security GUCAS Beijing China
An incremental intrusion detecting model is proposed in this paper. This model integrates unsupervised Self Organizing Map and supervised Radial Basis Function to complete incremental learning. Self Organizing Map can... 详细信息
来源: 评论