咨询与建议

限定检索结果

文献类型

  • 2,110 篇 期刊文献
  • 2,010 篇 会议
  • 10 册 图书

馆藏范围

  • 4,130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,994 篇 工学
    • 1,765 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 515 篇 信息与通信工程
    • 318 篇 土木工程
    • 307 篇 控制科学与工程
    • 275 篇 电气工程
    • 236 篇 电子科学与技术(可...
    • 235 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 217 篇 生物工程
    • 215 篇 建筑学
    • 215 篇 化学工程与技术
    • 151 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 128 篇 安全科学与工程
    • 126 篇 网络空间安全
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 105 篇 仪器科学与技术
    • 90 篇 生物医学工程(可授...
  • 1,442 篇 理学
    • 749 篇 数学
    • 405 篇 物理学
    • 241 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 173 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 619 篇 管理学
    • 410 篇 管理科学与工程(可...
    • 233 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 13 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 60 篇 deep learning
  • 59 篇 security
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 41 篇 machine learning
  • 40 篇 software
  • 40 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 accuracy
  • 36 篇 blockchain
  • 33 篇 computer science

机构

  • 226 篇 state key labora...
  • 161 篇 school of cyber ...
  • 152 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 39 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 33 篇 xiuli du
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 24 篇 wang wei
  • 24 篇 limin sun
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 zhang lei
  • 17 篇 xu chengshun
  • 17 篇 tan yang

语言

  • 3,721 篇 英文
  • 209 篇 中文
  • 201 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4130 条 记 录,以下是3931-3940 订阅
排序:
Automated Design of Logic Circuits with a Increasable Evolution Approach
Automated Design of Logic Circuits with a Increasable Evolut...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Guoliang He Naixue Xiong Athanasios V. Vasilakos Yuanxiang Li Zhongzhi Shi State Key Laboratory of Software Engineering Wuhan University of China Wuhan China Key Laboratory of Intelligent Information Process Institute of Computing Technology Chinese Academy and Sciences Beijing China Department of Computer Science Georgia State University USA Department of Computer Science Saint Francis Xavier University Canada
Since the scalability of logic circuits is becoming larger and more complex, the auto-design is becoming more and more difficult. In order to improve automatic design and performance evaluation of logic circuits in ef... 详细信息
来源: 评论
Design and Implement of Digital Modulator Based on Improved DDS technology and DSP Builder
Design and Implement of Digital Modulator Based on Improved ...
收藏 引用
International Conference on Wireless Communications, Networking and Mobile Computing (WiCom)
作者: Kangshun Li Xiaoqiao Lu Wensheng Zhang Feng Wang School of Information South China Agricultural University Guangzhou China School of Information Engineering Jiangxi University of Science and Technology Jiangxi China Institute of Automation Chinese Academy and Sciences Beijing China State Key Laboratory of Software Engineering Wuhan University of China Wuhan China
In this paper, according to the basic theory of digital modulator, the design model of digital modulator is built by using the improved Direct Digital Synthesizer (DDS) technology through running the Matlab/DSP Builde... 详细信息
来源: 评论
New method of processing the boundary problem in the empirical mode decomposition (EMD)
收藏 引用
beijing Gongye Daxue Xuebao / Journal of beijing University of technology 2009年 第5期35卷 626-632页
作者: Du, Xiu-Li He, Li-Zhi Key Laboratory of Urban Security and Disaster Engineering Ministry of Education Beijing University of Technology Beijing 100124 China E and T Co. Ltd. Beijing 100016 China
Based on deeply studying and analyzing Hilbert-Huang transform (HHT), a so-called semi-periodical-semi-symmetrical method is presented in this paper to deal with the boundary problem resulting in error during the proc... 详细信息
来源: 评论
Novel evidence combination method based on proportional conjunctive and complementary pooling criterion
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2009年 第1期37卷 95-100页
作者: Lang, Feng-Hua Gu, Li-Ze Yang, Yi-Xian Niu, Xin-Xin Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
To solve the drawbacks of Dempster rule and improved rule of combination, a novel evidence combination method based on proportional conjunctive and complementary pooling criterion was presented. Firstly, the advantage... 详细信息
来源: 评论
Overview security analysis of 3G authentication protocols and technical specifications
收藏 引用
Qinghua Daxue Xuebao/Journal of Tsinghua University 2009年 第SUPPL. 2期49卷 2193-2199页
作者: Cao, Chenlei Zhang, Ru Niu, Xinxin Zhou, Linna Zhang, Zhentao Information Security Centre of State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology of Ministry of Education Beijing University of Posts and Telecommunications Beijing 100876 China Department of Electronic Engineering Tsinghua University Beijing 100084 China National Cyber-Net Security Ltd Beijing 100088 China
This paper presents an analysis of 3GPP (3rd generation partnership project) security protocols and related technical specifications to further development of the 3G (3rd-generation) security protocol standards. A mat... 详细信息
来源: 评论
Dynamic Output Feedback Control for a Class of Stochastic Time-Delay Systems
Dynamic Output Feedback Control for a Class of Stochastic Ti...
收藏 引用
2009 American Control Conference (ACC 2009)
作者: Lin Li Yingmin Jia Junping Du Shiying Yuan Seventh Research Division Beihang University (BUAA) Beijing 100191 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 P.R. China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo 454000 Henan P.R. China
This paper is concerned with the problem of robust control for a class of uncertain stochastic systems with discrete and distributed time-varying delays via dynamic output feedback control. The parameter uncertainties... 详细信息
来源: 评论
Design of high-speed network intrusion detection system architecture
收藏 引用
Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of technology 2009年 第SUPPL. 1期41卷 198-200页
作者: Yao, Wen-Bin Wang, Cong Liu, Jian-Yi Si, Yan-Fang Yang, Yi-Xian National Engineering Laboratory for Disaster Backup and Recovery Beijing 100876 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Department of Computer Science and Technology Harbin Engineering University Harbin 150001 China
Parallel approach is an important way to improve the performance of networked based intrusion detection system. A parallel architecture of intrusion detection system based on the ideas of combining twice data-flow par... 详细信息
来源: 评论
Combining opportunistic routing with dynamic source routing for wireless mesh networks
Combining opportunistic routing with dynamic source routing ...
收藏 引用
IET International Communication Conference on Wireless Mobile and Computing (CCWMC 2009)
作者: Qiang Shen Xuming Fang Sunmyeng Kim Rong He High Performance Network Lab Institute of Acoustics Chinese Academy and Sciences Beijing China Provincial Key Laboratory of Information Coding and Transmission Southwest Jiaotong University Chengdu China School of Computer and Software Engineering Kumoh National Institute of Technology Gyeongbuk South Korea
Routing in wireless mesh networks presents a great challenge due to unreliable wireless links and collisions. Recently, a new routing method, opportunistic routing (OR), is proposed to deal with them by exploiting bro...
来源: 评论
The design of intelligent expert classifier for featured crop mapping combining spectral library
The design of intelligent expert classifier for featured cro...
收藏 引用
International Conference on Geoinformatics
作者: Li-gang Fang Hong-li Li Shui-sen Chen Jiangsu Province Support Software Engineering R&D Center for Modern Information Technology Application in Enterprise Suzhou China 215104 Key Laboratory of Resources Remote Sensing & Digital Agriculture Ministry of Agriculture Beijing China Public Laboratory of Geoinfomatica of Guangdong Province Guangzhou Institute of Geography Guangzhou China
In the study, a module was designed which was used to estimate yield of crop (such as lychee, banana and sugarcane etc) using spectral library of featured crops of South China. An approach combining spectral library w... 详细信息
来源: 评论
A Novel Interacting Multiple Model Algorithm Based on Multi-sensor Optimal Information Fusion Rule
A Novel Interacting Multiple Model Algorithm Based on Multi-...
收藏 引用
2009 American Control Conference (ACC 2009)
作者: Xiaoyan Fu Yingmin Jia Junping Du Shiying Yuan Seventh Research Division Beihang University (BUAA) Beijing 100083 P.R. China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 P.R. China School of Electrical Engineering and Automation Henan Polytechnic University Jiaozuo 454000 Henan P.R. China
In this paper, a novel interacting multiple model (IMM) algorithm is proposed, which utilizes a multi-sensor optimal information fusion rule to combine multiple models in the linear minimum variance sense instead of f... 详细信息
来源: 评论