咨询与建议

限定检索结果

文献类型

  • 2,110 篇 期刊文献
  • 2,010 篇 会议
  • 10 册 图书

馆藏范围

  • 4,130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,994 篇 工学
    • 1,765 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 515 篇 信息与通信工程
    • 318 篇 土木工程
    • 307 篇 控制科学与工程
    • 275 篇 电气工程
    • 236 篇 电子科学与技术(可...
    • 235 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 217 篇 生物工程
    • 215 篇 建筑学
    • 215 篇 化学工程与技术
    • 151 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 128 篇 安全科学与工程
    • 126 篇 网络空间安全
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 105 篇 仪器科学与技术
    • 90 篇 生物医学工程(可授...
  • 1,442 篇 理学
    • 749 篇 数学
    • 405 篇 物理学
    • 241 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 173 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 619 篇 管理学
    • 410 篇 管理科学与工程(可...
    • 233 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 13 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 60 篇 deep learning
  • 59 篇 security
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 41 篇 machine learning
  • 40 篇 software
  • 40 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 accuracy
  • 36 篇 blockchain
  • 33 篇 computer science

机构

  • 226 篇 state key labora...
  • 161 篇 school of cyber ...
  • 152 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 39 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 33 篇 xiuli du
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 24 篇 wang wei
  • 24 篇 limin sun
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 zhang lei
  • 17 篇 xu chengshun
  • 17 篇 tan yang

语言

  • 3,721 篇 英文
  • 209 篇 中文
  • 201 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4130 条 记 录,以下是3951-3960 订阅
排序:
Bidirectional Sticker Systems with Complex Structures and Generative Capacity
收藏 引用
电子学报(英文版) 2008年 第3期17卷 409-413页
作者: WANG Shudong XU Jin LIU Xiangrong MA Fangfang Institute of Software School of Electronic Engineering and Computer Science Peking University Beijing 100871 China Key Laboratory of High Confidence Software Technologies Ministry of Education Beijing 100871 China) College of Information Science and Engineering Shandong University of Science and Technology Qingdao 266510~ China!
The languages generated by Bidirectional sticker systems with complex structure (BSS) are defined;The classifications of BSS are proposed and the generative capacity is discussed. The characterization of recursively e... 详细信息
来源: 评论
Design and implementation of active information service system
收藏 引用
Journal of China Universities of Posts and Telecommunications 2008年 第SUPPL.期15卷 55-58页
作者: WANG, Rui-jie DU, Jun-ping TU, Xu-yan YIN, Yi-xin School of Information Engineering University of Science and Technology Beijing Beijing 100083 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia School of Computer Science Beijing University of Posts and Telecommunications Beijing 100876 China
This paper gives the types and characteristics of intelligent information push and pull technology (IIPP) and build a push and pull model. It presents the design and implementation of an active information service sys... 详细信息
来源: 评论
Qualitative control for mobile robot navigation based on reinforcement learning and grey system
收藏 引用
Mediterranean Journal of Measurement and Control 2008年 第1期4卷 1-7页
作者: Chen, Chunlin Dong, Daoyi Chen, Zonghai Wang, Haibo School of Management and Engineering Nanjing University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Key Laboratory of Systems and Control Institute of Systems Science Beijing China Department of Automation University of Science and Technology of China China
A qualitative control method using reinforcement learning (RL) and grey system is developed for mobile robot navigation in an unknown environment. New representation and computation mechanisms are key approaches for l... 详细信息
来源: 评论
Practical Identity-Based Aggregate Signature from Bilinear Maps
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2008年 第6期13卷 684-687页
作者: 王竹 吴倩 叶顶锋 陈辉焱 State Key Laboratory of Information Security Graduate School of Chinese Academy of SciencesBeijing 100049 China Information Engineering College The Central University for NationalitiesBeijing 100081China Beijing Electronic Science and Technology Institute Beijing 100070China
A new identity-based (ID-based) aggregate signature scheme which does not need any kind of interaction among the signers was proposed to provide partial aggregation. Compared with the existing ID-based aggregate sig... 详细信息
来源: 评论
Object Tracking and QoS Control for Wireless Sensor Networks
收藏 引用
电子学报(英文版) 2009年 第4期
作者: TU Guofang TU Guofang GAO Shaoshuai GAO Shaoshuai ZHANG Can ZHANG Can School of Information Science and Engineering Graduated University of Chinese Academy of Sciences Beijing 100049 China School of Information Science and Engineering Graduated University of Chinese Academy of Sciences Beijing 100049 China .National Institute of Standards and Technology Gaithersburg MD 20899 USA .National Institute of Standards and Technology Gaithersburg MD 20899 USA State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China
来源: 评论
Soundness analysis of inter-organizational workflows
收藏 引用
Information technology Journal 2008年 第8期7卷 1194-1199页
作者: Sun, H.C. Du, Y.Y. College of Information Science and Engineering Shandong University of Science and Technology Qingdao 266510 China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100080 China
This study presents an approach to judge the soundness of inter-organizational workflowl. It focuses on interactive messages in an inter-organizational system. Each workflow entity is packaged based on the object-orie... 详细信息
来源: 评论
Technical framework for Internetware: An architecture centric approach
收藏 引用
Science in China(Series F) 2008年 第6期51卷 610-622页
作者: YANG FuQing1,2, Lü Jian3,4 & MEI Hong1,2 1 key laboratory of High Confidence software Technologies (Peking University), Ministry of Education, beijing 100871, China 2 School of Electronics engineering and Computer Science, Peking University, beijing 100871, China 3 State key laboratory for Novel software technology, Nanjing 210093, China 4 Department of Computer Science and technology, Nanjing University, Nanjing 210093, China 1. Key Laboratory of High Confidence Software Technologies (Peking University) Ministry of Education Beijing 100871 China 2. School of Electronics Engineering and Computer Science Peking University Beijing 100871 China 3. State Key Laboratory for Novel Software Technology Nanjing 210093 China 4. Department of Computer Science and Technology Nanjing University Nanjing 210093 China
Being a new software paradigm evolved by the Internet, Internetware brings many challenges to the traditional software methods and techniques. Sponsored by the national basic research program (973), researchers in C... 详细信息
来源: 评论
Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme
收藏 引用
Journal of Computer Science & technology 2008年 第2期23卷 265-269页
作者: 刘胜利 陈晓峰 张方国 Department of Computer Science and Engineering Shanghai Jiao Tong UniversityShanghai 200240China State Key Laboratory of Information SecurityInstitute of SoftwareChinese Academy of Sciences Beijing 100080China Department of Computer Science School of Information Science and TechnologySun Yat-Sen University Guangzhou 510275China Department of Electronics and Communication Engineering School of Information Science and Technology Sun Yat-Sen UniversityGuangzhou 510275China
Restrictive partially blind signature (RPBS) plays an important role in designing secure electronic cash system Very recently, Wang, Tang and Li proposed a neW ID-based restrictive partially blind signature (ID-RPB... 详细信息
来源: 评论
A Group-Oriented (t,n) Threshold Signature Scheme with Traceable Signers
收藏 引用
Wuhan University Journal of Natural Sciences 2008年 第6期13卷 680-684页
作者: TAN Zuowen1,2 1. School of Information technology, Jiangxi University of Finance and Economics, Nanchang 330013, Jiangxi, China 2. State key laboratory of Information security/Institute of software, Chinese Academy of Sciences, beijing 100190, China School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 Jiangxi China State Key Laboratory of Information Security/Institute of Software Chinese Academy of Sciences Beijing 100190 China
A group-oriented (t, n) threshold signature scheme employs the cryptographic techniques of secret share, allows any subset of t players out of n players to sign message on behalf of the group and disallows the creat... 详细信息
来源: 评论
On the Design and Temporal Petri Net Verification of Grid Commerce Architecture
收藏 引用
电子学报(英文版) 2008年 第2期17卷 247-251页
作者: DU Yuyue JIANG Changjun College of Information Science and Engineering Shandong University of Science and Technology Qingdao 266510 China Department of Computer Science and Engineering Tongji University Shanghai 200092 China The State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100080 China
The emergence of Grid Computing settings lays a solid foundation for designing and constructing a next generation E-commerce environment. This work presents a new E-commerce architecture based on a Grid Computing envi... 详细信息
来源: 评论