咨询与建议

限定检索结果

文献类型

  • 2,110 篇 期刊文献
  • 2,010 篇 会议
  • 10 册 图书

馆藏范围

  • 4,130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,994 篇 工学
    • 1,765 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 515 篇 信息与通信工程
    • 318 篇 土木工程
    • 307 篇 控制科学与工程
    • 275 篇 电气工程
    • 236 篇 电子科学与技术(可...
    • 235 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 217 篇 生物工程
    • 215 篇 建筑学
    • 215 篇 化学工程与技术
    • 151 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 128 篇 安全科学与工程
    • 126 篇 网络空间安全
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 105 篇 仪器科学与技术
    • 90 篇 生物医学工程(可授...
  • 1,442 篇 理学
    • 749 篇 数学
    • 405 篇 物理学
    • 241 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 173 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 619 篇 管理学
    • 410 篇 管理科学与工程(可...
    • 233 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 13 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 60 篇 deep learning
  • 59 篇 security
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 41 篇 machine learning
  • 40 篇 software
  • 40 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 accuracy
  • 36 篇 blockchain
  • 33 篇 computer science

机构

  • 226 篇 state key labora...
  • 161 篇 school of cyber ...
  • 152 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 39 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 33 篇 xiuli du
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 24 篇 wang wei
  • 24 篇 limin sun
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 zhang lei
  • 17 篇 xu chengshun
  • 17 篇 tan yang

语言

  • 3,721 篇 英文
  • 209 篇 中文
  • 201 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4130 条 记 录,以下是3971-3980 订阅
排序:
Web application server replication scheme for complex transaction patterns
收藏 引用
Ruan Jian Xue Bao/Journal of software 2008年 第2期19卷 432-445页
作者: Zuo, Lin Liu, Shao-Hua Feng, Yu-Lin Wei, Jun Li, Yang Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences Beijing 100080 China Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing 100080 China Graduate University Chinese Academy of Sciences Beijing 100049 China
The support of reliability as adopted in conventional replication or transaction processing techniques is not enough due to their distinct objectives: Replication guarantees the liveness of computational operations by... 详细信息
来源: 评论
Information transmission model for covert channel
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2008年 第11期36卷 2216-2219页
作者: Yao, Li-Hong Zi, Xiao-Chao Li, Jian-Hua School of Information Security Engineering Shanghai Jiaotong University Shanghai 200240 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China
Covert channels cause serious security threat to information systems, and the research on the information transmission principle of the channels is crucial to detect and eliminate them. Covert channel is essentially a... 详细信息
来源: 评论
Scheduling aircraft landing based on clonal selection algorithm and receding horizon control
Scheduling aircraft landing based on clonal selection algori...
收藏 引用
11th International IEEE Conference on Intelligent Transportation Systems, ITSC 2008
作者: Jia, Xiaolan Cao, Xianbin Guo, Yuanping Qiao, Hong Zhang, Jun University of Science and Technology of China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230026 China Institute of Automation Chinese Academy of Sciences Beijing 100080 China School of Electronic and Information Engineering Beihang University Beijing 100083 China
The task of Aircraft Landing Scheduling (ALS) is to give a landing sequence and landing times for a given set of aircrafts where many constraints must be satisfied. ALS is an NP-hard problem with large-scale and multi... 详细信息
来源: 评论
Rock magnetism and magnetic anisotropy in folded sills and basaltic flows:A case study of volcanics from the Taimyr Peninsula, Northern Russia
收藏 引用
Chinese Science Bulletin 2008年 第5期53卷 759-767页
作者: ZHANG ShuWei J. Harald WALDERHAUG YANG YueJun College of Computer Engineering and Software Taiyuan University of Technology Taiyuan 030024 China Department of Earth Sciences University of Bergen AIl~gaten 415007 Bergen Norway State Key Laboratory of Geological Processes and Mineral Resources China University of Geosciences Beijing 100083 China Department of Applied Physics Taiyuan University of Technology Taiyuan 030024 China
Magnetic measurements were performed on apparently deformed igneous rocks of 23 sites from the southeastern part of the Taimyr Peninsula. Rock magnetism and reflected light microscopy analyses reveal that fine-grained... 详细信息
来源: 评论
Novel and quick fuzzy rule extraction method
收藏 引用
Kongzhi yu Juece/Control and Decision 2008年 第9期23卷 1015-1020页
作者: Chen, Tie-Ming Gong, Rong-Sheng Samuel, H Huang College of Software Engineering Zhejiang University of Technology Hangzhou 310014 China State Key Laboratory of Software Development Environment Beihang University Beijing 100086 China School of Engineering University of Cincinnati Cincinnati 45221 United States
This paper presents a novel method for classification problems. Firstly, entropy is introduced to select the best discretization solution from Chi-merge for each feature to guide grid partition. Afterwards one simple ... 详细信息
来源: 评论
Dynamic response of submerged floating-tunnel tethers subjected to current
收藏 引用
Gongcheng Lixue/engineering Mechanics 2008年 第10期25卷 229-234页
作者: Chen, Jian-Yun Sun, Sheng-Nan Su, Zhi-Bin State Key Laboratory of Coastal and Offshore Engineering Dalian University of Technology Dalian 116085 China Civil King Software Technology Co. Ltd. Beijing 100044 China
To study the transversal oscillation response of the tether under vortex-induced vibration and parametric vibration, a nonlinear tether-tube model of submerged floating-tunnels is proposed by the basis of taking the s... 详细信息
来源: 评论
Wyner-Ziv coding based on signal denoising technique
Wyner-Ziv coding based on signal denoising technique
收藏 引用
2008 5th International Conference on Visual Information engineering (VIE 2008)
作者: Guiguang Ding Xiaodong Shen Key Laboratory for Information System Security Ministry of Education Tsinghua National Laboratory for Information Science and Technology School of Software Tsinghua University Beijing China
In Wyner-Ziv video coding, efficient compression is achieved by exploiting source statistics at the decoder only, which is radically different from conventional video coding. Prior work on this topic has been restrict...
来源: 评论
On the margin explanation of boosting algorithms
On the margin explanation of boosting algorithms
收藏 引用
21st Annual Conference on Learning Theory, COLT 2008
作者: Wang, Liwei Sugiyama, Masashi Yang, Cheng Zhou, Zhi-Hua Feng, Jufu Key Laboratory of Machine Perception MOE School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Department of Computer Science Tokyo Institute of Technology 2-12-1 O-okayama Meguro-ku Tokyo 152-8552 Japan National Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China
Much attention has been paid to the theoretical explanation of the empirical success of AdaBoost. The most influential work is the margin theory, which is essentially an upper bound for the generalization error of any... 详细信息
来源: 评论
Group key management method based on tree-shape architecture in Wimax network
收藏 引用
Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition) 2008年 第SUPPL. 1期38卷 200-203页
作者: Pan, Shaoming Gu, Yonghao Yang, Yatao Ji, Yichao Department of Electronic Information and Control Engineering Guangxi University of Technology Liuzhou 545006 China Information Security Center State Key Laboratory of Networking and Switching Beijing University of Posts and Telecommunications Beijing 100876 China State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing 100044 China
To improve the security and applicable capability of the group key management in 802.16e standard, the traditional group key management mechanism is discussed and the current security solutions for group key managemen... 详细信息
来源: 评论
A Secure Email Encryption Proxy Based on Identity-Based Cryptography
A Secure Email Encryption Proxy Based on Identity-Based Cryp...
收藏 引用
International Conference on MultiMedia and Information technology, MMIT
作者: Tieming Chen Shilong Ma College of Software Engineering Zhejiang University of Technology Hangzhou China State Key Laboratory of Software Development Environment Beihang University Beijing China
PKI-based security frameworks for Email systems, such as S/MIME, are all good at working for content protects but not efficient because of the high cost for public key certificate management. In others, PGP-based solu... 详细信息
来源: 评论