咨询与建议

限定检索结果

文献类型

  • 2,060 篇 期刊文献
  • 1,987 篇 会议
  • 10 册 图书

馆藏范围

  • 4,057 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,939 篇 工学
    • 1,735 篇 计算机科学与技术...
    • 1,438 篇 软件工程
    • 502 篇 信息与通信工程
    • 311 篇 土木工程
    • 282 篇 控制科学与工程
    • 269 篇 电气工程
    • 230 篇 材料科学与工程(可...
    • 230 篇 电子科学与技术(可...
    • 218 篇 机械工程
    • 217 篇 生物工程
    • 214 篇 化学工程与技术
    • 208 篇 建筑学
    • 149 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 124 篇 安全科学与工程
    • 121 篇 网络空间安全
    • 119 篇 力学(可授工学、理...
    • 110 篇 光学工程
    • 104 篇 仪器科学与技术
    • 91 篇 生物医学工程(可授...
  • 1,432 篇 理学
    • 750 篇 数学
    • 399 篇 物理学
    • 240 篇 生物学
    • 208 篇 统计学(可授理学、...
    • 170 篇 化学
    • 150 篇 系统科学
    • 120 篇 地球物理学
  • 609 篇 管理学
    • 404 篇 管理科学与工程(可...
    • 229 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 108 篇 法学
  • 76 篇 医学
  • 41 篇 军事学
  • 38 篇 经济学
  • 33 篇 农学
  • 23 篇 教育学
  • 12 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 71 篇 cryptography
  • 65 篇 authentication
  • 65 篇 feature extracti...
  • 61 篇 training
  • 57 篇 deep learning
  • 57 篇 security
  • 54 篇 privacy
  • 52 篇 laboratories
  • 48 篇 information secu...
  • 47 篇 computational mo...
  • 47 篇 protocols
  • 43 篇 data mining
  • 40 篇 machine learning
  • 40 篇 software
  • 40 篇 cloud computing
  • 36 篇 optimization
  • 36 篇 blockchain
  • 35 篇 accuracy
  • 32 篇 computer science

机构

  • 226 篇 state key labora...
  • 154 篇 school of cyber ...
  • 151 篇 key laboratory o...
  • 105 篇 university of ch...
  • 91 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 state key labora...
  • 77 篇 department of co...
  • 76 篇 information secu...
  • 75 篇 school of softwa...
  • 70 篇 school of comput...
  • 64 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 54 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 38 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 32 篇 cao xiaochun
  • 32 篇 yingmin jia
  • 30 篇 xiuli du
  • 25 篇 wang wei
  • 24 篇 limin sun
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 zhang lei
  • 17 篇 xu chengshun
  • 17 篇 tan yang

语言

  • 3,734 篇 英文
  • 206 篇 中文
  • 119 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4057 条 记 录,以下是4021-4030 订阅
排序:
Describing Service-Oriented Architecture by Extended Darwin
收藏 引用
Wuhan University Journal of Natural Sciences 2005年 第6期10卷 971-976页
作者: ZHANG Tao SHEN Mei-e YING Shi YE Peng LIANG Zao-qing State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 Hubei China Computer Department Beijing Information Technology Institute Beijing 100101 China School of Computer Science Wuhan University of Science and Engineering Wuhan 430074 Hubei China
Describing Service-Oriented Architecture (SOA) is critical in the development of Web based system, in this paper, an approach for describing SOA by extended Darwin is proposed. The requirements for describing SOA, w... 详细信息
来源: 评论
A Mathematical Approach to Disaster Recovery Planning
A Mathematical Approach to Disaster Recovery Planning
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Kun Wang Zhonghai Yin Feng Yuan Lihua Zhou Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China National Info Security Engineering and Technology Research Center Beijing China
It is crucial for highly security-critical information systems to accurately control the disaster recovery activities. Using optimization theory, we present a disaster recovery planning mathematical model. The model u... 详细信息
来源: 评论
A Disaster Recovery System Model in an E-government System
A Disaster Recovery System Model in an E-government System
收藏 引用
IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)
作者: Kun Wang Lihua Zhou Zhen Cai Zengxin Li Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China National Info Security Engineering and Technology Research Center Beijing China
We present a Robust Disaster Recovery System Model (RDRSM) for highly security-critical systems to realize continuous service. Through strengthening safe communication ability, RDRSM guarantees secure and reliable com... 详细信息
来源: 评论
Study of Secure Complicated Information System Architecture Model
Study of Secure Complicated Information System Architecture ...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Kun Wang Ruidan Su Zengxin Li Zhen Cai Lihua Zhou Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China National Info Security Engineering and Technology Research Center Beijing China
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ... 详细信息
来源: 评论
An improved Bayesian networks learning algorithm based on independence test and MDL scoring
An improved Bayesian networks learning algorithm based on in...
收藏 引用
Proceedings of the International Conference on Active Media technology, AMT
作者: Junzhong Ji Jing Yan Chunnian Liu N. Zhong College of Computer Science and Technology Beijing University of Technology Beijing Municipal Key Laboratory of Multimedia and Intelligent Software Technology Beijing China Department of Information Engineering Maebashi Institute of Technology Maebashi-City Japan
In recent years, more and more people studied the Bayesian networks learning algorithm that integrates independence test with scoring metric. Based on the proposed hybrid algorithm I-B&B-MDL, a modified method is ... 详细信息
来源: 评论
AN IMPROVED BICLUSTERING ALGORITHM AND ITS APPLICATION TO GENE EXPRESSION SPECTRUM ANALYSIS
收藏 引用
Genomics, Proteomics & Bioinformatics 2005年 第3期3卷 189-193页
作者: Hua Qu Liu-Pu Wang Yan-Chun Liang Chun-Guo Wu College of Software Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Jilin University Changchun 130012 China Guangzhou Institute of China Telecom Guangzhou 510630 China College of Computer Science and Technology Key Laboratory of Symbol Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China Key Laboratory of Information Science and Engineering of the Ministry of Railway/Key Laboratory of Advanced Information Science and Network Technology of Beijing Beijing Jiaotong University Beijing 100044 China.
Cheng and Church algorithm is an important approach in biclustering algorithms. In this paper, the process of the extended space in the second stage of Cheng and Church algorithm is improved and the selections of two ... 详细信息
来源: 评论
ID-based ring authenticated encryption
ID-based ring authenticated encryption
收藏 引用
International Conference on Advanced Information Networking and Applications (AINA)
作者: Tianjie Cao Dongdai Lin Rui Xue Graduate School of Chinese Academy of Sciences Beijing China School of Computer Science and Technology China University of Mining and Technology Xuzhou China State Key Laboratory of Information Security of Institute of Software Chinese Academy and Sciences Beijing China
Ring authenticated encryption has the following security requirements: semantic-security, recipient-designation, verification-dependence, verification-convertibility, recipient-ambiguity, recipient-verifiability, sign... 详细信息
来源: 评论
A Perspective of Fusing Ontology and Metamodeling Architecture in Interconnection Environment
A Perspective of Fusing Ontology and Metamodeling Architectu...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Jin Liu Keqing He Bing Li Fei He The State Key Laboratory of Software Engineering (SKLSE) Wuhan University of China Wuhan China Institute of Computing Technology Chinese Academy and Sciences Beijing China Graduate School of Science and Engineering Waseda University Tokyo Japan
To achieve interconnection environment, the proposed approach consists of MMFI for ontology and reference ontology for normalizing semantic space, ontology-induced schema mapping for transition from semantic interconn... 详细信息
来源: 评论
An efficient ID-based deniable authentication protocol from pairings
An efficient ID-based deniable authentication protocol from ...
收藏 引用
International Conference on Advanced Information Networking and Applications (AINA)
作者: Tianjie Cao Dongdai Lin Rui Xue Graduate School of Chinese Academy of Sciences Beijing P.R. China School of Computer Science and Technology China University of Mining and Technology Xuzhou P.R. China State Key Laboratory of Information Security of Institute of Software Chinese Academy of Sciences Beijing P.R. China
Deniability is a privacy property that ensures protocol participants can later deny taking part in a particular protocol run. A deniable authentication protocol enables an intended receiver to identify the source of a... 详细信息
来源: 评论
Image analysis method for acquiring cell's immunological information
收藏 引用
Ruan Jian Xue Bao/Journal of software 2005年 第9期16卷 1551-1559页
作者: Yang, Da-Gang Dou, Wan-Chun Zhang, Xi-Wen Cai, Shi-Jie State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Intelligence Engineering Laboratory Institute of Software Chinese Academy of Sciences Beijing 100080 China
Cell's immunological information is acquired through analyzing color immunofluorescence image. A pixel growing algorithm with dynamic seed values is proposed to extract fluorescent regions in the CIE (L*, a*, b*) ... 详细信息
来源: 评论