咨询与建议

限定检索结果

文献类型

  • 2,110 篇 期刊文献
  • 2,010 篇 会议
  • 10 册 图书

馆藏范围

  • 4,130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,994 篇 工学
    • 1,765 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 515 篇 信息与通信工程
    • 318 篇 土木工程
    • 307 篇 控制科学与工程
    • 275 篇 电气工程
    • 236 篇 电子科学与技术(可...
    • 235 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 217 篇 生物工程
    • 215 篇 建筑学
    • 215 篇 化学工程与技术
    • 151 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 128 篇 安全科学与工程
    • 126 篇 网络空间安全
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 105 篇 仪器科学与技术
    • 90 篇 生物医学工程(可授...
  • 1,442 篇 理学
    • 749 篇 数学
    • 405 篇 物理学
    • 241 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 173 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 619 篇 管理学
    • 410 篇 管理科学与工程(可...
    • 233 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 13 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 60 篇 deep learning
  • 59 篇 security
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 41 篇 machine learning
  • 40 篇 software
  • 40 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 accuracy
  • 36 篇 blockchain
  • 33 篇 computer science

机构

  • 226 篇 state key labora...
  • 161 篇 school of cyber ...
  • 152 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 39 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 33 篇 xiuli du
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 24 篇 wang wei
  • 24 篇 limin sun
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 zhang lei
  • 17 篇 xu chengshun
  • 17 篇 tan yang

语言

  • 3,721 篇 英文
  • 209 篇 中文
  • 201 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4130 条 记 录,以下是4091-4100 订阅
排序:
Study of secure complicated information system architecture model
Study of secure complicated information system architecture ...
收藏 引用
1st International Conference on Semantics, Knowledge and Grid, SKG 2005
作者: Wang, Kun Su, Ruidan Li, Zengxin Cai, Zhen Zhou, Lihua Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China National Info Security Engineering and Technology Research Center Beijing 100093 China
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ... 详细信息
来源: 评论
A new general framework for shot boundary detection and key-frame extraction  7
A new general framework for shot boundary detection and key-...
收藏 引用
7th ACM SIGMM International Workshop on Multimedia Information Retrieval, MIR 2005
作者: Feng, Huamin Fang, Wei Liu, Sen Fang, Yong Key Laboratory of Security and Secrecy of Information Beijing Electronic Science and Technology Institution Beijing100070 China School of Telecommunications Engineering Beijing University of Posts and Telecommunications Beijing100876 China Communication Engineering College YanShan University Qinhuangdao066004 China
Video shot boundary detection is an important step in many video applications. Since the rapid development of video editing technology, especially, the extensive use of sub-window in news video, the original method of... 详细信息
来源: 评论
Image analysis method for acquiring cell's immunological information
收藏 引用
Ruan Jian Xue Bao/Journal of software 2005年 第9期16卷 1551-1559页
作者: Yang, Da-Gang Dou, Wan-Chun Zhang, Xi-Wen Cai, Shi-Jie State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Intelligence Engineering Laboratory Institute of Software Chinese Academy of Sciences Beijing 100080 China
Cell's immunological information is acquired through analyzing color immunofluorescence image. A pixel growing algorithm with dynamic seed values is proposed to extract fluorescent regions in the CIE (L*, a*, b*) ... 详细信息
来源: 评论
Framework of the distributed β-PSML and its applications
收藏 引用
beijing Gongye Daxue Xuebao / Journal of beijing University of technology 2005年 第4期31卷 427-433页
作者: Su, Yi-La Liu, Chun-Nian Beijing Municipal Key Laboratory of Multimedia and Intelligent Software Technology College of Computer Science Beijing University of Technology Beijing 100022 China College of Information Engineering Inner Mongolia University of Technology Huhehaote 010062 China
For solving problems in a large-scale distributed Web environment, we propose the distributed β-PSML (problem solver markup language). The distributed β-PSML is an extension of the β-PSML that we have proposed befo... 详细信息
来源: 评论
A general framework of targeted marketing  1
收藏 引用
Third International Atlantic Web Intelligence Conference on Advances in Web Intelligence, AWIC 2005
作者: Huang, Jiajin Zhong, Ning Yao, Y.Y. Liu, Chunnian Multimedia and Intelligent Software Technology Beijing Municipal Key Laboratory College of Computer Science and Technology Beijing University of Technology 100022 Beijing China Department of Information Engineering Maebashi Institute of Technology Maebashi-City 371-0816 Japan Department of Computer Science University of Regina Regina Sask. S4S 0A2 Canada
In this paper, inspired by a unified probabilistic model of information retrieval, we propose a general framework of targeted marketing by considering three types of information, namely, the customer profiles, the pro... 详细信息
来源: 评论
Describing Service-Oriented Architecture by Extended Darwin
收藏 引用
Wuhan University Journal of Natural Sciences 2005年 第6期10卷 971-976页
作者: ZHANG Tao SHEN Mei-e YING Shi YE Peng LIANG Zao-qing State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 Hubei China Computer Department Beijing Information Technology Institute Beijing 100101 China School of Computer Science Wuhan University of Science and Engineering Wuhan 430074 Hubei China
Describing Service-Oriented Architecture (SOA) is critical in the development of Web based system, in this paper, an approach for describing SOA by extended Darwin is proposed. The requirements for describing SOA, w... 详细信息
来源: 评论
A Mathematical Approach to Disaster Recovery Planning
A Mathematical Approach to Disaster Recovery Planning
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Kun Wang Zhonghai Yin Feng Yuan Lihua Zhou Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China National Info Security Engineering and Technology Research Center Beijing China
It is crucial for highly security-critical information systems to accurately control the disaster recovery activities. Using optimization theory, we present a disaster recovery planning mathematical model. The model u... 详细信息
来源: 评论
A Disaster Recovery System Model in an E-government System
A Disaster Recovery System Model in an E-government System
收藏 引用
IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)
作者: Kun Wang Lihua Zhou Zhen Cai Zengxin Li Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China National Info Security Engineering and Technology Research Center Beijing China
We present a Robust Disaster Recovery System Model (RDRSM) for highly security-critical systems to realize continuous service. Through strengthening safe communication ability, RDRSM guarantees secure and reliable com... 详细信息
来源: 评论
Study of Secure Complicated Information System Architecture Model
Study of Secure Complicated Information System Architecture ...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Kun Wang Ruidan Su Zengxin Li Zhen Cai Lihua Zhou Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China National Info Security Engineering and Technology Research Center Beijing China
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ... 详细信息
来源: 评论
An improved Bayesian networks learning algorithm based on independence test and MDL scoring
An improved Bayesian networks learning algorithm based on in...
收藏 引用
Proceedings of the International Conference on Active Media technology, AMT
作者: Junzhong Ji Jing Yan Chunnian Liu N. Zhong College of Computer Science and Technology Beijing University of Technology Beijing Municipal Key Laboratory of Multimedia and Intelligent Software Technology Beijing China Department of Information Engineering Maebashi Institute of Technology Maebashi-City Japan
In recent years, more and more people studied the Bayesian networks learning algorithm that integrates independence test with scoring metric. Based on the proposed hybrid algorithm I-B&B-MDL, a modified method is ... 详细信息
来源: 评论