咨询与建议

限定检索结果

文献类型

  • 2,110 篇 期刊文献
  • 2,010 篇 会议
  • 10 册 图书

馆藏范围

  • 4,130 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,994 篇 工学
    • 1,765 篇 计算机科学与技术...
    • 1,447 篇 软件工程
    • 515 篇 信息与通信工程
    • 318 篇 土木工程
    • 307 篇 控制科学与工程
    • 275 篇 电气工程
    • 236 篇 电子科学与技术(可...
    • 235 篇 材料科学与工程(可...
    • 219 篇 机械工程
    • 217 篇 生物工程
    • 215 篇 建筑学
    • 215 篇 化学工程与技术
    • 151 篇 交通运输工程
    • 131 篇 动力工程及工程热...
    • 128 篇 安全科学与工程
    • 126 篇 网络空间安全
    • 122 篇 力学(可授工学、理...
    • 113 篇 光学工程
    • 105 篇 仪器科学与技术
    • 90 篇 生物医学工程(可授...
  • 1,442 篇 理学
    • 749 篇 数学
    • 405 篇 物理学
    • 241 篇 生物学
    • 206 篇 统计学(可授理学、...
    • 173 篇 化学
    • 150 篇 系统科学
    • 121 篇 地球物理学
  • 619 篇 管理学
    • 410 篇 管理科学与工程(可...
    • 233 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 106 篇 法学
  • 77 篇 医学
  • 41 篇 军事学
  • 36 篇 经济学
  • 32 篇 农学
  • 23 篇 教育学
  • 13 篇 艺术学
  • 11 篇 文学

主题

  • 73 篇 semantics
  • 70 篇 cryptography
  • 67 篇 feature extracti...
  • 65 篇 authentication
  • 65 篇 training
  • 60 篇 deep learning
  • 59 篇 security
  • 56 篇 privacy
  • 52 篇 laboratories
  • 48 篇 computational mo...
  • 48 篇 information secu...
  • 48 篇 protocols
  • 43 篇 data mining
  • 41 篇 machine learning
  • 40 篇 software
  • 40 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 accuracy
  • 36 篇 blockchain
  • 33 篇 computer science

机构

  • 226 篇 state key labora...
  • 161 篇 school of cyber ...
  • 152 篇 key laboratory o...
  • 105 篇 university of ch...
  • 92 篇 institute of inf...
  • 90 篇 key laboratory o...
  • 86 篇 state key labora...
  • 78 篇 department of co...
  • 78 篇 state key labora...
  • 76 篇 school of softwa...
  • 76 篇 information secu...
  • 71 篇 school of comput...
  • 65 篇 national key lab...
  • 62 篇 state key labora...
  • 56 篇 beijing key labo...
  • 55 篇 state key labora...
  • 55 篇 state key labora...
  • 52 篇 tsinghua nationa...
  • 44 篇 school of electr...
  • 39 篇 the key laborato...

作者

  • 79 篇 du xiuli
  • 57 篇 junping du
  • 38 篇 yixian yang
  • 33 篇 xiuli du
  • 31 篇 yingmin jia
  • 30 篇 cao xiaochun
  • 24 篇 wang wei
  • 24 篇 limin sun
  • 23 篇 zhao mi
  • 22 篇 wang bin
  • 21 篇 huang qingming
  • 20 篇 yang yixian
  • 20 篇 du xiu-li
  • 19 篇 guo li
  • 18 篇 du junping
  • 18 篇 li bo
  • 18 篇 yuehui jin
  • 17 篇 zhang lei
  • 17 篇 xu chengshun
  • 17 篇 tan yang

语言

  • 3,721 篇 英文
  • 209 篇 中文
  • 201 篇 其他
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Beijing Key Laboratory of Software Security Engineering Technology"
4130 条 记 录,以下是4101-4110 订阅
排序:
AN IMPROVED BICLUSTERING ALGORITHM AND ITS APPLICATION TO GENE EXPRESSION SPECTRUM ANALYSIS
收藏 引用
Genomics, Proteomics & Bioinformatics 2005年 第3期3卷 189-193页
作者: Hua Qu Liu-Pu Wang Yan-Chun Liang Chun-Guo Wu College of Software Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Jilin University Changchun 130012 China Guangzhou Institute of China Telecom Guangzhou 510630 China College of Computer Science and Technology Key Laboratory of Symbol Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China Key Laboratory of Information Science and Engineering of the Ministry of Railway/Key Laboratory of Advanced Information Science and Network Technology of Beijing Beijing Jiaotong University Beijing 100044 China.
Cheng and Church algorithm is an important approach in biclustering algorithms. In this paper, the process of the extended space in the second stage of Cheng and Church algorithm is improved and the selections of two ... 详细信息
来源: 评论
ID-based ring authenticated encryption
ID-based ring authenticated encryption
收藏 引用
International Conference on Advanced Information Networking and Applications (AINA)
作者: Tianjie Cao Dongdai Lin Rui Xue Graduate School of Chinese Academy of Sciences Beijing China School of Computer Science and Technology China University of Mining and Technology Xuzhou China State Key Laboratory of Information Security of Institute of Software Chinese Academy and Sciences Beijing China
Ring authenticated encryption has the following security requirements: semantic-security, recipient-designation, verification-dependence, verification-convertibility, recipient-ambiguity, recipient-verifiability, sign... 详细信息
来源: 评论
A Perspective of Fusing Ontology and Metamodeling Architecture in Interconnection Environment
A Perspective of Fusing Ontology and Metamodeling Architectu...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Jin Liu Keqing He Bing Li Fei He The State Key Laboratory of Software Engineering (SKLSE) Wuhan University of China Wuhan China Institute of Computing Technology Chinese Academy and Sciences Beijing China Graduate School of Science and Engineering Waseda University Tokyo Japan
To achieve interconnection environment, the proposed approach consists of MMFI for ontology and reference ontology for normalizing semantic space, ontology-induced schema mapping for transition from semantic interconn... 详细信息
来源: 评论
An efficient ID-based deniable authentication protocol from pairings
An efficient ID-based deniable authentication protocol from ...
收藏 引用
International Conference on Advanced Information Networking and Applications (AINA)
作者: Tianjie Cao Dongdai Lin Rui Xue Graduate School of Chinese Academy of Sciences Beijing P.R. China School of Computer Science and Technology China University of Mining and Technology Xuzhou P.R. China State Key Laboratory of Information Security of Institute of Software Chinese Academy of Sciences Beijing P.R. China
Deniability is a privacy property that ensures protocol participants can later deny taking part in a particular protocol run. A deniable authentication protocol enables an intended receiver to identify the source of a... 详细信息
来源: 评论
Relational peculiarity oriented data mining
Relational peculiarity oriented data mining
收藏 引用
Proceedings - Fourth IEEE International Conference on Data Mining, ICDM 2004
作者: Zhong, Ning Liu, Chunnian Yao, Y.Y. Ohshima, Muneaki Huang, Mingxin Huang, Jiajin Department of Information Engineering Maebashi Institute of Technology 460-1 Kamisadori-Cho Maebashi 371-0816 Japan Computer Science College Beijing University of Technology Multimedia and Intelligent Software Technology Beijing Municipal Key Laboratory Beijing 100022 China Department of Computer Science University of Regina Regina Sask. S4S 0A2 Canada
Peculiarity rules are a new type of interesting rules which can be discovered by searching the relevance among peculiar data. A main task of mining peculiarity rules is the identification of peculiarity. Traditional m... 详细信息
来源: 评论
TMS: Targeted Marketing System Based on Market Value Functions  04
TMS: Targeted Marketing System Based on Market Value Functio...
收藏 引用
IEEE WIC ACM International Conference on Web Intelligence (WI)
作者: Jiajin Huang Ning Zhong Chunnian Liu Y.Y. Yao Dejun Qiu Chuangxin Ou College of Computer Science and Technology Multimedia and Intelligent Software Technology Beijing Municipal Key Laboratory Beijing University of Technology Beijing China Department of Information Engineering Maebashi Institute of Technology Maebashi Japan Department of Computer Science University of Regina Regina SAS Canada
TMS (Targeted Marketing System) is an integrated system and toolkit for profit-driven and cost-effective marketing. The system consists of three components: a Web-based user interface, a market value inference engine,... 详细信息
来源: 评论
Relational peculiarity oriented data mining
Relational peculiarity oriented data mining
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Ning Zhong Chunnian Liu Y.Y. Yao M. Ohshima Mingxin Huang Jiajin Huang Department of Information Engineering Maebashi Institute of Technology Maebashi Japan The Computer Science College Multimedia and Intelligent Software Technology Beijing Municipal Key Laboratory Beijing University of Technology Beijing China Department of Computer Science University of Regina Regina SAS Canada
Peculiarity rules are a new type of interesting rules which can be discovered by searching the relevance among peculiar data. A main task of mining peculiarity rules is the identification of peculiarity. Traditional m... 详细信息
来源: 评论
Attribute reduction of rough sets in mining market value functions
Attribute reduction of rough sets in mining market value fun...
收藏 引用
IEEE/WIC International Conference on Web Intelligence, WI 2003
作者: Huang, Jiajin Liu, Chunnian Ou, Chuangxin Yao, Y.Y. Zhong, N. Mutimedia and Intelligent Software Technology Beijing Municipal Key Laboratory Beijing University of Technology Beijing China Department of Computer Science University of Regina ReginaSKS4S 0A2 Canada Department of Information Engineering Macbashi Institute of Technology Maebashi-City371-0816 Japan
The linear model of market value functions is a new method for direct marketing. Just like other methods in direct marketing, attribute reduction is very important to deal with large databases. We apply the algorithm ... 详细信息
来源: 评论
Online recommendation based on customer shopping model in e-commerce  03
Online recommendation based on customer shopping model in e-...
收藏 引用
IEEE WIC ACM International Conference on Web Intelligence (WI)
作者: Junzhong Ji Zhiqiang Sha Chunnian Liu Ning Zhong College of Computer Science and Technology Beijing Municipal Key Laboratory of Multimedia and Intelligent Software Technology Beijing University of Technology Beijing China Department of Information Engineering Maebashi Institute of Technology Maebashi Japan
As e-commerce developing rapidly, it is becoming a research focus about how to capture or find customer's behavior patterns and realize commerce intelligence by use of Web mining technology. Recommendation system ... 详细信息
来源: 评论
Attribute reduction of rough sets in mining market value functions  03
Attribute reduction of rough sets in mining market value fun...
收藏 引用
IEEE WIC ACM International Conference on Web Intelligence (WI)
作者: Jiajin Huang Chunnian Liu Chuangxin Ou Y.Y. Yao N. Zhong Mutimedia and Intelligent Software Technology Beijing Municipal Key Laboratory Beijing University of Technology Beijing China Department of Computer Science University of Regina Regina SAS Canada Department of Information Engineering Macbashi Institute of Technology Maebashi Japan
The linear model of market value functions is a new method for direct marketing. Just like other methods in direct marketing, attribute reduction is very important to deal with large databases. We apply the algorithm ... 详细信息
来源: 评论