咨询与建议

限定检索结果

文献类型

  • 82 篇 期刊文献
  • 62 篇 会议
  • 2 册 图书

馆藏范围

  • 146 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 78 篇 工学
    • 53 篇 计算机科学与技术...
    • 40 篇 软件工程
    • 14 篇 控制科学与工程
    • 12 篇 信息与通信工程
    • 9 篇 机械工程
    • 9 篇 电气工程
    • 9 篇 电子科学与技术(可...
    • 9 篇 生物工程
    • 8 篇 生物医学工程(可授...
    • 7 篇 材料科学与工程(可...
    • 7 篇 土木工程
    • 5 篇 动力工程及工程热...
    • 5 篇 交通运输工程
    • 4 篇 仪器科学与技术
    • 3 篇 光学工程
    • 3 篇 冶金工程
    • 3 篇 化学工程与技术
    • 3 篇 环境科学与工程(可...
    • 3 篇 安全科学与工程
  • 50 篇 理学
    • 29 篇 数学
    • 14 篇 生物学
    • 14 篇 统计学(可授理学、...
    • 12 篇 物理学
    • 4 篇 系统科学
  • 22 篇 管理学
    • 19 篇 管理科学与工程(可...
    • 6 篇 工商管理
    • 5 篇 图书情报与档案管...
  • 5 篇 医学
    • 5 篇 基础医学(可授医学...
    • 5 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 法学
  • 2 篇 农学
  • 1 篇 教育学

主题

  • 6 篇 deep learning
  • 6 篇 machine learning
  • 6 篇 artificial intel...
  • 5 篇 semantics
  • 5 篇 accuracy
  • 4 篇 data models
  • 3 篇 reliability
  • 3 篇 optimization
  • 3 篇 analytical model...
  • 3 篇 security
  • 3 篇 performance eval...
  • 3 篇 games
  • 3 篇 training
  • 3 篇 convolutional ne...
  • 2 篇 reinforcement le...
  • 2 篇 semantic segment...
  • 2 篇 public key crypt...
  • 2 篇 data centers
  • 2 篇 safety
  • 2 篇 soft robotics

机构

  • 6 篇 department of na...
  • 5 篇 arab american un...
  • 4 篇 chair of materia...
  • 4 篇 arab american un...
  • 4 篇 jülich aachen re...
  • 4 篇 faculty of data ...
  • 3 篇 department of co...
  • 3 篇 current address:...
  • 3 篇 forschungszentru...
  • 3 篇 chair of materia...
  • 3 篇 chair of theory ...
  • 3 篇 current address:...
  • 3 篇 chair of data sc...
  • 3 篇 institute of ene...
  • 3 篇 icesco chair for...
  • 3 篇 helmholtz instit...
  • 3 篇 school of chemic...
  • 3 篇 department of na...
  • 3 篇 institute of nan...
  • 2 篇 department of hu...

作者

  • 10 篇 amani yousef owd...
  • 9 篇 majdi owda
  • 6 篇 lei zhang
  • 5 篇 owda majdi
  • 5 篇 owda amani youse...
  • 5 篇 vidal thibaut
  • 4 篇 lodi andrea
  • 4 篇 qianhong wu
  • 4 篇 yin-ying ting
  • 4 篇 sandfeld stefan
  • 4 篇 bo qin
  • 3 篇 dr. yushu tang
  • 3 篇 futai zhang
  • 3 篇 prof. horst hahn
  • 3 篇 mark i mccarthy
  • 3 篇 dr. piotr m. kow...
  • 3 篇 prof. maximilian...
  • 3 篇 mobarak abumohse...
  • 3 篇 bei zhou
  • 3 篇 sören l. dreyer

语言

  • 129 篇 英文
  • 16 篇 其他
检索条件"机构=Chair of Data Science and Data Engineering"
146 条 记 录,以下是131-140 订阅
排序:
Privacy as a Product: A Case Study in the m-Health Sector
Privacy as a Product: A Case Study in the m-Health Sector
收藏 引用
International Conference on Information, Intelligence, Systems and Applications
作者: Constantinos Patsakis Agusti Solanas Distributed Systems Group School of Computer Science and Statistics Trinity College UNESCO Chair in Data Privacy Department Computer Engineering & Mathematics Universitat Rovira i Virgili
Business models based on offering free services to people in exchange for their data are gaining importance and prevalence. The most prominent examples are social networks and, more recently, mobile social networks. H... 详细信息
来源: 评论
Sequence data and association statistics from 12,940 type 2 diabetes cases and controls
收藏 引用
Scientific data 2017年 第1期4卷 170179页
作者: Jason Flannick Christian Fuchsberger Anubha Mahajan Tanya M Teslovich Vineeta Agarwala Kyle J Gaulton Lizz Caulkins Ryan Koesterer Clement Ma Loukas Moutsianas Davis J McCarthy Manuel A Rivas John R B Perry Xueling Sim Thomas W Blackwell Neil R Robertson N William Rayner Pablo Cingolani Adam E Locke Juan Fernandez Tajes Heather M Highland Josee Dupuis Peter S Chines Cecilia M Lindgren Christopher Hartl Anne U Jackson Han Chen Jeroen R Huyghe Martijn van de Bunt Richard D Pearson Ashish Kumar Martina Müller-Nurasyid Niels Grarup Heather M Stringham Eric R Gamazon Jaehoon Lee Yuhui Chen Robert A Scott Jennifer E Below Peng Chen Jinyan Huang Min Jin Go Michael L Stitzel Dorota Pasko Stephen C J Parker Tibor V Varga Todd Green Nicola L Beer Aaron G Day-Williams Teresa Ferreira Tasha Fingerlin Momoko Horikoshi Cheng Hu Iksoo Huh Mohammad Kamran Ikram Bong-Jo Kim Yongkang Kim Young Jin Kim Min-Seok Kwon Juyoung Lee Selyeong Lee Keng-Han Lin Taylor J Maxwell Yoshihiko Nagai Xu Wang Ryan P Welch Joon Yoon Weihua Zhang Nir Barzilai Benjamin F Voight Bok-Ghee Han Christopher P Jenkinson Teemu Kuulasmaa Johanna Kuusisto Alisa Manning Maggie C Y Ng Nicholette D Palmer Beverley Balkau Alena Stančáková Hanna E Abboud Heiner Boeing Vilmantas Giedraitis Dorairaj Prabhakaran Omri Gottesman James Scott Jason Carey Phoenix Kwan George Grant Joshua D Smith Benjamin M Neale Shaun Purcell Adam S Butterworth Joanna M M Howson Heung Man Lee Yingchang Lu Soo-Heon Kwak Wei Zhao John Danesh Vincent K L Lam Kyong Soo Park Danish Saleheen Wing Yee So Claudia H T Tam Uzma Afzal David Aguilar Rector Arya Tin Aung Edmund Chan Carmen Navarro Ching-Yu Cheng Domenico Palli Adolfo Correa Joanne E Curran Dennis Rybin Vidya S Farook Sharon P Fowler Barry I Freedman Michael Griswold Daniel Esten Hale Pamela J Hicks Chiea-Chuen Khor Satish Kumar Benjamin Lehne Dorothée Thuillier Wei Yen Lim Jianjun Liu Marie Loh Solomon K Musani Sobha Puppala William R Scott Loïc Yengo Sian-Tsung Tan Herman A Taylor Farook Thameem Gregory Wilson Tien Yin Wong Pål Rasmu Department of Molecular Biology Massachusetts General Hospital Boston Massachusetts USA. Program in Medical and Population Genetics Broad Institute Cambridge Massachusetts USA. Department of Biostatistics and Center for Statistical Genetics University of Michigan Ann Arbor Michigan USA. Wellcome Trust Centre for Human Genetics Nuffield Department of Medicine University of Oxford Oxford UK. Harvard-MIT Division of Health Sciences and Technology Massachusetts Institute of Technology Cambridge Massachusetts USA. Department of Statistics University of Oxford Oxford UK. Genetics of Complex Traits University of Exeter Medical School University of Exeter Exeter UK. MRC Epidemiology Unit Institute of Metabolic Science University of Cambridge Cambridge UK. Department of Twin Research and Genetic Epidemiology King's College London London UK. Oxford Centre for Diabetes Endocrinology and Metabolism Radcliffe Department of Medicine University of Oxford Oxford UK. Department of Human Genetics Wellcome Trust Sanger Institute Hinxton Cambridgeshire UK. School of Computer Science McGill University Montreal Quebec Canada. McGill University and Génome Québec Innovation Centre Montreal Quebec Canada. Human Genetics Center The University of Texas Graduate School of Biomedical Sciences at Houston The University of Texas Health Science Center at Houston Houston Texas USA. Department of Biostatistics Boston University School of Public Health Boston Massachusetts USA. National Heart Lung and Blood Institute's Framingham Heart Study Framingham Massachusetts USA. Medical Genomics and Metabolic Genetics Branch National Human Genome Research Institute National Institutes of Health Bethesda Maryland USA. Department of Biostatistics Harvard School of Public Health Boston Massachusetts USA. Chronic Disease Epidemiology Swiss Tropical and Public Health Institute University of Basel Basel Switzerland. Institute of Genetic Epidemiology Helmholtz Zentrum München German R
To investigate the genetic basis of type 2 diabetes (T2D) to high resolution, the GoT2D and T2D-GENES consortia catalogued variation from whole-genome sequencing of 2,657 European individuals and exome sequencing of 1...
来源: 评论
A Generic Construction of Proxy Signatures from Certificateless Signatures
A Generic Construction of Proxy Signatures from Certificatel...
收藏 引用
International Conference on Advanced Information Networking and Applications (AINA)
作者: Lei Zhang Qianhong Wu Bo Qin Josep Domingo-Ferrer Peng Zeng Jianwei Liu Ruiying Du Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Tarragona Spain Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University China Department of Maths School of Science Xi'an University of Technology China School of Electronic and Information Engineering Beijing University of Aeronautics and Astronautics China
The primitive of proxy signatures allows the original signer to delegate proxy signers to sign on messages on behalf of the original signer. It has found numerous applications in distributed computing scenarios where ... 详细信息
来源: 评论
Corrigendum: “Provably-secure electronic cash based on certicateless partially-blind signatures”
收藏 引用
Electronic Commerce Research and Applications 2013年 第1期12卷 60-60页
作者: Lei Zhang Futai Zhang Bo Qin Shubo Liu East China Normal University Software Engineering Institute Shanghai Key Laboratory of Trustworthy Computing Shanghai China Universitat Rovira i Virgili Department of Computer Engineering and Mathematics UNESCO Chair in Data Privacy Tarragona Catalonia Spain Nanjing Normal University School of Computer Science and Technology China Xi’an University of Technology School of Science Department of Maths China Wuhan University School of Computer Science Wuhan China
来源: 评论
Practical privacy for value-added applications in vehicular ad hoc networks  5th
收藏 引用
5th International Conference on Internet and Distributed Computing Systems, IDCS 2012
作者: Zhang, Lei Wu, Qianhong Qin, Bo Domingo-Ferrer, Josep Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Dept. of Comp. Eng. and Maths Universitat Rovira i Virgili TarragonaCatalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University School of Computer China Department of Maths School of Science Xi’an University of Technology China
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur... 详细信息
来源: 评论
Q&A
收藏 引用
Design Management Review 2014年 第3期25卷
作者: John Maeda Steven Heller Tim Hoover Has been a design partner at Kleiner Perkins Caufield & Byers since January 2014 helping entrepreneurs and portfolio companies to build design into their company cultures. He served as the president of Rhode Island School of Design for six years through 2013 and also served as an associate director of research at the MIT Media Lab. Maeda has been a practicing designer since 1990 and his work is in the permanent collections of the Museum of Modern Art San Francisco Museum of Modern Art and the Cartier Foundation. He serves on the boards of several corporations including Sonos and Wieden + Kennedy and is chair of eBay's Design Advisory Board. His four published books include The Laws of Simplicity and Redesigning Leadership. Maeda is the recipient of a variety of international awards for his creative work including induction into the Art Director's Club Hall of Fame. In 2001 he received the White House National Design Award in 2002 he received the Mainichi Design Prize in Japan and in 2005 he was awarded the Raymond Loewy Foundation Prize in Germany. Maeda earned a BS and an MS from MIT in computer science and electrical engineering. He received a PhD in design science from the University of Tsukuba Institute of Art and Design in Japan as well as an MBA from Arizona State University. Co‐chair and co‐founder of the MFA Designer as Author and Entrepreneur program at the School of Visual Arts in New York. He was the art director of The New York Times Book Review and now writes the VISUALS column for the NYTBR. He also writes “The Daily Heller” at *** a weekly online design column for Atlantic magazine. He is author co‐author and editor of more than 165 books on the history and practice of graphic design illustration and satiric art. His forthcoming books include 100 Classic Graphic Design Magazines (Laurence King Publishers) and Raw Data: The Process Behind Information Graphics (Thames + Hudson). Heller was the 2011 recipient of the Smithsonian National Design Award for Design Mind. He has also writ
John Maeda is a past president of Rhode Island School of Design and an internationally known designer. He's now involved in helping entrepreneurs build design into their company cultures. Writer and educator Steve...
来源: 评论
Strong Security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation
Strong Security Enabled Certificateless Aggregate Signatures...
收藏 引用
International Conference on Intelligent Networking and Collaborative Systems (INCOS)
作者: Hu Xiong Qianhong Wu Zhong Chen Key Laboratory of Network and Software Security Assurance of the Ministry of Education Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing China Department of Computer Engineering and Mathematics UNESCO Chair in Data Pr Universitat Rovira i Virgili Tarragona Spain Key Laboratory of AeroSpace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University of China China
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that ... 详细信息
来源: 评论
On the Security of a Certificateless Signature Scheme
On the Security of a Certificateless Signature Scheme
收藏 引用
2010 2nd International Conference on Signal Processing System(2010年信号处理系统国际会议 ICSPS 2010)
作者: Songqin Miao Futai Zhang Lei Zhang School of Computer Science and Technology Nanjing Normal University Nanjing China Jiangsu Engineeri UNESCO Chair in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira
Certificateless public key cryptography (CLPKC) eliminates certificate management in traditional public key infrastructure and solves the problem of the key escrow in identity-based cryptography. Certificateless ... 详细信息
来源: 评论
Cryptanalysis of a Certificateless Multi-receiver Signcryption Scheme
Cryptanalysis of a Certificateless Multi-receiver Signcrypti...
收藏 引用
International Conference on Multimedia Information Networking and Security (MINES)
作者: Songqin Miao Futai Zhang Lei Zhang School of Computer Science and Technology Nanjing Normal University Nanjing China UNESCO Chair in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Catalonia Spain
Certificateless public key cryptography eliminates certificate management in traditional public key infrastructure and solves the key escrow problem in identity-based cryptography. Certificateless signcryption is one ... 详细信息
来源: 评论
"Who Counterfeited My Viagra?" Probabilistic Item Removal Detection via RFID Tag Cooperation
收藏 引用
EURASIP Journal on Wireless Communications and Networking 2010年 第1期2011卷 1-13页
作者: Conti, Mauro Di Pietro, Roberto Spognardi, Angelo Computer Science Department Vrije Universiteit Amsterdam Amsterdam The Netherlands Mathematics Department Università di Roma Tre Roma Italy Computer Engineering and Mathematics Department UNESCO Chair in Data Privacy Universitat Rovira i Virgili Tarragona Spain Computer Science Department Università "La Sapienza" Roma Roma Italy
We leverage RFID tag cooperation to enforce tampering detection. That is, we provide a set of probabilistic protocols that detect the absence of a tag from a system composed of a set of tags and a reader. Our proposal...
来源: 评论