咨询与建议

限定检索结果

文献类型

  • 88 篇 会议
  • 28 篇 期刊文献

馆藏范围

  • 116 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 92 篇 工学
    • 69 篇 计算机科学与技术...
    • 49 篇 软件工程
    • 44 篇 信息与通信工程
    • 14 篇 电子科学与技术(可...
    • 11 篇 电气工程
    • 11 篇 控制科学与工程
    • 6 篇 光学工程
    • 4 篇 机械工程
    • 4 篇 动力工程及工程热...
    • 3 篇 生物医学工程(可授...
    • 3 篇 生物工程
    • 2 篇 仪器科学与技术
    • 2 篇 化学工程与技术
    • 2 篇 环境科学与工程(可...
    • 2 篇 安全科学与工程
  • 47 篇 理学
    • 33 篇 数学
    • 13 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 5 篇 系统科学
    • 3 篇 生物学
    • 1 篇 化学
    • 1 篇 大气科学
  • 20 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 10 篇 工商管理
    • 4 篇 图书情报与档案管...
  • 5 篇 法学
    • 4 篇 社会学
    • 1 篇 法学
  • 4 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 农学

主题

  • 6 篇 authentication
  • 5 篇 wireless sensor ...
  • 5 篇 cryptography
  • 3 篇 sensor nodes
  • 3 篇 cognitive radio
  • 3 篇 protocols
  • 3 篇 telecommunicatio...
  • 3 篇 wireless network...
  • 3 篇 energy efficienc...
  • 2 篇 knowledge based ...
  • 2 篇 viterbi algorith...
  • 2 篇 computational co...
  • 2 篇 ad hoc networks
  • 2 篇 wireless communi...
  • 2 篇 optical fibers
  • 2 篇 optimization
  • 2 篇 energy consumpti...
  • 2 篇 peak to average ...
  • 2 篇 decision making
  • 2 篇 topology

机构

  • 6 篇 computer enginee...
  • 5 篇 state key lab. o...
  • 5 篇 state key labora...
  • 4 篇 state key labora...
  • 4 篇 department of el...
  • 3 篇 key lab. of comp...
  • 3 篇 school of comput...
  • 3 篇 embedded softwar...
  • 2 篇 school of mathem...
  • 2 篇 state key lab. o...
  • 2 篇 computer enginee...
  • 2 篇 department of el...
  • 2 篇 wireless network...
  • 2 篇 college of compu...
  • 2 篇 computer enginee...
  • 2 篇 school of comput...
  • 2 篇 school of softwa...
  • 2 篇 department of ps...
  • 2 篇 cream group stat...
  • 2 篇 science and tech...

作者

  • 5 篇 pei qingqi
  • 5 篇 woehrle matthias
  • 4 篇 wang xinmei
  • 4 篇 li hui
  • 3 篇 hu weisheng
  • 3 篇 su yikai
  • 3 篇 meier andreas
  • 3 篇 pang liaojun
  • 3 篇 plessl christian
  • 3 篇 langendoen koen
  • 3 篇 guo wei
  • 3 篇 beutel jan
  • 2 篇 chen zhong
  • 2 篇 jun hou
  • 2 篇 bu shu-po
  • 2 篇 li peng
  • 2 篇 guo hong
  • 2 篇 kaklamani dimitr...
  • 2 篇 wang jing
  • 2 篇 dai yafei

语言

  • 109 篇 英文
  • 6 篇 中文
  • 1 篇 其他
检索条件"机构=Computer Engineering and Networks Lab."
116 条 记 录,以下是101-110 订阅
排序:
Improvement on Ahn et al.'s RSA P-homomorphic signature scheme
Improvement on Ahn et al.'s RSA P-homomorphic signature sche...
收藏 引用
8th International ICST Conference on Security and Privacy in Communication networks, SecureComm 2012
作者: Wang, Zhiwei College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100190 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China
P-homomorphic signature is a general framework for computing on authenticated data, which is recently proposed by Ahn et al. With P-homomorphic signature, any third party can derive a signature on the object message m... 详细信息
来源: 评论
Demonstration of a task-flow based aircraft collab.rative design application in optical grid  33
Demonstration of a task-flow based aircraft collaborative de...
收藏 引用
2007 33rd European Conference and Exhibition of Optical Communication, ECOC 2007
作者: Wang, Zhengyu Guo, Wei Sun, Zhenyu Jin, Yaohui Sun, Weiqiang Hu, Weisheng Lin, Xinhua Wu, Min-You Liu, Hong Fu, San Yuan, Jun Qiao, Chunming State Key Lab. on Fiber-Optic Local Area Networks and Advanced Optical Communication systems Shanghai JiaoTong University Shanghai200240 China Grid Computing Center Shanghai JiaoTong University Shanghai200240 China Institute of Aerospace Science and Technology Shanghai JiaoTong University Shanghai200240 China Shanghai Supercomputer Center Shanghai201203 China Computer Science and Engineering State University of New York BuffaloNY14260 United States
One task-flow scheduler has been designed to optimally allocate resources for a task-flow based Aircraft Collab.rative Design Application in Optical Grid. This scheduler and application has been deployed on an Optical... 详细信息
来源: 评论
Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc networks
收藏 引用
Journal of Interconnection networks 2003年 第3期4卷 345-359页
作者: Jiandong Li Zygmunt J. Haas Min Sheng Yanhui Chen Xidian University State Key Lab. of Integrated Service Network Xi'an Shaanxi 710071 P. R. China Cornell University School of Electrical and Computer Engineering Wireless Networks Laboratory Ithaca NY 14853 USA Xidian University Information Science Institute Xi'an Shaanxi 710071 P. R. China
In this paper, the IEEE 802.11 multiple access control (MAC) protocol was modified for use in multi-channel, multi-hop ad hoc networks through the use of a new channel-status indicator. In particular, in the modified ... 详细信息
来源: 评论
Robust Multi-Exposure Image Fusion: A Structural Patch Decomposition Approach
Robust Multi-Exposure Image Fusion: A Structural Patch Decom...
收藏 引用
作者: Ma, Kede Li, Hui Yong, Hongwei Wang, Zhou Meng, Deyu Zhang, Lei Department of Electrical and Computer Engineering University of Waterloo WaterlooONN2L 3G1 Canada Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong Department of Computing. Hong Kong Polytechnic University Hong Kong Hong Kong Institute for Information and System Sciences and Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an710049 China Inst. for Info. and Syst. Sci. and Min. of Educ. Key Lab. of Intelligent Networks and Netwk. Secty. Xi'an Jiaotong University Xi'an710049 China
We propose a simple yet effective structural patch decomposition approach for multi-exposure image fusion (MEF) that is robust to ghosting effect. We decompose an image patch into three conceptually independent compon... 详细信息
来源: 评论
Cost-efficient and skew-aware data scheduling for incremental learning in 5G network
arXiv
收藏 引用
arXiv 2020年
作者: Pu, Lingjun Yuan, Xinjing Xu, Xiaohang Chen, Xu Zhou, Pan Xu, Jingdong The College of Computer Science Nankai University Tianjin300071 China The State Key Laboratory of Integrated Services Networks Xidian University Xi’an710126 China The School of Computer Science and Engineering Sun Yat-Sen University Guangzhou510006 China The Pazhou Lab. Guangzhou510335 China The Hubei Engineering Research Center on Big Data Security The School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China
To facilitate the emerging applications in 5G networks, mobile network operators will provide many network functions in terms of control and prediction. Recently, they have recognized the power of machine learning (ML... 详细信息
来源: 评论
ISM: Intent-perceptible service migration model for IP network survivability
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2011年 第12期39卷 2768-2775页
作者: Zhao, Er-Hu Yang, Xiao-Long Xu, Jie Long, Ke-Ping Zhang, Dan Research Centre for Optical Internet and Mobile Information Networks University of Electronic Science and Technology of China Chengdu Sichuan 611731 China National Key Lab. of Integrated Information System Tech. Institute of Software Chinese Acad. of Sci. Beijing 100190 China School of Computer and Communication Engineering University of Science and Technology Beijing Beijing 100083 China 706 Institute The Second Academy of China Aerospace Beijing 100854 China
The existing service migration methods bring the server cluster heavy burden, and their time spending is so high that seriously affects the service continuity. In order to enhance the survivability of IP network servi... 详细信息
来源: 评论
Secure the 5G and Beyond networks with Zero Trust and Access Control Systems for Cloud Native Architectures
Secure the 5G and Beyond Networks with Zero Trust and Access...
收藏 引用
ACS/IEEE International Conference on computer Systems and Applications
作者: Hisham A. Kholidy Keven Disen Andrew Karam Elhadj Benkhelifa Mohammad A. Rahman Atta-Ur Rahman Ibrahim Almazyad Ahmed F. Sayed Rakia Jaziri Dept. of Networks and Computer Security College of Engineering SUNY Polytechnic Institute Utica NY USA Dept. of Networks and Comp. Security SUNY Polytechnic Institute Utica NY USA The Air Force Research Laboratory (AFRL RIGB) Rome NY USA Smart Systems AI and Cybersecurity Research Centre Staffordshire Univ. UK Dept of Electrical and Computer Engineering Florida International University USA Dept. of Computer Science Imam Abdulrahman Bin Faisal University Dammam Saudi Arabia Dept. of Electrical and Computer Engineering Univ. of Arizona Tucson AZ USA Transmission Dept. Telecom Egypt Fayoum Egypt Paragraphe Research Lab. Univ. of Paris VIII France
5G networks are highly distributed, built on an open service-based architecture that requires multi-vendor hardware and software development environments, all of which create a high attack surface in the 5G networks t...
来源: 评论
Finite-Blocklength Multi-Antenna Covert Communication Aided By A UAV Relay
Finite-Blocklength Multi-Antenna Covert Communication Aided ...
收藏 引用
2021 IEEE Global Communications Conference (GLOBECOM)
作者: Xinying Chen Min Sheng Nan Zhao Wei Xu Dusit Niyato School of Information and Communication Engineering Dalian University of Technology Dalian China Faculty of Information Technology University of Jyväskylä Jyväskylä Finland State Key Laboratory of Integrated Services Networks Xidian University Xi'an China National Mobile Communications Research Lab. Southeast University Nanjing Jiangsu China School of Computer Science and Engineering Nanyang Technological University Singapore Singapore
We propose a UAV-relayed covert communication scheme with finite blocklength to maximize the effective transmission rate from the transmitter to the legitimate receiver against a flying warden. The transmitter adopts ... 详细信息
来源: 评论
Study on user's identification system in insider threats
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第11 A期30卷 121-126页
作者: Pei, Qing-Qi Zhao, Peng Zhang, Hong-Bin Wang, Chao Yin, Hao Institute of China Electronic System Engineering Corporation Beijing 100141 China Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 China Institute of Information Science and Engineering Hebei University of Science and Technology Shijiazhuang 050018 China
Monitoring user's abnormal behaviors, which is an effective method to detect impersonation, is used for impersonation detection in insider threats. A model is built by using TAN-based Bayesian network to reflect t... 详细信息
来源: 评论
Attack and improve of a group signature scheme based on Chinese remainder theorem
收藏 引用
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology 2007年 第1期29卷 182-184页
作者: Wang, Feng-He Hu, Yu-Pu Wang, Chun-Xiao Key Lab. of Computer Networks and Information Security Xidian University Xi'an 710071 China Dept. of Mathematics Taishan Collage Taian 271000 China Dept. of Math. and Phys. Shandong Institute of Architecture and Engineering Jinan 250014 China
An attack is mounted on a group signature ncncmc bnscd on Cliincso Remainder Theory (Chen-Scheme). It shows the Chen-Scheme is insecure: A colluding subset of group members can find the private key of other members an... 详细信息
来源: 评论