咨询与建议

限定检索结果

文献类型

  • 1,026 篇 会议
  • 987 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,020 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,302 篇 工学
    • 836 篇 计算机科学与技术...
    • 646 篇 软件工程
    • 330 篇 信息与通信工程
    • 157 篇 电气工程
    • 137 篇 电子科学与技术(可...
    • 127 篇 控制科学与工程
    • 95 篇 生物工程
    • 88 篇 核科学与技术
    • 82 篇 机械工程
    • 72 篇 光学工程
    • 63 篇 生物医学工程(可授...
    • 61 篇 网络空间安全
    • 57 篇 动力工程及工程热...
    • 56 篇 仪器科学与技术
    • 51 篇 化学工程与技术
    • 46 篇 交通运输工程
    • 40 篇 安全科学与工程
  • 704 篇 理学
    • 301 篇 物理学
    • 288 篇 数学
    • 114 篇 生物学
    • 87 篇 统计学(可授理学、...
    • 51 篇 化学
    • 44 篇 系统科学
  • 338 篇 管理学
    • 207 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 74 篇 工商管理
  • 75 篇 医学
    • 57 篇 临床医学
    • 44 篇 基础医学(可授医学...
  • 52 篇 法学
    • 29 篇 社会学
  • 28 篇 经济学
    • 28 篇 应用经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 12 篇 教育学
  • 4 篇 文学
  • 3 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 69 篇 computer network...
  • 56 篇 semantics
  • 48 篇 feature extracti...
  • 43 篇 accuracy
  • 38 篇 computational mo...
  • 35 篇 federated learni...
  • 34 篇 robustness
  • 32 篇 protocols
  • 32 篇 training
  • 28 篇 computer science
  • 28 篇 w & z bosons
  • 27 篇 deep learning
  • 27 篇 bandwidth
  • 27 篇 security
  • 25 篇 internet
  • 24 篇 wireless communi...
  • 24 篇 wireless sensor ...
  • 23 篇 higgs bosons
  • 22 篇 data mining

机构

  • 148 篇 centro brasileir...
  • 148 篇 istanbul technic...
  • 147 篇 national and kap...
  • 147 篇 yerevan physics ...
  • 146 篇 university of sp...
  • 145 篇 universidad iber...
  • 144 篇 brunel universit...
  • 144 篇 academy of scien...
  • 143 篇 indian institute...
  • 143 篇 charles universi...
  • 140 篇 university of de...
  • 140 篇 department of ph...
  • 138 篇 imperial college...
  • 138 篇 rwth aachen univ...
  • 137 篇 università di to...
  • 136 篇 indian institute...
  • 134 篇 infn sezione di ...
  • 131 篇 institute for nu...
  • 130 篇 zhejiang univers...
  • 129 篇 department of ph...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 1,818 篇 英文
  • 164 篇 其他
  • 40 篇 中文
检索条件"机构=Computer Network Engineering Technology Center"
2020 条 记 录,以下是1821-1830 订阅
排序:
Evolutionary algorithm for a genetic robot’s personality
Evolutionary algorithm for a genetic robot’s personality
收藏 引用
IEEE International Workshop on Robot and Human Communication (ROMAN)
作者: Kang-Hee Lee Hyun-Sik Shim Woo-Sup Han Kwang-Choon Kim Jong-Hwan Kim Fundamental Technology Team Mechatronics & Manufacturing Technology Center Corporate Technology Operations Samsung Electronics Company Limited South Korea Application Technology Laboratory Telecommunication Research and Development Center Telecommunication Network Business Samsung Electronics Company Limited South Korea Faculty of Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and Technology South Korea
This paper proposes a new concept of the genetic robot which has its own robot genome, in which each chromosome consists of many genes that contribute to defining the robotpsilas personality. The large number of genes... 详细信息
来源: 评论
Storage Requirements for Key Distribution in Sensor networks
Storage Requirements for Key Distribution in Sensor Networks
收藏 引用
International Conference on Sensor Technologies and Applications, SensorComm
作者: Zhihong Liu Jianfeng Ma Qiping Huang SangJae Moon Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University China School of Communication Engineering Xidian University China Mobile Network Security Technology Research Center Kyungpook National University South Korea
Sensor networks are resource-constrained, which makes developing efficient key distribution scheme a challenging problem. In general, many key distribution techniques are designed to address the trade-off between limi... 详细信息
来源: 评论
Vulnerability of network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis
Vulnerability of Network Traffic under Node Capture Attacks ...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: P. Tague D. Slater J. Rogers R. Poovendran Network Security Lab (NSL) Electrical Engineering Department University of Washington Seattle WA USA Formation Technology Division Naval Research Laboratory Center for High Assurance Computer Systems Washington D.C. DC USA
We investigate the impact of node capture attacks on the confidentiality and integrity of network traffic. We map the compromise of network traffic to the flow of current through an electric circuit and propose a metr... 详细信息
来源: 评论
Keying material based key pre-distribution scheme
Keying material based key pre-distribution scheme
收藏 引用
IEEE International Conference on Intelligence and Security Informatics, ISI
作者: Zhihong Liu Jianfeng Ma Qiping Huang SangJae Moon Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China School of Communication Engineering Xidian University Xi'an China Mobile Network Security Technology Research Center Kyungpook National University South Korea
A key pre-distribution scheme is a method by which initially an off-line trusted authority T A distributes pieces of information among a set of users. Later, each member of a group of users can compute a common key fo... 详细信息
来源: 评论
ROBOKID: Let Children Construct Their Own Emotional Kids - Learning by Construction
ROBOKID: Let Children Construct Their Own Emotional Kids - L...
收藏 引用
IEEE International Workshop on Digital Game and Intelligent Toy Enhanced Learning (DIGITEL)
作者: Gwo-Dong Chen Mu-Chun Su Eric Hsiao-kuang Wu Wu-Yuin Hwang Tzu-Chien Liu Eric Zhi-Feng Liu Siew-Rong Wu Department of Computer Science and Information Engineering National Central University Taiwan Graduate of Network Learning Technology National Central University Taiwan Graduate Institute of Learning and Instruction National Central University Taiwan Center for General Education National Yang-Ming University Taiwan
Bill Gates mentioned in Scientific America that robot will enter every home in ten year the same as personal computers have entered into almost every home in ten year. This project is to response to this trend, and to... 详细信息
来源: 评论
Negative refraction in 3D-chiral metamaterial
Negative refraction in 3D-chiral metamaterial
收藏 引用
Optical Fabrication and Testing, OFT 2008
作者: Plum, E. Zhou, J. Dong, J. Fedotov, V.A. Koschny, T. Soukoulis, C.M. Zheludev, N.I. EPSRC Nanophotonics Portfolio Centre Optoelectronics Research Centre University of Southampton SO17 1BJ United Kingdom Institute of Optical Fiber Commun. and Network Tech Ningbo University Ningbo 315211 China Ames Laboratory Department of Physics and Astronomy Iowa State University Ames Iowa 50011 United States Department of Electrical and Computer Engineering Microelectronics Research Center Iowa State University Ames Iowa 50011 United States Department of Materials Science and Technology University of Crete Greece
We demonstrate that artificial chiral meta-material with electromagnetic coupling shows negative index of refraction linked to exceptionally strong circular birefringence. © 2008 Optical Society of America.
来源: 评论
Negative refraction in 3D-chiral metamaterial
Negative refraction in 3D-chiral metamaterial
收藏 引用
Plasmonics and Metamaterials, META_PLAS 2008
作者: Plum, E. Zhou, J. Dong, J. Fedotov, V.A. Koschny, T. Soukoulis, C.M. Zheludev, N.I. EPSRC Nanophotonics Portfolio Centre Optoelectronics Research Centre University of Southampton SO17 1BJ United Kingdom Institute of Optical Fiber Commun. and Network Tech. Ningbo University Ningbo 315211 China Ames Laboratory Department of Physics and Astronomy Iowa State University Ames Iowa 50011 United States Department of Electrical and Computer Engineering Microelectronics Research Center Iowa State University Ames Iowa 50011 United States Department of Materials Science and Technology University of Crete Greece
We demonstrate that artificial chiral meta-material with electromagnetic coupling shows negative index of refraction linked to exceptionally strong circular birefringence. © 2008 Optical Society of America.
来源: 评论
A Novel Quantitative Analysis Model for Information System Survivability Based on Conflict Analysis
收藏 引用
Tsinghua Science and technology 2007年 第S1期12卷 217-222页
作者: 王健 王慧强 赵国生 Department of Computer Science and Technology Harbin Engineering University Center of Computer Network and Information Harbin Normal UniversityHarbin 150001China
This paper describes a novel quantitative analysis model for system survivability based on conflict analysis, which provides a direct-viewing survivable situation. Based on the three-dimensional state space of conflic... 详细信息
来源: 评论
Enhancing role-based access control model through fuzzy relations
Enhancing role-based access control model through fuzzy rela...
收藏 引用
3rd Internationl Symposium on Information Assurance and Security, IAS 2007
作者: Takabi, Hassan Amini, Morteza Jalili, Rasool Network Security Center Computer Engineering Department Sharif University of Technology Tehran Iran
Role-Based Access Control (RBAC) model is naturally suitable to organizations where users are assigned organizational roles with well-defined privileges. However, due to the large number of users in nowadays online se... 详细信息
来源: 评论
Separation of duty in role-based access control model through fuzzy relations
Separation of duty in role-based access control model throug...
收藏 引用
3rd Internationl Symposium on Information Assurance and Security, IAS 2007
作者: Takabi, Hassan Amini, Morteza Jalili, Rasool Network Security Center Computer Engineering Department Sharif University of Technology Tehran Iran
As a security principle, separation of duty (SoD) is widely considered in computer security. In the role-based access control(RBAC) model, separation of duty constraints enforce conflict of interest policies. There ar... 详细信息
来源: 评论