咨询与建议

限定检索结果

文献类型

  • 1,917 篇 期刊文献
  • 1,799 篇 会议
  • 1 册 图书

馆藏范围

  • 3,717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,598 篇 工学
    • 1,779 篇 计算机科学与技术...
    • 1,389 篇 软件工程
    • 616 篇 信息与通信工程
    • 372 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 192 篇 机械工程
    • 151 篇 网络空间安全
    • 138 篇 光学工程
    • 133 篇 生物医学工程(可授...
    • 126 篇 仪器科学与技术
    • 107 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 70 篇 建筑学
    • 64 篇 土木工程
    • 64 篇 化学工程与技术
  • 1,268 篇 理学
    • 684 篇 数学
    • 342 篇 物理学
    • 249 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 646 篇 管理学
    • 415 篇 管理科学与工程(可...
    • 256 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 133 篇 医学
    • 117 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 29 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 87 篇 feature extracti...
  • 69 篇 federated learni...
  • 68 篇 semantics
  • 64 篇 security
  • 62 篇 computational mo...
  • 61 篇 cryptography
  • 59 篇 optimization
  • 58 篇 training
  • 57 篇 deep learning
  • 57 篇 accuracy
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 51 篇 privacy
  • 47 篇 authentication
  • 39 篇 data models
  • 38 篇 servers
  • 37 篇 data mining
  • 37 篇 protocols
  • 37 篇 robustness

机构

  • 147 篇 department of co...
  • 75 篇 key laboratory o...
  • 74 篇 national key lab...
  • 67 篇 school of softwa...
  • 58 篇 shandong provinc...
  • 56 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 43 篇 school of comput...
  • 43 篇 hubei province k...
  • 38 篇 state key labora...
  • 36 篇 university of ch...
  • 36 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 peng cheng labor...
  • 32 篇 department of el...
  • 31 篇 key laboratory f...
  • 30 篇 state key labora...
  • 30 篇 school of cyber ...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 yang yang
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 xiaoming wu
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,217 篇 英文
  • 407 篇 其他
  • 102 篇 中文
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3717 条 记 录,以下是3091-3100 订阅
排序:
A measurement study on potential inter-domain routing diversity
收藏 引用
IEEE Transactions on Network and Service Management 2012年 第3期9卷 268-278页
作者: Hu, Chengchen Chen, Kai Chen, Yan Liu, Bin Vasilakos, Athanasios V. MoE Key Laboratory of Intelligent Networks and Network Security Department of Computer Science and Techonolgy Xi'An Jiaotong University Xi'an Shaanxi China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong Department of Electrical Engineering and Computer Science Northwestern University Evanston IL United States Department of Computer Science and Technology Tsinghua University Beijing China Department of Computer and Telecommunications Engineering University of Western Macedonia GR 50100 Kozani Greece
In response to Internet emergencies, Internet resiliency is investigated directly through an autonomous system (AS) level graph inferred from policy-compliant BGP paths or/and traceroute paths. Due to policy-driven in... 详细信息
来源: 评论
Extending interface automata with Z notation
Extending interface automata with Z notation
收藏 引用
4th IPM International Conference on Fundamentals of Software Engineering, FSEN 2011
作者: Cao, Zining Wang, Hui National Key Laboratory of Science and Technology on Avionics System Integration Shanghai 200233 China Department of Computer Science and Technology Nanjing University of Aero. and Astro. Nanjing 210016 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China
In this paper, we propose a specification approach combining interface automata and Z language. This approach can be used to describe behavioural properties and data properties of software components. We also study th... 详细信息
来源: 评论
Towards energy-fairness in asynchronous duty-cycling sensor networks
Towards energy-fairness in asynchronous duty-cycling sensor ...
收藏 引用
IEEE Conference on computer Communications, INFOCOM 2012
作者: Li, Zhenjiang Mo, Li Liu, Yunhao School of Computer Engineering Nanyang Technological University Singapore Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong MOE Key Lab. for Information System Security School of Software Tsinghua University China
In this paper, we investigate the problem of controlling node sleep intervals so as to achieve the min-max energy fairness in asynchronous duty-cycling sensor networks. We propose a mathematical model to describe the ... 详细信息
来源: 评论
A 680 V LDMOS on a thin SOI with an improved field oxide structure and dual field plate
收藏 引用
Journal of Semiconductors 2012年 第5期33卷 44-47页
作者: 王中健 程新红 夏超 徐大伟 曹铎 宋朝瑞 俞跃辉 沈达身 State Key Laboratory of Functional Materials for Informatics Shanghai Institute of Micro-System&Information TechnologyChinese Academy of Sciences Graduate University of the Chinese Academy of Sciences Department of Electrical and Computer Engineering University of Alabama in Huntsville
A 680 V LDMOS on a thin SOI with an improved field oxide(FOX) and dual field plate was studied *** FOX structure was formed by an "oxidation-etch-oxidation" process,which took much less time to form,and had a low ... 详细信息
来源: 评论
Secure data retrieval of outsourced data with complex query support
Secure data retrieval of outsourced data with complex query ...
收藏 引用
32nd IEEE International Conference on Distributed Computing systems Workshops, ICDCSW 2012
作者: Zhu, Yan Ma, Di Wang, Shanbiao Beijing Key Laboratory of Internet Security Technology Peking University Beijing 100871 China Department of Computer and Information Science University of Michigan Dearborn MI 48128 United States Institute of Computer Science and Technology Peking University Beijing 100871 China
The ability to efficiently retrieve data in their encrypted form is important for the cloud to become a truly secure and practical data sharing platform. Although this field has attracted tremendous research attention... 详细信息
来源: 评论
Detecting infeasible traces in process models
Detecting infeasible traces in process models
收藏 引用
14th International Conference on Enterprise information systems, ICEIS 2012
作者: Wang, Zhaoxia Wen, Lijie Zhu, Xiaochen Liu, Yingbo Wang, Jianmin School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Key Lab. for Information System Security Ministry of Education Beijing 100084 China National Laboratory for Information Science and Technology Beijing 100084 China Logistical Engineering University Chongqing 400016 China
Workflow testing is an important method of workflow analysis in design time. A challenging problem with trace-oriented test data generation in particular and trace-based workflow analysis in general is the existence o... 详细信息
来源: 评论
An research for formal verification of safety-critical software
An research for formal verification of safety-critical softw...
收藏 引用
2012 2nd International Conference on computer Application and system Modeling, ICCASM 2012
作者: Ma, Weigang Hei, Xinhong Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China School of Computer Science and Engineering Xi'an University of Technology Xi'an 710071 China
A verification methodology is presented for railway interlocking system which is regarded as a safety-critical system. The methodology utilizes UML to model the function requirement and LTL to verify the safety requir... 详细信息
来源: 评论
The optimization of replica distribution in the unstructured overlays
收藏 引用
science China(information sciences) 2012年 第3期55卷 714-722页
作者: FENG GuoFu1,2 , LI WenZhong2, LU SangLu2, CHEN DaoXu2 & BUYYA Rajkumar3 1School of information science, Nanjing Audit University, Nanjing 210029, China 2State key laboratory of Novel Software technology, Nanjing University, Nanjing 210093, China 3department of computer science and Software Engineering, The University of Melbourne, Victoria 3010, Australia School of Information Science Nanjing Audit University Nanjing China State Key Laboratory of Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Software Engineering The University of Melbourne Victoria Australia
Replication is a widely used technique in unstructured overlays to improve content availability or system performance. A fundamental question often addressed by previous work focused on: how many replicas ought to be ... 详细信息
来源: 评论
Software structure evaluation based on the interaction and encapsulation of methods
收藏 引用
science China(information sciences) 2012年 第12期55卷 2816-2825页
作者: ZHENG QingHua 1,2,OU ZhiJiang 1,2,LIU Ting 1,YANG ZiJiang 3,HOU YuQiao 1,2 & ZHENG Chao 1,2 1 MOE key laboratory for Intelligent Networks and Network security,Xi'an Jiaotong University,Xian 710049,China 2 Shaanxi key laboratory of Satellite-terrestrial Network technology R&D,Xi'an Jiaotong University,Xian 710049,China 3 department of computer science,Western Michigan University,Michigan,USA MOE Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University Xian China Shaanxi Key Laboratory of Satellite-terrestrial Network Technology R&D Xi’an Jiaotong University Xian China Department of Computer Science Western Michigan University Michigan USA
Software structure is the most important factor affecting the quality of a *** evaluation of software structure is a foundational technique for software ***,the traditional evaluation criteria,such as "high cohes... 详细信息
来源: 评论
Verifiable Fully Homomorphic Encryption scheme
Verifiable Fully Homomorphic Encryption scheme
收藏 引用
2012 2nd International Conference on Consumer Electronics, Communications and Networks, CECNet 2012
作者: Jin, Fangyuan Zhu, Yanqin Luo, Xizhao Department of Computer Science and Technology Soochow University Suzhou China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China
We construct a general Verifiable Fully Homomorphic Encryption, using the existed Fully Homomorphic Encryption schemes. The main appeal of the scheme is the verifiability of Evaluate function. Its security and other p... 详细信息
来源: 评论