咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是3111-3120 订阅
排序:
Scaling Laws of Multicast Capacity for Power-Constrained Wireless Networks under Gaussian Channel Model
收藏 引用
IEEE Transactions on computers 2012年 第5期61卷 713-725页
作者: Cheng Wang Changjun Jiang Xiang-Yang Li Shaojie Tang Yuan He Xufei Mao Yunhao Liu Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China Department of Computer Science and Engineering Building of Electronics and Information Engineering University of Tongji Shanghai China Department of Computer Science Illinois Institute of Technology Chicago IL USA Tsinghua National Laboratory for Information Science and Technology (TNLIST) Tsinghua University Beijing China Department of Computer Science and Engineering University of Tongji China Department of Computer Science Hong Kong University of Science and Technology Kowloon Hong Kong China Tsinghua National Laboratory for Information Science and Technology (TNLIST) School of Software Tsinghua University Beijing China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing China
We study the asymptotic networking-theoretic multicast capacity bounds for random extended networks (REN) under Gaussian channel model, in which all wireless nodes are individually power-constrained. During the transm... 详细信息
来源: 评论
Exploiting constructive interference for scalable flooding in wireless networks
Exploiting constructive interference for scalable flooding i...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Yin Wang Yuan He Xufei Mao Yunhao Liu Zhiyu Huang Xiangyang Li MOE Key Laboratory for Information System Security School of Software TNLIST Tsinghua University China Department of Computer Science and Engineering HKUST Hong Kong China Institute of Software Chinese Academy of Sciences China Department of Computer Science Illinois Institute of Technology USA
Exploiting constructive interference in wireless networks is an emerging trend for it allows multiple senders transmit an identical packet simultaneously. Constructive interference based flooding can realize milliseco... 详细信息
来源: 评论
Logical difference analysis based on variable precision lower approximation operator and graded upper approximation operator
Logical difference analysis based on variable precision lowe...
收藏 引用
2012 International Conference on computer science and information Processing, CSIP 2012
作者: Zhang, Xianyong Miao, Duoqian Department of Computer Science and Technology Tongji University Shanghai 201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 201804 China College of Mathematics and Software Science Sichuan Normal University Chengdu Sichuan 610068 China
This paper aims to construct and analyze an original logical difference based on the quantitative approximation operators. According to the variable precision lower approximation operator and graded upper approximatio... 详细信息
来源: 评论
Algorithms and analyses of logical difference of graded lower and upper approximation operators
Algorithms and analyses of logical difference of graded lowe...
收藏 引用
2012 International Conference on computer science and information Processing, CSIP 2012
作者: Zhang, Xianyong Miao, Duoqian Department of Computer Science and Technology Tongji University Shanghai 201804 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 201804 China College of Mathematics and Software Science Sichuan Normal University Chengdu Sichuan 610068 China
Grade serves as a fundamental quantitative index, and the graded rough set model is a basic model. Thus, this paper aims to investigate an original logical difference in the graded rough set model. According to the sp... 详细信息
来源: 评论
Process Calculus with Data Structure and its Model Checking Algorithm
收藏 引用
Physics Procedia 2012年 33卷 782-789页
作者: Qing Zheng Zi-Ning Cao Department of Computer Science and Technology Nanjing University of Aero. & Astro. Nanjing 210016 P.R. China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 P.R. China National Key Laboratory of Science and Technology on Avionics System Integration Shanghai 200233 P.R. China
Model checking is one of the most important technology for automatically verification. So this paper generally proposed a method of combining CCS and Z language, to perform model checking. It combines the advantage of... 详细信息
来源: 评论
Providing fairness on shared-memory multiprocessors via process scheduling  12
Providing fairness on shared-memory multiprocessors via proc...
收藏 引用
12th Joint International Conference on Measurement and Modeling of computer systems, ACM SIGMETRICS/Performance 2012
作者: Xu, Di Wu, Chenggang Yew, Pen-Chung Li, Jianjun Wang, Zhenjiang State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China Graduate University Chinese Academy of Sciences Beijing China Department of Computer Science and Engineering University of Minnesota at Twin-Cities MN United States Institute of Information Science Academia Sinica Taiwan
Competition for shared memory resources on multiprocessors is the most dominant cause for slowing down applications and makes their performance varies unpredictably. It exacerbates the need for Quality of Service (QoS... 详细信息
来源: 评论
Trust Model Based on Structured Protection for High Level security system
收藏 引用
China Communications 2012年 第11期9卷 70-77页
作者: Liao Jianhua Zhao Yong Zhan Jing School of Electronics Engineering and Computer Science Peking University Beijing 100871 P. R. China School of Computer Science and Technology Beijing University of Technology Beijing 100124 P. R. China Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou 350007 P. R. China State Key Laboratory of Information Security Institute of So ware Chinese Academy of Sciences Beijing 100049 P. R. China
In order to ensure the security of information systems, it's essential to make sure that system behaviors are trusted. By analyzing threats that exist in executing procedures, a trust model based on structured pro... 详细信息
来源: 评论
Analysis on the weighting factor of wavelet-based watermarking scheme
收藏 引用
Journal of Computational information systems 2012年 第10期8卷 4285-4292页
作者: Liu, Lili Cao, Tianjie Lu, Yulong Zhang, Hongtai School of Computer Science and Technology China University of Mining and Technology Xuzhou 221116 China State Key Laboratory of Information Security Graduate School of the Chinese Academy of Sciences Beijing 100049 China
This paper studies an invisible and robust digital watermarking algorithm in the wavelet transform domain. The chose of Discrete Wavelet Transform is motivated by a good match with Human Visual system directives. Howe... 详细信息
来源: 评论
Inertial estimator learning automata
收藏 引用
IEICE Transactions on Fundamentals of Electronics, Communications and computer sciences 2012年 第6期E95-A卷 1041-1048页
作者: Zhang, Junqi Ni, Lina Xie, Chen Gao, Shangce Tang, Zheng Department of Computer Science and Technology Key Laboratory of Embedded System and Service Computing Tongji University Shanghai 200092 China College of Information Science and Engineering Shandong University of Science and Technology Qingdao China Department of Intellectual Information Systems Engineering University of Toyama Toyama-shi 930-8555 Japan
This paper presents an inertial estimator learning automata scheme by which both the short-term and long-term perspectives of the environment can be incorporated in the stochastic estimator-the long term information c... 详细信息
来源: 评论
Asymptotic throughput for large-scale wireless networks with general node density
收藏 引用
Wireless Networks 2012年 第5期19卷 559-575页
作者: Cheng Wang Changjun Jiang Xiang-Yang Li Yunhao Liu Department of Computer Science Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China The Tsinghua National Laboratory for Information Science and Technology (TNLIST) Department of Computer Science and Engineering Tongji University Shanghai China The Department of Computer Science Illinois Institute of Technology Chicago USA The TNLIST and School of Software Tsinghua University Beijing China CSE The Hong Kong University of Science and Technology Kowloon Hong Kong
We study the asymptotic throughput for a large-scale wireless ad hoc network consisting of n nodes under the generalized physical model. We directly compute the throughput of multicast sessions to unify the unicast an...
来源: 评论