咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是3241-3250 订阅
排序:
An utility-based job scheduling algorithm for cloud computing considering reliability factor
An utility-based job scheduling algorithm for cloud computin...
收藏 引用
2011 International Conference on Cloud and Service Computing, CSC 2011
作者: Yang, Bo Xu, Xiaofei Tan, Feng Park, Dong Ho State Key Laboratory of Software Engineering Wuhan University Wuhan China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Department of Industrial Engineering University of Electronic Science and Technology of China Chengdu 611731 China Department of Information and Statistics Hallym University Chuncheon 200-702 Korea Republic of
Cloud computing' service-oriented characteristics advance a new way of service provisioning called utility based computing. However, toward the practical application of commercialized Cloud, we encounter two chall... 详细信息
来源: 评论
Testing and validating machine learning classifiers by metamorphic testing
Testing and validating machine learning classifiers by metam...
收藏 引用
作者: Xie, Xiaoyuan Ho, Joshua W.K. Murphy, Christian Kaiser, Gail Xu, Baowen Chen, Tsong Yueh Centre for Software Analysis and Testing Swinburne University of Technology Hawthorn VIC 3122 Australia Department of Medicine Brigham and Women's Hospital Harvard Medical School Boston MA 02115 United States Department of Computer Science Columbia University New York NY 10027 United States School of Computer Science and Engineering Southeast University Nanjing 210096 China State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing 210093 China Department of Computer and Information Science University of Pennsylvania Philadelphia PA 19103 United States
Machine learning algorithms have provided core functionality to many application domains - such as bioinformatics, computational linguistics, etc. However, it is difficult to detect faults in such applications because... 详细信息
来源: 评论
A cooperative coevolution-based pittsburgh learning classifier system embedded with memetic feature selection
A cooperative coevolution-based pittsburgh learning classifi...
收藏 引用
Congress on Evolutionary Computation
作者: Yun Wen Hua Xu State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing China
Given that real-world classification tasks always have irrelevant or noisy features which degrade both prediction accuracy and computational efficiency, feature selection is an effective data reduction technique showi... 详细信息
来源: 评论
A domain partition model approach to the online fault recovery of FPGA-based reconfigurable systems
A domain partition model approach to the online fault recove...
收藏 引用
作者: Shang, Lihong Zhou, Mi Hu, Yu Yang, Erfu School of Computer Science and Engineering Beihang University Beijing 100191 China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Department of Electronic and Electrical Engineering University of Strathclyde Glasgow Gl 1XW United Kingdom
Field programmable gate arrays (FPGAs) are widely used in reliability-critical systems due to their reconfiguration ability. However, with the shrinking device feature size and increasing die area, nowadays FPGAs can ... 详细信息
来源: 评论
A multi-class pattern recognition method for motor imagery EEG data
A multi-class pattern recognition method for motor imagery E...
收藏 引用
2011 IEEE International Conference on systems, Man, and Cybernetics, SMC 2011
作者: Fang, Yonghui Chen, Minyou Harrison, Robert F. State Key Laboratory of Power Transmission Equipment and System Security and New Technology Chongqing University Chongqing China Department of Automatic Control and Systems Engineering University of Sheffield Sheffield S1 3JD United Kingdom School of Electronic and Information Engineering Southwest University Chongqing China
The Common Spatial Patterns (CSP) algorithm is useful for calculating spatial filters for detecting event-related desynchronization (ERD) for use in ERD-based brain-computer interfaces (BCIs). However, basic CSP is a ... 详细信息
来源: 评论
On the combinative method in obtaining angle of attack/sideslip with high bandwidth and low noise
On the combinative method in obtaining angle of attack/sides...
收藏 引用
Chinese Control Conference (CCC)
作者: Xiaming Yuan Jihong Zhu Hongsheng Tan Kai Liu Bo Yu State Key Laboratory of Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing 100084 China
Either of air data system (ADS) and strapdown inertial navigation system (SINS) can be used to get the measurement of angle of attack and sideslip, but with deficiency respectively. By use of complementary filter, the... 详细信息
来源: 评论
TCP-FIT: An improved TCP congestion control algorithm and its performance
TCP-FIT: An improved TCP congestion control algorithm and it...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Jingyuan Wang Jiangtao Wen Jun Zhang Yuxing Han Key Laboratory of Pervasive Computing Ministry of Education Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing China
The Transport Control Protocol (TCP) has been widely used by wired and wireless Internet applications such as FTP, email and HTTP. Numerous congestion algorithms have been proposed to improve the performance of TCP in... 详细信息
来源: 评论
Analysis of Chinese Interrogative Intonation and its Synthesis in HMM-Based Synthesis system
Analysis of Chinese Interrogative Intonation and its Synthes...
收藏 引用
2011 International Conference on Internet Computing and information Services (ICICIS 2011)
作者: Yongxin Wang Jia Jia Lianhong Cai Key Laboratory of Pervasive Computing Ministry of Education Tsinghua National Laboratory for Information Science (TNList) Department of Computer Science and TechnologyTsinghua University
In the training process of HMM-based speech synthesis systems, the states of the HMM models are clustered based on the context features labeled on the training corpus.A good feature set would enable the synthesis syst... 详细信息
来源: 评论
On the nonlinearity of some T-functions
收藏 引用
Journal of information and Computational science 2011年 第11期8卷 2231-2237页
作者: Wang, Yan Hu, Yupu Li, Shunbo Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China Department of Mathematics Xi'an University of Architecture and Technology Xi'an 710055 China
Single cycle T-functions are newly proposed components in stream cipher. In order to verify if such function is suitable for cipher design, the cryptographic properties of single cycle T-function are discussed. Nonlin... 详细信息
来源: 评论
Adaptive hypersonic flight control via back-stepping and Kriging estimation
Adaptive hypersonic flight control via back-stepping and Kri...
收藏 引用
IEEE International Conference on systems, Man and Cybernetics
作者: Bin Xu Fuchun Sun Shixing Wang Hao Wu Tsinghua National Laboratory of Information Science and Technology State Key Laboratory of Intelligent Technology and Systems Department of Computer Science and Technology Tsinghua University Beijing China Department of Mathematics and Computer Science Free University of Berlin Berlin Germany
This paper investigates the adaptive Kriging controller for the longitudinal dynamics of a generic hypersonic flight vehicle (HFV). For the altitude subsystem, the dynamics are transformed into the strict-feedback for... 详细信息
来源: 评论