咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是3291-3300 订阅
排序:
Formal definition method of denotational semantics and functions for PLC program language
收藏 引用
Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (science and technology) 2011年 第SUPPL. 1期42卷 1107-1113页
作者: Xiao, Li-Tian Gu, Ming Sun, Jia-Guang National Laboratory for Information Science and Technology School of Software Tsinghua University Beijing 100084 China Key Laboratory for Information System Security of Ministry of Education Department of Computer Science and Technology Tsinghua University Beijing 100084 China Beijing Special Engineering Design and Research Institute Beijing 100028 China
In order to verify the correctness of PLC programs by formal methods, the definition of denotational semantics on PLC program language was studied to achieve PLC programs modeling and model checking. Based on the exte... 详细信息
来源: 评论
Polynomial-time hierarchy of computable reals
收藏 引用
Journal of Computational information systems 2011年 第4期7卷 1108-1115页
作者: Chen, Qingliang Su, Kaile Wu, Lijun Department of Computer Science Jinan University Guangzhou 510632 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China Key Laboratory of High Confidence Software Technologies Ministry of Education Peking University Beijing China Institute for Integrated and Intelligent Systems Griffith University Brisbane Australia School of Computer Science and Engineering University of Electronic Science and Technology Chengdu 610054 China
In mathematics, various representations of real numbers have been investigated and all these representations are proved to be mathematically equivalent. Furthermore, it is known that all effective versions of these re... 详细信息
来源: 评论
An effective control scheme to ensure real-time causal order in large-scale distributed interactive simulations
An effective control scheme to ensure real-time causal order...
收藏 引用
International Conference on Communication Software and Networks, ICCSN
作者: Hangjun Zhou Sha Fu Key Laboratory of Science and Technology for National Defence of Parallel and Distributed Processing School of Computer Science National University of Defense Technology Changsha Hunan China Department of Information Management Hunan University of Finance and Economics Changsha Hunan China
When a large-scale distributed interactive simulation system is running on WAN, the sites usually disperse over a wide area in geography, which results in the simulation clock of each site is hardly to be accurately s... 详细信息
来源: 评论
A geometric distortion resilient image watermark algorithm based on DWT-DFT
Journal of Software
收藏 引用
Journal of Software 2011年 第9期6卷 1805-1812页
作者: Hu, Yuping Wang, Zhijian Liu, Hui Guo, Guangjun Guangdong Province Key Lab of EC Market Application Technology GuangDong University of Business Studies Guangzhou 510320 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University Hangzhou 310036 China Department of Electronics and Communication Engineering Changsha College Changsha Hunan 410003 China Department of Computer Science and Technology Hunan Institute of Humanities Science and Technology Loudi Hunan 41700 China
In this paper, a robust watermarking algorithm against geometric distortions and common signal processing is proposed. This algorithm is based on two method to solve the synchronization of the original watermarking im... 详细信息
来源: 评论
A multi-class pattern recognition method for motor imagery EEG data
A multi-class pattern recognition method for motor imagery E...
收藏 引用
IEEE International Conference on systems, Man and Cybernetics
作者: Yonghui Fang Minyou Chen Robert F Harrison State Key Laboratory of Power Transmission Equipment & System Security and New Technology Chongqing University Chongqing China School of Electronic and Information Engineering Southwest University Chongqing China Department of Automatic Control & Systems Engineering University of Sheffield Sheffield UK
The Common Spatial Patterns (CSP) algorithm is useful for calculating spatial filters for detecting event-related desynchronization (ERD) for use in ERD-based brain-computer interfaces (BCIs). However, basic CSP is a ... 详细信息
来源: 评论
Research of the Middleware Based Quality Management for Context-Aware Pervasive Applications
Research of the Middleware Based Quality Management for Cont...
收藏 引用
International Conference on computer and Management (CAMAN)
作者: Di Zheng Hang Yan Jun Wang Department of Computer Science Naval University of Engineering Wuhan Hubei China Department of Electronics and Information Engineering Huazhong University of Science and Technology Wuhan Hubei China Key Research Laboratory Wuhan Radar Institute Wuhan Hubei China
With the rapid development of the information technology, it is inevitable that the distributed mobile computing will evolve to the pervasive computing gradually whose final goal is fusing the information space compos... 详细信息
来源: 评论
Visual saliency detection by spatially weighted dissimilarity
Visual saliency detection by spatially weighted dissimilarit...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Lijuan Duan Chunpeng Wu Jun Miao Laiyun Qing Yu Fu College of Computer Science and Technology Beijing University of Technology Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy and Sciences Beijing China School of Information Science and Engineering Chinese Academy and Sciences Beijing China Department of Computing University of Surrey Guildford Surrey UK
In this paper, a new visual saliency detection method is proposed based on the spatially weighted dissimilarity. We measured the saliency by integrating three elements as follows: the dissimilarities between image pat... 详细信息
来源: 评论
New Constructions for Identity-Based Unidirectional Proxy Re-Encryption
收藏 引用
Journal of computer science & technology 2010年 第4期25卷 793-806页
作者: 赖俊祚 朱文涛 邓慧杰 刘胜利 寇卫东 Department of Computer Science and Enqineering Shanghai Jiao Tong University School of Information Systems Singapore Management University State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences School of Computer Science and Technology Xidian University
We address the cryptographic topic of proxy re-encryption (PRE), which is a special public-key cryptosystem. A PRE scheme allows a special entity, known as the proxy, to transform a message encrypted with the public... 详细信息
来源: 评论
A Trust-Personality Mechanism for Emotion Compensation
A Trust-Personality Mechanism for Emotion Compensation
收藏 引用
International Conference on Advanced Learning Technologies (ICALT)
作者: Jiwei Qin Qinghua Zheng Feng Tian Department of Computer Science and Technology Xi'an Jiaotong University Xi'an China Xi'an Jiaotong University Xi'an Shaanxi CN Ministry of Education Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China
E-learning provides an unprecedented flexibility and convenience for learners via breaking the limitation of space-time. Most researchers are only concerned about the learner's cognitive and construct a great amou... 详细信息
来源: 评论
An utility-based job scheduling algorithm for Cloud computing considering reliability factor
An utility-based job scheduling algorithm for Cloud computin...
收藏 引用
International Conference on Cloud and Service Computing (CSC)
作者: Bo Yang Xiaofei Xu Feng Tan Dong Ho Park State Key Laboratory of Software Engineering Wuhan University of China Wuhan China School of Computer Science and Engineering University of Electronic Science and Technology Chengdu China Department of Industrial Engineering University of Electronic Science and Technology Chengdu China Department of Information and Statistics Hallym University Chuncheon South Korea
Cloud computing' service-oriented characteristics advance a new way of service provisioning called utility based computing. However, toward the practical application of commercialized Cloud, we encounter two chall... 详细信息
来源: 评论