咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是3321-3330 订阅
排序:
DAWN: Energy efficient data aggregation in WSN with mobile sinks
DAWN: Energy efficient data aggregation in WSN with mobile s...
收藏 引用
2010 IEEE 18th International Workshop on Quality of Service, IWQoS 2010
作者: Tang, Shao Jie Yuan, Jing Li, Xiang Yang Liu, Yunhao Chen, Gui Hai Gu, Ming Zhao, Ji Zhong Dai, Guojun Department of Computer Science Illinois Institute of Technology Chicago IL United States State Key Laboratory of Novel Software Technology NanJing University NanJing China Department of Computer Science and Engineering HKUST China Key Laboratory of Information System Security Tsinghua University China Institute of Computer Application Technology Hangzhou Dianzi University China Department of Computer Science and Engineering Xi'An JiaoTong University China
The benefits of using mobile sink to prolong sensor network lifetime have been well recognized. However, few provably theoretical results remain are developed due to the complexity caused by time-dependent network top... 详细信息
来源: 评论
Group key management using proxy re-encryption for dynamic networks
Group key management using proxy re-encryption for dynamic n...
收藏 引用
2nd International Workshop on Education technology and computer science, ETCS 2010
作者: Zhang, Minqing Wu, Xuguang Han, Yiliang Yang, Xiaoyuan Key Laboratory of Network and Information Security of APF Engineering College of APF China Department of Computer Science and Technology Xi'an Jiaotong University Xi'an China
Decentralized group key management mechanisms offer beneficial solutions to enhance the scalability and reliability of a secure multicast framework by dividing the whole group into subgroups. However, many of the prev... 详细信息
来源: 评论
Hydrogen passivation for the performance enhancement of poly-Si crystallized by double-frequency YAG laser
收藏 引用
Optoelectronics Letters 2010年 第4期6卷 288-290页
作者: 李娟 丁思维 姚颖 罗翀 孟志国 吴春亚 熊绍珍 张志林 郭海诚 Tianjin Key Laboratory of Photo-electronic Thin Film Devices and Technology Key Laboratory of Opto-electronic Information Science and Technology(Nankai University and Tianjin University) Ministry of Education Institute of Photo-electronics Nankai University Key Laboratory of Advanced Display and System Applications Ministry of EducationShanghai University Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology
The hydrogen passivation is adopted to enhance the performance of poly-Si crystallized by YAG laser annealing(LA polySi).The effects of passivation time,passivation power and passivation temperature on the hall mobili... 详细信息
来源: 评论
Reconstructing 3D objects from 2D sectional views of engineering drawings using volume-based method
Reconstructing 3D objects from 2D sectional views of enginee...
收藏 引用
International Conference on Shape Modeling and Applications - Shape Modeling International Conference, SMI 2010
作者: Wen, Yamei Zhang, Hui Yu, Zhongmian Sun, Jiaguang Paul, Jean-Claude School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Key Laboratory for Information System Security Ministry of Education Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China INRIA France
Sectional views are widely used in engineering practice due to their clear and concise expression. However, it is difficult for computers to understand because of the large numbers of omitted entities and their divers... 详细信息
来源: 评论
Analyzing and correlating security events using state machine
Analyzing and correlating security events using state machin...
收藏 引用
10th IEEE International Conference on computer and information technology, CIT-2010, 7th IEEE International Conference on Embedded Software and systems, ICESS-2010, 10th IEEE Int. Conf. Scalable Computing and Communications, ScalCom-2010
作者: Feng, Xuewei Wang, Dongxia Zeng, Jiemei Ma, Guoqing Li, Jin National Key Laboratory of Science and Technology on Information System Security Beijing Institute of System Engineer Beijing 100101 China Beijing Aerospace Control Center Beijing 100296 China
It is unfeasible to analyze the security events by the manual way for the security manager, because the number of the events is huge and the information contained in the events is meaningless. After analyzing the exis... 详细信息
来源: 评论
The transition between sharp and rounded features and the manipulation of incompatible boundary in filling n sided holes
The transition between sharp and rounded features and the ma...
收藏 引用
International Conference on Shape Modeling and Applications - Shape Modeling International Conference, SMI 2010
作者: Shi, Kan-Le Yong, Jun-Hai Liu, Peng Sun, Jia-Guang Paul, Jean-Claude School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Key Laboratory for Information System Security Ministry of Education of China Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China INRIA France
N -sided hole filling plays an important role in vertex blending. Piegl and Tiller presented an algorithm to interpolate the given boundary and cross-boundary derivatives in B-spline form. To deal with the incompatibl... 详细信息
来源: 评论
Blind image watermark analysis using higher order statistics
Blind image watermark analysis using higher order statistics
收藏 引用
International Conference on Natural Computation
作者: Lu, Wei Sun, Wei Lu, Hongtao Guangdong Key Laboratory of Information Security Technology School of Information Science and Technology Sun Yat-Sen University Guangzhou 510275 China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200030 China
Over the past two decades, great efforts have been made to develop digital watermarking techniques for copyright protection or content verification of digital products. Currently, most of watermark detection methods a... 详细信息
来源: 评论
Bisimulations for open processes in higher order π-calculus
Bisimulations for open processes in higher order π-calculus
收藏 引用
2010 4th International Symposium on Theoretical Aspects of Software Engineering, TASE 2010
作者: Cao, Zining Department of Computer Science and Technology Nanjing University of Aero. and Astro. Nanjing 210016 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China National Key Laboratory of Science and Technology on Avionics System Integration Shanghai 200233 China
In this paper, we propose open bisimulations for open processes in higher order π-calculus. The equivalence of open bisimulations and other bisimulations for open processes is proved. Furthermore, we present a symbol... 详细信息
来源: 评论
Temporal logics and model checking algorithms for ZIAs
Temporal logics and model checking algorithms for ZIAs
收藏 引用
2nd International Conference on Software Engineering and Data Mining, SEDM 2010
作者: Cao, Zining National Key Laboratory of Science and Technology on Avionics System Integration Shanghai 200233 China Department of Computer Science and Technology Nanjing University of Aero. and Astro. Nanjing 210016 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China
In this paper, we first propose a specification approach combining interface automata and Z language. This approach can be used to describe temporal properties and data properties of software components. A branching t... 详细信息
来源: 评论
Developing an SVM-based ensemble learning system for customer risk identification collaborating with customer relationship management
收藏 引用
中国高等学校学术文摘·计算机科学 2010年 第2期4卷 196-203页
作者: Lean YU Shouyang WANG Kin Keung LAI Institute of Systems Science Academy of Mathematics and System Sciences Chinese Academy of Sciences Beijing 100190 China Hangzhou Key Laboratory of E-Business and Information Security Hangzhou Normal University Hangzhou 310036 China Institute of Systems Science Academy of Mathematics and System Sciences Chinese Academy of Sciences Beijing 100190 China Department of Management Sciences City University of Hong Kong Hong Kong China
In this study, we propose a support vector machine (SVM)-based ensemble learning system for customer relationship management (CRM) to help enterprise managers effectively manage customer risks from the risk aversion p... 详细信息
来源: 评论