咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是3331-3340 订阅
排序:
l-SkyDiv query:Effectively improve the usefulness of skylines
收藏 引用
science China(information sciences) 2010年 第9期53卷 1785-1799页
作者: HUANG ZhenHua1,2*,XIANG Yang1 & LIN ZiYu3 1department of computer science and technology,Tongji University,Shanghai 201804,China 2The key laboratory of Embedded system and Service Computing,Ministry of Education,Tongji University,Shanghai 200092,China 3department of computer science and technology,Peking University,Beijing 100871,China 1. Department of Computer Science and Technology Tongji University Shanghai 201804 China2. The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 200092 China3. Department of Computer Science and Technology Peking University Beijing 100871 China
Skyline query processing has recently received a lot of attention in database *** a set of multi-dimensional objects,the skyline query finds the objects that are not dominated by *** the best of our knowledge,the exis... 详细信息
来源: 评论
Factor analysis and majority voting based speech emotion recogntion
Factor analysis and majority voting based speech emotion rec...
收藏 引用
International Conference on Intelligent system Design and Engineering Application (ISDEA)
作者: Xu, Lu Xu, Mingxing Yang, Dali State Key Laboratory of Intelligent Technology and Systems Department of Computer Science and Technology Tsinghua University Beijing 100084 China Department of Computer Science and Technology Beijing Information Science and Technology University Beijing 100101 China
There are some problems to be resolved for speech emotion recognition, such as the dimension of feature sets is usually too high and the redundancy among various features is relatively stronger. Considering these prob... 详细信息
来源: 评论
Multicast capacity scaling for cognitive networks: General extended primary network
Multicast capacity scaling for cognitive networks: General e...
收藏 引用
2010 IEEE 7th International Conference on Mobile Adhoc and Sensor systems, MASS 2010
作者: Wang, Cheng Li, Xiang-Yang Tang, Shaojie Jiang, Changjun Department of Computer Science Tongji University Shanghai China Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China Department of Computer Science Illinois Institute of Technology Chicago IL 60616 United States
We study the capacity scaling laws for the cognitive network that consists of the primary hybrid network (PhN) and secondary ad hoc network (SaN). PhN is further comprised of an ad hoc network and a base station based... 详细信息
来源: 评论
Filling n-sided regions with G1 triangular Coons B-spline patches
Filling n-sided regions with G1 triangular Coons B-spline pa...
收藏 引用
作者: Shi, Kan-Le Yong, Jun-Hai Sun, Jia-Guang Paul, Jean-Claude Gu, He-Jin School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Key Laboratory for Information System Security Ministry of Education of China Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China INRIA Nancy France Jiangxi Academy of Sciences Nanchang 330029 China
Filling n-sided regions is an essential operation in shape and surface modeling. Positional and tangential continuities are highly required in designing and manufacturing. We propose a method for filling n-sided regio... 详细信息
来源: 评论
Multi-image based photon tracing for interactive global illumination of dynamic scenes
Multi-image based photon tracing for interactive global illu...
收藏 引用
作者: Yao, Chunhui Wang, Bin Chan, Bin Yong, Junhai Paul, Jean-Claude School of Software Tsinghua University Beijing China Department of Computer Science and Technology Tsinghua University Beijing China Key Laboratory for Information System Security Ministry of Education of China Beijing China Tsinghua National Laboratory for Information Science and Technology Beijing China University of Hong Kong Hongkong Hong Kong INRIA France
Image space photon mapping has the advantage of simple implementation on GPU without pre-computation of complex acceleration structures. However, existing approaches use only a single image for tracing caustic photons... 详细信息
来源: 评论
Refinement checking for interface automata with Z notation
Refinement checking for interface automata with Z notation
收藏 引用
作者: Cao, Zining National Key Laboratory of Science and Technology on Avionics System Integration Shanghai 200233 China Department of Computer Science and Technology Nanjing University of Aero. and Astro. Nanjing 210016 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China
In this paper, we first introduce a specification approach combining interface automata and Z language, which is named ZIA. A refinement relation on ZIAs is proposed. We then give an algorithm for checking refinement ... 详细信息
来源: 评论
A new subjective trust model in grid computing
A new subjective trust model in grid computing
收藏 引用
International Conference on computer Application and system Modeling
作者: Huang, Hai-Sheng Wang, Ru-Chuan School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing 210003 China State Key Laboratory of Information Security Graduate School of Chinese Academy of Science Beijing 100039 China Department of Mathematics and Computer Chizhou University Chizhou Anhui 247000 China
According to character of grid computing, the subjective trust model is proposed. It discriminates the trust relationships between entities in the same domain and in different domains and handles the two different tru... 详细信息
来源: 评论
Availability based trust model of clusters for MANET
Availability based trust model of clusters for MANET
收藏 引用
7th International Conference on Service systems and Service Management, ICSSSM'10
作者: Zhao, Xibin You, Zhiyang Zhao, Zhifeng Chen, Danning Peng, Feng Key Laboratory for Information System Security of Ministry of Education School of Software Tsinghua University 100084 China Department of Computer Science and Technology Tsinghua University 100084 China Department of Computer Science Zhenjiang Watercraft College 212003 China School of Software Tsinghua University 100084 China China Minzu Securities Co. Ltd. 100096 China
MANET (Mobile ad hoc network) is vulnerable to security attack due to its characteristics such as open network environment, lack of centralized control, dynamic topology, and so on, while traditional security mechanis... 详细信息
来源: 评论
Compositional abstraction refinement for timed systems
Compositional abstraction refinement for timed systems
收藏 引用
2010 4th International Symposium on Theoretical Aspects of Software Engineering, TASE 2010
作者: He, Fei Zhu, He Hung, William N. N. Song, Xiaoyu Gu, Ming School of Software Tsinghua University Beijing China Tsinghua National Laboratory for Information Science and Technology China Key Laboratory for Information System Security MOE China Synopsys Inc. Mountain View CA United States Department of ECE Portland State University Portland OR United States
Model checking suffers from the state explosion problem. Compositional abstraction and abstraction refinement have been investigated in many areas to address this problem. This paper considers the compositional model ... 详细信息
来源: 评论
Distributed fault detection for wireless sensor based on weighted average
Distributed fault detection for wireless sensor based on wei...
收藏 引用
2nd International Conference on Networks security, Wireless Communications and Trusted Computing, NSWCTC 2010
作者: Ji, Sai Yuan, Shen-Fang Ma, Ting-Huai Tan, Chang Aeronautic Science Key Laboratory for Smart Materials and Structures Nanjing University of Aeronautics and Astronautics Nanjing China Department of Computer Science and Technology Nanjing University of Information Science and Technology Nanjing China
This paper presents a distributed fault detection algorithm for wireless sensor networks (WSNs) by exploring the weighted average value scheme. Considering the spatial correlations in WSNs, a faulty sensor can diagnos... 详细信息
来源: 评论