咨询与建议

限定检索结果

文献类型

  • 1,919 篇 期刊文献
  • 1,763 篇 会议
  • 1 册 图书

馆藏范围

  • 3,683 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,602 篇 工学
    • 1,780 篇 计算机科学与技术...
    • 1,394 篇 软件工程
    • 617 篇 信息与通信工程
    • 373 篇 电气工程
    • 346 篇 控制科学与工程
    • 303 篇 电子科学与技术(可...
    • 224 篇 生物工程
    • 193 篇 机械工程
    • 151 篇 网络空间安全
    • 148 篇 光学工程
    • 134 篇 生物医学工程(可授...
    • 124 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 99 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,284 篇 理学
    • 692 篇 数学
    • 344 篇 物理学
    • 251 篇 生物学
    • 224 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 66 篇 化学
  • 649 篇 管理学
    • 417 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 142 篇 法学
    • 91 篇 社会学
  • 134 篇 医学
    • 118 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 30 篇 农学
  • 26 篇 教育学
  • 14 篇 文学
  • 5 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 cryptography
  • 58 篇 security
  • 56 篇 training
  • 55 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 52 篇 optimization
  • 52 篇 computational mo...
  • 48 篇 federated learni...
  • 46 篇 privacy
  • 45 篇 authentication
  • 38 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 data models
  • 32 篇 computer archite...

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 49 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 36 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 33 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 pan xipeng
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang

语言

  • 3,349 篇 英文
  • 235 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3683 条 记 录,以下是3341-3350 订阅
排序:
Process integration for service oriented networked applications
Process integration for service oriented networked applicati...
收藏 引用
作者: Huangfu, Xianpeng Luo, Aimin Huang, Li Chen, Honghui Luo, Xueshan National Key Laboratory of Science and Technology on Information System Engineering National University of Defense Technology China Informatics Research Center University of Reading United Kingdom Department of Computer Science University of Leicester United Kingdom
With the development of information, the paradigm in distributed networked applications is shifting towards Service Oriented Architecture, which has some good quality of louse coupled, reused, opened and integrated at... 详细信息
来源: 评论
Research on systematic metrics of network survivability
Research on systematic metrics of network survivability
收藏 引用
International Conference on information science and Engineering (ICISE)
作者: Liang Ming Dongxia Wang Lufeng Zhang Chunlei Wang Jian Tang Jinjing Zhao Nation Key Laboratory of Science and Technology on Information System Security Beijing Institute of System Engineering Beijing China Department of Computer Science and Technology Tsinghua University Beijing 100084 China
As networks develop into large-scale systems, survivability of network systems is imperative. The systematic metrics of network survivability are used to measure or evaluate network survivability. This Paper summarize... 详细信息
来源: 评论
An aspect oriented approach to analyzing fault of service composition
An aspect oriented approach to analyzing fault of service co...
收藏 引用
2010 IEEE Asia-Pacific Services Computing Conference, APSCC 2010
作者: Fan, Guisheng Yu, Huiqun Gu, Chunhua Chen, Liqiong Department of Computer Science and Engineering East China University of Science and Technology Shanghai 200237 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai 201112 China Department of Computer Science and Information Engineering Shanghai Institute of Technology Shanghai 200235 China
Service composition is an effective way to achieve value-added service, which has found wide application in software system. Fault handling is critical to achieve high reliability for these applications. However, the ... 详细信息
来源: 评论
Analyzing real-time schedulability of resource-oriented distributed real-time embedded software
Analyzing real-time schedulability of resource-oriented dist...
收藏 引用
2010 2nd IEEE International Conference on information Management and Engineering, ICIME 2010
作者: Chen, Liqiong Liu, Yunxiang Fan, Guisheng Department of Computer Science and Information Engineering Shanghai Institute of Technology Shanghai 200235 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai 201112 China Department of Computer Science and Engineering East China University of Science and Technology Shanghai 200237 China
As computer systems become increasingly internetworked, Distributed Real-time Embedded (DRE) software is becoming increasingly common and important, a challenging problem faced by researchers and developers of DRE sof... 详细信息
来源: 评论
Reconstructing 3D Objects from 2D Sectional Views of Engineering Drawings Using Volume-Based Method
Reconstructing 3D Objects from 2D Sectional Views of Enginee...
收藏 引用
International Conference on Shape Modeling and Applications
作者: Yamei Wen Hui Zhang Zhongmian Yu Jiaguang Sun Jean-Claude Paul Department of Computer Science and Technology Tsinghua University Beijing China Key Laboratory of Information System Security Ministry of Education Beijing China School of Software Tsinghua University Beijing China Key Laboratory for Information System Security Ministry of Education Beijing China Information Science and Technology Tsinghua National Laboratory for Information Science and Technology Beijing China INRIA France
Sectional views are widely used in engineering practice due to their clear and concise expression. However, it is difficult for computers to understand because of the large numbers of omitted entities and their divers... 详细信息
来源: 评论
Location-aware downlink and uplink power control and throughput optimization in cellular cognitive radio networks
收藏 引用
Frontiers of Electrical and Electronic Engineering in China 2010年 第4期5卷 441-448页
作者: Zhiyao MA Wei CHEN Zhigang CAO Khaled Ben LETAIEF State Key Laboratory on Microwave and Digital Communications Tsinghua National Laboratory for Information Science and Technology(TNList)Department of Electronic EngineeringTsinghua UniversityBeijing 100084China Department of Electronic and Computer Engineering The Hong Kong University of Science and TechnologyHong KongChina
In this paper,we consider throughput maximization in cognitive radio systems with proper power *** particular,we incorporate location-awareness into the power control design and maximize the average throughput of the ... 详细信息
来源: 评论
Research on test model of network survivability
收藏 引用
Journal of Computational information systems 2010年 第4期6卷 1301-1309页
作者: Ming, Liang Wang, Dongxia Zhang, Lufeng Wang, Chunlei Zhao, Jinjing Tang, Jian Beijing Institute of System Engineering Beijing 100101 China National Key Laboratory of Science and Technology on Information System Security China Dept. of Computer Science and Technology Tsinghua University Beijing 10084 China
Survivability is of a prime concern in the analysis and design of information infrastructure. This paper presents a novel test model for survivable network, in the presence of attacks, failures, or accidents. We name ... 详细信息
来源: 评论
Notice of Retraction: The research and development of worm defense strategies
Notice of Retraction: The research and development of worm d...
收藏 引用
International Conference on computer science and information technology (CSIT)
作者: Liuqi Ma Guoqing State Key Laboratory of Information Security Chinese Academy and Sciences Beijing China Information System Security National Key Laboratory of Science and Technology Beijing China
This article has been retracted by the publisher.
来源: 评论
Research on systematic metrics of network survivability
Research on systematic metrics of network survivability
收藏 引用
2nd International Conference on information science and Engineering, ICISE2010
作者: Ming, Liang Wang, Dongxia Zhang, Lufeng Wang, Chunlei Tang, Jian Zhao, Jinjing Nation Key Laboratory of Science and Technology on Information System Security Beijing Institute System Engineering Beijing 100101 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China
As networks develop into large-scale systems, survivability of network systems is imperative. The systematic metrics of network survivability are used to measure or evaluate network survivability. This Paper summarize... 详细信息
来源: 评论
Trust based routing for misbehavior detection in Ad hoc networks
收藏 引用
Journal of Networks 2010年 第5期5卷 551-558页
作者: Gong, Wei You, Zhiyang Chen, Danning Zhao, Xibin Gu, Ming Lam, Kwok-Yan Department of Computer Science and Technology Tsinghua University Beijing 100084 China Key Laboratory of Information System Security of Ministry of Education School of Software Tsinghua University Beijing 100084 China
Node misbehavior due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding most efficiency path. To deal with mis... 详细信息
来源: 评论