咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是3431-3440 订阅
排序:
Robustify a job-shop schedule according to the payload of the machine
Robustify a job-shop schedule according to the payload of th...
收藏 引用
International Conference on Services systems and Services Management, ICSSSM
作者: Zhiyang You Zhigang Sun Xibin Zhao Daxin Zang Department of Computer Science and Technology Tsinghua University Beijing China School of Software Tsinghua University Beijing China Key Laboratory of Information System Security Ministry of Education School of Software Tsinghua University Beijing China Software Engineering Institute Beijing Aeronautics and Astronautics University Beijing China
Robust scheduling is an effective way to solve job-shop scheduling problem (JSP) under a dynamic and stochastic environment with uncertainties, which may lead to numerous schedule disruptions. Maintaining the optimiza... 详细信息
来源: 评论
Aptitude-Based Methodology for Agent-Oriented Software Engineering
Aptitude-Based Methodology for Agent-Oriented Software Engin...
收藏 引用
2010 IEEE International Conference on Sofetware Engineering and Service sciences(2010 软件工程与服务科学国际学术会议 ICSESS)
作者: Chaoming Li Kenwen Wang Department of Computer Science Sun Yat-sen UniversityGuangZhou China Key laboratory of High Confi Department of Information Technology Griffith University Brisbane Australia
In order to build dynamic and open MultiAgent systems (MAS) for heterogeneous intelligent entities, we define aptitude model to abstract the intelligent properties for heterogeneous entities, and present an aptitude-b... 详细信息
来源: 评论
Risk analysis of physical protection system based on evidence theory
收藏 引用
Journal of information and Computational science 2010年 第13期7卷 2871-2878页
作者: Xu, Peida Su, Xiaoyan Wu, Jiyi Sun, Xiaohong Zhang, Yajuan Deng, Yong College of Computer and Information Sciences Southwest University Chongqing 400715 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University Zhejiang 310036 China College of Food Science and Technology Shanghai Ocean University Shanghai 201306 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Hunan 411105 China Key Subject Laboratory of National defense for Radioactive Waste and Environmental Security Southwest University of Science and Technology Mianyang 621010 China School of Electronics and Information Technology Shanghai Jiao Tong University Shanghai 200240 China
Risk evaluation is very important to the design and improvement of physical protection systems. In this paper, an evaluation method of multi-source information fusion is proposed based on the D-S evidence theory. In t... 详细信息
来源: 评论
A Logic-Based Frame for Knowledge Reasoning in Real-time security Analysis
A Logic-Based Frame for Knowledge Reasoning in Real-time Sec...
收藏 引用
2010 IEEE International Conference on Sofetware Engineering and Service sciences(2010 软件工程与服务科学国际学术会议 ICSESS)
作者: Chaoming Li Kenwen Wang Department of Computer Science Sun Yat-sen UniversityGuangZhou China Key laboratory of High Confi Department of Information Technology Griffith University Brisbane Australia
Continuous time Markov chains (CTMCs) have been used in real-time dependability and security analysis. However, existing approaches assume that the system is fully observable to a system attacker, which is not feasibl... 详细信息
来源: 评论
On the Power Allocation for Relay Networks with Finite-Alphabet Constraints
On the Power Allocation for Relay Networks with Finite-Alpha...
收藏 引用
2010 IEEE Global Telecommunications Conference GLOBECOM 2010
作者: Weiliang Zeng Mingxi Wang Chengshan Xiao Jianhua Lu State Key Laboratory on Microwave and Digital Communications Tsinghua National Laboratory of Information Science and Technology Department of Electronic Engineering Tsinghua University Beijing China Department of Electrical & Computer Engineering Missouri University of Science and Technology MO USA
In this paper, we investigate the optimal power allocation scheme for relay networks with finite-alphabet constraints. It has been shown that the previous work utilizing various design criteria with the Gaussian input... 详细信息
来源: 评论
Hybrid uniform distribution of particle swarm optimizer
收藏 引用
IEICE Transactions on Fundamentals of Electronics, Communications and computer sciences 2010年 第10期E93-A卷 1782-1791页
作者: Zhang, Junqi Tan, Ying Ni, Lina Xie, Chen Tang, Zheng Department of Computer Science and Technology Key Laboratory of Embedded System and Service Computing Ministry of Education Qingdao China Tongji University Shanghai 200092 China Key Laboratory of Machine Perception Ministry of Education Qingdao China Department of Machine Intelligence School of Electronics Engineering and Computer Science Peking University Beijing 100871 China College of Info Sci and Engi Shandong University of Science and Technology Qingdao China Department of Intellectual Information Systems Engineering University of Toyama Toyama-shi 930-8555 Japan
Particle swarm optimizer (PSO) is a stochastic global optimization technique based on a social interaction metaphor. Because of the complexity, dynamics and randomness involved in PSO, it is hard to theoretically anal... 详细信息
来源: 评论
RETRACTED ARTICLE: Reliability-based CBM system design for feed water pump
RETRACTED ARTICLE: Reliability-based CBM system design for f...
收藏 引用
作者: Qin, Jinlei Niu, Yuguang Li, Zheng Information and Network Management Center North China Electric Power University Baoding China Key Laboratory of Condition Monitoring and Control for Power Plant Equipment Ministry of Education North China Electric Power University Beijing China Department of Computer Science and Technology North China Electric Power University Beijing China
The condition-based maintenance (CBM) technique has been widely used in the power plant in China. Feed water pump is one of the most important general requirements in the power plant. its reliability plays an importan... 详细信息
来源: 评论
LEEN: Locality/Fairness-Aware key Partitioning for MapReduce in the Cloud
LEEN: Locality/Fairness-Aware Key Partitioning for MapReduce...
收藏 引用
IEEE International Conference on Cloud Computing technology and science (CloudCom)
作者: Shadi Ibrahim Hai Jin Lu Lu Song Wu Bingsheng He Li Qi Cluster and Grid Computing Laboratory Services Computing Technology and System Laboratory Huazhong University of Science and Technology Wuhan China School of Computer Engineering Nanyang Technological University Singapore Information and Technology Department China Development Bank Beijing China
This paper investigates the problem of Partitioning Skew in MapReduce-based system. Our studies with Hadoop, a widely used MapReduce implementation, demonstrate that the presence of partitioning skew causes a huge amo... 详细信息
来源: 评论
Fine-Grained Data Access Control systems with User Accountability in Cloud Computing
Fine-Grained Data Access Control Systems with User Accountab...
收藏 引用
IEEE International Conference on Cloud Computing technology and science (CloudCom)
作者: Jin Li Gansen Zhao Xiaofeng Chen Dongqing Xie Chunming Rong Wenjun Li Lianzhang Tang Yong Tang School of Computer Science and Educational Software Guangzhou University China School of Software Sun Yat-sen University China School of Computer Science Guangzhou University China Key Laboratory of Computer Networks and Information Security Xidian University China Department of Electrical Engineering and Computer Science Stavenger University Norway
Cloud computing is an emerging computing paradigm in which IT resources and capacities are provided as services over the Internet. Promising as it is, this paradigm also brings forth new challenges for data security a... 详细信息
来源: 评论
Functional analysis and security tests of online collaborative working platform for Shanghai EXPO 2010
收藏 引用
Journal of information and Computational science 2010年 第7期7卷 1561-1570页
作者: Wang, Yong Deng, Liwen Ruan, Da Jin, Jian Department of Computers Science and Technology Shanghai University of Electric Power Laboratory of Power System Network Security Shanghai 200090 China Chang Jiang Computer Group Corporation Shanghai China Ghent University 2400 Mol 9000 Gent Belgium Department of Computers Science and Technology East China Normal University Shanghai 200241 China
The paper presents functional analysis and security tests of online collaborative working platform for 2010 Shanghai EXPO participants. Under the framework of the computer supported cooperative work (CSCW) platform, w... 详细信息
来源: 评论