咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是3441-3450 订阅
排序:
Temporal Logics and Model Checking Algorithms for ZIAs
Temporal Logics and Model Checking Algorithms for ZIAs
收藏 引用
The 2nd International Conference on Software Engineering and Data Mining(IEEE 第二届国际软件工程和数据挖掘学术大会 SEDM 2010)
作者: Zining Ca0 National Key Laboratory of Science and Technology on Avionics System Integration Shanghai 200233. P. R. China Department of Computer Science and Technology Nanjing University of Aero. & Astro.Nanjing 210016 P. R. China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006. P. R. China
In this paper, we first propose a specification ap-proach combining interface automata and Z language. This approach can be used to describe temporal properties and data properties of software components. A branching ... 详细信息
来源: 评论
A New Secret Sharing Scheme Based on Commutative Encrypted Function
A New Secret Sharing Scheme Based on Commutative Encrypted F...
收藏 引用
International Forum on information technology and Applications, IFITA
作者: Jun He Ximei Li Lijuan Li Chunming Tang Computer and Information Engineering Department HuaiHua Vocational and Technical College Huaihua Hunan China School of Computer and Communication Hunan University Changsha Hunan China School of Mathematics and Information Science Guangzhou University Guangzhou Guangdong China State Key Laboratory of Information Security Institute of Software Science Chinese Academy and Sciences Beijing China
With the characteristic that the commutativity of modular exponential function makes the specific order of secret distribution process less important and on basis of the abstruseness of discrete logarithm, this paper ... 详细信息
来源: 评论
Describing the semantic relation of the deep web query interfaces using ontology extended LAV
Journal of Software
收藏 引用
Journal of Software 2010年 第1期5卷 89-98页
作者: Liang, Hao Zuo, Wan-Li Ren, Fei Department of Computer Science and Technology Jilin University Jilin Changchun China Department of Information Changchun Taxation College Jilin Changchun China Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Changchun China
The key element in a Deep Web information fusion system is the data source modeling problem, which is the determinant technical factor of the whole system. The query interfaces provided by the Deep Web are the clues t... 详细信息
来源: 评论
Cloud Storage as the Infrastructure of Cloud Computing
Cloud Storage as the Infrastructure of Cloud Computing
收藏 引用
International Conference on Intelligent Computing and Cognitive Informatics (ICICCI)
作者: Jiyi Wu Lingdi Ping Xiaoping Ge Ya Wang Jianqing Fu Alibaba Business College Key Laboratory of E-Business and Information Security Hangzhou Normal University Hangzhou China School of Computer Science and Technology University of Zhejiang Hangzhou China Department of Electronics Information Hangzhou Academy of Scientific Professional Technology Hangzhou China Zhejiang Second Institute of Surveying and Mapping Hangzhou China
As an emerging technology and business paradigm, Cloud Computing has taken commercial computing by storm. Cloud computing platforms provide easy access to a company's high-performance computing and storage infrast... 详细信息
来源: 评论
Complete 3D Model Reconstruction Using Two Types of Depth Sensors
Complete 3D Model Reconstruction Using Two Types of Depth Se...
收藏 引用
2010 IEEE International Conference on Intelligent Computing and Intelligent systems(2010 IEEE 智能计算与智能系统国际会议 ICIS 2010)
作者: Guangyu Mu Miao Liao Ruigang Yang Dantong Ouyang Zhiwen Xu Xiaoxin Guo Department of Computer Science and Technology Jilin UniversityCollege of InformationJilin Univers Department of Engineering University of KentuckyCenter for Visualization and Virtual EnvironmentLe Department of Engineering University of KentuckyCenter for Visualization and Virtual EnvironmentLe Department of Computer Science and Technology Jilin UniversityKey Laboratory of Symbolic Computatio Department of Computer Science and Technology Jilin UniversityChangchun China
We propose a fast and simple application system of 3D model reconstruction. We acquire range images by using a combination of a regular camera and two types of depth sensors. The reconstruction of a 3D model consists ... 详细信息
来源: 评论
Identifying reaction of stock price to public information based on fuzzy c-means clustering
Identifying reaction of stock price to public information ba...
收藏 引用
Chinese Control Conference (CCC)
作者: Chao-Chao Li Kai Chi Fang-Ping Fu Wen-Gang Che Qing-Jiang Zhao School of Information Engineering and Automation Kunming University of Science and Technology 650051 China Key Laboratory of Computer Technology and Application of Yunnan Province Kunming University of Science and Technology 650051 China Department of Physics and Technology Kunming University 650031 China
The efficient markets hypothesis (EMH) maintains that market prices fully reflect all available information such as public or private information. Therefore, the study of analyzing the reaction of stock price to the i... 详细信息
来源: 评论
Secure and Energy Aware Routing (SEAR) in Wireless Sensor Networks
Secure and Energy Aware Routing (SEAR) in Wireless Sensor Ne...
收藏 引用
2010 IEEE Global Telecommunications Conference GLOBECOM 2010
作者: Di Tang Tingting Jiang Jian Ren Department of Electrical and Computer Engineering Michigan State University East Lansing MI USA National Key Laboratory of ISN & Information Science Institute Xidian University Xi'an China Department of Computer Science Virginia Technology Blacksburg VA USA
Lifetime optimization and security are two important design issues for multi-hop wireless sensor networks with non-replenishable energy resources. In this research, we propose a novel secure and energy aware (SEAR) ro... 详细信息
来源: 评论
An associative memory system for incremental learning and temporal sequence
An associative memory system for incremental learning and te...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Furao Shen Hui Yu Wataru Kasai Osamu Hasegawa State Key Laboratory for Novel Software Technology Jiangyin Information Technology Research Institute Nanjing University Nanjing China Department of Computer Intelligence and Systems Science Tokyo Institute of Technology Yokohama Japan Imaging Science and Engineering Laboratory Tokyo Institute of Technology Yokohama Japan
An associative memory (AM) system is proposed to realize incremental learning and temporal sequence learning. The proposed system is constructed with three layer networks: The input layer inputs key vectors, response ... 详细信息
来源: 评论
Universal Approximation of TS Fuzzy systems Constructed Dynamically-MISO Cases
Universal Approximation of TS Fuzzy Systems Constructed Dyna...
收藏 引用
American Control Conference
作者: ShiYu Yan ZengQi Sun Zhe Li State Key Laboratory on Intelligent Technology and Systems Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing 100084 P.R. China Central University of Finance and Economics Beijing 100081 P.R. China
Study on approximation capabilities of fuzzy systems has been an important and hot issue for many years. Many existing studies on fuzzy systems based on standard affine TS fuzzy models suffer seriously from curse of d... 详细信息
来源: 评论
Color estimation base on a giving color estimation PC-based system
收藏 引用
Procedia - Social and Behavioral sciences 2010年 第1期2卷 120-124页
作者: Jin Tao Hitoshi Hoshino Yusaku Fujii Jia Hongzhi Koichi Maru Hou Wenmei Shanghai Key Laboratory of Modern Optical System School of Optical-Electrical and Computer Engineering University of Shanghai for Science and Technology Shanghai 20093 China Department of Electronic Engineering Faculty of Engineering Gunma University Gunma 376-8515 Japan
A person's clothes color information was estimated by using a prototype PC-based system. The novel concept can be divided into 3 stages. First, space-variant color filter is put onto the lens of the monochrome sec... 详细信息
来源: 评论