咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是3551-3560 订阅
排序:
Communication-aware scheduling algorithm for heterogeneous systems
收藏 引用
High technology Letters 2008年 第2期14卷 129-133页
作者: Ruan, Youlin Liu, Gan Zhang, Jianjun Han, Jianjun Li, Qinghua School of Information Engineering Wuhan University of Technology Wuhan 430070 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China Department of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Previous work mostly employs an ideal system model that assumes fully connected processors and concurrent communication, which leads to inaccurate and inefficient schedule results. In this paper, a new scheduling mode... 详细信息
来源: 评论
Error bounded algorithm for approximate B-spline surface skinning
收藏 引用
Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of computer-Aided Design and computer Graphics 2008年 第11期20卷 1477-1482页
作者: Wang, Wenke Zhang, Hui Wang, Bin School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Key Laboratory for Information System Security Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China
B-spline surface skinning is a commonly used tool in surface modeling. Huge amounts of control points will be introduced in the skinned surface by traditional skinning approach. This paper proposes an efficient approx... 详细信息
来源: 评论
Democratic Group Signatures with Linkability from Gap Diffie-Hellman Group
收藏 引用
Journal of Shanghai Jiaotong university(science) 2008年 第6期13卷 688-691页
作者: 刘彦宾 李祥学 钱海峰 张文政 Department of Computer Science ZunYi Normal CollegeZunyi 563002China School of Information Security Engineering Shanghai Jiaotong UniversityShanghai 200240China State Key Laboratory of Integrated Service Networks Xidian UniversityXi'an 710071China Computer Science and Technology Department East China Normal UniversityShanghai 200062China National Laboratory for Modern Communications Chengdu 610041China
Democratic group signatures (DGSs) attract many researchers due to their appealing properties, i.e., anonymity, traceability and no group manager. security results of existing work are based on decisional Diffie-Hel... 详细信息
来源: 评论
Performance analysis for large scale parallel microscopic traffic simulation system
Performance analysis for large scale parallel microscopic tr...
收藏 引用
International Symposium on Advances in computer and Sensor Networks and systems, 2008
作者: Fei, Yin Dongliang, Zhang Department of Computer Science and Technology Tongji University The Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai 201804 China
In this paper, we present the parallel implementation of the traffic microsimulation PMTS (Parallel Microscopic Traffic Simulation) focusing on the performance issues. The parallelization of PMTS is domain decompositi... 详细信息
来源: 评论
RING PROXY SIGNATURES
收藏 引用
Journal of Electronics(China) 2008年 第1期25卷 108-114页
作者: Wei Baodian Zhang Fangguo Chen Xiaofeng Department of Electronics and Communication Engineering Sun Yat-Sen University Guangzhou 510275 China Department of Computer Science Sun Yat-Sen University Guangzhou 510275 China Guangdong.Key Laboratory of Information Security Technology Guangzhou 510275 China
Proxy signatures have been used to enable the transfer of digital signing power within some context and ring signatures can be used to provide the anonymity of a signer. By combining the functionalities of proxy signa... 详细信息
来源: 评论
Personalized multimedia web summarizer for tourist  08
Personalized multimedia web summarizer for tourist
收藏 引用
17th International Conference on World Wide Web 2008, WWW'08
作者: Wu, Xiao Li, Jintao Zhang, Yongdong Tang, Sheng Neo, Shi-Yong Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China Department of Computer Science National University of Singapore Singapore
In this paper, we highlight the use of multimedia technology in generating intrinsic summaries of tourism related information. The system utilizes an automated process to gather, filter and classify information on var... 详细信息
来源: 评论
Integration of signature encryption and key exchange
Integration of signature encryption and key exchange
收藏 引用
2008 International Conference on Computational Intelligence and security, CIS 2008
作者: Yong, Ding Ya-hui, Li School of Mathematics and Computational Science Guilin University of Electronic Technology Guilin 541004 China Ministry of Education Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China Department of Computer Science City University of Hong Kong Hong Kong Hong Kong
Signature, encryption and key exchange are some of the most important and foundational cryptographical tools. In most cases, they are all needed to provide different secure functions. There exist called authenticated ... 详细信息
来源: 评论
Perceptual video encryption scheme for mobile application based on H.264
收藏 引用
Journal of China Universities of Posts and Telecommunications 2008年 第SUPPL.期15卷 73-78页
作者: WANG, Li-feng WANG, Wen-dong MA, Jian XIAO, Chen WANG, Kong-qiao State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Department of Electronic and Information Engineering Beijing Electronic Science and Technology Institute Beijing 100070 China Nokia Research Center Beijing 100013 China School of Computer Science and Technology Bei Hang University Beijing 100083 China
security video communication is a challenging task, especially for wireless video applications. A perceptual video encryption scheme is proposed based on exploiting the special feature of entropy coding in H.264. The ... 详细信息
来源: 评论
Semi-fragile audio watermarking against shearing
收藏 引用
Zidonghua Xuebao/Acta Automatica Sinica 2008年 第6期34卷 647-651页
作者: Zhao, Hong Shen, Dong-Sheng Zhu, Yuan-Hui Department of Computer Science and Engineering Zhangzhou Normal College Zhangzhou 363000 China Key Laboratory of Information Security Technology Zhangzhou Normal College Zhangzhou 363000 China
Semi-fragile watermarking can tolerate general signal processing, detect any spiteful tamper on marked multimedia data, and locate spatial regions within an altered image. A semi-fragile audio watermarking against she... 详细信息
来源: 评论
Streaming media intrusion detection through interacting protocol state machines
Streaming media intrusion detection through interacting prot...
收藏 引用
2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008
作者: Xin, Yu Shao-hua, Yu Yan, Liu Jian-hua, Ma Department of Electron and Information Hua-zhong University of Science and Technology China Optical Communication Technologies and Networks State Key Laboratory China Faculty of Computer and Information Sciences Hosei University Japan
Being a fast-growing Internet application, streaming media application shares the network resources with the regular Internet traffic, and is susceptible to the existing security holes of the Internet, such as SETUP R... 详细信息
来源: 评论