咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是3581-3590 订阅
排序:
An Energy Efficient, Low Cost, Hybrid Storage system Based on Utility
An Energy Efficient, Low Cost, Hybrid Storage System Based o...
收藏 引用
Japan-China Joint Workshop on Frontier of computer science and technology (FCST)
作者: Lingfang Zeng Dan Feng Bharadwaj Veeravalli Qingsong Wei Key Laboratory of Information Storage Ministry of Education Huazhong University of Science and Technology China Department of Electrical and Computer Engineering National University of Singapore Singapore Data Storage Institute Singapore
To get large disk-like characteristics and offset the significant power demands of hard disk drives, we propose a fully functional hybrid archive system (called Pseudodisk) composed of an array of disks and a tape lib... 详细信息
来源: 评论
Quick Finding of Network Video Stream
Quick Finding of Network Video Stream
收藏 引用
International Conference on computer science and information technology (CSIT)
作者: Qindong Sun Shengli Li Xiaojun Guo Network Computing and Security Key Laboratory of Shaanxi Xi'an University of Technology Xi'an China School of Electronics and Information Engineering Xi'an Jiaotong University Xi'an China Department of Research and Development Xi'an Anzhi Science and Technology Corporation Xi'an China
Network video technology develops quickly in recent years and the applications of network video are various. The effectively managing of the application based on network video is necessary for network flow management,... 详细信息
来源: 评论
A Dynamic Trust Model for the Multi-agent systems
A Dynamic Trust Model for the Multi-agent Systems
收藏 引用
International Symposiums on information Processing (ISIP)
作者: Bin li Maolin Xing JunWu Zhu Tongshen Che State Key Laboratory for Novel Software Nanjing University Nanjing China Department of Computer Science and Engineering Yangzhou University Yangzhou China College of Information Science and Technology Nanjing University of Aeronautics and Astronautics China
Internet provides a fertile medium for new breeds of computer viruses. Many people who have access to a wealth of information via Internet are attacked by more computer viruses than they can effectively process. We pr... 详细信息
来源: 评论
Improved Ant Colony system for VRPSPD with Maximum Distance Constraint
收藏 引用
systems Engineering - Theory & Practice 2008年 第1期28卷 132-140页
作者: Tao ZHANG Wen-xin TIAN Yue-jie ZHANG Shi-xin LIU School of Information Management and Engineering Shanghai University of Finance and Economics Shanghai 200433 China Informatization Office in Center of Modern Education Technology of Shanghai Finance University Shanghai 201209 China Department of Computer Science and Engineering Shanghai Key Laboratory of Intelligent Information Processing Fudan University Shanghai 200433 China School of Information Science and Engineering Northeastern University Key Laboratory of Integrated Automation of Process Industry Ministry of Education Shenyang 110004 China
This article investigates the reverse logistics vehicle routing problem with a single depot, simultaneous distribution and collection of the goods by a homogeneous fleet of vehicles under the restrictions of maximum c... 详细信息
来源: 评论
A communication-aware scheduling algorithm for heterogeneous systems
收藏 引用
High technology Letters 2008年 第2期14卷 129-133页
作者: 阮幼林 Liu Gan Zhang Jianjun Hart Jianjun Li Qinghua School of Information Engineering Wuhan University of Technology Wuhan 430070 P.R. China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 P.R. ChinaI Department of Computer Science and Technology Huazhang University of Science and Technology Wuhan 430074 P.R. Chinat
Previous work mostly employs an ideal system model that assumes fully connected processors and concurrent communication, which leads to inaccurate and inegicient schedule results. In this paper, a new scheduling model... 详细信息
来源: 评论
Research on Motion Vector Accuracy in OvercompleteWavelet-Domain Scalable Video Coding Based on Human Visual system Characteristics
Research on Motion Vector Accuracy in OvercompleteWavelet-Do...
收藏 引用
The 9th International Conference for Young computer Scientists(第九届国际青年计算机大会)
作者: Chuanming Song Xianghai Wang Fuyan Zhang Department of Computer Science & Technology Nanjing University Nanjing 210093 China College of Computer & Information Technol. Liaoning Normal University Dalian 116029 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China
This paper proposes an accuracy-distortion model for overcomplete wavelet-based scalable motion estimation by exploiting the theory of stationary random process. We first estimate the motion compensation errors in spa... 详细信息
来源: 评论
A Novel Method of Combined Feature Extraction for Recognition
A Novel Method of Combined Feature Extraction for Recognitio...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Tingkai Sun Songcan Chen Jingyu Yang Pengfei Shi School of Computer Science and Technology Nanjing University of Science and Technology of PLA Nanjing China Department of Computer Science & Engineering Nanjing University of Aeronautics and Astronautics Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Electronic Information and Electrical Engineering Shanghai Jiaotong University Shanghai China
Multimodal recognition is an emerging technique to overcome the non-robustness of the unimodal recognition in real applications. Canonical correlation analysis (CCA) has been employed as a powerful tool for feature fu... 详细信息
来源: 评论
On Energy Spreading Transform Based MIMO systems: Capacity and Diversity
On Energy Spreading Transform Based MIMO Systems: Capacity a...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Feng Han Pingyi Fan Q. T. Zhang K. B. Letaief State Key Laboratory on Microwave and Digital Communications Department of Electronic Engineering Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China Department Electrical Engineering City University of Hong Kong Hong Kong China Department Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong China
The energy spreading transform (EST) has recently been proposed as a technique for the multiple input and multiple output (MIMO) fading channels, ending up with an EST-based iterative detection scheme for MIMO systems... 详细信息
来源: 评论
Evolutionary Testing of Trusted Computing Supporting Software Based on Genetic Algorithms
Evolutionary Testing of Trusted Computing Supporting Softwar...
收藏 引用
International Symposium on Knowledge Acquisition and Modeling, KAM
作者: Fan He Jing Len Huanguo Zhang Yonghua Tan College of Computer Wuhan University of China Wuhan Hubei China Department of Information Technology Hubei University of Police Wuhan Hubei China Key Laboratory of AeroSpace Information Security and Trusted Computing Ministry of Education Wuhan Hubei China Development and Reform Bureau of Laoshan Qingdao Shandong China
The rapid development of trusted computing (TC) technology has become a milestone in the field of information security. There is an increasing application of trusted computing platform (TCP) with trusted computing sup... 详细信息
来源: 评论
An Effective and Robust Pedestrians Detecting Algorithm & Symposia
An Effective and Robust Pedestrians Detecting Algorithm & Sy...
收藏 引用
International Conference on Intelligent Transportation
作者: Zhipeng Li Yun Sun Fuqiang Liu Wenhuan Shi Key Laboratory of Embedded System and Service Computing supported by Ministry of Education University of Tongji Shanghai China School of Electronics and Information Engineering University of Tongji Shanghai China Department of Control Science and Technology Shanghai Jiaotong University Shanghai China
In this paper, we present a pedestrian detection approach using spatial histograms of oriented gradients feature. As spatial histograms of oriented gradients consist of marginal distributions of an image over local an... 详细信息
来源: 评论