咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是3591-3600 订阅
排序:
Personalized web retrieval based on rough-fuzzy method
收藏 引用
Journal of Computational information systems 2007年 第3期3卷 1067-1074页
作者: Duan, Qiguo Miao, Duoqian Zhang, Hongyun Zheng, Ji Key Laboratory of 'Embedded System and Service Computing' Department of Computer Science and Technology Tongji University Shanghai 201804 China
A novel approach of rough-fuzzy hybridization is proposed for efficient personalized Web retrieval. Variable precision rough set model is used to discover user preference. Fuzzy sets are incorporated to take care of t... 详细信息
来源: 评论
An empirical study on software development with open source components in the chinese software industry
收藏 引用
Software Process: Improvement and Practice 2008年 第1期13卷
作者: Weibing Chen Jingyue Li Jianqiang Ma Reidar Conradi Junzhong Ji Chunnian Liu Beijing Municipal Key Laboratory of Multimedia and Intelligent Software Technology Beijing University of Technology Beijing 100022 China Department of Computer and Information Science Norwegian University of Science and Technology (NTNU) NO-7491 Trondheim Norway
Chinese software companies are increasingly using open source software (OSS) components in software development. Development with OSS components faces challenges with respect to component selection, component integrat... 详细信息
来源: 评论
key management in ad hoc networks using self-certified public key system
收藏 引用
International Journal of Mobile Communications 2007年 第1期5卷 94-106页
作者: Fagen, Li Xiangjun, Xin Yupu, Hu Key Laboratory of Computer Networks and Information Security Xidian University Xi'an Shaanxi 710071 China Department of Information and Computing Science Zhengzhou University of Light Industry Zhengzhou Henan 450002 China
As various applications of ad hoc network have been proposed, security issues have become a central concern and are increasingly important. In this paper, we propose a distributed key management approach by using the ... 详细信息
来源: 评论
Performance evaluation on IEEE 802.11e considering emergency calls in congested situation
收藏 引用
中国邮电高校学报(英文版) 2007年 第z1期14卷 50-54页
作者: CUI Lu-ming OKADA Kazunori KATO Toshihiko CHEN Xing-yi Information Security Center National Institute of Information and Communications Technology Tokyo 184-8795 Japan Department of Information Network System Science The University of Electro-Communications Tokyo 182-8585 Japan States Key Laboratory of Networking and Switching Beijing University of Posts and Telecommunications Beijing 100876 China
To enhance the quality of service (QoS) support in IEE 802.11, IEEE 802.11e has been studied, which introduces the so-called hybrid coordination function (HCF). HCF includes two medium access mechanisms: contention-ba... 详细信息
来源: 评论
Compact sequential aggregate signatures
Proceedings of the ACM Symposium on Applied Computing
收藏 引用
Proceedings of the ACM Symposium on Applied Computing 2007年 249-253页
作者: Mu, Yi Susilo, Willy Zhu, Huafei School of Information Technology and Computer Science University of Wollongong Wollongong NSW 2522 Australia Department of System and Information Security Institute for Infocomm Research 21 Heng Mui Keng Terrace Singapore Singapore
In this paper, a new notion which we call compact sequential aggregate signatures is introduced and formalized. Informally, a compact sequential aggregate signature states the following thing: for a given message vect... 详细信息
来源: 评论
A pairing-based signcryption scheme using self-certified public keys
收藏 引用
International Journal of computers and Applications 2007年 第3期29卷 278-282页
作者: Li, F. Xin, X. Hu, Y. School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu Sichuan 610054 China Department of Information and Computing Science Zhengzhou University of Light Industry Zhengzhou Henan 450002 China Key Laboratory of Computer Networks and Information Security Xidian University Xi'an Shaanxi 710071 China
In recent years, many pairing-based signcryption schemes have been proposed. There is, however, an inherent weakness in these schemes: the private key escrow problem, in which the "trusted" private key gener... 详细信息
来源: 评论
Improved structural modeling based on conserved domain clusters and structure-anchored alignments
Proceedings of the ACM Symposium on Applied Computing
收藏 引用
Proceedings of the ACM Symposium on Applied Computing 2007年 128-132页
作者: Zhang, Fa Xu, Lin Liu, Zhiyong Yuan, Bo Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Science Graduate School Chinese Academy of Science Institute of Computing Technology Chinese Academy of Science Department of Computer Science and Engineering Shanghai Jiaotong University
In this paper, we presented a method to improve structural modeling based on conserved domain clusters and structure-anchored alignments. We first constructed a template library of structural clusters for all conserve... 详细信息
来源: 评论
Image Segmentation Based on Modified Pulse-Coupled Neural Networks
收藏 引用
电子学报(英文版) 2007年 第1期16卷 119-122页
作者: ZHANG Junying FAN Xiuju DONG Jiyang SHI Meihong School of Computer Science and Engineering Xidian University Xi'an 710071 China National Key Laboratory for Radar Signal Processing Xidian University Xi'an 710071 China Information and Control Department Xi'an Engineering Science and Technology Institute Xi'an 710048 Chian
Based on the property of Human vision system (HVS) that human eye's sensitivity to an image varies with different information regions of the image, Pulse-coupled neural network (PCNN) model is modified for image s... 详细信息
来源: 评论
An improved Bayesian network structure learning algorithm and its application in an intelligent B2C portal
收藏 引用
Web Intelligence and Agent systems 2007年 第2期5卷 127-138页
作者: Ji, Junzhong Liu, Chunnian Yan, Jing Zhong, Ning College of Computer Science and Technology Beijing University of Technology Beijing Municipal Key Laboratory of Multimedia and Intelligent Software Technology Beijing 100022 China Department of Information Engineering Maebashi Institute of Technology 460-1 Kamisadori-Cho Maebashi-City 371-0816 Japan
Web Intelligence (WI) is a new and active research field in current AI and IT. Intelligent B2C Portals are an important research topic in WI. In this paper, we first investigate and analyze the architecture of a B2C p... 详细信息
来源: 评论
Fuzzy QoS controllers in mobile ad hoc networks using genetic algorithms
收藏 引用
Journal of Computational information systems 2007年 第6期3卷 2255-2260页
作者: Sun, Baolin Li, Hua Zeng, Yue Qin, Qianqing College of Computer Science and Technology Hubei University of Economics Wuhan 430205 China State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing Wuhan University Wuhan 430079 China Xinyang Vocational and Technical College Xinyang 464000 China Department of Computer Jiangxi Vocational College of Finance and Economics Jiujiang 332000 China
Mobile ad hoc network (MANET) is an autonomous system of mobile wireless nodes connected dynamically without any preexisting infrastructure. Here, since the nodes are mobile, the network topology changes rapidly and u... 详细信息
来源: 评论