咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是3611-3620 订阅
排序:
Gippy: Campus GIS information system supported by P2P
Gippy: Campus GIS information system supported by P2P
收藏 引用
2007 International Symposium on Applications and the Internet - Workshops, SAINT-W
作者: Fengyuan, Xu Zhiyi, Fang Xiao, Han Department of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory Symbolic Computation and Knowledge Engineering Education Ministry Jilin University Changchun 130012 China School of Economics and Information Systems Jilin University Changchun 130012 China
Geographical information system (GIS) integrates operation and synthesis analysis of multi-factor information, satisfying the demand of high efficiency and visual performance in human computer Interaction, whereas Pee... 详细信息
来源: 评论
The Epidemic Threshold of a More General Epidemic Spreading Model for Network Viruses
The Epidemic Threshold of a More General Epidemic Spreading ...
收藏 引用
International Conference on Natural Computation (ICNC)
作者: Lansheng Han Shuxia Han Min Yang Laboratory for Information Security School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Mathematics Department Huazhong University of Science and Technology Wuhan China School of Computer Science Wuhan University of China Wuhan Hubei China
Deferent from the other epidemic models, this paper focus on the different spreading features of network viruses compared with biological viruses such as the connectivity rate of the net is variable and that is also t... 详细信息
来源: 评论
A Role-Based Secure Workflow Model
A Role-Based Secure Workflow Model
收藏 引用
第六届网格与协同计算国际会议(The Sixth International Conference on Grid and Cooperative Computing GCC 2007)
作者: Jianliang Xu Chunyan Song Shenhua Li Mingqiang Wang Department of Computer Science and Technology Ocean University of China Qingdao 266100 P.R.China Laboratory of Cryptographic Technology and Information Security Shandong University Jinan 250100
Workflow Management system is used for supporting many day-to-day workflows in large organizations. But heterogeneous and distributed computing systems make security management of WFMS decentralized, thus its security... 详细信息
来源: 评论
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymo...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Li Lu Jinsong Han Lei Hu Jinpeng Huai Yunhao Liu Lionel M. Ni State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong China State Key Laboratory of Software Developing Environment Beihang University Beijing China
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence, there exists an inhere... 详细信息
来源: 评论
A model for learning and acting rationally in multiagent system
A model for learning and acting rationally in multiagent sys...
收藏 引用
IEEE International Conference on Robotics and Biomimetics
作者: Yao-Hai Lin Shan-Li Hu Jian-Bin Luo Department of Computer Science and Technology Fuzhou University Fuzhou China Department of Computer and Information Science Fujian Agriculture And Forestry University Fuzhou China Key Laboratory for Computer Science Chinese Academy and Sciences Beijing China
In order to characterize the agent, there is a presupposition that each agent has its set of propositions. The model is based upon our prior observation, and satisfies many properties. Furthermore, we describe concret... 详细信息
来源: 评论
A Rough Set Approach to Grouping Goods in Electronic Commerce
A Rough Set Approach to Grouping Goods in Electronic Commerc...
收藏 引用
International Conference on Advanced Communication technology (ICACT)
作者: Qiguo Duan Duoqian Miao The Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China Department of Computer Science and Technology University of Tongji Shanghai China Department ofComputer Science and Technology University of Tongji Shanghai China
As electronic commerce (EC) become more and more prevalent to people, it is very critical to provide the right information to the right customers. The EC sites are generating large amount of data on customer purchases... 详细信息
来源: 评论
Research on Usage Control Model with Delegation Characteristics Based on OM-AM Methodology
Research on Usage Control Model with Delegation Characterist...
收藏 引用
IFIP International Conference on Network and Parallel Computing Workshops (NPC Workshops)
作者: Zhiyong Zhang Lin Yang Qingqi Pei Jianfeng Ma Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an China Electron. Information Engineering Coll. Henan University of Science and Technology Luoyang China The Research Institute Renesas Technology Corporation Beijing China
UCON ABC is a basic framework of next generation access control policy Usage Control that is composed of Authorization-oBlige-Condition components, but so far it lacks of important delegation characteristic. The pape... 详细信息
来源: 评论
Using Three Layer Neural Networks to Compute Discrete Real Functions
Using Three Layer Neural Networks to Compute Discrete Real F...
收藏 引用
International Conference on Natural Computation (ICNC)
作者: Jian Wang Yixian Yang Nan Jiang Zhaozhi Zhang Xiaomin Ma Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China College of Computer Science Beijing University of Technology Beijing China Institute of Systems Science Academia Sinica Beijing China Engineering and Physics Department Oral Roberts University Tulsa OK USA
This paper concerns how to compute discrete real functions using three-layer feedforward neural networks with one hidden layer. Firstly, we define strongly and weakly symmetric real functions. Then we give a network t... 详细信息
来源: 评论
Ant Colony system based on the ASRank and MMAS for the VRPSPD
Ant Colony System based on the ASRank and MMAS for the VRPSP...
收藏 引用
第三届IEEE无线通讯、网络技术暨移动计算国际会议
作者: Chuoya Yu Tao Zhang Yuejie Zhang Wenxin Tian School of Information Management and Engineering Shanghai University of Finance and Economics Shangh Department of Computer Science and Engineering Shanghai Key Laboratory of Intelligent Information P Information Office in Center of Modern Education Technology Shanghai Finance University Shanghai 201
This paper builds a mixed integer programming model for the VRPSPD. An Ant Colony system (ACS) approach combining with the pheromone updating strategy of ASRank and MMAS ant algorithm is proposed. The initial vehicle ... 详细信息
来源: 评论
RLC_ACS: AN IMPROVED ANT COLONY ALGORITHM FOR VRPSDP
RLC_ACS: AN IMPROVED ANT COLONY ALGORITHM FOR VRPSDP
收藏 引用
2007 International Conference on Machine Learning and Cybernetics(IEEE第六届机器学习与控制论国际会议)
作者: XUE-CHAO ZHENG TAO ZHANG WEN-XIN TIAN YUE-JIE ZHANG School of Information Management and Engineering Shanghai University of Finance and Economics Shan Information Office in Center of Modem Education Technology of Shanghai Finance University Shanghai Department of Computer Science and Engineering Fudan University Shanghai Key Laboratory of Intelli
This paper studies the reverse logistics vehicle routing problem with simultaneous distribution of the goods and collection of the ones as same as the initial state by a homogeneous fleet of vehicles with capacities c... 详细信息
来源: 评论