咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是3681-3690 订阅
排序:
Threshold undeniable RSA signature scheme  3rd
收藏 引用
3rd International Conference on information and Communications security, ICICS 2001
作者: Wang, Guilin Qing, Sihan Wang, Mingsheng Zhou, Zhanfei Engineering Research Center for Information Security Technology State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing100080 China Mathematics Department College of Science and Technology Nihon University Tokyo101-8308 Japan
Undeniable signature has been extensively researched after Chaum and Antwerpen first proposed the concept of this special digital signature ten years ago. Up to now, however, almost all the existed schemes are based o... 详细信息
来源: 评论
Multisequence synthesis over an integral domain  1
收藏 引用
International Conference on Cryptography and Lattices, CaLC 2001
作者: Wang, Li-Ping Zhu, Yue-Fei State Key Laboratory of Information Security Graduate School University of Science and Technology of China Beijing100039 China Department of Network Engineering Information Engineering University Zhengzhou450002 China
We first give an extension of F[x]-lattice basis reduction algorithm to the polynomial ring R[x] where F is a field and R an arbitrary integral domain. So a new algorithm is presented for synthesizing minimum length l... 详细信息
来源: 评论
An Effective Method for Chinese Grammar Rule Learning
收藏 引用
International Journal of computer Processing of Languages 2001年 第4期14卷 361-374页
作者: CHUNFA YUAN GANG CHEN K. F. WONG WENJIE LI State Key Laboratory of Intelligent Technology and System Department of Computer Science & Technology Tsinghua University Beijing 100084 China Department of System Engineering & Engineering Management The Chinese University of Hong Kong China
A new method of Chinese grammar rules learning is put forward in this paper. The key point of this method is to use part-of-speech (POS), semantic and contextual information together in learning and expressing Chinese... 详细信息
来源: 评论
Statistical learning and analyses of Chinese ancient books for information retrieval
Statistical learning and analyses of Chinese ancient books f...
收藏 引用
IEEE International Conference on systems, Man and Cybernetics
作者: Min Zhang Shao-Ping Ma Zhe Jiang Ke Huang State Key laboratory of Intelligent Technology and System Department of Computer Science and Technology Tsinghua University Beijing China
The technique of full text retrieval for modern Chinese has been studied for a long time, but the same cannot be said for ancient Chinese books, especially in China. This paper tries to find the characteristics of Chi... 详细信息
来源: 评论
A TV program generation system using digest video scenes and a scripting markup language
A TV program generation system using digest video scenes and...
收藏 引用
Annual Hawaii International Conference on system sciences (HICSS)
作者: Y. Shirota T. Hashimoto A. Nadamoto T. Hattori A. Iizawa K. Tanaka K. Sumiya Software Research Center Imaging System Business Group Ricoh Company Limited Japan Division of Information and Media Science Graduate School of Science and Technology Kobe University Japan Department of Computer and Systems Engineering Graduate School of Science and Technology Kobe University Japan Division of Urban Information Systems Research Center for Urban Safety and Security Kobe University Japan
This paper describes a TV program generation system using digest video scenes that are retrieved from video streams with the program indexes. The key features of the system are: (1) TV programs can be dynamically gene... 详细信息
来源: 评论
Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies
收藏 引用
ACM Transactions on information and system security 2000年 第2期3卷 85-106页
作者: Osborn, Sylvia Sandhu, Ravi Munawer, Qamar Dept. of Computer Science The University of Western Ontario London ON N6A 5B7 Canada Laboratory for Information Security Technology MS4A4 Information and Software Engineering Department George Mason University Fairfax VA 22030 United States
Access control models have traditionally included mandatory access control (or lattice-based access control) and discretionary access control. Subsequently, role-based access control has been introduced, along with cl... 详细信息
来源: 评论
Chinese word classification based on statistics
Chinese word classification based on statistics
收藏 引用
World Congress on Intelligent Control and Automation (WCICA)
作者: Zhao Shi-Wan Xia Ying Ma Shao-Ping Wang Yu Su Zhong Department of Computer Science and Technology State Key Laboratory of Intelligent Technology and System Beijing China
Chinese words classification based on statistics plays an important role in natural language processing, such as speech recognition, intelligent Chinese input method, and so on. We first do statistics and calculation ... 详细信息
来源: 评论
Using ODIIPSA98 to design the computer-supporting environment for integrated human-machine discussion system
Using ODIIPSA98 to design the computer-supporting environmen...
收藏 引用
World Congress on Intelligent Control and Automation (WCICA)
作者: Diao Lili Lu Yuchang Shi Chunyi Computer Science and Technology Department The State Key Laboratory of Intelligent Technology and System TsingHua University Beijing China
The study of an integrated human-machine discussion system for supporting economic decisions requires establishing a computer-supporting environment, which can discover the knowledge about economics from heterogeneous... 详细信息
来源: 评论
A knowledge sharing and collaboration system model based on Internet
A knowledge sharing and collaboration system model based on ...
收藏 引用
IEEE International Conference on systems, Man and Cybernetics
作者: Wu Gangshan Huang Yuan Shian-Shyong Tseng Zhang Fuyan State Key Laboratory for Novell Software Technology Department of Computer Science and Technology Nanjing University of Technology Jiangsu China Department of Computer and Information Science National Chiao Tung University Hsinchu Taiwan
This paper proposes a knowledge sharing and collaboration system model (InKB) based on the Internet. It gives a way to collaborate and share knowledge between Web-based knowledge systems. InKB model has three layers: ... 详细信息
来源: 评论
The research on mobile robot simulation and visualization under Virtual Reality
The research on mobile robot simulation and visualization un...
收藏 引用
International Conference on information, Communications and Signal Processing
作者: Lei Yang Xinxin Yang Kezhong He The State Key Laboratory of Intelligent Technology & System Department of Computer Science Tsinghua University Beijing China
Simulation under Virtual Reality is the front edge of simulation technology. And also, it provide a new method for integrated multisensor simulation under a united environment. In the past, most simulation and animati... 详细信息
来源: 评论