咨询与建议

限定检索结果

文献类型

  • 93 篇 会议
  • 48 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 144 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 83 篇 工学
    • 57 篇 计算机科学与技术...
    • 44 篇 软件工程
    • 26 篇 信息与通信工程
    • 10 篇 电气工程
    • 10 篇 控制科学与工程
    • 6 篇 生物工程
    • 5 篇 电子科学与技术(可...
    • 5 篇 航空宇航科学与技...
    • 5 篇 安全科学与工程
    • 4 篇 机械工程
    • 4 篇 仪器科学与技术
    • 3 篇 动力工程及工程热...
    • 3 篇 建筑学
    • 3 篇 交通运输工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 光学工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 环境科学与工程(可...
  • 38 篇 理学
    • 17 篇 数学
    • 12 篇 物理学
    • 8 篇 生物学
    • 8 篇 统计学(可授理学、...
    • 2 篇 大气科学
    • 2 篇 系统科学
  • 23 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 12 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 6 篇 法学
    • 5 篇 社会学
    • 1 篇 法学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 1 篇 教育学
  • 1 篇 农学
  • 1 篇 医学
  • 1 篇 艺术学

主题

  • 10 篇 watermarking
  • 9 篇 communication sy...
  • 9 篇 computer graphic...
  • 8 篇 protection
  • 6 篇 computer securit...
  • 6 篇 robustness
  • 5 篇 data security
  • 5 篇 intellectual pro...
  • 5 篇 authentication
  • 5 篇 security
  • 5 篇 protocols
  • 5 篇 privacy
  • 4 篇 internet of thin...
  • 4 篇 laboratories
  • 4 篇 internet
  • 4 篇 information secu...
  • 4 篇 quantum cryptogr...
  • 3 篇 information syst...
  • 3 篇 wireless communi...
  • 3 篇 bandwidth

机构

  • 8 篇 state key labora...
  • 4 篇 department for s...
  • 3 篇 information and ...
  • 3 篇 disaster managem...
  • 3 篇 state key labora...
  • 3 篇 science and tech...
  • 3 篇 university of en...
  • 3 篇 graduate school ...
  • 3 篇 state key labora...
  • 3 篇 department of el...
  • 3 篇 space communicat...
  • 3 篇 privacy engineer...
  • 3 篇 laboratory of sy...
  • 2 篇 faculty of scien...
  • 2 篇 directorate of i...
  • 2 篇 fraunhofer insti...
  • 2 篇 institute for in...
  • 2 篇 department of co...
  • 2 篇 ministry of high...
  • 2 篇 department of ma...

作者

  • 10 篇 gritzalis stefan...
  • 8 篇 kalloniatis chri...
  • 5 篇 guo hong
  • 5 篇 chen ziyang
  • 5 篇 yu song
  • 5 篇 xu bingjie
  • 4 篇 palma david
  • 4 篇 m. arnold
  • 4 篇 sideri maria
  • 3 篇 okada kazunori
  • 3 篇 song yu
  • 3 篇 pang jun
  • 3 篇 m. schmucker
  • 3 篇 hong guo
  • 3 篇 zhang yichen
  • 3 篇 kitsiou angeliki
  • 3 篇 ziyang chen
  • 3 篇 bingjie xu
  • 3 篇 xiangyu wang
  • 3 篇 mouratidis haral...

语言

  • 139 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"机构=Department of Security Technology for Graphics and Communication Systems"
144 条 记 录,以下是81-90 订阅
排序:
Studying a low-temperature engine with external heat supply
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1843卷
作者: A D Mekhtiyev V V Yugay A D Alkina Y G Neshina D E Kapanova Department of Electrical Equipment Operation S.Seifullin Kazakh Agrotechnical University Nur-Sultan Kazakhstan Solar Cell Physics Research Laboratory National Research Tomsk Polytechnic University Tomsk Russia Department of The technology of communication systems Karaganda Technical University Karaganda Kazakhstan Department of Information Technology and Security Karaganda Technical University Karaganda Kazakhstan Department of Energy Systems Karaganda Technical University Karaganda Kazakhstan
The article presents some results of studying the most optimal parameters of the displacer and the piston of a low-temperature engine with external heat supply to increase its efficiency when converting low-grade heat...
来源: 评论
Research of unsupervised entity relation extraction
收藏 引用
Journal of Computers (Taiwan) 2019年 第1期30卷 31-41页
作者: Liu, Yun Li, Mingxin Liu, Hui Cheng, Junjun Fu, Yanping Department of Electronic and Information Engineering Key Laboratory of Communication and Information Systems Beijing Municipal Commission of Education Beijing Jiaotong University China China Information Technology Security Evaluation Center Beijing China Key Laboratory of Communication and Information Systems Beijing Municipal Commission of Education Beijing Jiaotong University China
Nowadays, the Internet is growing rapidly and the number of network data is also growing rapidly, which makes it more difficult to get information from the massive network data with traditional methods. Entity relatio... 详细信息
来源: 评论
Online observability of boolean control networks
arXiv
收藏 引用
arXiv 2019年
作者: Wu, Guisen Dai, Liyun Liu, Zhiming Chen, Taolue Pang, Jun School of Computer and Information Science Southwest University Chongqing400715 China Department of Computer Science and Information Systems University of London Birkbeck United Kingdom Faculty of Science Technology and Communication Interdisciplinary Centre for Security Reliability and Trust University of Luxembourg
Observabililty is an important topic of Boolean control networks (BCNs). There are four types of observability which are proposed to capture the ability to determine BCNs' initial states by four different algorith... 详细信息
来源: 评论
High Accuracy Synchronization for Distributed Massive MIMO using White Rabbit
High Accuracy Synchronization for Distributed Massive MIMO u...
收藏 引用
IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and communication, ISPCS
作者: Thomas Bigler Albert Treytl David Löschenbrand Thomas Zemen Department for Integrated Sensor Systems Danube University Krems Wr. Neustadt Austria AIT - Austrian Institute of Technology Security & Communication Technologies Vienna Austria
Accurate synchronization is a crucial prerequisite for wireless communication systems and in particular for spatially distributed massive multiple-input multiple-output (MIMO) systems which is also used in the upcomin... 详细信息
来源: 评论
An Examination of Pairing Method with Camera and Acceleration Sensor
An Examination of Pairing Method with Camera and Acceleratio...
收藏 引用
International Conference on Mobile Computing and Ubiquitous Networking (ICMU)
作者: Makoto Nagatomo Kentaro Aburada Naonobu Okazaki Mirang Park Security Research Center Kanagawa Institute of Technology Atsugi Japan Department of Computer Science and Systems Engineering University of Miyazaki Miyazaki Japan Department of Information Network and Communication Kanagawa Institute of Technology Atsugi Japan
Received signal strength (RSS) is used for proximate device authentication in wireless communications, but it changes significantly due to environmental factors. Thus, it is difficult to obtain reliably accurate devic... 详细信息
来源: 评论
A new QoE fairness index for QoE management
收藏 引用
Quality and User Experience 2018年 第1期3卷 1-23页
作者: Hoßfeld, Tobias Skorin-Kapov, Lea Heegaard, Poul E. Varela, Martín Modeling of Adaptive Systems University of Duisburg-Essen Essen Germany Chair of Communication Networks University of Würzburg Würzburg Germany Faculty of Electrical Engineering and Computing University of Zagreb Zagreb Croatia Department of Information Security and Communication Technology NTNU Norwegian University of Science and Technology Trondheim Norway Oulo Finland
The user-centric management of networks and services focuses on the Quality of Experience (QoE) as perceived by the end user. In general, the goal is to maximize (or at least ensure an acceptable) QoE, while ensuring ...
来源: 评论
IAC-17.B4.7.8 :Integrated smallsats and unmanned vehicles for networking in remote locations  68
IAC-17.B4.7.8 :Integrated smallsats and unmanned vehicles fo...
收藏 引用
68th International Astronautical Congress: Unlocking Imagination, Fostering Innovation and Strengthening security, IAC 2017
作者: Birkeland, Roger Palma, David Zolich, Artur Department of Electronic Systems Norwegian University of Science and Technology NTNU Trondheim Norway Department of Information Security and Communication Technology NTNU Norway Department of Engineering Cybernetics NTNU Norway
The lack of infrastructure in maritime and Arctic regions has a strong impact on many operations, such as the retrieval of scientific data. Nowadays, data logged during these operations must either be collected by man... 详细信息
来源: 评论
Android malware detection based on static behavior feature analysis
收藏 引用
Journal of Computers (Taiwan) 2018年 第6期29卷 243-253页
作者: Chen, Chen Liu, Yun Shen, Bo Cheng, Jun-Jun Department of Electronic and Information Engineering Key Laboratory of Communication and Information Systems Beijing Municipal Commission of Education Beijing Jiaotong University Beijing15120201 China China Information Technology Security Evaluation Center Beijing China
As an open source operating system, Android has groups of users and developers, which result in a great deal of Android application in app markets. But at the same time, app’s benign and malicious behavior cannot be ... 详细信息
来源: 评论
"I have learned that i must think twice before…". An educational intervention for enhancing students’ privacy awareness in facebook  7th
"I have learned that i must think twice before…". An educat...
收藏 引用
7th International Conference on eDemocracy, e-Democracy 2017
作者: Sideri, Maria Kitsiou, Angeliki Tzortzaki, Eleni Kalloniatis, Christos Gritzalis, Stefanos Privacy Engineering and Social Informatics Laboratory Department of Cultural Technology and Communication University of the Aegean Lesvos81100 Greece Information and Communication Systems Security Laboratory Department of Information and Communications Systems Engineering University of the Aegean Samos83200 Greece
Social Network Sites have doubtless become part of our lives, facilitating communication and interaction between social actors. Within this frame users disclose personal information for several reasons while at the sa... 详细信息
来源: 评论
Evolving Bent Quaternary Functions
Evolving Bent Quaternary Functions
收藏 引用
Congress on Evolutionary Computation
作者: Stjepan Picek Karlo Knezevic Luca Mariot Domagoj Jakobovic Alberto Leporati Cyber Security Research Group Delft University of Technology Delft The Netherlands Faculty of Electrical Engineering and Computing University of Zagreb Zagreb Croatia Department of Informatics Systems and Communication Università degli Studi di Milano-Bicocca Milano Italy
Boolean functions have a prominent role in many real-world applications, which makes them a very active research domain. Throughout the years, various heuristic techniques proved to be an attractive choice for the con... 详细信息
来源: 评论