咨询与建议

限定检索结果

文献类型

  • 122 篇 会议
  • 53 篇 期刊文献

馆藏范围

  • 175 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 147 篇 工学
    • 130 篇 计算机科学与技术...
    • 110 篇 软件工程
    • 54 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 10 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 动力工程及工程热...
    • 7 篇 网络空间安全
    • 6 篇 机械工程
    • 5 篇 交通运输工程
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物工程
    • 4 篇 安全科学与工程
    • 3 篇 光学工程
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 土木工程
    • 3 篇 航空宇航科学与技...
  • 69 篇 理学
    • 53 篇 数学
    • 12 篇 物理学
    • 10 篇 统计学(可授理学、...
    • 5 篇 生物学
  • 41 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 20 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 9 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 7 篇 wireless sensor ...
  • 7 篇 cryptography
  • 5 篇 privacy
  • 4 篇 public key crypt...
  • 4 篇 security
  • 3 篇 security of data
  • 3 篇 educational inst...
  • 3 篇 authentication
  • 3 篇 semantics
  • 3 篇 feature extracti...
  • 3 篇 network security
  • 3 篇 peer to peer net...
  • 3 篇 malware
  • 3 篇 accuracy
  • 3 篇 adaptation model...
  • 2 篇 support vector m...
  • 2 篇 outsourcing
  • 2 篇 filtering
  • 2 篇 network protocol...
  • 2 篇 boolean function...

机构

  • 15 篇 college of compu...
  • 10 篇 jiangsu high tec...
  • 8 篇 key lab. of broa...
  • 7 篇 school of cyber ...
  • 7 篇 beijing key lab....
  • 7 篇 guangxi collabor...
  • 6 篇 jiangsu high tec...
  • 6 篇 key lab. of netw...
  • 5 篇 key lab. of comp...
  • 5 篇 shanghai key lab...
  • 4 篇 ministry of edu....
  • 4 篇 college of compu...
  • 4 篇 key lab. of comp...
  • 4 篇 school of comput...
  • 4 篇 key lab. of broa...
  • 4 篇 key lab. of broa...
  • 4 篇 jiangsu high tec...
  • 4 篇 key lab. of comp...
  • 3 篇 department of co...
  • 3 篇 key lab. of comp...

作者

  • 11 篇 wang ruchuan
  • 9 篇 li hui
  • 7 篇 chunhe xia
  • 7 篇 tianbo wang
  • 6 篇 chen chen
  • 6 篇 xu li
  • 5 篇 li wei
  • 4 篇 fan kai
  • 4 篇 ma wenping
  • 4 篇 ye xiaoguo
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 zhang xue-jun
  • 4 篇 yang geng
  • 4 篇 zhang min-ling
  • 3 篇 chen zhong
  • 3 篇 yang bo
  • 3 篇 zhou li-hua
  • 3 篇 weidong zhou
  • 3 篇 liu jun

语言

  • 151 篇 英文
  • 22 篇 中文
  • 2 篇 其他
检索条件"机构=GD Key Lab. of Computer Network"
175 条 记 录,以下是31-40 订阅
排序:
Chosen-ciphertext secure bidirectional proxy broadcast re-encryption schemes
收藏 引用
International Journal of Information and Communication Technology 2016年 第4期8卷 405-419页
作者: Sun, Jin Hu, Yupu Department of Application Mathematics Xi'an University of Technology Xi'an710048 China Key Lab. of Computer Network and Information Security Xidian University Xi'an710071 China
A proxy re-encryption (PRE) scheme supports the delegation of decryption rights via a proxy, who makes the ciphertexts decryptable by the delegatee. However, how to structure a chosen-ciphertext secure proxy re-encryp... 详细信息
来源: 评论
AUV dead-reckoning navigation based on neural network using a single accelerometer  11
AUV dead-reckoning navigation based on neural network using ...
收藏 引用
11th ACM International Conference on Underwater networks and Systems, WUWNet 2016
作者: Xie, Yan-Xin Liu, Jun Hu, Cheng-Quan Cui, Jun-Hong Xu, Hongli State Key Laboratory of Robotics CAS No. 114 Nanta Street Shenhe District Shenyang China College of Computer Science and Technology Jilin University Changchun China Underwater Sensor Network Lab. University of Connecticut StorrsCT06269 United States Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai200240 China
The accuracy of the Autonomous Underwater Vehicles (AUVs) navigation system determines whether they can safely operate and return. Traditional Dead-reckoning (DR) relies on the inertial sensors such as gyroscope and a... 详细信息
来源: 评论
The design and implementation of network attack and defense platform based on cloud desktop
收藏 引用
Journal of Physics: Conference Series 2017年 第1期887卷
作者: Zining Yan Yunhan Wang Shijiao Shao Boquan Li Embedded System Lab. College of Computer Science and Technology Harbin China Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Key Laboratory of Network Assessment of Technology Chinese Academy of Sciences Beijing China
This paper discusses the cloud desktop technology, virtualization technology and penetration testing technology used in the network attack and defense training platform, and introduces the design and implementation pr...
来源: 评论
A simulator for swarm AUVs acoustic communication networking  11
A simulator for swarm AUVs acoustic communication networking
收藏 引用
11th ACM International Conference on Underwater networks and Systems, WUWNet 2016
作者: Li, Guannan Liu, Jun Wang, Xue Xu, Hongli Cui, Jun-Hong Shenyang Institute of Automation CAS University of Chinese Academy of Sciences No. 114 Nanta Street Shenhe District Shenyang China College of Computer Science and Technology Jilin University State Key Laboratory of Robotics Key Laboratory of System Control and Information Processing Ministry of Education of China Changchun China Shenyang Institute of Automation CAS Northeast University No. 114 Nanta Street Shenhe District Shenyang China Shenyang Institute of Automation CAS No. 114 Nanta Street Shenhe District Shenyang China College of Computer Science and Technology Jilin University Changchun China Underwater Sensor Network Lab. University of Connecticut StorrsCT06269 United States
This paper presents a simulator for swarm operations designed to verify algorithms for a swarm of autonomous underwater robots (AUVs), specifically for constructing an underwater communication network with AUVs carryi... 详细信息
来源: 评论
Hyper-compact virtual estimators for big network data based on register sharing
Hyper-compact virtual estimators for big network data based ...
收藏 引用
ACM SIGMETRICS International Conference on Measurement and Modeling of computer Systems, SIGMETRICS 2015
作者: Xiao, Qingjun Chen, Shigang Chen, Min Ling, Yibei Department of Computer and Information Science and Engineering University of Florida GainesvilleFL United States Key Lab. of Computer Network and Information Integration Southeast University Ministry of Education China Telcordia Technologies and Applied Research Ericsson United States
Cardinality estimation over big network data consisting of numerous flows is a fundamental problem with many practical applications. Traditionally the research on this problem focused on using a small amount of memory... 详细信息
来源: 评论
Modeling parameter interactions in ranking SVM  15
Modeling parameter interactions in ranking SVM
收藏 引用
24th ACM International Conference on Information and Knowledge Management, CIKM 2015
作者: Zhang, Yaogong Xu, Jun Lan, Yanyan Guo, Jiafeng Xie, Maoqiang Huang, Yalou Cheng, Xueqi College of Computer and Control Engineering Nankai University China CAS Key Lab. of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China College of Software Nankai University China
Ranking SVM, which formalizes the problem of learning a ranking model as that of learning a binary SVM on preference pairs of documents, is a state-of-the-art ranking model in information retrieval. The dual form solu... 详细信息
来源: 评论
Fully secure predicate-based broadcast encryption
收藏 引用
Journal of Computational Information Systems 2014年 第2期10卷 611-618页
作者: Sun, Jin Hu, Yupu Wang, Shangping Department of Application Mathematics in Xi'an University of Technology Xi'an 710054 China Key Lab. of Computer Network and Information Security Xidian University Xi'an 710071 China
According to the broadcast encryption scheme with wide applications in the real world, a fully secure predicate-based broadcast encryption was proposed by combining with Waters dual system encryption, predicate encryp... 详细信息
来源: 评论
Specifying safety and liveness of semi-algebraic transition systems
收藏 引用
Journal of Computational Information Systems 2015年 第2期11卷 457-465页
作者: Fu, Jun Wu, Jinzhao Tan, Hongyan Zhou, Ning School of Computer and Information Technology Beijing Jiaotong University Beijing China Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis Guangxi University for Nationalities Nanning China High Performance Network Lab. Institute of Acoustics Chinese Academy of Sciences Beijing China School of Electronic and Information Engineering Lanzhou Jiaotong University Lanzhou China
We present an approach to specification of properties of semi-algebraic transition systems which are introduced as mathematical structures for modeling complex physical systems. We extend dynamic logic to the semi-alg... 详细信息
来源: 评论
Directed test suite augmentation via exploiting program dependency  6
Directed test suite augmentation via exploiting program depe...
收藏 引用
6th International Workshop on Constraints in Software Testing, Verification, and Analysis, CSTVA 2014
作者: Wang, Haijun Guan, Xiaohong Zheng, Qinghua Liu, Ting Shen, Chao Yang, Zijiang MOE Key Lab. for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China College of Computer and Technology Xi'an University of Technology Xi'an China Western Michigan University KalamazooMI United States
Regression testing is a practice to discover faults introduced in the program modification. However, the existing test suite is usually designed at an early stage of software development and is therefore insensitive t... 详细信息
来源: 评论
Reducing test cases with causality partitions  26
Reducing test cases with causality partitions
收藏 引用
26th International Conference on Software Engineering and Knowledge Engineering, SEKE 2014
作者: Wang, Haijun Guan, Xiaohong Zheng, Qinghua Liu, Ting Li, Xiangyang Yu, Lechen Yang, Zijiang MOE Key Lab. for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China College of Computer and Technology Xi'an University of Technology Xi'an China Western Michigan University KalamazooMI United States
Automatic test case generation using symbolic execution suffers from the problem of path explosion: the number of paths to be explored may grow exponentially with the scale of a program. We believe that different path... 详细信息
来源: 评论