咨询与建议

限定检索结果

文献类型

  • 122 篇 会议
  • 53 篇 期刊文献

馆藏范围

  • 175 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 147 篇 工学
    • 130 篇 计算机科学与技术...
    • 110 篇 软件工程
    • 54 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 10 篇 电气工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 动力工程及工程热...
    • 7 篇 网络空间安全
    • 6 篇 机械工程
    • 5 篇 交通运输工程
    • 4 篇 建筑学
    • 4 篇 环境科学与工程(可...
    • 4 篇 生物工程
    • 4 篇 安全科学与工程
    • 3 篇 光学工程
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 土木工程
    • 3 篇 航空宇航科学与技...
  • 69 篇 理学
    • 53 篇 数学
    • 12 篇 物理学
    • 10 篇 统计学(可授理学、...
    • 5 篇 生物学
  • 41 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 20 篇 图书情报与档案管...
    • 10 篇 工商管理
  • 9 篇 法学
    • 8 篇 社会学
  • 5 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 文学
  • 2 篇 农学
  • 2 篇 军事学

主题

  • 7 篇 wireless sensor ...
  • 7 篇 cryptography
  • 5 篇 privacy
  • 4 篇 public key crypt...
  • 4 篇 security
  • 3 篇 security of data
  • 3 篇 educational inst...
  • 3 篇 authentication
  • 3 篇 semantics
  • 3 篇 feature extracti...
  • 3 篇 network security
  • 3 篇 peer to peer net...
  • 3 篇 malware
  • 3 篇 accuracy
  • 3 篇 adaptation model...
  • 2 篇 support vector m...
  • 2 篇 outsourcing
  • 2 篇 filtering
  • 2 篇 network protocol...
  • 2 篇 boolean function...

机构

  • 15 篇 college of compu...
  • 10 篇 jiangsu high tec...
  • 8 篇 key lab. of broa...
  • 7 篇 school of cyber ...
  • 7 篇 beijing key lab....
  • 7 篇 guangxi collabor...
  • 6 篇 jiangsu high tec...
  • 6 篇 key lab. of netw...
  • 5 篇 key lab. of comp...
  • 5 篇 shanghai key lab...
  • 4 篇 ministry of edu....
  • 4 篇 college of compu...
  • 4 篇 key lab. of comp...
  • 4 篇 school of comput...
  • 4 篇 key lab. of broa...
  • 4 篇 key lab. of broa...
  • 4 篇 jiangsu high tec...
  • 4 篇 key lab. of comp...
  • 3 篇 department of co...
  • 3 篇 key lab. of comp...

作者

  • 11 篇 wang ruchuan
  • 9 篇 li hui
  • 7 篇 chunhe xia
  • 7 篇 tianbo wang
  • 6 篇 chen chen
  • 6 篇 xu li
  • 5 篇 li wei
  • 4 篇 fan kai
  • 4 篇 ma wenping
  • 4 篇 ye xiaoguo
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 zhang xue-jun
  • 4 篇 yang geng
  • 4 篇 zhang min-ling
  • 3 篇 chen zhong
  • 3 篇 yang bo
  • 3 篇 zhou li-hua
  • 3 篇 weidong zhou
  • 3 篇 liu jun

语言

  • 151 篇 英文
  • 22 篇 中文
  • 2 篇 其他
检索条件"机构=GD Key Lab. of Computer Network"
175 条 记 录,以下是81-90 订阅
排序:
An efficient two-stage level set segmentation framework for overlapping plant leaf image
An efficient two-stage level set segmentation framework for ...
收藏 引用
8th International Conference on Intelligent Computing Technology, ICIC 2012
作者: Wang, Xiao-Feng Min, Hai Key Lab. of Network and Intelligent Information Processing Department of Computer Science and Technology Hefei University Hefei Anhui 230022 China Intelligent Computing Lab. Hefei Institute of Intelligent Machines Chinese Academy of Sciences P.O.Box 1130 Hefei Anhui 230031 China Department of Automation University of Science and Technology of China Hefei Anhui 230027 China
In this paper, an efficient two-stage segmentation framework was proposed to address the plant leaf image with overlapping phenomenon, which is built based on the leaf approximate symmetry and level set evolution theo... 详细信息
来源: 评论
Gossip-based indexing ring topology for 2-dimension spatial data in overlay networks
Gossip-based indexing ring topology for 2-dimension spatial ...
收藏 引用
2012 International Workshop on Information and Electronics Engineering, IWIEE 2012
作者: Zou, Z.Q. Wang, Y. Hu, B. Wang, R.C. College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China
Overlay networks are used widely in the Internet, such as retrieval and share of files, multimedia games and so on. However, in distributed system, the retrieval and share of 2-dimension spatial data still have some d... 详细信息
来源: 评论
CCA-secure unidirectional proxy broadcast re-encryption in the standard model
收藏 引用
Journal of Computational Information Systems 2012年 第14期8卷 5909-5916页
作者: Sun, Jin Hu, Yupu Department of Application Mathematics in Xi'an University of Technology Xi'an 710048 China Key Lab. of Computer Network and Information Security Xidian University Xi'an 710071 China
Considering construct a chosen-ciphertext secure unidirectional PRE in the adaptive corruption model is still an important question and the broadcast encryption with wide applications in the real world, the first CCA-... 详细信息
来源: 评论
MOEA/D with iterative thresholding algorithm for sparse optimization problems
MOEA/D with iterative thresholding algorithm for sparse opti...
收藏 引用
12th International Conference on Parallel Problem Solving from Nature, PPSN 2012
作者: Li, Hui Su, Xiaolei Xu, Zongben Zhang, Qingfu Institute for Information and System Sciences Key Lab. for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an Shaanxi 710049 China School of Computer Science and Electronic Engineering University of Essex Wivenhoe Park Colchester CO4 3SQ United Kingdom
Currently, a majority of existing algorithms for sparse optimization problems are based on regularization framework. The main goal of these algorithms is to recover a sparse solution with k non-zero components(called ... 详细信息
来源: 评论
A node similarity based trust transmission method
收藏 引用
2nd World Congress on computer Science and Information Engineering, CSIE 2011
作者: Wang, Haiyan Wang, Ying Yue, Xiwen College of Computer Science Nanjing University of Posts and Telecommunications Nanjing 210003 Jiangsu China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210003 Jiangsu China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing 210003 Jiangsu China
A novel trust transmission method which is based on the similarities of nodes in trust models is proposed in this paper. Trust transmission is evaluated by calculating the similarity between recommenders when trustor ... 详细信息
来源: 评论
A trusted network remediation scheme based on the stability of access terminals
收藏 引用
2nd World Congress on computer Science and Information Engineering, CSIE 2011
作者: Wang, Haiyan Xu, Mingming College of Computer Nanjing University of Posts and Telecommunications 210003 Nanjing Jiangsu China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks 210003 Nanjing Jiangsu China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province 210003 Nanjing Jiangsu China
To improve the effectiveness of control and remediation of failure access terminals in trusted network, a novel remediation scheme is proposed in this paper. Based on the introduction of a definition of stability of a... 详细信息
来源: 评论
Wireless MIMO switching with MMSE relaying  2012
Wireless MIMO switching with MMSE relaying
收藏 引用
2012 IEEE International Symposium on Information Theory, ISIT 2012
作者: Wang, Fanggang Liew, Soung Chang Guo, Dongning Institute of Network Coding Chinese Univ. of Hong Kong Hong Kong Hong Kong State Key Lab. of Rail Traffic Control and Safety EIE Beijing Jiaotong Univ. Beijing China Department of Electrical Engineering and Computer Science Northwestern Univ. Evanston IL United States
A wireless relay which forms a one-to-one mapping from the inputs (uplinks) to the outputs (downlinks) is called a multiple-input-multiple-output (MIMO) switch. The MIMO switch carries out precode-and-forward, where a... 详细信息
来源: 评论
WSSecTool: A web service security analysis tool based on program slicing
WSSecTool: A web service security analysis tool based on pro...
收藏 引用
2012 IEEE 8th World Congress on Services, SERVICES 2012
作者: Fu, Wei Zhang, Yingzhou Zhu, Xianting Qian, Junyan College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China Dept. of Computer Science and Technology Guilin Univ. of Electronic Technology Guilin 541004 China
With the development of web service, more and more attention has been drawn to web service in recent years. However, the damage caused by service security problems is becoming more and more serious nowadays. This pape... 详细信息
来源: 评论
Flow inspection router assignment (FIRA) in access/aggregation network clouds
Flow inspection router assignment (FIRA) in access/aggregati...
收藏 引用
32nd IEEE International Conference on Distributed Computing Systems Workshops, ICDCSW 2012
作者: Wang, Jianping Qiao, Chunming Sudhaakar, Raghuram S. Addepalli, Sateesh Jin, Yaohui Argibay-Losada, Pablo Jesus Department of Computer Science City University of Hong Kong Hong Kong Hong Kong Department of Computer Science and Engineering State University of New York Buffalo NY United States Cisco Systems China State Key Lab. of Adv. Opt. Commun. Syst. and Network Shanghai Jiao Tong University Shanghai China Telematic Engineering Department University of Vigo Spain
Sufficient computing resources availab.e at future generation routers in the access/aggregation networks can be pooled to form a cloud at edge, which we call Access/Aggregation network Cloud (or ANC). An ANC can be us... 详细信息
来源: 评论
A new application with algebraic multigrid method
收藏 引用
Journal of Information and Computational Science 2012年 第6期9卷 1447-1454页
作者: Huang, Ying Xie, Mei Li, Weisheng Lai, Jun Wang, Kuangsheng School of Electronic Engineering University of Electronic Science and Technology of China Chengdu 610054 China Chongqing Key Lab. of Computer Network and Communication Technology Chongqing 400065 China Institute of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing 400065 China
Algebraic Multi-grid (AMG) method is analyzed and is combined with the graph cut method to extract the texture feature of the image. AMG method can extract more information about the singularities in the image. The da... 详细信息
来源: 评论