咨询与建议

限定检索结果

文献类型

  • 12 篇 会议

馆藏范围

  • 12 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10 篇 工学
    • 6 篇 计算机科学与技术...
    • 6 篇 软件工程
    • 3 篇 信息与通信工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 控制科学与工程
  • 4 篇 理学
    • 4 篇 数学
    • 1 篇 物理学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 3 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 1 篇 公共管理

主题

  • 1 篇 voluntary servic...
  • 1 篇 ban logic
  • 1 篇 color image enha...
  • 1 篇 payment protocol
  • 1 篇 tree-maps
  • 1 篇 collaboration in...
  • 1 篇 intensity correc...
  • 1 篇 formal analysis
  • 1 篇 electronic payme...
  • 1 篇 digital watermar...
  • 1 篇 hsv color space
  • 1 篇 management infor...
  • 1 篇 并行计算
  • 1 篇 量子化学程序
  • 1 篇 visual informati...
  • 1 篇 image coding
  • 1 篇 saturation corre...
  • 1 篇 off-line ttp
  • 1 篇 fairness
  • 1 篇 流程设计

机构

  • 2 篇 xi'an branch of ...
  • 2 篇 ministry of edu....
  • 1 篇 systems engineer...
  • 1 篇 super computing ...
  • 1 篇 department of co...
  • 1 篇 systems engineer...
  • 1 篇 department of co...
  • 1 篇 guangdong teleco...
  • 1 篇 research institu...
  • 1 篇 school of comput...
  • 1 篇 中国科学院大连化...
  • 1 篇 shaanxi province...
  • 1 篇 gd key lab. of c...
  • 1 篇 gd key lab. of c...
  • 1 篇 rica south china...
  • 1 篇 department of co...
  • 1 篇 national lab. of...
  • 1 篇 school of comput...
  • 1 篇 school of comput...
  • 1 篇 gd key lab.of co...

作者

  • 2 篇 kai fan
  • 2 篇 nazaraf shah
  • 2 篇 hui li
  • 2 篇 feng tian
  • 2 篇 qinghua zheng
  • 2 篇 yue wang
  • 1 篇 jin zhong
  • 1 篇 zheren li
  • 1 篇 chi xuebin
  • 1 篇 ma li-hong
  • 1 篇 hanqing lu
  • 1 篇 li guohui
  • 1 篇 迟学斌
  • 1 篇 zhang baohua
  • 1 篇 haifei fu
  • 1 篇 min liu
  • 1 篇 guoxi wang
  • 1 篇 kang cai
  • 1 篇 mengdong chen
  • 1 篇 li lanjun

语言

  • 9 篇 英文
  • 3 篇 中文
检索条件"机构=GD Key Lab.of Computer Network"
12 条 记 录,以下是1-10 订阅
排序:
偏标记学习的研究
偏标记学习的研究
收藏 引用
第六届演化计算与学习研讨会(ECOLE)
作者: 张敏灵 School of Computer Science and Engineering MOE Key Lab.of Computer Network & Information Integration Southeast UniversityChina
Traditional Supervised Learning Cnput Space represented by a single instance(feature vector characterizing its properties Dutput Space associated with a single label characterizing its *** Assumption:Strong Supervisio... 详细信息
来源: 评论
Next Generation of Web-based Information Management System for National Volunteer Service
Next Generation of Web-based Information Management System f...
收藏 引用
2015 Joint International Mechanical,Electronic and Information Technology Conference(JIMET 2015)
作者: Feng Tian Yundong Yao Tian Lan Qinghua Zheng Jingjing Kou Haifei Fu Nazaraf Shah Systems Engineering Institute Xi'an Jiaotong University Shaanxi Province Key Lab.of Satellite and Terrestrial Network Tech.R&D Department of Computer Science and Technology Xi'an Jiaotong University
This paper presents a survey about the existing web-based information management system for volunteer services. Based on the survey results the paper highlights the new features and functions of the next generation of... 详细信息
来源: 评论
Design and Prototype Implementation of Social Value Evaluation System for Voluntary Service
Design and Prototype Implementation of Social Value Evaluati...
收藏 引用
2015 IEEE Advanced Information Technology,Electronic and Automation Control Conference(IAEAC 2015)
作者: Min Liu Fan Wu Feng Tian Haiping Zhu Nazaraf Shah Qinghua Zheng Yan Chen Department of Computer Science and Technology Xi'an Jiaotong University Shaanxi Province Key Lab.of Satellite and Terrestrial Network Tech.R&D Systems Engineering Institute Xi'an Jiaotong University Shaanxi Province Key Lab.of Satellite and Terrestrial Network Tech.R&D Department of Computer Science and Technology Coventry University
Evaluating the social value of voluntary service(especially the quality of collaborative service) not only measures the degree of society civilization,but also provides the guidance or indicator of overall arrangement... 详细信息
来源: 评论
The Realization of Hierarchical Visualization Methods for Database Performance
The Realization of Hierarchical Visualization Methods for Da...
收藏 引用
2012 International Conference on Applied Informatics and Communication(ICAIC 2012)
作者: Yang Tang Mengdong Chen Zheren Li School of Computer Science and Engineering Key Lab.Of Beijing Network Technology Beihang University
Database,as the role of providing data services for many applications,has become increasingly ***,in order to ensure the normal operation of the database and facilitate the query of the database administrator,the perf... 详细信息
来源: 评论
An efficient method of modeling performance data for wireless mesh network
An efficient method of modeling performance data for wireles...
收藏 引用
International Conference on Ubiquitous Information Technologies and Applications
作者: Li, Wei Fan, Ruiting Li, Lanjun School of Computer Science and Technology Key Lab.of Beijing Network Technology Beihang University Beijing China
With the development of wireless mesh network (WMN) and its expansion of the scale, it is important to provide an efficient mechanism to convenient the network administrators. network fault diagnosis is the key part o... 详细信息
来源: 评论
NWCHEM软件在生物体系中的应用
NWCHEM软件在生物体系中的应用
收藏 引用
首届中国科学院超级计算应用大会(SCA2011)
作者: Zhang Baohua 张宝花 Li Guohui 李国辉 Wei Fan 魏帆 Liu Qian 刘倩 Jin Zhong 金钟 Chi Xuebin 迟学斌 Super Computing Center Computer Network Information Center Chinese Academy of Science Beijing 100 中国科学院计算机网络信息中心超级计算中心 北京 100190 State-Key Lab.of Molecular Reaction Dynamics Dalian Institute of Chemical Physics Chinese Academy 中国科学院大连化学物理研究所分子反应动力学国家重点实验室 大连 116023
生物体系结构和功能比较复杂,对其进行简单的振动柔性分析,研究构象变化以及原子分子之间相互作用势的精确度问题等都非常费时费力。我们可以将研究体系分割成合适的小片段后,使用量子化学程序进行精确计算,再采用MFCC结合REMD技术... 详细信息
来源: 评论
A New Abuse-Free Fair Electronic Payment Protocol
A New Abuse-Free Fair Electronic Payment Protocol
收藏 引用
The Fifth International Conference on Information Assurance and Security(第五届信息保障与安全国际会议)
作者: Kai Fan Hui Li Yue Wang Ministry of Edu.Key Lab.of Computer Network and Information Security Xidian University Xi'an Shaanxi Xi'an Branch of Shaanxi Telecom Ltd.Xi'an ShaanxiChina
To solve the problem of the abuse in electronic payment protocols, a new abuse-free fair electronic payment protocol is proposed in this paper. The proposed protocol solves the problems in Parks'protocol and furth... 详细信息
来源: 评论
Security Analysis of the Kerberos protocol using BAN logic
Security Analysis of the Kerberos protocol using BAN logic
收藏 引用
The Fifth International Conference on Information Assurance and Security(第五届信息保障与安全国际会议)
作者: Hui Li Kai Fan Yue Wang Ministry of Edu.Key Lab.of Computer Network and Information Security Xidian University Xi'an Shaanxi Xi'an Branch of Shaanxi Telecom Ltd.Xi'an ShaanxiChina
Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the us... 详细信息
来源: 评论
NORMALIZED SI CORRECTION FOR HUE-PRESERVING COLOR IMAGE ENHANCEMENT
NORMALIZED SI CORRECTION FOR HUE-PRESERVING COLOR IMAGE ENHA...
收藏 引用
2007 International Conference on Machine Learning and Cybernetics(IEEE第六届机器学习与控制论国际会议)
作者: DONG YU LI-HONG MA HAN-QING LUU GD Key Lab.of Computer Network Dept.of Electronic Engineering South China University of Technology GD Key Lab.of Computer Network Dept.of Electronic Engineering South China University of Technology National Lab.of Pattern Recognition Inst.of Automation Chinese Academy Of Sciences Beijing China
We examine the issue of color distortion after enhancement in this study and proposed an algorithm named normalized SI correction to correct intensity and saturation components based on their *** previous research, th... 详细信息
来源: 评论
Modified quantization index modulation watermarking adaptive to contrast masking thresholds
Modified quantization index modulation watermarking adaptive...
收藏 引用
1st International Conference on Communications and networking in China, ChinaCom '06
作者: Guoxi, Wang Lihong, Ma. Kang, Cai Hanqing, Lu GD Key Lab. of Computer Network Dept.of Electronic Engineering South China Univ. of Tech. Guangzhou 510641 China National Lab. of Pattern Recognition Inst. Automation China Academy of Science Beijing 100080 China Guangdong Telecom.
In this paper, we suggest an adaptive watermarking method to improve both transparence and robustness of quantization index modulation (QIM) scheme. Instead of a fixed quantization step size, we apply a step size adap... 详细信息
来源: 评论