咨询与建议

限定检索结果

文献类型

  • 18 篇 会议
  • 12 篇 期刊文献

馆藏范围

  • 30 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 23 篇 工学
    • 18 篇 计算机科学与技术...
    • 14 篇 软件工程
    • 6 篇 电气工程
    • 4 篇 电子科学与技术(可...
    • 3 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 2 篇 建筑学
    • 2 篇 生物工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 航空宇航科学与技...
    • 1 篇 城乡规划学
    • 1 篇 网络空间安全
  • 8 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
    • 2 篇 工商管理
    • 1 篇 公共管理
  • 7 篇 理学
    • 4 篇 数学
    • 3 篇 生物学
    • 1 篇 物理学
    • 1 篇 系统科学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学

主题

  • 3 篇 authentication
  • 3 篇 protocols
  • 3 篇 open source soft...
  • 2 篇 deep learning
  • 2 篇 grid computing
  • 2 篇 costs
  • 2 篇 distributed comp...
  • 2 篇 federated learni...
  • 2 篇 blockchains
  • 2 篇 privacy
  • 1 篇 contribution eva...
  • 1 篇 computer science
  • 1 篇 surveys
  • 1 篇 file systems
  • 1 篇 parallel process...
  • 1 篇 learning systems
  • 1 篇 access control
  • 1 篇 antenna arrays
  • 1 篇 超级染色体
  • 1 篇 random forest

机构

  • 3 篇 institute for ne...
  • 3 篇 school of comput...
  • 3 篇 school of cyber ...
  • 2 篇 distributed comp...
  • 2 篇 jin yinhu labora...
  • 2 篇 national enginee...
  • 2 篇 key laboratory o...
  • 1 篇 university of sc...
  • 1 篇 key laboratory o...
  • 1 篇 jinan key labora...
  • 1 篇 key laboratory o...
  • 1 篇 school of inform...
  • 1 篇 school of big da...
  • 1 篇 computer systems...
  • 1 篇 qilu university ...
  • 1 篇 systems research...
  • 1 篇 china unicom net...
  • 1 篇 tsinghua univers...
  • 1 篇 shandong provinc...
  • 1 篇 school of comput...

作者

  • 2 篇 yang bo
  • 2 篇 zhang chao
  • 2 篇 li zhen
  • 2 篇 xu shouhuai
  • 2 篇 zou deqing
  • 2 篇 li yating
  • 2 篇 huang lican
  • 2 篇 zhang ruqian
  • 2 篇 wang lin
  • 2 篇 jin hai
  • 2 篇 wang ning
  • 1 篇 qin zhijin
  • 1 篇 孙毅
  • 1 篇 niyato dusit
  • 1 篇 ryu-seok bae
  • 1 篇 qin xiaoqi
  • 1 篇 wang lei
  • 1 篇 huang hai
  • 1 篇 bai wang
  • 1 篇 tao yu

语言

  • 25 篇 英文
  • 3 篇 中文
  • 2 篇 其他
检索条件"机构=Institute of Network and Distributed Computing"
30 条 记 录,以下是1-10 订阅
排序:
k-TEVS: A k-Times E-Voting Scheme on Blockchain With Supervision
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年 第3期22卷 2326-2337页
作者: Liu, Yang He, Debiao Luo, Min Wang, Lianhai Peng, Cong Wuhan University School of Cyber Science and Engineering Wuhan430072 China Shenzhen Institute of Information Technology Institute of Information Technology Shenzhen518172 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Matrix Elements Technologies Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Shanghai200232 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
Thee-vote is regarded as a waytoexpress the opinion that the voters ask for. Actually, the e-vote could be applied wildly likequestionnaire,***,thecoexistences of efficiency and security as well as transparency and pr... 详细信息
来源: 评论
ATHENA: An In-vehicle CAN Intrusion Detection Framework Based on Physical Characteristics of Vehicle Systems
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Kai Sun, Zhen Wang, Bailing Fan, Qilin Li, Ming Zhang, Hongke School of Computer Science and Technology Harbin Institute of Technology Weihai China Shandong Key Laboratory of Industrial Network Security China School of Big Data and Software Engineering Chongqing University Chongqing China Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing University Chongqing China Jinan Key Laboratory of Distributed Databases Shandong Inspur Database Technology Co. Ltd Jinan China School of Electronic and Information Engineering Beijing Jiaotong University Beijing China
With the growing interconnection between In-Vehicle networks (IVNs) and external environments, intelligent vehicles are increasingly vulnerable to sophisticated external network attacks. This paper proposes ATHENA, th... 详细信息
来源: 评论
Dash: A resource browser and help system  91
Dash: A resource browser and help system
收藏 引用
19th Annual ACM SIGUCCS Conference on User Services, SIGUCCS 1991
作者: Van Haren, Christopher J. Distributed Computing and Network Services - Applications Group Massachusetts Institute of Technology 1 Amherst Street CambridgeMA02139 United States
Stand-alone Unix workstations are hard to navigate. Ten's, if not hundred's of megabyte of programs are sitting right on your desk. As you add network connectivity and the availability of more services, more a... 详细信息
来源: 评论
A New Pipeline for Knowledge Graph Reasoning Enhanced by Large Language Models Without Fine-Tuning
A New Pipeline for Knowledge Graph Reasoning Enhanced by Lar...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Chen, Zhongwu Bai, Long Li, Zixuan Huang, Zhen Jin, Xiaolong Dou, Yong National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
Conventional Knowledge Graph Reasoning (KGR) models learn the embeddings of KG components over the structure of KGs, but their performances are limited when the KGs are severely incomplete. Recent LLM-enhanced KGR mod... 详细信息
来源: 评论
Predicting cement compressive strength using double-layer multi-expression programming
Predicting cement compressive strength using double-layer mu...
收藏 引用
4th International Conference on Computational and Information Sciences, ICCIS 2012
作者: Zhang, Qingke Yang, Bo Wang, Lin Zhu, Fuxiang Shandong Province Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan China Computer Networks and Distributed Systems Laboratory Beijing Institute Technology Beijing China
This paper presents a novel algorithm named Double-layer Multi-expression Programming (DMEP). Then DMEP model is applied to the prediction of 28-day Portland cement compressive strength. We compare DMEP model with oth... 详细信息
来源: 评论
Threshold signature scheme based on non-interactive Diffie-Hellman signature
Threshold signature scheme based on non-interactive Diffie-H...
收藏 引用
1st International Conference on networking and distributed computing, ICNDC 2010
作者: Wang, Xiuqun Huang, Lican Key Laboratory for Information System Security Ministry of Education Tsinghua University and Beijing Certification Authority Beijing China Institute of Network and Distributed Computing Zhejiang Sci-Tech University Hangzhou China
We present a threshold signature based on non-interactive Diffie-Hellman signature. It works in asynchronous communication system and can tolerate Byzantine faults with optimal resiliencen ≥ 3t + 1, where n is the nu... 详细信息
来源: 评论
Modeling and design of notarial system supporting secure transactions in electronic commerce based on the Internet
Modeling and design of notarial system supporting secure tra...
收藏 引用
International Conference on Information networking
作者: Sung-Woo Tak Ryu-Seok Bae Jong-Moon Son Distributed Computing Laboratory Network Computing Department Systems Engineering Research Institute Daejeon South Korea
In this paper, we analyze notarial requirements in the electronic commerce based on the Internet and design the notarial system to support secure transactions, which provides the notarial service for assurance of tran... 详细信息
来源: 评论
Secure transmission with artificial noise in heterogeneous massive MIMO network  1st
Secure transmission with artificial noise in heterogeneous m...
收藏 引用
1st International Congress on Signal and Information Processing, networking and Computers, ICSINC 2015
作者: Li, Chang Sun, Songlin Liu, Wei Huang, Hai School of Information and Communication Engineering Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China Department of Network and Platform M2M & Internet of Things Institute China Mobile Research Institute Beijing China
Heterogeneous network (HetNet) is a promising technology to improve the capacity of future generations of cellular network, in which a mobile station can be served by multiple Base Stations (BSs) with different scales... 详细信息
来源: 评论
Achieving both high precision and high recall in near-duplicate detection
Achieving both high precision and high recall in near-duplic...
收藏 引用
17th ACM Conference on Information and Knowledge Management, CIKM'08
作者: Huang, Lian'en Wang, Lei Li, Xiaoming Institute of Network Computing and Distributed Systems Peking University Beijing 100871 China Shenzhen Graduate School of Peking University Shenzhen Guangdong 518055 China State Key Laboratory of Advanced Optical Communication Systems and Networks Peking University Beijing 100871 China
To find near-duplicate documents, fingerprint-based para-digms such as Broder's shingling and Charikar's simhash algorithms have been recognized as effective approaches and are considered the state-of-the-art.... 详细信息
来源: 评论
A Lightweight execution framework for massive independent tasks
A Lightweight execution framework for massive independent ta...
收藏 引用
2008 Workshop on Many-Task computing on Grids and Supercomputers, MTAGS 2008
作者: Hui, Li Huashan, Yu Xiaoming, Li Shenzhen Graduate School of Peking University Shenzhen Guangdong 518055 P.R. China Institute of Network Computing and Distributed System Peking University Beijing 100871 P.R. China State Key Laboratory of Advanced Optical Communication and Network Peking University Beijing 100871 P.R. China
This paper presents a lightweight framework for executing many independent tasks efficiently on grids of heterogeneous computational nodes. It dynamically groups tasks of different granularities and dispatches the gro... 详细信息
来源: 评论