咨询与建议

限定检索结果

文献类型

  • 252 篇 期刊文献
  • 215 篇 会议
  • 2 册 图书

馆藏范围

  • 469 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 335 篇 工学
    • 246 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 86 篇 信息与通信工程
    • 62 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 27 篇 控制科学与工程
    • 27 篇 网络空间安全
    • 23 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 11 篇 光学工程
    • 11 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 6 篇 化学工程与技术
  • 138 篇 理学
    • 79 篇 数学
    • 32 篇 物理学
    • 29 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 6 篇 化学
  • 65 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 24 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 13 篇 药学(可授医学、理...
    • 8 篇 公共卫生与预防医...
  • 12 篇 法学
    • 6 篇 社会学
  • 7 篇 军事学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 文学
  • 3 篇 教育学

主题

  • 14 篇 computer network...
  • 12 篇 computer archite...
  • 12 篇 wireless sensor ...
  • 11 篇 computational mo...
  • 11 篇 protocols
  • 11 篇 ip networks
  • 11 篇 cryptography
  • 10 篇 servers
  • 10 篇 feature extracti...
  • 10 篇 security
  • 9 篇 application soft...
  • 9 篇 costs
  • 8 篇 machine learning
  • 8 篇 cloud computing
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 routing
  • 7 篇 deep learning
  • 7 篇 laboratories

机构

  • 15 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 school of cyber ...
  • 8 篇 school of cyber ...
  • 7 篇 peng cheng labor...
  • 7 篇 institute of inf...
  • 7 篇 state key labora...
  • 7 篇 key laboratory o...
  • 6 篇 shenzhen key lab...
  • 6 篇 internet and mob...
  • 6 篇 department of co...
  • 6 篇 university of ch...
  • 6 篇 robotics and int...
  • 6 篇 state key labora...
  • 6 篇 national enginee...
  • 6 篇 department of co...
  • 5 篇 information secu...
  • 5 篇 school of comput...

作者

  • 11 篇 eui-nam huh
  • 8 篇 zou juan
  • 8 篇 yang shuang-hua
  • 8 篇 cao xiaochun
  • 8 篇 jiannong cao
  • 7 篇 liu ming
  • 6 篇 mcdaniel patrick
  • 6 篇 ahmad jawad
  • 6 篇 xu qianqian
  • 6 篇 jin hai
  • 6 篇 chen guihai
  • 5 篇 song biao
  • 5 篇 wu yuan
  • 5 篇 yang shengxiang
  • 5 篇 hongxin hu
  • 5 篇 mohammad mehedi ...
  • 5 篇 huh eui-nam
  • 5 篇 yang zhiyong
  • 5 篇 huang qingming
  • 5 篇 guihai chen

语言

  • 438 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Internet Computing & Security Laboratory Department of Computer Engineering"
469 条 记 录,以下是351-360 订阅
排序:
Parallelization using task parallel library with task-based programming model
Parallelization using task parallel library with task-based ...
收藏 引用
IEEE International Conference on Software engineering and Service Sciences (ICSESS)
作者: Xinhong Hei Jinlong Zhang Bin Wang Haiyan Jin Nasser Giacaman School of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an Shaanxi Province China Department of Electrical and Computer Engineering The University of Auckland Auckland New Zealand
In order to reduce the complexity of traditional multithreaded parallel programming, this paper explores a new task-based parallel programming using the Microsoft .NET Task Parallel Library (TPL). Firstly, this paper ... 详细信息
来源: 评论
Utilizing the dropped packets for data delivery in VANETs
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2013年 第3期20卷 48-52页
作者: SONG Chao LIU Ming GONG Hai-gang CHEN Gui-hai CAO Jian-nong School of Computer Science and Engineering University of Electronic Science and Technology of China School of Computer Science and Engineering Shanghai Jiao Tong University Internet and Mobile Computing Laboratory Department of Computing Hong Kong Polytechnic University
Timely and cost-efficient multi-hop data delivery among vehicles is essential for vehicular ad-hoc networks (VANETs), and various routing protocols are envisioned for infrastructure-less vehicle-to-vehicle (V2V) c... 详细信息
来源: 评论
Corrigendum to “Fast and scalable lock methods for video coding on many-core architecture” [J. Vis. Commun. Image R. 25(7) (2014) 1758–1762]
收藏 引用
Journal of Visual Communication and Image Representation 2015年 27卷 57-57页
作者: Weizhi Xu Hui Yu Dianjie Lu Fenglong Song Da Wang Xiaochun Ye Songwei Pei Dongrui Fan Hongtao Xie Institute of Microelectronics Tsinghua University Beijing China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China Key Lab. of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Information Science and Engineering Shandong Normal University Jinan China Department of Computer Science and Technology Beijing University of Chemical Technology Beijing China Institute of Information Engineering Chinese Academy of Sciences National Engineering Laboratory for Information Security Technologies Beijing China
来源: 评论
Corrigendum to “Fast and scalable lock methods for video coding on many-core architecture” [J. Vis. Commun. 25 (7) (2014) 1758–1762]
收藏 引用
Journal of Visual Communication and Image Representation 2015年 26卷 350-350页
作者: Weizhi Xu Hui Yu Dianjie Lu Fenglong Song Da Wang Xiaochun Ye Songwei Pei Dongrui Fan Hongtao Xie Institute of Microelectronics Tsinghua University Beijing China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China Key Lab. of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Information Science and Engineering Shandong Normal University Jinan China Department of Computer Science and Technology Beijing University of Chemical Technology Beijing China Institute of Information Engineering Chinese Academy of Sciences National Engineering Laboratory for Information Security Technologies Beijing China
来源: 评论
Towards accountable authority attribute-based encryption
收藏 引用
High Technology Letters 2013年 第1期19卷 82-87页
作者: 王永涛 Chen Kefei Long Yu Department of Computer Science and Engineering Shanghai Jiao Tong University China Information Technology Security Evaluation Center Shanghai Key Laboratory of Scalable Computing and System Shanghai JiaoTong University
An accountable authority attribute-based encryption (A-ABE) scheme is presented in this paper. The notion of accountable authority identity-based encryption (A-IBE) was first introduced by Goyal at Crypto'07. It ... 详细信息
来源: 评论
Motion Analysis for Human Interaction Detection Using Optical Flow on Lattice Superpixels
收藏 引用
Wuhan University Journal of Natural Sciences 2013年 第2期18卷 109-116页
作者: ZHENG Peng CAO Yu WANG Song School of Computer Wuhan University The Key Laboratory of Aerospace Information Security and Trust Computing Ministry of Education Department of Computer Science and Engineering University of South Carolina
We develop a new video-based motion analysis algorithn to determine whether two persons have any interaction in their meet- ing. The interaction between two persons can be very general, such as shaking hands, exchangi... 详细信息
来源: 评论
Below the salt the dangers of unfulfilled physical media assumptions
Below the salt the dangers of unfulfilled physical media ass...
收藏 引用
17th International security Protocols Workshop
作者: Blaze, Matt McDaniel, Patrick Computer Science Department University of Pennsylvania United States Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering Pennsylvania State University United States
Introduction: The physical access media communication traverses is increasing in diversity. Users now access data and services from wired computers, wireless laptops, PDAs, cell phones, and any number of embedded devi...
来源: 评论
Consumerisation of IT: Mitigating Risky User Actions and Improving Productivity with Nudging
收藏 引用
Procedia Technology 2014年 16卷 508-517页
作者: Iryna Yevseyeva Charles Morisset James Turland Lynne Coventry Thomas Groß Christopher Laing Aad van Moorsel Centre for Cybercrime and Computer Security School of Computing Science Newcastle University Newcastle-upon-Tyne NE1 7RU United Kingdom Psychology and Communication Technology Laboratory School of Health & Life Sciences Northumbria University Newcastle-upon-Tyne NE1 8ST United Kingdom Faculty of Engineering and Environment Department of Computer Science Northumbria University Newcastle-upon-Tyne NE1 8ST United Kingdom
In this work we address the main issues of IT consumerisation that are related to security risks, and propose a ‘soft’ mitigation strategy for user actions based on nudging, widely applied to health and social behav... 详细信息
来源: 评论
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks  1
收藏 引用
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013
作者: Liu, Shengli Weng, Jian Zhao, Yunlei Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Software School Fudan University Shanghai 201203 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Leakage-resilient public key encryption (PKE) schemes are designed to resist "memory attacks", i.e., the adversary recovers the cryptographic key in the memory adaptively, but subject to constraint that the ... 详细信息
来源: 评论
Abstracts from the 3rd International Genomic Medicine Conference (3rd IGMC 2015) : Jeddah, Kingdom of Saudi Arabia. 30 November - 3 December 2015
收藏 引用
BMC genomics 2016年 第6期17 Suppl 6卷 487页
作者: Jerry W. Shay Noriko Homma Ruyun Zhou Muhammad Imran Naseer Adeel G. Chaudhary Mohammed Al-Qahtani Nobutaka Hirokawa Maryam Goudarzi Albert J. Fornace Saleh Baeesa Deema Hussain Mohammed Bangash Fahad Alghamdi Hans-Juergen Schulten Angel Carracedo Ishaq Khan Hanadi Qashqari Nawal Madkhali Mohamad Saka Kulvinder S. Saini Awatif Jamal Jaudah Al-Maghrabi Adel Abuzenadah Adeel Chaudhary Mohammed Al Qahtani Ghazi Damanhouri Heba Alkhatabi Anne Goodeve Laura Crookes Nikolas Niksic Nicholas Beauchamp Adel M. Abuzenadah Jim Vaught Bruce Budowle Mourad Assidi Abdelbaset Buhmeida Leena Merdad Sudhir Kumar Sayaka Miura Karen Gomez Mahmood Rasool Ahmed Rebai Sajjad Karim Hend F. Nour Eldin Heba Abusamra Elham M. Alhathli Nada Salem Mohammed H. Al-Qahtani Hossam Faheem Ashok Agarwa Eberhard Nieschlag Joachim Wistuba Oliver S. Damm Mohd A. Beg Taha A. Abdel-Meguid Hisham A. Mosli Osama S. Bajouh Serdar Coskun Muhammad Abu-Elmagd Ashraf Dallol Sahar Hakamy Wejdan Al-Qahtani Asia Al-Harbi Shireen Hussain Burak Ozkosem Rick DuBois Safia S. Messaoudi Maryam T. Dandana Touhami Mahjoub Wassim Y. Almawi S. Abdalla M. Nabil Al-Aama Asmaa Elzawahry Tsuyoshi Takahashi Sachiyo Mimaki Eisaku Furukawa Rie Nakatsuka Isao Kurosaka Takahiko Nishigaki Hiromi Nakamura Satoshi Serada Tetsuji Naka Seiichi Hirota Tatsuhiro Shibata Katsuya Tsuchihara Toshirou Nishida Mamoru Kato Sajid Mehmood Naeem Mahmood Ashraf Awais Asif Muhammad Bilal Malik Siddique Mehmood Aadil Hussain Qazi Mohammad Sajid Jamal Mughees Uddin Siddiqui Mohammad A. Alzohairy Mohammad A. Al Karaawi Taoufik Nedjadi Heba Al-Khattabi Adel Al-Ammari Ahmed Al-Sayyad Hédia Zitouni Nozha Raguema Marwa Ben Ali Wided Malah Raja Lfalah Wassim Almawi Mohammed Elanbari Andrey Ptitsyn Sana Mahjoub Rabeb El Ghali Bechir Achour Nidhal Ben Amor Brahim N’siri Hamid Morjani Esam Azhar Vera Chayeb Maryam Dendena Hedia Zitouni Khedija Zouari-Limayem Bassem Refaat Ahmed M. Ashshi Sarah A. Batwa Hazem Ramadan Amal Awad Ahmed Ateya Adel Galal Ahmed El-Shemi Ahmad Ashshi Mohammed Basalamah Youjin Na Cha University of Texas Southwestern Medical Center Dallas USA Department of Cell Biology and Anatomy Graduate School of Medicine the University of Tokyo Tokyo Japan Center of Excellence in Genomic Medicine Research King Abdulaziz University Jeddah Saudi Arabia Department of Biochemistry and Molecular & Cellular Biology Lombardi Comprehensive Cancer Center Georgetown University Washington USA Department of Oncology Lombardi Comprehensive Cancer Center Georgetown University Washington USA Department of Radiation Medicine Lombardi Comprehensive Cancer Center Georgetown University Washington USA Center of Excellence in Genomic Medicine Research (CEGMR) King Abdulaziz University Jeddah Kingdom of Saudi Arabia King Fahd Medical Research Centre King Abdulaziz University Jeddah Saudi Arabia Centre of Excellence in Genomic Medicine Research King Abdulaziz University Jeddah Saudi Arabia Sheffield Diagnostic Genetic Service Sheffield Children’s NHS Foundation Trust Western Bank Sheffield UK Center of Innovations in Personalized Medicine King Abdulaziz University Jeddah Saudi Arabia President ISBER Editor-in-Chief Biopreservation & Biobanking ᅟ USA Institute of Applied Genetics Department of Molecular and Medical Genetics University of North Texas Health Science Center Fort Worth USA Department of Dental Public Health Faculty of Dentistry King Abdulaziz University Jeddah Saudi Arabia Institute for Genomics and Evolutionary Medicine Temple University Philadelphia USA Center of Excellence in Genomic Medicine King Abdulaziz University Jeddah Kingdom of Saudi Arabia Laboratory of Molecular and Cellular Screening Processes (Bioinformatics Group) Centre of Biotechnology of Sfax Sfax Tunisia Fujitsu Technology Solutions International ᅟ ᅟ Case Western Reserve University School of Medicine and Lerner College of Medicine Cleveland Clinic Foundation Cleveland USA American Center for Reproductive Medicine Andrology Center Cleveland USA Center for Reproductive Medicine and
O1 Regulation of genes by telomere length over long distances Jerry W. Shay O2 The microtubule destabilizer KIF2A regulates the postnatal establishment of neuronal circuits in addition to prenatal cell survival, cell ...
来源: 评论