咨询与建议

限定检索结果

文献类型

  • 261 篇 期刊文献
  • 220 篇 会议
  • 2 册 图书

馆藏范围

  • 483 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 347 篇 工学
    • 256 篇 计算机科学与技术...
    • 192 篇 软件工程
    • 89 篇 信息与通信工程
    • 64 篇 电气工程
    • 41 篇 电子科学与技术(可...
    • 33 篇 控制科学与工程
    • 28 篇 生物工程
    • 28 篇 网络空间安全
    • 23 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 11 篇 光学工程
    • 11 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 7 篇 化学工程与技术
  • 142 篇 理学
    • 80 篇 数学
    • 33 篇 物理学
    • 30 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 7 篇 化学
  • 65 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 24 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 13 篇 药学(可授医学、理...
    • 8 篇 公共卫生与预防医...
  • 12 篇 法学
    • 6 篇 社会学
  • 7 篇 军事学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 文学
  • 3 篇 教育学

主题

  • 14 篇 computer network...
  • 12 篇 computer archite...
  • 12 篇 wireless sensor ...
  • 11 篇 computational mo...
  • 11 篇 protocols
  • 11 篇 ip networks
  • 11 篇 cryptography
  • 10 篇 servers
  • 10 篇 feature extracti...
  • 10 篇 security
  • 9 篇 application soft...
  • 9 篇 costs
  • 8 篇 machine learning
  • 8 篇 federated learni...
  • 8 篇 cloud computing
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 routing
  • 7 篇 deep learning

机构

  • 15 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 school of cyber ...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...
  • 8 篇 school of cyber ...
  • 7 篇 peng cheng labor...
  • 7 篇 institute of inf...
  • 7 篇 state key labora...
  • 6 篇 shenzhen key lab...
  • 6 篇 internet and mob...
  • 6 篇 department of co...
  • 6 篇 university of ch...
  • 6 篇 robotics and int...
  • 6 篇 national enginee...
  • 6 篇 department of co...
  • 5 篇 information secu...
  • 5 篇 department of co...

作者

  • 11 篇 eui-nam huh
  • 9 篇 cao xiaochun
  • 8 篇 zou juan
  • 8 篇 yang shuang-hua
  • 8 篇 jiannong cao
  • 7 篇 liu ming
  • 7 篇 luo xiangyang
  • 7 篇 lu wei
  • 6 篇 mcdaniel patrick
  • 6 篇 zhou jiantao
  • 6 篇 cao jiannong
  • 6 篇 ahmad jawad
  • 6 篇 xu qianqian
  • 6 篇 jin hai
  • 6 篇 chen guihai
  • 5 篇 song biao
  • 5 篇 wu yuan
  • 5 篇 yang shengxiang
  • 5 篇 hongxin hu
  • 5 篇 mohammad mehedi ...

语言

  • 437 篇 英文
  • 42 篇 其他
  • 4 篇 中文
检索条件"机构=Internet Computing & Security Laboratory Department of Computer Engineering"
483 条 记 录,以下是361-370 订阅
排序:
Using Kuliback-Leibler divergence to model opponents in poker  28
Using Kuliback-Leibler divergence to model opponents in poke...
收藏 引用
28th AAAI Conference on Artificial Intelligence, AAAI 2014
作者: Zhang, Jiajia Wang, Xuan Yao, Lin Li, Jingpeng Shen, Xuedong Intelligence Computing Research Center Harbin Institute of Technology Shenzhen Applied Technology Engineering Laboratory for Internet Multimedia Application China Intelligence Computing Research Center Harbin Institute of Technology Public Service Platform of Mobile Internet Application Security Industry China School of Electronics Engineering and Computer Science Peking University China C302 HIT Campus Shenzhen University Town NanShan District XiLi Shenzhen518055 China IER Building Soutn Area Shenzhen High-Tech Industrial Park Shenzhen518055 China
Opponent modeling is an essential approach for building competitive computer agents in imperfect information games. This paper presents a novel approach to develop opp onent modeling techniques. The approach applies n... 详细信息
来源: 评论
Practical distributed signatures in the standard model
收藏 引用
2014 Conference on Cryptographer's Track at the RSA, CT-RSA 2014
作者: Wang, Yujue Wong, Duncan S. Wu, Qianhong Chow, Sherman S. M. Qin, Bo Liu, Jianwei Key Laboratory of Aerospace Information Security and Trusted Computing School of Computer Wuhan University China Department of Computer Science City University of Hong Kong Hong Kong Hong Kong School of Electronics and Information Engineering Beihang University China Department of Information Engineering Chinese University of Hong Kong Hong Kong Hong Kong School of Information Renmin University of China Beijing China
A distributed signature scheme allows participants in a qualified set to jointly generate a signature which cannot be forged even when all the unqualified participants collude together. In this paper, we propose an ef... 详细信息
来源: 评论
Parallelization Using Task Parallel Library with Task-Based Programming Model
Parallelization Using Task Parallel Library with Task-Based ...
收藏 引用
2014 IEEE 5th International Conference on Software engineering and Service Science
作者: Xinhong Hei Jinlong Zhang Bin Wang Haiyan Jin Nasser Giacaman Department of Electrical and Computer Engineering The University of Auckland Auckland New Zealand School of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In order to reduce the complexity of traditional multithreaded parallel programming,this paper explores a new task-based parallel programming using the *** Task Parallel Library(TPL).Firstly,this paper proposes a cu... 详细信息
来源: 评论
Parallelization using task parallel library with task-based programming model
Parallelization using task parallel library with task-based ...
收藏 引用
IEEE International Conference on Software engineering and Service Sciences (ICSESS)
作者: Xinhong Hei Jinlong Zhang Bin Wang Haiyan Jin Nasser Giacaman School of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an Shaanxi Province China Department of Electrical and Computer Engineering The University of Auckland Auckland New Zealand
In order to reduce the complexity of traditional multithreaded parallel programming, this paper explores a new task-based parallel programming using the Microsoft .NET Task Parallel Library (TPL). Firstly, this paper ... 详细信息
来源: 评论
Utilizing the dropped packets for data delivery in VANETs
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2013年 第3期20卷 48-52页
作者: SONG Chao LIU Ming GONG Hai-gang CHEN Gui-hai CAO Jian-nong School of Computer Science and Engineering University of Electronic Science and Technology of China School of Computer Science and Engineering Shanghai Jiao Tong University Internet and Mobile Computing Laboratory Department of Computing Hong Kong Polytechnic University
Timely and cost-efficient multi-hop data delivery among vehicles is essential for vehicular ad-hoc networks (VANETs), and various routing protocols are envisioned for infrastructure-less vehicle-to-vehicle (V2V) c... 详细信息
来源: 评论
Corrigendum to “Fast and scalable lock methods for video coding on many-core architecture” [J. Vis. Commun. Image R. 25(7) (2014) 1758–1762]
收藏 引用
Journal of Visual Communication and Image Representation 2015年 27卷 57-57页
作者: Weizhi Xu Hui Yu Dianjie Lu Fenglong Song Da Wang Xiaochun Ye Songwei Pei Dongrui Fan Hongtao Xie Institute of Microelectronics Tsinghua University Beijing China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China Key Lab. of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Information Science and Engineering Shandong Normal University Jinan China Department of Computer Science and Technology Beijing University of Chemical Technology Beijing China Institute of Information Engineering Chinese Academy of Sciences National Engineering Laboratory for Information Security Technologies Beijing China
来源: 评论
Corrigendum to “Fast and scalable lock methods for video coding on many-core architecture” [J. Vis. Commun. 25 (7) (2014) 1758–1762]
收藏 引用
Journal of Visual Communication and Image Representation 2015年 26卷 350-350页
作者: Weizhi Xu Hui Yu Dianjie Lu Fenglong Song Da Wang Xiaochun Ye Songwei Pei Dongrui Fan Hongtao Xie Institute of Microelectronics Tsinghua University Beijing China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China Key Lab. of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Information Science and Engineering Shandong Normal University Jinan China Department of Computer Science and Technology Beijing University of Chemical Technology Beijing China Institute of Information Engineering Chinese Academy of Sciences National Engineering Laboratory for Information Security Technologies Beijing China
来源: 评论
Towards accountable authority attribute-based encryption
收藏 引用
High Technology Letters 2013年 第1期19卷 82-87页
作者: 王永涛 Chen Kefei Long Yu Department of Computer Science and Engineering Shanghai Jiao Tong University China Information Technology Security Evaluation Center Shanghai Key Laboratory of Scalable Computing and System Shanghai JiaoTong University
An accountable authority attribute-based encryption (A-ABE) scheme is presented in this paper. The notion of accountable authority identity-based encryption (A-IBE) was first introduced by Goyal at Crypto'07. It ... 详细信息
来源: 评论
Motion Analysis for Human Interaction Detection Using Optical Flow on Lattice Superpixels
收藏 引用
Wuhan University Journal of Natural Sciences 2013年 第2期18卷 109-116页
作者: ZHENG Peng CAO Yu WANG Song School of Computer Wuhan University The Key Laboratory of Aerospace Information Security and Trust Computing Ministry of Education Department of Computer Science and Engineering University of South Carolina
We develop a new video-based motion analysis algorithn to determine whether two persons have any interaction in their meet- ing. The interaction between two persons can be very general, such as shaking hands, exchangi... 详细信息
来源: 评论
Below the salt the dangers of unfulfilled physical media assumptions
Below the salt the dangers of unfulfilled physical media ass...
收藏 引用
17th International security Protocols Workshop
作者: Blaze, Matt McDaniel, Patrick Computer Science Department University of Pennsylvania United States Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering Pennsylvania State University United States
Introduction: The physical access media communication traverses is increasing in diversity. Users now access data and services from wired computers, wireless laptops, PDAs, cell phones, and any number of embedded devi...
来源: 评论