咨询与建议

限定检索结果

文献类型

  • 254 篇 期刊文献
  • 215 篇 会议
  • 2 册 图书

馆藏范围

  • 471 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 337 篇 工学
    • 247 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 86 篇 信息与通信工程
    • 63 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 27 篇 控制科学与工程
    • 27 篇 网络空间安全
    • 23 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 11 篇 光学工程
    • 11 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 6 篇 建筑学
  • 138 篇 理学
    • 79 篇 数学
    • 32 篇 物理学
    • 29 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 6 篇 化学
  • 65 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 24 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 13 篇 药学(可授医学、理...
    • 8 篇 公共卫生与预防医...
  • 12 篇 法学
    • 6 篇 社会学
  • 7 篇 军事学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 文学
  • 3 篇 教育学

主题

  • 14 篇 computer network...
  • 12 篇 computer archite...
  • 12 篇 wireless sensor ...
  • 11 篇 computational mo...
  • 11 篇 protocols
  • 11 篇 ip networks
  • 11 篇 cryptography
  • 10 篇 servers
  • 10 篇 feature extracti...
  • 10 篇 security
  • 9 篇 application soft...
  • 9 篇 costs
  • 8 篇 machine learning
  • 8 篇 cloud computing
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 routing
  • 7 篇 deep learning
  • 7 篇 laboratories

机构

  • 15 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 school of cyber ...
  • 8 篇 school of cyber ...
  • 7 篇 peng cheng labor...
  • 7 篇 institute of inf...
  • 7 篇 state key labora...
  • 7 篇 key laboratory o...
  • 6 篇 shenzhen key lab...
  • 6 篇 internet and mob...
  • 6 篇 department of co...
  • 6 篇 university of ch...
  • 6 篇 robotics and int...
  • 6 篇 state key labora...
  • 6 篇 national enginee...
  • 6 篇 department of co...
  • 5 篇 information secu...
  • 5 篇 school of comput...

作者

  • 11 篇 eui-nam huh
  • 8 篇 zou juan
  • 8 篇 yang shuang-hua
  • 8 篇 cao xiaochun
  • 8 篇 jiannong cao
  • 7 篇 liu ming
  • 6 篇 mcdaniel patrick
  • 6 篇 ahmad jawad
  • 6 篇 xu qianqian
  • 6 篇 jin hai
  • 6 篇 chen guihai
  • 5 篇 song biao
  • 5 篇 wu yuan
  • 5 篇 yang shengxiang
  • 5 篇 hongxin hu
  • 5 篇 mohammad mehedi ...
  • 5 篇 huh eui-nam
  • 5 篇 yang zhiyong
  • 5 篇 huang qingming
  • 5 篇 guihai chen

语言

  • 440 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Internet Computing & Security Laboratory Department of Computer Engineering"
471 条 记 录,以下是391-400 订阅
排序:
Collaborative integrity verification in hybrid clouds
Collaborative integrity verification in hybrid clouds
收藏 引用
International Conference on Collaborative computing: Networking, Applications and Worksharing (CollaborateCom)
作者: Yan Zhu Hongxin Hu Gail-Joon Ahn Yujing Han Shimin Chen Beijing Key Laboratory of Internet Security Technology Peking University Beijing China Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University Tempe AZ USA Justitutc of Computer Science and Technology Peking University Beijing China
A hybrid cloud is a cloud computing environment in which an organization provides and manages some internal resources and the others provided externally. However, this new environment could bring irretrievable losses ... 详细信息
来源: 评论
Provably secure role-based encryption with revocation mechanism
Provably secure role-based encryption with revocation mechan...
收藏 引用
作者: Zhu, Yan Hu, Hong-Xin Ahn, Gail-Joon Wang, Huai-Xi Wang, Shan-Biao Institute of Computer Science and Technology Peking University Beijing 100871 China Beijing Key Laboratory of Internet Security Technology Peking University Beijing 100871 China School of Computing Informatics and Decision Systems Engineering Arizona State University Tempe AZ 85287 United States 4School of Mathematical Sciences Peking University Beijing 100871 China
Role-Based Encryption (RBE) realizes access control mechanisms over encrypted data according to the widely adopted hierarchical RBAC model. In this paper, we present a practical RBE scheme with revocation mechanism ba... 详细信息
来源: 评论
Enabling fast prediction for ensemble models on data streams  11
Enabling fast prediction for ensemble models on data streams
收藏 引用
17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2011
作者: Zhang, Peng Li, Jun Wang, Peng Gao, Byron J. Zhu, Xingquan Guo, Li Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China National Engineering Laboratory for Information Content Security Beijing China Department of Computer Science Texas State University San Marcos TX 78666-4616 United States QCIS Faculty of Eng. and IT University of Technology Sydney NSW 2007 Australia
Ensemble learning has become a common tool for data stream classification, being able to handle large volumes of stream data and concept drifting. Previous studies focus on building accurate prediction models from str... 详细信息
来源: 评论
Buffer and Switch: An Efficient Road-to-Road Routing Scheme for VANETs
Buffer and Switch: An Efficient Road-to-Road Routing Scheme ...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Chao Song Ming Liu Yonggang Wen Jiannong Cao Guihai Chen School of Computer Science and Engineering University of Electronic Science and Technology Chengdu China School of Computer Engineering Nanyang Technological University Singapore Internet and Mobile Computing Laboratory Department of Computing Hong Kong Polytechnic University Hong Kong China School of Computer Science and Engineering Shanghai Jiaotong University Shanghai China
Vehicular Ad Hoc Networks (VANETs) are getting increasing attention from academic researchers and automotive industries. Timely and cost-efficient multi-hop data delivery among vehicles is essential for VANETs, and va... 详细信息
来源: 评论
Strong security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation
Strong Security Enabled Certificateless Aggregate Signatures...
收藏 引用
International Conference on Intelligent Networking and Collaborative Systems (INCOS)
作者: Hu Xiong Qianhong Wu Zhong Chen Key Laboratory of Network and Software Security Assurance of the Ministry of Education Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing China Department of Computer Engineering and Mathematics UNESCO Chair in Data Pr Universitat Rovira i Virgili Tarragona Spain Key Laboratory of AeroSpace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University of China China
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that ... 详细信息
来源: 评论
An improved radius of gyration similarity measure between generalized fuzzy numbers and its application to multisource data fusion
收藏 引用
Journal of computers 2011年 第8期6卷 1732-1739页
作者: Yong, Deng Dong, Sun Wen, Jiang Jianling, Xu College of computer and information sciences Southwest University Chongqing 400715 China Hangzhou Key Lab of E-Business and Information Security Hangzhou Normal University Hanzhou Zhejiang 310036 China School of Electronics and Information Technology Shanghai Jiao Tong University Shanghai 200240 China Key Laboratory of Intelligent Computing Information Processing of Ministry of Education Xiangtan University Xiangtan Hunan 411105 China Department of Electronics Engineering Northwestern Polytechnical University Xían 710072 China Grain Economics Institute Nanjing University of Finance and Economics Nanjing 210003 China
The degree of similarity between fuzzy numbers plays an important role in fuzzy information fusion. In this paper, improved ROG-based similarity measure developed from the current ROG method is presented. It is shown ... 详细信息
来源: 评论
A light-weighted misused key detection in wireless sensor networks
A light-weighted misused key detection in wireless sensor ne...
收藏 引用
2010 International Conference on Computational Science and Its Applications, ICCSA 2010
作者: Han, Young-Ju Park, Min-Woo Kim, Jong-Myoung Chung, Tai-Myoung Internet Management Technology Laboratory Department of Electrical and Computer Engineering Sungkyunkwan University 300 Cheoncheon-dong Jangan-gu Suwon-si Gyeonggi-do 440-746 Korea Republic of Incidents Analysis Team Korea Internet Security Agency Korea Republic of
In wireless sensor networks, sensor nodes are generally distributed in hostile environments so the security services such as confidentiality, authentication and integrity are very important. The basis of these securit... 详细信息
来源: 评论
A translation framework for virtual execution environment on CPU/GPU architecture
A translation framework for virtual execution environment on...
收藏 引用
International Symposium on Parallel Architectures, Algorithms, and Programming
作者: Dong, Guoxing Chen, Kai Zhu, Erzhou Zhang, Yichao Qi, Zhengwei Guan, Haibing School of Software Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiaotong University Shanghai 200240 China School of Information Security Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiaotong University Shanghai 200240 China Department of Computer Science and Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiaotong University Shanghai 200240 China
GPUs are many-core processors with tremendous computational power. However, as automatic parallelization has not been realized yet, developing high-performance parallel code for GPUs is still very challenging. The pap... 详细信息
来源: 评论
Efficient online trace building using code replication
Efficient online trace building using code replication
收藏 引用
International Conference on Grid and Cloud computing
作者: Deng, Haipeng Chen, Kai Liu, Bo He, Yunchao Zhou, Kan Yang, Yindong Liang, Alei Guan, Haibing School of Software Shanghai Jiao Tong University China Department of Computer Science and Engineering Shanghai Jiao Tong University China School of Information Security Engineering Shanghai Jiao Tong University China Shanghai Key Laboratory of Scalable Computing and Systems China
Hot trace building plays an important role in enhancing the performance of dynamic binary translators, since in most cases 10% of code takes 90% of execution time of the whole program. Hot traces can promote the code ... 详细信息
来源: 评论
Performance tuning towards a KVM-based low latency virtualization system
Performance tuning towards a KVM-based low latency virtualiz...
收藏 引用
2nd International Conference on Information engineering and computer Science, ICIECS 2010
作者: Zuo, Baojing Chen, Kai Liang, Alei Guan, Haibing Zhang, Jun Ma, Ruhui Yang, Hongbo School of Software Shanghai Jiao Tong University Shanghai 200240 China School of Information Security Engineering Shanghai Jiao Tong University Shanghai 200240 China Department of Computer Science and Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai 200240 China
Utilizing virtualization technology to combine real-time operating system (RTOS) and off-the-shelf time-sharing general purpose operating system (GPOS) is attracting much more interest recently. Such combination has t... 详细信息
来源: 评论