咨询与建议

限定检索结果

文献类型

  • 254 篇 期刊文献
  • 215 篇 会议
  • 2 册 图书

馆藏范围

  • 471 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 337 篇 工学
    • 247 篇 计算机科学与技术...
    • 188 篇 软件工程
    • 86 篇 信息与通信工程
    • 63 篇 电气工程
    • 39 篇 电子科学与技术(可...
    • 28 篇 生物工程
    • 27 篇 控制科学与工程
    • 27 篇 网络空间安全
    • 23 篇 生物医学工程(可授...
    • 21 篇 机械工程
    • 15 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 11 篇 光学工程
    • 11 篇 仪器科学与技术
    • 8 篇 安全科学与工程
    • 6 篇 建筑学
  • 138 篇 理学
    • 79 篇 数学
    • 32 篇 物理学
    • 29 篇 生物学
    • 26 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 6 篇 化学
  • 65 篇 管理学
    • 38 篇 管理科学与工程(可...
    • 27 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 24 篇 医学
    • 18 篇 临床医学
    • 16 篇 基础医学(可授医学...
    • 13 篇 药学(可授医学、理...
    • 8 篇 公共卫生与预防医...
  • 12 篇 法学
    • 6 篇 社会学
  • 7 篇 军事学
  • 5 篇 经济学
  • 5 篇 农学
  • 4 篇 文学
  • 3 篇 教育学

主题

  • 14 篇 computer network...
  • 12 篇 computer archite...
  • 12 篇 wireless sensor ...
  • 11 篇 computational mo...
  • 11 篇 protocols
  • 11 篇 ip networks
  • 11 篇 cryptography
  • 10 篇 servers
  • 10 篇 feature extracti...
  • 10 篇 security
  • 9 篇 application soft...
  • 9 篇 costs
  • 8 篇 machine learning
  • 8 篇 cloud computing
  • 8 篇 privacy
  • 8 篇 training
  • 7 篇 computer science
  • 7 篇 routing
  • 7 篇 deep learning
  • 7 篇 laboratories

机构

  • 15 篇 key laboratory o...
  • 11 篇 school of comput...
  • 11 篇 department of co...
  • 9 篇 school of comput...
  • 9 篇 school of cyber ...
  • 8 篇 school of cyber ...
  • 7 篇 peng cheng labor...
  • 7 篇 institute of inf...
  • 7 篇 state key labora...
  • 7 篇 key laboratory o...
  • 6 篇 shenzhen key lab...
  • 6 篇 internet and mob...
  • 6 篇 department of co...
  • 6 篇 university of ch...
  • 6 篇 robotics and int...
  • 6 篇 state key labora...
  • 6 篇 national enginee...
  • 6 篇 department of co...
  • 5 篇 information secu...
  • 5 篇 school of comput...

作者

  • 11 篇 eui-nam huh
  • 8 篇 zou juan
  • 8 篇 yang shuang-hua
  • 8 篇 cao xiaochun
  • 8 篇 jiannong cao
  • 7 篇 liu ming
  • 6 篇 mcdaniel patrick
  • 6 篇 ahmad jawad
  • 6 篇 xu qianqian
  • 6 篇 jin hai
  • 6 篇 chen guihai
  • 5 篇 song biao
  • 5 篇 wu yuan
  • 5 篇 yang shengxiang
  • 5 篇 hongxin hu
  • 5 篇 mohammad mehedi ...
  • 5 篇 huh eui-nam
  • 5 篇 yang zhiyong
  • 5 篇 huang qingming
  • 5 篇 guihai chen

语言

  • 440 篇 英文
  • 27 篇 其他
  • 4 篇 中文
检索条件"机构=Internet Computing & Security Laboratory Department of Computer Engineering"
471 条 记 录,以下是401-410 订阅
排序:
When Transportation Meets Communication: V2P over VANETs
When Transportation Meets Communication: V2P over VANETs
收藏 引用
IEEE International Conference on Distributed computing Systems
作者: Nianbo Liu Ming Liu Jiannong Cao Guihai Chen Wei Lou School of Computer Science and Engineering University of Electronic Science and Technology of China Internet and Mobile Computing Laboratory Hong Kong Polytechnic University Department of Computer Science and Engineering Shanghai Jiao Tong University
Information interaction is a crucial part of modern transportation activities. In this paper, we propose the idea of Vehicle-to-Passenger communication (V2P), which allows direct, instant, and flexible communication b... 详细信息
来源: 评论
Information flow control in cloud computing
Information flow control in cloud computing
收藏 引用
International Conference on Collaborative computing: Networking, Applications and Worksharing (CollaborateCom)
作者: Ruoyu Wu Gail-Joon Ahn Hongxin Hu Mukesh Singhal Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University Tempe AZ USA Department of Computer Science University of Kentucky Lexington KY USA
Cloud computing is an emerging computing paradigm where computing resources are provided as services over internet while residing in a large data center. Even though it enables us to dynamically provide servers with t... 详细信息
来源: 评论
Enhance Information Flow Tracking with Function Recognition
收藏 引用
China Communications 2010年 第6期7卷 24-29页
作者: Zhou Kan Huang Shiqiu Huang Shan Qi Zhengwei Gu Jian Guan Haibing School of software Shanghai Jliao Tong University Shanghai 200240 P. R. China Key Lab of Information Network Security Ministry of Public Security Department of Computer Science & Engineering Shanghai Jiao Tong University Shanghai 200240 P. R China Shanghai Key Laboratory of Scalable Computing & System Shanghai P. R. China
With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the comput... 详细信息
来源: 评论
Incremental intrusion detecting method based on SOM/RBF
Incremental intrusion detecting method based on SOM/RBF
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Li-Ye Tian Wei-Peng Liu Department of Electronic and Information Engineering Naval Aeronautical and Astronautical University Yantai China Trusted Computing Laboratory College of Computer Beijing University of Technology Beijing China The State Key Laboratory of Information Security GUCAS Beijing China
An incremental intrusion detecting model is proposed in this paper. This model integrates unsupervised Self Organizing Map and supervised Radial Basis Function to complete incremental learning. Self Organizing Map can... 详细信息
来源: 评论
Authenticated Asymmetric Group Key Agreement Protocol and Its Application
Authenticated Asymmetric Group Key Agreement Protocol and It...
收藏 引用
IEEE International Conference on Communications
作者: Lei Zhang Qianhong Wu Bo Qin Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Catalonia Spain School of Computer Key Laboratory of AeroSpace Information Security and Trusted Computing Ministry of Education Wuhan University of China China School of Science Department of Maths Xi''an University of Technology China
A recent primitive known as asymmetric group key agreement allows a group of users to negotiate a common encryption key which is accessible to any entities while each user holds her respective secret decryption key. T... 详细信息
来源: 评论
Performance Tuning Towards a KVM-Based Low Latency Virtualization System
Performance Tuning Towards a KVM-Based Low Latency Virtualiz...
收藏 引用
International Conference on Information engineering and computer Science (ICIECS)
作者: Baojing Zuo Kai Chen Alei Liang Haibing Guan Jun Zhang Ruhui Ma Hongbo Yang School of Software Shanghai Jiaotong University Shanghai China School of Information Security Engineering Shanghai Jiaotong University Shanghai China Department of Computer Science and Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiaotong University Shanghai China
Utilizing virtualization technology to combine real-time operating system(RTOS)and off-the-shelf time-sharing general purpose operating system (GPOS)is attracting much more interest *** combination has the potential t... 详细信息
来源: 评论
A Translation Framework for Virtual Execution Environment on CPU/GPU Architecture
A Translation Framework for Virtual Execution Environment on...
收藏 引用
International Symposium on Parallel Architectures, Algorithms and Programming (PAAP)
作者: Guoxing Dong Kai Chen Erzhou Zhu Yichao Zhang Zhengwei Qi Haibing Guan School of Software Shanghai Jiaotong University Shanghai China School of Information Security Engineering Shanghai Jiaotong University Shanghai China Department of Computer Science and Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiaotong University Shanghai China
GPUs are many-core processors with tremendous computational power. However, as automatic parallelization has not been realized yet, developing high-performance parallel code for GPUs is still very challenging. The pap... 详细信息
来源: 评论
Hierarchical Certificateless Signatures
Hierarchical Certificateless Signatures
收藏 引用
IEEE/IFIP International Conference on Embedded and Ubiquitous computing, EUC
作者: Lei Zhang Qianhong Wu Josep Domingo-Ferrer Bo Qin UNESCO Chair in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Catalonia Spain School of Computer Key Laboratory of AeroSpace Information Security and Trusted Computing Wuhan University of Technology China School of Science Department of Maths Xi'an University of Technology China
Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In... 详细信息
来源: 评论
A novel clustering topology control for reliable multi-hop routing in wireless sensor networks
收藏 引用
Journal of Communications 2010年 第9期5卷 654-664页
作者: Du, Ruiying Ai, Chunyu Guo, Longjiang Chen, Jing Liu, Jianwei He, Jing Li, Yingshu School of Computer science Wuhan University Wuhan China State Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan China Department of Mathematics Physics Computer Science and Geomatics Troy University Troy AL 36082 United States Department of Computer Science Heilongjiang University Harbin China Department of Computer Science Georgia State University Atlanta GA 30303 United States School of Electronics Information Engineering Beihang University Beijing China
The reliability of wireless sensor networks is significant in certain applications, especially the reliable routing. Most existing routing protocols use multi-paths to improve routing reliability. However, multi-paths... 详细信息
来源: 评论
A Novel Cloud Market Infrastructure for Trading Service
A Novel Cloud Market Infrastructure for Trading Service
收藏 引用
International Conference on Computational Science and its Applications (ICCSA)
作者: Biao Song Mohammad Mehedi Hassan Eui-Nam Huh Internet Computing and Network Security Laboratory Department of Computer Engineering Kyung Hee University South Korea
In this paper, we present a novel combinatorial auction (CA) based trading infrastructure to enable the supply and demand of Cloud services from different Cloud providers (CP). We propose a new auction policy that con... 详细信息
来源: 评论