咨询与建议

限定检索结果

文献类型

  • 68 篇 会议
  • 60 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 129 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 82 篇 工学
    • 58 篇 计算机科学与技术...
    • 47 篇 软件工程
    • 21 篇 电气工程
    • 19 篇 信息与通信工程
    • 8 篇 生物医学工程(可授...
    • 7 篇 电子科学与技术(可...
    • 6 篇 机械工程
    • 6 篇 生物工程
    • 4 篇 光学工程
    • 4 篇 仪器科学与技术
    • 4 篇 控制科学与工程
    • 4 篇 交通运输工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 动力工程及工程热...
    • 2 篇 建筑学
  • 40 篇 理学
    • 25 篇 数学
    • 9 篇 统计学(可授理学、...
    • 6 篇 物理学
    • 6 篇 生物学
    • 3 篇 系统科学
    • 2 篇 化学
  • 14 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 4 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 9 篇 医学
    • 7 篇 临床医学
    • 5 篇 基础医学(可授医学...
    • 4 篇 药学(可授医学、理...
    • 3 篇 公共卫生与预防医...
  • 4 篇 法学
    • 2 篇 社会学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 文学
  • 2 篇 农学
  • 1 篇 教育学

主题

  • 8 篇 feature extracti...
  • 8 篇 computer network...
  • 7 篇 computational mo...
  • 5 篇 computer archite...
  • 5 篇 wireless sensor ...
  • 5 篇 accuracy
  • 5 篇 ip networks
  • 4 篇 deep learning
  • 4 篇 application soft...
  • 4 篇 quality of servi...
  • 4 篇 servers
  • 4 篇 blockchain
  • 4 篇 cloud computing
  • 4 篇 privacy
  • 4 篇 training
  • 3 篇 object detection
  • 3 篇 data privacy
  • 3 篇 public key crypt...
  • 3 篇 ad hoc networks
  • 3 篇 grid computing

机构

  • 7 篇 key laboratory o...
  • 4 篇 the department o...
  • 4 篇 state key labora...
  • 3 篇 network and data...
  • 3 篇 department of co...
  • 3 篇 shandong provinc...
  • 3 篇 the institute of...
  • 3 篇 shandong fundame...
  • 3 篇 institute for ne...
  • 3 篇 xi'an university...
  • 3 篇 school of comput...
  • 3 篇 engineering rese...
  • 3 篇 robotics and int...
  • 3 篇 shaanxi key labo...
  • 3 篇 the department o...
  • 3 篇 school of cyber ...
  • 3 篇 key laboratory o...
  • 3 篇 school of comput...
  • 2 篇 electric power r...
  • 2 篇 technological in...

作者

  • 11 篇 eui-nam huh
  • 5 篇 song biao
  • 5 篇 mohammad mehedi ...
  • 4 篇 luo xiangyang
  • 4 篇 shi zhenghao
  • 4 篇 biao song
  • 4 篇 huh eui nam
  • 4 篇 jin haiyan
  • 3 篇 zhou jiantao
  • 3 篇 zhao minghua
  • 3 篇 eui nam huh
  • 3 篇 huh eui-nam
  • 3 篇 tang wei
  • 3 篇 yajun liu
  • 3 篇 li aimin
  • 3 篇 xinhong hei
  • 3 篇 fei rong
  • 3 篇 lin you
  • 3 篇 zhang jin
  • 3 篇 boulila wadii

语言

  • 120 篇 英文
  • 8 篇 其他
  • 1 篇 中文
检索条件"机构=Internet Computing and Network Security Laboratory Department of Computer Engineering"
129 条 记 录,以下是111-120 订阅
排序:
An IPTV service delivery model using novel virtual network topology  11
An IPTV service delivery model using novel virtual network t...
收藏 引用
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
作者: Song, Biao Hassan, Mohammad Mehedi Huh, Eui Nam Internet Computing and Network Security Lab. Department of Computer Engineering Kyung Hee University 1 Seocheon-dong Giheung-gu Yongin-si Gyeonggi-do 446-701 Korea Republic of
network Virtualization, as an irresistible trend for building future internet, create a virtual topology on the top of the current network architecture and provide end-to-end quality of service guarantees. By utilizin... 详细信息
来源: 评论
Cost analysis on IPTV hosting service for 3rd party providers  11
Cost analysis on IPTV hosting service for 3rd party provider...
收藏 引用
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication
作者: Aldana Diaz, Maria Elizabeth Huh, Eui Nam Department of Computer Engineering Internet Computing and Network Security Lab. Kyung Hee University 1 Seocheon-dong Giheung-gu Yongin-si Gyeonggi-do 446-701 Korea Republic of
3rd party content service expands the variety of contents that IPTV usually distributes and opens the opportunity to create new and attractive content to anyone. However, the hosting service for 3rd party content dema... 详细信息
来源: 评论
An Efficient Key Management for Secure Multicast in Sensor-Cloud
An Efficient Key Management for Secure Multicast in Sensor-C...
收藏 引用
ACIS/JNU International Conference on computers, networks, Systems and Industrial engineering (CNSI)
作者: Tien-Dung Nguyen Eui-Nam Huh Department of Computer Engineering Internet Computing and Security Laboratory Suwon South Korea
Nowadays, in Publish/Subscribe system, the number of subscriptions from customers can be large, the events happening in such a system are more frequent and the notification load is heavy. Combining with cloud computin... 详细信息
来源: 评论
Strong security enabled certificateless aggregate signatures applicable to mobile computation
Strong security enabled certificateless aggregate signatures...
收藏 引用
3rd IEEE International Conference on Intelligent networking and CollaborativeSystems, INCoS 2011
作者: Hu, Xiong Wu, Qianhong Chen, Zhong Key Laboratory of Network and Software Security Assurance of the Ministry of Education School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan University Ministry of Education China Universitat Rovira i Virgili Department of Computer Engineering and Mathematics UNESCO Av. Països Catalans 26 E-43007 Tarragona Spain
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that ... 详细信息
来源: 评论
Strong security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation
Strong Security Enabled Certificateless Aggregate Signatures...
收藏 引用
International Conference on Intelligent networking and Collaborative Systems (INCOS)
作者: Hu Xiong Qianhong Wu Zhong Chen Key Laboratory of Network and Software Security Assurance of the Ministry of Education Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing China Department of Computer Engineering and Mathematics UNESCO Chair in Data Pr Universitat Rovira i Virgili Tarragona Spain Key Laboratory of AeroSpace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University of China China
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that ... 详细信息
来源: 评论
Enhance Information Flow Tracking with Function Recognition
收藏 引用
China Communications 2010年 第6期7卷 24-29页
作者: Zhou Kan Huang Shiqiu Huang Shan Qi Zhengwei Gu Jian Guan Haibing School of software Shanghai Jliao Tong University Shanghai 200240 P. R. China Key Lab of Information Network Security Ministry of Public Security Department of Computer Science & Engineering Shanghai Jiao Tong University Shanghai 200240 P. R China Shanghai Key Laboratory of Scalable Computing & System Shanghai P. R. China
With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the comput... 详细信息
来源: 评论
A Novel Cloud Market Infrastructure for Trading Service
A Novel Cloud Market Infrastructure for Trading Service
收藏 引用
International Conference on Computational Science and its Applications (ICCSA)
作者: Biao Song Mohammad Mehedi Hassan Eui-Nam Huh Internet Computing and Network Security Laboratory Department of Computer Engineering Kyung Hee University South Korea
In this paper, we present a novel combinatorial auction (CA) based trading infrastructure to enable the supply and demand of Cloud services from different Cloud providers (CP). We propose a new auction policy that con... 详细信息
来源: 评论
A Hybrid Algorithm for Partner Selection in Market Oriented Cloud computing
A Hybrid Algorithm for Partner Selection in Market Oriented ...
收藏 引用
International Conference on Management and Service Science, MASS
作者: Biao Song M. M. Hassan Eui-Nam Huh Chang-Woo Yoon Hyun-Woo Lee Internet Computing and Network Security Laboratory Department of Computer Engineering Kyung Hee University South Korea Electronics and Telecommunications Research Institute South Korea
In our previous paper, we proposed a novel combinatorial auction (CA) based cloud market model for trading services that allows cloud providers (CPs) to make groups and submit their bids collaboratively as a single bi... 详细信息
来源: 评论
A Grid-enabled framework of expertise search engine using web-based online communities
A Grid-enabled framework of expertise search engine using we...
收藏 引用
11th International Conference on computer and Information Technology, ICCIT 2008
作者: Hassan, Mohammad Mehedi Lee, Pil-Woo Huh, Eui-Nam Internet Computing and Network Security Lab Department of Computer Engineering Kyung Hee University Korea Republic of KISTI Daejun Korea Republic of
Existing search engines like Google' Yahoo!' Live etc. are not yet capable to answer queries that require deep semantic understanding of the query or the document. Instead' it is preferable to find and ask... 详细信息
来源: 评论
Propagation Service Decision Method for Web Services Composition in u-Lifecare System
Propagation Service Decision Method for Web Services Composi...
收藏 引用
International Conference on Computational Science and its Applications (ICCSA)
作者: Ki-moon Choi Mohammad Mehedi Hassan Eui-Nam Huh Internet Computing and Network Security Laboratory Department of Computer Engineering Kyung Hee University Yongin si Gyeonggi South Korea
In Web environment, multiple Web service(WS)s may provide similar functionalities with different nonfunctional property values (e.g. different QoS metrics). Quality of service (QoS) metrics of WSs are critical factors... 详细信息
来源: 评论