咨询与建议

限定检索结果

文献类型

  • 96 篇 会议
  • 40 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 137 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 106 篇 工学
    • 70 篇 计算机科学与技术...
    • 57 篇 软件工程
    • 22 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 生物工程
    • 9 篇 化学工程与技术
    • 8 篇 机械工程
    • 8 篇 电子科学与技术(可...
    • 8 篇 农业工程
    • 6 篇 光学工程
    • 5 篇 材料科学与工程(可...
    • 5 篇 电气工程
    • 5 篇 网络空间安全
    • 3 篇 建筑学
    • 2 篇 仪器科学与技术
    • 2 篇 动力工程及工程热...
  • 49 篇 理学
    • 31 篇 数学
    • 11 篇 生物学
    • 10 篇 化学
    • 8 篇 物理学
    • 6 篇 统计学(可授理学、...
    • 3 篇 系统科学
  • 25 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 9 篇 医学
    • 5 篇 临床医学
    • 5 篇 公共卫生与预防医...
    • 3 篇 基础医学(可授医学...
  • 8 篇 农学
    • 8 篇 作物学
  • 1 篇 法学
  • 1 篇 文学

主题

  • 5 篇 information proc...
  • 4 篇 grid computing
  • 4 篇 semantics
  • 3 篇 educational inst...
  • 3 篇 convolution
  • 3 篇 routing protocol...
  • 3 篇 natural language...
  • 3 篇 labeling
  • 3 篇 image reconstruc...
  • 3 篇 filtering algori...
  • 2 篇 computer science
  • 2 篇 learning systems
  • 2 篇 imaging
  • 2 篇 rsa cryptosystem
  • 2 篇 support vector m...
  • 2 篇 polynomial inter...
  • 2 篇 trees (mathemati...
  • 2 篇 multi-secret sha...
  • 2 篇 engineering in m...
  • 2 篇 schnorr signatur...

机构

  • 17 篇 school of comput...
  • 8 篇 college of compu...
  • 6 篇 school of comput...
  • 6 篇 provincial key l...
  • 6 篇 hubei province k...
  • 6 篇 college of infor...
  • 5 篇 provincial key l...
  • 5 篇 jiangsu provinci...
  • 5 篇 jiangsu high tec...
  • 4 篇 jiangsu provinci...
  • 4 篇 college of compu...
  • 4 篇 first-imaging te...
  • 4 篇 school of inform...
  • 4 篇 zhejiang lab
  • 3 篇 institute for in...
  • 3 篇 jiangsu provinci...
  • 3 篇 jiangsu provinci...
  • 3 篇 saic motor ai la...
  • 3 篇 state key labora...
  • 3 篇 school of electr...

作者

  • 14 篇 kong fang
  • 14 篇 zhu qiaoming
  • 10 篇 zhou guodong
  • 6 篇 yu fei
  • 6 篇 wang yonghao
  • 6 篇 li peifeng
  • 6 篇 hu wei
  • 5 篇 qian peide
  • 4 篇 fei yu
  • 4 篇 qian longhua
  • 4 篇 xizhao luo
  • 4 篇 yanqin zhu
  • 4 篇 li renfa
  • 3 篇 li yang
  • 3 篇 yue guangxue
  • 3 篇 li chenglong
  • 3 篇 wu zhan
  • 3 篇 zhou guo dong
  • 3 篇 zeng zeng
  • 3 篇 xu cheng

语言

  • 131 篇 英文
  • 6 篇 中文
检索条件"机构=Key Lab of Computer Information Processing Technology of Jiangsu Province"
137 条 记 录,以下是61-70 订阅
排序:
BDLR:lncRNA identification using ensemble learning
收藏 引用
BIOCELL 2022年 第4期46卷 951-960页
作者: LEJUN GONG SHEHAI ZHOU JINGMEI CHEN YONGMIN LI LI ZHANG ZHIHONG GAO Jiangsu Key Lab of Big Data Security&Intelligent Processing School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing210046China Smart Health Big Data Analysis and Location Services Engineering Laboratory of Jiangsu Province Nanjing210046China Zhejiang Engineering Research Center of Intelligent Medicine Wenzhou325035China College of Computer Science and Technology Nanjing Forestry UniversityNanjing210037China
Long non-coding RNAs(lncRNAs)play an important role in many life activities such as epigenetic material regulation,cell cycle regulation,dosage compensation and cell differentiation regulation,and are associated with ... 详细信息
来源: 评论
A VERIFIABLE MULTI-SECRET SHARING SCHEME
A VERIFIABLE MULTI-SECRET SHARING SCHEME
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Yong Wang Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se... 详细信息
来源: 评论
A VERIFIABLE MULTI-SECRET SHARING SCHEME
A VERIFIABLE MULTI-SECRET SHARING SCHEME
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Yong Wang Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se... 详细信息
来源: 评论
Research on user authentication for grid computing security
Research on user authentication for grid computing security
收藏 引用
2006 2nd International Conference on Semantics Knowledge and Grid, SKG
作者: Ronghui, Wu Renfa, Li Fei, Yu Guangxue, Yue Cheng, Xu School of Computer and Communication Hunan University Changsha410082 China State Key Laboratory of Information Security Graduate School Chinese Academy of Sciences Beijing 100049 China Provincial Key Laboratory of Computer Information Processing Technology Jiangsu Province Suzhou University Suzhou 150063 China College of Informationg Engineering JiaXing University JiaXing 314000 China
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system... 详细信息
来源: 评论
AN IMPROVED(k,m)-DOT1~n SCHEME FOR ARBITRARY K
AN IMPROVED(k,m)-DOT1~n SCHEME FOR ARBITRARY K
收藏 引用
2009中国宁波国际计算机科学与技术学术大会
作者: Juan Xie Yanqin Zhu Xizhao Luo School of Computer Science and Technology Soochow University Jiangsu Provincial Key Lab of Computer Information Processing Technology
In(k,m)-DOT~nScheme,the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas' s scheme,they ... 详细信息
来源: 评论
Research on user authentication for grid computing security
Research on user authentication for grid computing security
收藏 引用
2nd International Conference on Semantics, Knowledge, and Grid, SKG 2006
作者: Wu, Ronghui Li, Renfa Yu, Fei Yue, Guangxue Xu, Cheng School of Computer and Communication Hunan University Changsha 410082 China State Key Laboratory of Information Security Graduate School Chinese Academy of Sciences Beijing 100049 China Provincial Key Laboratory of Computer Information Processing Technology Jiangsu Province Suzhou University Suzhou 150063 China College of Informationg Engineering JiaXing University JiaXing 314000 China
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system... 详细信息
来源: 评论
Multi-objective optimization on multistage half-band FIR filter design using simulated annealing algorithm  21
Multi-objective optimization on multistage half-band FIR fil...
收藏 引用
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Zhang, Jin Hu, Wei Wang, Yonghao Zhu, Xiangyu College of Computer Science and Technology Wuhan University of Science and Technology China Hubei Province Key Laboratory of Intelligent Information Processing Real-time Industrial System Wuhan China Digital Media Technology Lab Birmingham City University Birmingham United Kingdom
The design of a finite impulse response (FIR) digital filter is essentially a multi-parameter and multi-objective optimization problem, different optimization techniques can be utilized to minimize the latency in the ... 详细信息
来源: 评论
Short cycle conversion scheduling model for flexilink architecture  21
Short cycle conversion scheduling model for flexilink archit...
收藏 引用
21st IEEE International Conference on High Performance Computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Guo, Yi Liu, Jing Wang, Yonghao Hu, Wei College of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China Digital Media Technology Lab Birmingham City University BirmingHam United Kingdom
Nowadays, most of the data traffic on the Internet is audio and video content, such as streaming media, Internet TV and so on. High-quality interactive multimedia content requires a high-quality real-time network. The... 详细信息
来源: 评论
Improvement on Ahn et al.'s RSA P-homomorphic signature scheme
Improvement on Ahn et al.'s RSA P-homomorphic signature sche...
收藏 引用
8th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2012
作者: Wang, Zhiwei College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100190 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China
P-homomorphic signature is a general framework for computing on authenticated data, which is recently proposed by Ahn et al. With P-homomorphic signature, any third party can derive a signature on the object message m... 详细信息
来源: 评论
Semantic role labeling using Chinese dependency parsing tree
Semantic role labeling using Chinese dependency parsing tree
收藏 引用
IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS)
作者: Hongling Wang Xiaohong Yuan Guodong Zhou Jiangsu Provincial Key Lab for Computer Information Processing Technology Soochow University Suzhou China
Although recent years have seen much progress in semantic role labeling in English, only a little research focuses on Chinese dependency relationship. This paper presents an SRL system on Chinese dependency relation b... 详细信息
来源: 评论