咨询与建议

限定检索结果

文献类型

  • 104 篇 会议
  • 67 篇 期刊文献

馆藏范围

  • 171 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 124 篇 工学
    • 101 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 35 篇 信息与通信工程
    • 14 篇 控制科学与工程
    • 10 篇 机械工程
    • 8 篇 电气工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 6 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 光学工程
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
  • 57 篇 理学
    • 41 篇 数学
    • 12 篇 物理学
    • 7 篇 生物学
    • 6 篇 统计学(可授理学、...
  • 38 篇 管理学
    • 22 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
  • 8 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 3 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
    • 3 篇 作物学

主题

  • 9 篇 cryptography
  • 8 篇 privacy
  • 6 篇 semantics
  • 6 篇 training
  • 5 篇 wireless sensor ...
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 computational mo...
  • 4 篇 security
  • 4 篇 accuracy
  • 4 篇 adaptation model...
  • 3 篇 image segmentati...
  • 3 篇 optimization
  • 3 篇 authentication
  • 3 篇 real-time system...
  • 3 篇 blockchain
  • 3 篇 protocols
  • 3 篇 malware
  • 3 篇 federated learni...
  • 3 篇 cloud computing

机构

  • 8 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 beijing key lab....
  • 8 篇 guangxi collabor...
  • 6 篇 school of comput...
  • 5 篇 shanghai key lab...
  • 5 篇 nanjing fenghuo ...
  • 4 篇 school of comput...
  • 4 篇 ministry of edu....
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 4 篇 key lab. of comp...
  • 4 篇 school of comput...
  • 4 篇 key lab of compu...
  • 4 篇 college of infor...
  • 4 篇 purple mountain ...
  • 4 篇 key laboratory o...
  • 4 篇 key lab. of comp...
  • 4 篇 guangxi key lab ...
  • 4 篇 jiangsu high tec...

作者

  • 11 篇 wang yun
  • 9 篇 li hui
  • 8 篇 chunhe xia
  • 8 篇 tianbo wang
  • 8 篇 he jieyue
  • 7 篇 yun wang
  • 6 篇 chen chen
  • 6 篇 zhang min-ling
  • 5 篇 mi jiacong
  • 5 篇 feng yu
  • 5 篇 liu yongshan
  • 5 篇 zhang yu
  • 4 篇 fan kai
  • 4 篇 jinbin tu
  • 4 篇 xin geng
  • 4 篇 tu jinbin
  • 4 篇 ma wenping
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 yu zhang

语言

  • 149 篇 英文
  • 12 篇 中文
  • 10 篇 其他
检索条件"机构=Key Lab. of Computer Network and Information Integration"
171 条 记 录,以下是131-140 订阅
排序:
A delay guaranteed and services differentiated MAC protocol based on location and reservation in near-space
收藏 引用
Journal of Convergence information Technology 2011年 第2期6卷 120-130页
作者: Chen, Chen Gao, Xinbo Pei, Qingqi National Key Lab. of Integrated Service Networks Xidian Univ Xi'an 710071 China School of Electronic Engineering Xidian Univ Xi'an 710071 China Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian Univ Xi'an 710071 China
With an ever-increasing interests and demands in Near-Space, more and more researchers have put their attentions on this field, leading to an emerging needs for modeling the 20-100km altitude space especially for broa... 详细信息
来源: 评论
Multi-user private keyword search for cloud computing
Multi-user private keyword search for cloud computing
收藏 引用
2011 3rd IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2011
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China State Key Lab. of Networking and Switching Technology Beijing University of Posts and Telecommunications China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论
Comments on a threshold authenticated encryption scheme
收藏 引用
International Journal of computers and Applications 2011年 第2期33卷 132-136页
作者: Tan, Zuowen Department of Computer Science and Technology School of Information Technology Jiangxi University of Finance and Economics Nanchang 330032 Jiangxi Province China Key Lab. of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 China
An authenticated encryption scheme (AE scheme) allows the signer to generate a valid authenticated ciphertext on a message such that the designated recipient can recover the message. AE schemes can achieve confidentia... 详细信息
来源: 评论
A robust and secure overlay storage scheme based on erasure coding
A robust and secure overlay storage scheme based on erasure ...
收藏 引用
5th International Conference on Pervasive Computing and Applications, ICPCA10
作者: Li, Chuanyou Wang, Yun School of Computer Science and Engineering Southeast University Key Lab of Computer Network and Information Integration Nanjing 210096 China
Recently, in classical P2P overlay networks, with applying replication technique, a single peer is replaced by a cluster of peers in order to tolerant Byzantine failures. In this paper, a novel robust and secure schem... 详细信息
来源: 评论
Distance estimation by constructing the virtual ruler in anisotropic sensor networks
Distance estimation by constructing the virtual ruler in ani...
收藏 引用
IEEE INFOCOM 2010
作者: Wang, Yun Li, Kai Wu, Jie School of Computer Science and Engineering Southeast University Key Lab. of Computer Network and Information Integration Nanjing 210096 China Department of Computer and Information Sciences Temple University Philadelphia PA 119122 United States
Distance estimation is fundamental for many functionalities of wireless sensor networks and has been studied intensively in recent years. A critical challenge in distance estimation is handling anisotropic problems in... 详细信息
来源: 评论
D-TDMA: An approach of dynamic TDMA scheduling for target tracking in wireless sensor networks
D-TDMA: An approach of dynamic TDMA scheduling for target tr...
收藏 引用
2010 IEEE/ACM International Conference on Green Computing and Communications, GreenCom 2010, 2010 IEEE/ACM International Conference on Cyber, Physical and Social Computing, CPSCom 2010
作者: Wang, Yun Shi, Peizhong Li, Kai Chen, Zhikui Department of Computer Science and Engineering Southeast University Key Lab. of Computer Network and Information Integration Nanjing 210096 China School of Software Technology Dalian University of Technology Dalian 116024 China
In the application of target tracking based on dynamic convey tree-based collab.ration (DCTC) in wireless sensor networks, collisions and interferences among nodes pose a challenge for data aggregation. In this paper,... 详细信息
来源: 评论
Full rate and full diversity STBC in decode-and-forward relay systems
Full rate and full diversity STBC in decode-and-forward rela...
收藏 引用
2010 International Conference on Communications and Intelligence information Security, ICCIIS 2010
作者: Wang, Yong Li, Hui Ministry of Education Key Lab. of Computer Network and Information Security School of Telecommunications Engineering Xidian University Xi'an China
Diversity techniques are very effective tools to increase signal reception quality in Rayleigh fading channels. A novel space-time block coding method for cooperative relay networks is proposed which guarantees full d... 详细信息
来源: 评论
Effects of image lossy compression on palmprint verification performance
Effects of image lossy compression on palmprint verification...
收藏 引用
2010 IEEE International Conference on information Theory and information Security, ICITIS 2010
作者: Li, Hengjian Wang, Jizhi Wang, Yinglong Zhang, Jiashu Shandong Provincial Key Laboratory of computer Network Shandong Computer Science Center Jinan China Sichuan Province Key Lab. of Signal and Information Processing Southwest Jiaotong University Chengdu China
In this paper, we investigate the effects that the lossy image compression has on the performance competitive codes of palmprint verification algorithms. Effects of lossy compression on palmprint recognition performan... 详细信息
来源: 评论
Improving efficiency of security schemes in automated trust negotiation
Improving efficiency of security schemes in automated trust ...
收藏 引用
2nd International Workshop on Education Technology and computer Science, ETCS 2010
作者: Liu, Bailing Lu, Hongwei Zhao, Yizhu Ge, Feng College of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Key Lab. of Information Network Security Ministry of Public Security Shanghai China
Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. When... 详细信息
来源: 评论
Performance analysis of optimal antenna scheme in transmit diversity systems
Performance analysis of optimal antenna scheme in transmit d...
收藏 引用
2010 6th International Conference on Natural Computation, ICNC'10
作者: Wang, Yong Li, Hui Wang, Xiyuan Key Lab. of Computer Network and Information Security School of Telecommunications Engineering Xidian University Xi'an China Science Research Department Xidian University Xi'an China
The performance of transmit antenna selection is investigated. The exact closed-form expressions for the average BER and average SNR in MRT systems and EGT systems are proposed. The minimum number of increased transmi... 详细信息
来源: 评论