咨询与建议

限定检索结果

文献类型

  • 104 篇 会议
  • 67 篇 期刊文献

馆藏范围

  • 171 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 124 篇 工学
    • 101 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 35 篇 信息与通信工程
    • 14 篇 控制科学与工程
    • 10 篇 机械工程
    • 8 篇 电气工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 6 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 光学工程
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
  • 57 篇 理学
    • 41 篇 数学
    • 12 篇 物理学
    • 7 篇 生物学
    • 6 篇 统计学(可授理学、...
  • 38 篇 管理学
    • 22 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
  • 8 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 3 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
    • 3 篇 作物学

主题

  • 9 篇 cryptography
  • 8 篇 privacy
  • 6 篇 semantics
  • 6 篇 training
  • 5 篇 wireless sensor ...
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 computational mo...
  • 4 篇 security
  • 4 篇 accuracy
  • 4 篇 adaptation model...
  • 3 篇 image segmentati...
  • 3 篇 optimization
  • 3 篇 authentication
  • 3 篇 real-time system...
  • 3 篇 blockchain
  • 3 篇 protocols
  • 3 篇 malware
  • 3 篇 federated learni...
  • 3 篇 cloud computing

机构

  • 8 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 beijing key lab....
  • 8 篇 guangxi collabor...
  • 6 篇 school of comput...
  • 5 篇 shanghai key lab...
  • 5 篇 nanjing fenghuo ...
  • 4 篇 school of comput...
  • 4 篇 ministry of edu....
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 4 篇 key lab. of comp...
  • 4 篇 school of comput...
  • 4 篇 key lab of compu...
  • 4 篇 college of infor...
  • 4 篇 purple mountain ...
  • 4 篇 key laboratory o...
  • 4 篇 key lab. of comp...
  • 4 篇 guangxi key lab ...
  • 4 篇 jiangsu high tec...

作者

  • 11 篇 wang yun
  • 9 篇 li hui
  • 8 篇 chunhe xia
  • 8 篇 tianbo wang
  • 8 篇 he jieyue
  • 7 篇 yun wang
  • 6 篇 chen chen
  • 6 篇 zhang min-ling
  • 5 篇 mi jiacong
  • 5 篇 feng yu
  • 5 篇 liu yongshan
  • 5 篇 zhang yu
  • 4 篇 fan kai
  • 4 篇 jinbin tu
  • 4 篇 xin geng
  • 4 篇 tu jinbin
  • 4 篇 ma wenping
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 yu zhang

语言

  • 149 篇 英文
  • 12 篇 中文
  • 10 篇 其他
检索条件"机构=Key Lab. of Computer Network and Information Integration"
171 条 记 录,以下是141-150 订阅
排序:
Coherent depth test scheme in FreePipe
Coherent depth test scheme in FreePipe
收藏 引用
作者: Liu, Fang Huang, Mengcheng Liu, Xuehui Wu, En-Hua SuperComputing Center Computer Network Information Center Chinese Academy of Sciences China State Key Lab. of Computer Sciences Institute of Software Chinese Academy of Sciences China University of Macau China
This paper presents a rasterization rendering pipeline namely FreePipe. The system builds a bridge between the traditional graphics pipelines and the general purpose computing architecture CUDA by taking advantages of... 详细信息
来源: 评论
The extended FDH sequences
The extended FDH sequences
收藏 引用
作者: Ma, WenPing He, YeFeng Sun, Shaohui Education Key Lab. of Computer Network and Information Security Xidian University Xi'an 710071 China Datang Mobile Communications Equipment Co. Lid. China
A new construction method for polyphase sequences with two-valued periodic auto- and crosscorrelation functions is proposed. This method gives L families of polyphase sequences for each prime length L which is bigger ... 详细信息
来源: 评论
New construction of single-and multi-output Boolean functions with high algebraic immunity
New construction of single-and multi-output Boolean function...
收藏 引用
作者: He, Yefeng Ma, Wenping Ministry of Education Key Lab. of Computer Network and Information Security Xidian University Xi'an 710071 China School of Communication and Information Engineering Xi'an Institute of Post and Telecommunications Xi'an 710121 China
In order to respond to algebraic attacks, it is important to construct Boolean functions with high algebraic immunity of the graphs. In this paper, the complicated problem of algebraic immunity of the graph is convert... 详细信息
来源: 评论
Distance Estimation by Constructing The Virtual Ruler in Anisotropic Sensor networks
Distance Estimation by Constructing The Virtual Ruler in Ani...
收藏 引用
2010 Proceedings IEEE INFOCOM
作者: Yun Wang Kai Li Jie Wu School of Computer Science & Engineering Southeast University Key Lab of Computer Network and Information Integration MOE Nanjing China 210096 Department of Computer and Information Sciences Temple University Philadelphia PA 119122
Distance estimation is fundamental for many functionalities of wireless sensor networks and has been studied intensively in recent years. A critical challenge in distance estimation is handling anisotropic problems in... 详细信息
来源: 评论
On cross-correlation properties of Boolean functions
On cross-correlation properties of Boolean functions
收藏 引用
2009 4th International Conference on Communications and networking in China, CHINACOM 2009
作者: Zhou, Yu Xie, Min Xiao, Guozhen State Key Lab. Integrated Service Network Xidian University Shannxi Xi'an 710071 China Key Laboratory Computer Network and Information Security Xidian University Shannxi Xi'an 710071 China
To measure the correlation between two arbitrary Boolean functions, we propose the two new criteria called the sum-of-squares indicator and the absolute indicator of the cross-correlation. The two indicators generaliz... 详细信息
来源: 评论
A new abuse-free fair electronic payment protocol
A new abuse-free fair electronic payment protocol
收藏 引用
5th International Conference on information Assurance and Security, IAS 2009
作者: Fan, Kai Wang, Yue Li, Hui Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian University Xi'an Shaanxi China Xi'an Branch of Shaanxi Telecom Ltd. Xi'an Shaanxi China
To solve the problem of the abuse in electronic payment protocols, a new abuse-free fair electronic payment protocol is proposed in this paper. The proposed protocol solves the problems in Parks' protocol and furt... 详细信息
来源: 评论
Security analysis of the kerberos protocol using BAN logic
Security analysis of the kerberos protocol using BAN logic
收藏 引用
5th International Conference on information Assurance and Security, IAS 2009
作者: Fan, Kai Li, Hui Wang, Yue Ministry of Edu. Key Lab. of Computer Network and Information Security Xidian University Xi'an Shaanxi China Xi'an Branch of Shaanxi Telecom Ltd. Xi'an Shaanxi China
Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the us... 详细信息
来源: 评论
Improvement of MODIS 8-day LAI/FPAR product with temporal filters to generate high quality time-series product
Improvement of MODIS 8-day LAI/FPAR product with temporal fi...
收藏 引用
2009 Joint Urban Remote Sensing Event
作者: Huifang, Zhang Runhe, Shi Honglin, Zhong Peiqing, Qu Juan, Sun Wenpeng, Lin Su, Li Key Lab. of Geographic Information Science Ministry of Education East China Normal University Shanghai China Key Laboratory of Ecosystem Network Observation and Modeling IGSNRR CAS Beijing China Key Lab. of Urban Ecology and Environment Restoration Shanghai Normal University Shanghai China Computer College Beijing Technology and Business University Beijing China
Numerous studies have reported that the timeseries terrestrial parameters such as the Normalized Difference Vegetation Index (NDVI), Leaf Area of Index (LAI), Fraction of Absorbed Photosynthetic Active Radiation (FPAR... 详细信息
来源: 评论
Combining opportunistic routing with dynamic source routing for wireless mesh networks
Combining opportunistic routing with dynamic source routing ...
收藏 引用
Institution of Engineering and Technology International Communication Conference on Wireless Mobile and Computing
作者: Shen, Qiang Fang, Xuming Kim, Sunmyeng He, Rong Provincial Key Lab. of Information Coding and Transmission Southwest Jiaotong University Chengdu 610031 China High Performance Network Lab. Institute of Acoustics Chinese Academy of Sciences Beijing 100190 China School of Computer and Software Engineering Kumoh National Institute of Technology Gyeongbuk 730701 Korea Republic of
Routing in wireless mesh networks presents a great challenge due to unreliable wireless links and collisions. Recently, a new routing method, opportunistic routing (OR), is proposed to deal with them by exploiting bro... 详细信息
来源: 评论
An improved identity-based group signature scheme
An improved identity-based group signature scheme
收藏 引用
2009 International Conference on Computational Intelligence and Security, CIS 2009
作者: Tan, Zuowen School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 Jiangxi Province China Key Lab. of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 Fujian Province China
In a group signature scheme, a group member signs messages anonymously on behalf of the group. However, in the case of a dispute, the actual group signer's identity can be revealed by a designated entity. In this ... 详细信息
来源: 评论