咨询与建议

限定检索结果

文献类型

  • 104 篇 会议
  • 67 篇 期刊文献

馆藏范围

  • 171 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 124 篇 工学
    • 101 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 35 篇 信息与通信工程
    • 14 篇 控制科学与工程
    • 10 篇 机械工程
    • 8 篇 电气工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 6 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 光学工程
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
  • 57 篇 理学
    • 41 篇 数学
    • 12 篇 物理学
    • 7 篇 生物学
    • 6 篇 统计学(可授理学、...
  • 38 篇 管理学
    • 22 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
  • 8 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 3 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
    • 3 篇 作物学

主题

  • 9 篇 cryptography
  • 8 篇 privacy
  • 6 篇 semantics
  • 6 篇 training
  • 5 篇 wireless sensor ...
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 computational mo...
  • 4 篇 security
  • 4 篇 accuracy
  • 4 篇 adaptation model...
  • 3 篇 image segmentati...
  • 3 篇 optimization
  • 3 篇 authentication
  • 3 篇 real-time system...
  • 3 篇 blockchain
  • 3 篇 protocols
  • 3 篇 malware
  • 3 篇 federated learni...
  • 3 篇 cloud computing

机构

  • 8 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 beijing key lab....
  • 8 篇 guangxi collabor...
  • 6 篇 school of comput...
  • 5 篇 shanghai key lab...
  • 5 篇 nanjing fenghuo ...
  • 4 篇 school of comput...
  • 4 篇 ministry of edu....
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 4 篇 key lab. of comp...
  • 4 篇 school of comput...
  • 4 篇 key lab of compu...
  • 4 篇 college of infor...
  • 4 篇 purple mountain ...
  • 4 篇 key laboratory o...
  • 4 篇 key lab. of comp...
  • 4 篇 guangxi key lab ...
  • 4 篇 jiangsu high tec...

作者

  • 11 篇 wang yun
  • 9 篇 li hui
  • 8 篇 chunhe xia
  • 8 篇 tianbo wang
  • 8 篇 he jieyue
  • 7 篇 yun wang
  • 6 篇 chen chen
  • 6 篇 zhang min-ling
  • 5 篇 mi jiacong
  • 5 篇 feng yu
  • 5 篇 liu yongshan
  • 5 篇 zhang yu
  • 4 篇 fan kai
  • 4 篇 jinbin tu
  • 4 篇 xin geng
  • 4 篇 tu jinbin
  • 4 篇 ma wenping
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 yu zhang

语言

  • 149 篇 英文
  • 12 篇 中文
  • 10 篇 其他
检索条件"机构=Key Lab. of Computer Network and Information Integration"
171 条 记 录,以下是151-160 订阅
排序:
pService: Towards similarity search on peer-to-peer web services discovery
pService: Towards similarity search on peer-to-peer web serv...
收藏 引用
1st International Conference on Advances in P2P Systems, AP2PS 2009
作者: Zhou, Gang Yu, Jianjun National Digital Switching System Engineering and Technological Research Center 450002 France State Key Lab. of Software Development Environment Beihang University 100191 China Computer Network Information Center Chinese Academy of Sciences 100190 China
We present the design of pService system for P2P Web services discovery supporting similarity earch with its locality-preserving feature based on modified Skip Graph. In pService, the most important property (e.g. ser... 详细信息
来源: 评论
Study of secret sharing schemes based on quantum theory
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第11 A期30卷 127-132+139页
作者: Zhu, Zhen-Chao Zhang, Yu-Qing Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 China National Computer Network Intrusion Protection Center GUCAS Beijing 100043 China
Quantum secret sharing (QSS) which is based on the laws of quantum mechanics, instead of mathematical assumptions can share the information unconditionally securely, according to the form of sharing information, quant... 详细信息
来源: 评论
Support vector machine for suppressing error method
Support vector machine for suppressing error method
收藏 引用
1st International Conference on information Science and Engineering, ICISE2009
作者: Lu, Shuxia Shi, Pu Chen, Ming Key Lab. of Machine Learning and Computational Intelligence College of Mathematics and Computer Science Hebei University Baoding China Baoding Pascali Cable TV Integrater Information Network Co. Ltd. Baoding China College of Mathematics and Computer Science Hebei University Baoding China
Support Vector Machine (SVM) is sensitive to noises and outliers. For reducing the effect of noises and outliers, we propose a novel SVM for suppressing error function. The error function is limited to the interval of... 详细信息
来源: 评论
An active defense model and framework of insider threats detection and sense
An active defense model and framework of insider threats det...
收藏 引用
5th International Conference on information Assurance and Security, IAS 2009
作者: Zhang, Hongbin Ma, Jianfeng Wang, Yinchuan Pei, Qingqi Ministry of Education Key Lab. of Computer Network and Information Security Xidian Univ. Xi'an 710071 China Inst. of Information Sci. and Eng. Hebei Univ. of Sci. and Tech. Shijiazhuang 050018 China Research Institute China Electronic Equipment and Systems Engineering Corporation Beijing 100141 China
Insider attacks is a well-known problem acknowledged as a threat as early as 1980s. The threat is attributed to legitimate users who take advantage of familiarity with the computational environment and abuse their pri... 详细信息
来源: 评论
Non-blocking message total ordering protocol
收藏 引用
Science in China(Series F) 2008年 第12期51卷 1919-1934页
作者: WANG Yun & WANG JunLing School of computer Science & Engineering, Southeast University key lab.of computer network & information integration, MOE, Nanjing 210096, China 1. School of Computer Science & Engineering Southeast University Key Lab of Computer Network & Information Integration MOE Nanjing 210096 China
Message total ordering is a critical part in active replication in order to maintain consistency among members in a fault tolerant group. The paper proposes a non-blocking message total ordering protocol (NBTOP) for... 详细信息
来源: 评论
A link analysis for passive UHF RFID system in LOS indoor environment
A link analysis for passive UHF RFID system in LOS indoor en...
收藏 引用
2008 International Conference on Wireless Communications, networking and Mobile Computing, WiCOM 2008
作者: Hong, Gang Wang Chang, Xing Petitioner Chang, Hua Zhu Ministry of Education Key Lab. Computer Network and Information Security Xidian University Xi'an China
A link analysis model for passive UHF RFID system in LOS indoor environment is developed and demonstrated. Using this model, the power received by tag and the read performance are investigated. The multipath fading an... 详细信息
来源: 评论
Twice-Imaging airborne camera system with distributed sensors  21
Twice-Imaging airborne camera system with distributed sensor...
收藏 引用
21st Congress of the International Society for Photogrammetry and Remote Sensing, ISPRS 2008
作者: Zhao, S.H. Yan, L. Duan, X.H. Wu, Y.K. Shen, T.T. Su, M.D. Beijing Key Lab. of Spatial Information Integration and its Application Peking University Beijing100871 China School of Electronics Engineering and Computer Science Peking University Beijing China
Digital airborne cameras play a significant role for aerial Photogrammetry development from analog to full-digital age. Because of the gap between digital sensor performance and Photogrammetry request, digital airborn... 详细信息
来源: 评论
Autonomous distributed trust mode
收藏 引用
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University 2008年 第3期35卷 469-473页
作者: Zhan, Yang Pang, Liao-Jun Zhu, Xiao-Yan Wang, Yu-Min Key Lab. of Computer Network and Information Security Xidian Univ. Xi'an 710071 China State Key Lab. of Integrated Service Networks Xidian Univ. Xi'an 710071 China
To estimate the trust value in P2P networks, an autonomous trust mode based on both direct experiences and recommendations is proposed, in which the recommendation synthetic coefficients are decided by the trustor'... 详细信息
来源: 评论
Attack-tolerant node localization in wireless sensor networks
收藏 引用
Wuhan Ligong Daxue Xuebao/Journal of Wuhan University of Technology 2008年 第7期30卷 111-115页
作者: Ye, A-Yong Ma, Jian-Feng Key Lab. of the Ministry of Education for Computer Networks and Information Security Xidian University Xi'an 710071 China Key Lab. of the Network Security and Cryptology Fujian Normal University Fuzhou 350007 China
It is essential to ensure that sensors can determine their location for wireless sensor networks. However, most of existing location discovery protocols became vulnerable in the presence of malicious attacks. So the a... 详细信息
来源: 评论
Adaptive genetic algorithm and its application to multi-literal multi-issue competitive e-commerce
收藏 引用
Dianzi Yu Xinxi Xuebao/Journal of Electronics and information Technology 2008年 第11期30卷 2613-2616页
作者: Li, Jian Jing, Bo Yang, Yi-Xian Information Security Center State Key Lab. of Network and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Dept. of Computer Technology Beijing Institute of Applied Meteorology Beijing 100029 China
To make the agents negotiate more efficiently in multi-lateral multi-issue negotiation in multi-agent based competitive e-commerce, an agent negotiation model in competitive environment is presented, and the Adaptive ... 详细信息
来源: 评论