咨询与建议

限定检索结果

文献类型

  • 104 篇 会议
  • 67 篇 期刊文献

馆藏范围

  • 171 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 124 篇 工学
    • 101 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 35 篇 信息与通信工程
    • 14 篇 控制科学与工程
    • 10 篇 机械工程
    • 8 篇 电气工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 6 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 光学工程
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
  • 57 篇 理学
    • 41 篇 数学
    • 12 篇 物理学
    • 7 篇 生物学
    • 6 篇 统计学(可授理学、...
  • 38 篇 管理学
    • 22 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
  • 8 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 3 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
    • 3 篇 作物学

主题

  • 9 篇 cryptography
  • 8 篇 privacy
  • 6 篇 semantics
  • 6 篇 training
  • 5 篇 wireless sensor ...
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 computational mo...
  • 4 篇 security
  • 4 篇 accuracy
  • 4 篇 adaptation model...
  • 3 篇 image segmentati...
  • 3 篇 optimization
  • 3 篇 authentication
  • 3 篇 real-time system...
  • 3 篇 blockchain
  • 3 篇 protocols
  • 3 篇 malware
  • 3 篇 federated learni...
  • 3 篇 cloud computing

机构

  • 8 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 beijing key lab....
  • 8 篇 guangxi collabor...
  • 6 篇 school of comput...
  • 5 篇 shanghai key lab...
  • 5 篇 nanjing fenghuo ...
  • 4 篇 school of comput...
  • 4 篇 ministry of edu....
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 4 篇 key lab. of comp...
  • 4 篇 school of comput...
  • 4 篇 key lab of compu...
  • 4 篇 college of infor...
  • 4 篇 purple mountain ...
  • 4 篇 key laboratory o...
  • 4 篇 key lab. of comp...
  • 4 篇 guangxi key lab ...
  • 4 篇 jiangsu high tec...

作者

  • 11 篇 wang yun
  • 9 篇 li hui
  • 8 篇 chunhe xia
  • 8 篇 tianbo wang
  • 8 篇 he jieyue
  • 7 篇 yun wang
  • 6 篇 chen chen
  • 6 篇 zhang min-ling
  • 5 篇 mi jiacong
  • 5 篇 feng yu
  • 5 篇 liu yongshan
  • 5 篇 zhang yu
  • 4 篇 fan kai
  • 4 篇 jinbin tu
  • 4 篇 xin geng
  • 4 篇 tu jinbin
  • 4 篇 ma wenping
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 yu zhang

语言

  • 149 篇 英文
  • 12 篇 中文
  • 10 篇 其他
检索条件"机构=Key Lab. of Computer Network and Information Integration"
171 条 记 录,以下是161-170 订阅
排序:
A distributed topology control algorithm for k-connected dominating set in wireless sensor networks
A distributed topology control algorithm for k-connected dom...
收藏 引用
2007 2nd International Conference on Pervasive Computing and Applications, ICPCA'07
作者: Yun, Wang Kai, Li Qiang, Xu Lab. of Computer Network and Information Integration Southeast University Ministry of Education Nanjing 210096 China
Potential applications have fostered the rapid development of wireless sensor network. Power control technology contributes as a fundamental part in fault tolerant topology control, through which simplified reliably c... 详细信息
来源: 评论
New trust model based on advanced D-S evidence theory for P2P networks
收藏 引用
Dianzi Yu Xinxi Xuebao/Journal of Electronics and information Technology 2008年 第6期30卷 1480-1484页
作者: Tian, Chun-Qi Zou, Shi-Hong Wang, Wen-Dong Cheng, Shi-Duan Broadband Network Research Center State Key Lab. of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Department of Computer Science and Technology College of Electronic and Information Engineering Tongji University Shanghai 200092 China
Trust relationship between participants is indispensable to set up in a large-scale distributed P2P file-sharing system. A novel trust model for P2P system based on advanced D-S theory of evidence is proposed in this ... 详细信息
来源: 评论
An improved algorithm for Eleman Neural network by adding a modified error function
An improved algorithm for Eleman Neural Network by adding a ...
收藏 引用
4th International Symposium on Neural networks, ISNN 2007
作者: Zhang, Zhiqiang Tang, Zheng Tang, GuoFeng Vairappan, Catherine Wang, XuGang Xiong, RunQun Faculty of Engineering Toyama University Gofuku 3190 Toyama shi 930-8555 Japan Institute of Software Chinese Academy of Sciences Beijing 100080 China Key Lab. of Computer Network and Information Integration Southeast University Nanjing 210096 China
The Eleman Neural network has been widely used in various fields ranging from temporal version of the Exclusive-OR function to the discovery of syntactic categories in natural language date. However, one of the proble... 详细信息
来源: 评论
Study of distinguishing attack on a new type nonlinear filter generator
收藏 引用
Tongxin Xuebao/Journal on Communications 2007年 第SUPPL.期28卷 151-154页
作者: Wu, Li-Hua Li, Yuan Hu, Yu-Pu Key Lab. of Computer Network and Information Security Xidian Univ. Xi'an 710071 China
Based on the theory of hypothesis testing the security of a new type nonlinear filter generator was studied, which consists of non-linear source, linear feedback shift register and filter Boolean functions. The result... 详细信息
来源: 评论
Survivable storage networks and Quorum system
收藏 引用
Tongxin Xuebao/Journal on Communications 2007年 第SUPPL.期28卷 121-124页
作者: Zhang, Wei Ma, Jian-Feng Liu, Shu-Guang Wang, Chao Key Lab. of Computer Network and Information Security Xidian Univ. Xi'an 710071 China Engineering Institute of the Armed Police Xi'an 710086 China
A survivable storage architecture was provided based on an overall study of storage service survivability. It contains storage nodes, users, access control system, reliability analysis module, intrusion and fault dete... 详细信息
来源: 评论
Graphic-based theory proof of compliance algorithm
收藏 引用
Jisuanji Gongcheng/computer Engineering 2006年 第21期32卷 175-176页
作者: Rao, Yixuan Yang, Bo Key Lab. of Computer Network and Information Security Xi'an 710071 China
The paper puts forward a new proof of compliance algorithm in PolicyMaker, the algorithm applies graphic theory's DFS notion and the dynamic character, in the face of withdrawing the delegation, deletes the delega... 详细信息
来源: 评论
Study on high-speed network intrusion detection based on network processor
收藏 引用
Zhongshan Daxue Xuebao/Acta Scientiarum Natralium Universitatis Sunyatseni 2006年 第SUPPL.期45卷 31-34页
作者: Li, Jia-Chun Chen, Qi-Yu Zhang, Ling Liu, Lan Computer Network Key Lab. South China University of Technology Guangzhou 510640 China Department of Electronics and Information Guangdong Polytechnic Normal University Guangzhou 510665 China
In order to improve attack detection rate and processing capability of intrusion detection system on high-speed environment, NP-NIDS: a high-speed intrusion detection system based on IXP2400 network processor is studi... 详细信息
来源: 评论
A novel secure routing system in overlay environment
收藏 引用
4th International Conference on Grid and Cooperative Computing - GCC 2005
作者: Su, Han Wang, Yun Department of Computer Science and Engineering Lab. of Computer Network and Information Integration Southeast University Nanjing 210096 China
Routers are effective building blocks for Internet. It is almost impossible to modify router software only for applications. How to satisfy applications' specific requirements of communication is a big problem. No... 详细信息
来源: 评论
New delegation of the decryption scheme for P2P data sharing
收藏 引用
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University 2005年 第5期32卷 781-785页
作者: Zhao, Heng Quan, Yi-Ning Hu, Yu-Pu Key Lab. of Computer Network and Information Security Xidian Univ. Xi'an 710071 China
By applying the secret sharing system and the zero knowledge proof protocol, this paper presents a new time constraint delegation of the decryption scheme based on trust agent platforms, which solves the problem that ... 详细信息
来源: 评论
Efficient anonymous fingerprinting scheme based on the bilinear Diffie-Hellman intractability assumption
收藏 引用
Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University 2005年 第5期32卷 794-797页
作者: Wei, Ling-Bo Yang, Bo Key Lab. of Computer Network and Information Security Xidian Univ. Xi'an 710071 China
In the gap Diffie-Hellman group, based on the bilinear Diffie-Hellman intractable assumption and the security two-party computation protocol, a new efficient anonymous fingerprint scheme is proposed. This scheme is no... 详细信息
来源: 评论