咨询与建议

限定检索结果

文献类型

  • 1,806 篇 会议
  • 1,567 篇 期刊文献

馆藏范围

  • 3,373 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,197 篇 工学
    • 1,552 篇 计算机科学与技术...
    • 1,250 篇 软件工程
    • 573 篇 信息与通信工程
    • 290 篇 电气工程
    • 234 篇 电子科学与技术(可...
    • 232 篇 控制科学与工程
    • 193 篇 生物工程
    • 159 篇 机械工程
    • 133 篇 网络空间安全
    • 111 篇 仪器科学与技术
    • 104 篇 光学工程
    • 98 篇 生物医学工程(可授...
    • 76 篇 化学工程与技术
    • 76 篇 核科学与技术
    • 70 篇 动力工程及工程热...
    • 67 篇 交通运输工程
    • 65 篇 安全科学与工程
  • 1,108 篇 理学
    • 533 篇 数学
    • 376 篇 物理学
    • 212 篇 生物学
    • 165 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 81 篇 化学
  • 582 篇 管理学
    • 361 篇 管理科学与工程(可...
    • 252 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 91 篇 法学
    • 48 篇 法学
  • 76 篇 医学
    • 61 篇 临床医学
    • 50 篇 基础医学(可授医学...
  • 50 篇 经济学
    • 50 篇 应用经济学
  • 27 篇 军事学
  • 25 篇 农学
  • 15 篇 教育学
  • 13 篇 文学
  • 9 篇 艺术学

主题

  • 141 篇 feature extracti...
  • 122 篇 semantics
  • 106 篇 hadron colliders
  • 103 篇 accuracy
  • 95 篇 computational mo...
  • 88 篇 training
  • 83 篇 deep learning
  • 70 篇 data models
  • 62 篇 federated learni...
  • 52 篇 neural networks
  • 51 篇 security
  • 49 篇 privacy
  • 45 篇 adaptation model...
  • 43 篇 optimization
  • 43 篇 predictive model...
  • 42 篇 robustness
  • 41 篇 protocols
  • 41 篇 cloud computing
  • 40 篇 blockchain
  • 40 篇 cryptography

机构

  • 192 篇 shandong provinc...
  • 174 篇 key laboratory o...
  • 151 篇 centro brasileir...
  • 151 篇 yerevan physics ...
  • 150 篇 national and kap...
  • 150 篇 istanbul technic...
  • 149 篇 university of sp...
  • 149 篇 academy of scien...
  • 148 篇 universidad iber...
  • 148 篇 indian institute...
  • 147 篇 charles universi...
  • 147 篇 department of ph...
  • 146 篇 brunel universit...
  • 146 篇 university of de...
  • 144 篇 rwth aachen univ...
  • 142 篇 imperial college...
  • 139 篇 università di to...
  • 139 篇 zhejiang univers...
  • 139 篇 indian institute...
  • 136 篇 infn sezione di ...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,120 篇 英文
  • 158 篇 其他
  • 103 篇 中文
检索条件"机构=Key Laboratory of Computer Network Technology"
3373 条 记 录,以下是3321-3330 订阅
排序:
Netflow based network service QoS monitor system
收藏 引用
Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition) 2008年 第SUPPL. 1期38卷 114-117页
作者: Wu, Hua Gong, Jian Zhang, Xiaoyu School of Computer Science and Engineering Southeast University Nanjing 210096 China Key Laboratory of Computer Network Technology of Jiangsu Province Nanjing 210096 China
In order to obtain the network performance metrics from the Netflow, the reliability of obtaining the network metrics from the sampled Netflow is analyzed. A Netflow based network service QoS (quality of service) moni... 详细信息
来源: 评论
keying material based key pre-distribution scheme
Keying material based key pre-distribution scheme
收藏 引用
IEEE International Conference on Intelligence and Security Informatics, ISI
作者: Zhihong Liu Jianfeng Ma Qiping Huang SangJae Moon Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China School of Communication Engineering Xidian University Xi'an China Mobile Network Security Technology Research Center Kyungpook National University South Korea
A key pre-distribution scheme is a method by which initially an off-line trusted authority T A distributes pieces of information among a set of users. Later, each member of a group of users can compute a common key fo... 详细信息
来源: 评论
Limitedly dividable stream-based modeling and performance analysis of P2P streaming networks
收藏 引用
Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition) 2008年 第SUPPL. 1期38卷 145-149页
作者: Wu, Jiagao Tao, Jun Zou, Zhiqiang Institute of Computer Technology College of Computer Nanjing University of Posts and Telecommunications Nanjing 210003 China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing 210096 China
Due to the deficiency of fluid-based (FB) P2P network model in dealing with the stream which could not be divided infinitely, a limitedly dividable stream-based (LDSB) model was studied and proposed for P2P streaming ... 详细信息
来源: 评论
MPMAC and its security analysis
收藏 引用
Beijing Gongye Daxue Xuebao / Journal of Beijing University of technology 2008年 第SUPPL. 2期34卷 62-66页
作者: Zhang, Shao-Lan Yang, Yi-Xian Xing, Guo-Bo Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China School of Computer Science and Technology Shandong Jianzhu University Jinan 250101 China
According to the weakness of mode of operation, a modified parallelizable message authentication code (MPMAC) is proposed. The mode to process the last block of message is improved to avoid the forgery attack with ran... 详细信息
来源: 评论
Universally composable anonymous Hash certification model
收藏 引用
Science in China(Series F) 2007年 第3期50卷 440-455页
作者: ZHANG Fan MA JianFeng SangJae MOON Key Laboratory of Computer Networks and Information Security (Ministry of Education) Xidian UniversityXi'an 710071 China Mobile Network Security Technology Research Center Kyungpook National University Sankyuk-dongBuk-ku Daeyu 702-701 Korea
Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity authentica... 详细信息
来源: 评论
Provable Efficient Certificateless Group key Exchange Protocol
收藏 引用
Wuhan University Journal of Natural Sciences 2007年 第1期12卷 41-45页
作者: CAO Chunjie MA Jianfeng MOON Sangjae Key Laboratory of Computer Networks and InformationSecurity Ministry of Education Xidian University Xi' an 710071Shaanxi China Mobile Network Security Technology Research Center Kyungpook National University Daeyu 702701 Korea
Certificateless public key cryptography (CL-PKC) avoids the inherent escrow of identity-based cryptography and does not require certificates to guarantee the authenticity of public keys. Based on CL-PKC, we present ... 详细信息
来源: 评论
A Complex Virtual Screening Computing Platform Based on SOA
A Complex Virtual Screening Computing Platform Based on SOA
收藏 引用
IEEE Asia-Pacific Conference on Services Computing (APSCC)
作者: Pengfei Liu Shoubin Dong Yicheng Cao Zhengping Du Zhike Mao Communication and Computer Network Key Laboratory of Guangdong South China University of Technology Guangzhou China School of Bioscience and Bioengineering South China University of Technology Guangzhou China
Receptor-based virtual screening becomes more and more important in novel leads design in pharmaceutical industry. However, virtual screening technology is not mature enough and still growing with the dynamic developm... 详细信息
来源: 评论
Research on Usage Control Model with Delegation Characteristics Based on OM-AM Methodology
Research on Usage Control Model with Delegation Characterist...
收藏 引用
IFIP International Conference on network and Parallel Computing Workshops (NPC Workshops)
作者: Zhiyong Zhang Lin Yang Qingqi Pei Jianfeng Ma Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an China Electron. Information Engineering Coll. Henan University of Science and Technology Luoyang China The Research Institute Renesas Technology Corporation Beijing China
UCON ABC is a basic framework of next generation access control policy Usage Control that is composed of Authorization-oBlige-Condition components, but so far it lacks of important delegation characteristic. The pape... 详细信息
来源: 评论
Architecture and implementation of parallel multiple structural alignment on the grid environment
收藏 引用
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and technology (Natural Science Edition) 2007年 第SUPPL. 2期35卷 72-75页
作者: Liu, Pengfei Dong, Shoubin Cao, Yicheng Du, Zhengping Communication and Computer Network Key Laboratory of Guangdong South China University of Technology Guangzhou 510640 China School of Bioscience and Bioengineering South China University of Technology Guangzhou 510640 China
This paper aims at the computing-intensive problem of multiple structural alignment. After conducting analysis on progressive pairwise alignment strategy that most of the popular multiple structural alignment based on... 详细信息
来源: 评论
New scheme of implementing real-time linux
New scheme of implementing real-time linux
收藏 引用
2006 International Conference on Software Engineering Advances, ICSEA'06
作者: Hong, Xue-Yu Zhang, Ling Hu, Jin-Long Guangdong Key Laboratory of Computer Network South China University of Technology Guangzhou 510640 China
To well support the real-time requirement from applications, we enhance the real-time ability in Linux kernel through two new kernel mechanisms. Firstly, we present a new microsecond-level timer mechanism based on UTI... 详细信息
来源: 评论