咨询与建议

限定检索结果

文献类型

  • 1,702 篇 会议
  • 1,349 篇 期刊文献

馆藏范围

  • 3,051 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,017 篇 工学
    • 1,493 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 546 篇 信息与通信工程
    • 275 篇 电气工程
    • 214 篇 电子科学与技术(可...
    • 208 篇 控制科学与工程
    • 199 篇 生物工程
    • 134 篇 机械工程
    • 127 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 97 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 67 篇 交通运输工程
    • 65 篇 化学工程与技术
    • 64 篇 动力工程及工程热...
    • 54 篇 安全科学与工程
    • 42 篇 建筑学
  • 920 篇 理学
    • 532 篇 数学
    • 219 篇 生物学
    • 199 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 75 篇 化学
  • 565 篇 管理学
    • 344 篇 管理科学与工程(可...
    • 244 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 94 篇 法学
    • 60 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 31 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 135 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 59 篇 deep learning
  • 59 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 privacy
  • 42 篇 robustness
  • 41 篇 security
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 162 篇 school of comput...
  • 83 篇 key laboratory o...
  • 67 篇 computer network...
  • 67 篇 college of compu...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 39 篇 fujian provincia...
  • 37 篇 school of cyber ...
  • 36 篇 university of ch...
  • 36 篇 shandong provinc...
  • 35 篇 key laboratory o...
  • 31 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 28 篇 zhang min-ling
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 26 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 237 篇 其他
  • 120 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3051 条 记 录,以下是2971-2980 订阅
排序:
Action-Based Access Control Modelt
收藏 引用
电子学报(英文版) 2008年 第3期17卷 396-401页
作者: LI Fenghua WANG Wei MA Jianfeng Sang JaeMoon Key Laboratory of Computer Networks and Information Security (Ministry of Education) Xidian University Xi'an 710071 China) Graduate School Beijing Electronic Science and Technology Institute Beijing 100070 China) Mobile Network Security Technology Research Center Kyungpook National UniversitySankyuk-dong~ Buk-ku~ Daeyu 702-701~ KoreaI
来源: 评论
Secure AODV Routing Protocol Using SL Multi-Signcryption
收藏 引用
电子学报(英文版) 2007年 第2期16卷 311-314页
作者: ZHANG Chuanrong YIN Zhonghai ZHANG Yuqing XIAO Guozhen Telecommunication Engineering Institute A irforce Engineering University Xi ' an 710077 China National Computer Network Intrusion Protection Center GUCAS Beijing 100049 China State Key Laboratory of Integrated Service Networks Xidian University Xi'an 710071 China The Ministry of Education Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China
Routing security is an important issue in secure ad hoc networks, and it appears to be a problem that is not trivial to solve. In this paper, we consider secure routing protocol and applied new cryptographic mechanism... 详细信息
来源: 评论
Short group signature with IND-CCA2 full-anonymity
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2007年 第10期30卷 1865-1871页
作者: Zhang, Yue-Yu Chen, Jie Su, Wan-Li Wang, Yu-Min Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China
In CRYPTO 2004, a short group signature is proposed by Boneh, Boyen and Shacham, which is based on strong Diffie-Hellman (SDH) assumption and Decision Linear assumption. Thereafter it is denoted BBS. Only chosen plain... 详细信息
来源: 评论
Hybrid heuristic for total flowtime minimization in no-wait flow shops
Hybrid heuristic for total flowtime minimization in no-wait ...
收藏 引用
11th International Conference on computer Supported Cooperative Work in Design, CSCWD 2007
作者: Zhu, Xia Li, Xiaoping Wang, Qian School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
In this paper, no-wait flow shop scheduling problem with total flowtime minimization is considered. A hybrid heuristic is proposed, which is based on PH1 (p) (presented by Aldowaisan and Allahverdi, OMEGA, 2004). A co... 详细信息
来源: 评论
Rights management scheme for DRM in authorized domain based on PMI
收藏 引用
Tongxin Xuebao/Journal on Communications 2007年 第SUPPL.期28卷 107-111页
作者: Gao, Ming-Ding Pei, Qing-Qi Zeng, Xing-Wen Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China
The DRM technologies and the concept of authorized domain were introduced. The requirements of rights management for DRM in Authorized domain were analyzed from the examples of application scene. A rights management s... 详细信息
来源: 评论
Universally composable anonymous Hash certification model
收藏 引用
Science in China(Series F) 2007年 第3期50卷 440-455页
作者: ZHANG Fan MA JianFeng SangJae MOON Key Laboratory of Computer Networks and Information Security (Ministry of Education) Xidian UniversityXi'an 710071 China Mobile Network Security Technology Research Center Kyungpook National University Sankyuk-dongBuk-ku Daeyu 702-701 Korea
Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity authentica... 详细信息
来源: 评论
Study of side-channel attacks for elliptic curve cryptosystem algorithm
收藏 引用
Wuhan Ligong Daxue Xuebao (Jiaotong Kexue Yu Gongcheng Ban)/Journal of Wuhan University of Technology (Transportation Science and Engineering) 2007年 第3期31卷 491-493+505页
作者: Liu, Shuanggen Hu, Yupu Xu, Wensheng Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China College of Computer Information Engineering Jiangxi Normal University Nanchang 330022 China
Side-channel attacks are serious practical threat against implementation of cryptographic algorithms. Regarding implementation of elliptic curve cryptosystems, simple side-channel attacks (SSCA) can be used to determi... 详细信息
来源: 评论
Hybrid Heuristic for Total Flowtime Minimization in No-wait Flow Shops
Hybrid Heuristic for Total Flowtime Minimization in No-wait ...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Xia Zhu Xiaoping Li Qian Wang School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education South-East University Nanjing China
In this paper, no-wait flow shop scheduling problem with total flowtime minimization is considered. A hybrid heuristic is proposed, which is based on PHI (p) (presented by Aldowaisan and Allahverdi, OMEGA, 2004). A co... 详细信息
来源: 评论
Web Service Based Method for Large Scale Flow Shops with Flowtime Minimization
Web Service Based Method for Large Scale Flow Shops with Flo...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yi Zhang Xiaoping Li Qian Wang Key Laboratory of Computer Network and Information Integration Ministry of Education South-East University Nanjing China Southeast University Nanjing Jiangsu CN
In this paper, a Web Service based method is presented to conduct parallelized operations in an algorithm on multiple computers. Parallelizable operations in a constructive heuristic for flow shop scheduling problem w... 详细信息
来源: 评论
Cost Optimization Method for Workflows with Deadline Constraints in Grids
Cost Optimization Method for Workflows with Deadline Constra...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yingchun Yuan Xiaoping Li Qian Wang Xia Zhu School of Computer Science and Engineering South-East University Nanjing China Faculty of Information Science Agricultural University of Hebei Baoding China Key Laboratory of Computer Network and Information Integration Ministry of Education South-East University Nanjing China School of Computer Science and Engineering Southeast University Nanjing 210096 P.R. China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education Nanjing 210096 P.R. China. qwang@*** Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education Nanjing 210096 P.R. China
Cost optimization for workflow applications with deadline constraints is fundamental and intractable in grids. In this paper, early tree is introduced to find an early feasible schedule for a workflow application. Acc... 详细信息
来源: 评论