咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3241-3250 订阅
排序:
BASIC regenerating code: Binary addition and shift for exact repair
BASIC regenerating code: Binary addition and shift for exact...
收藏 引用
IEEE International Symposium on Information Theory
作者: Hanxu Hou Kenneth W. Shum Minghua Chen Hui Li Peking University Beijing Beijing CN Institute of Network Coding Chinese University of Hong Kong Hong Kong China Department of Information Engineering Chinese University of Hong Kong Hong Kong China Shenzhen Engineering Laboratory of Converged Networks Technology Shenzhen Key Laboratory of Cloud Computing Technology and App. Shenzhen Graduate School Peking University Shenzhen China
Regenerating code is a class of storage codes that achieve the optimal trade-off between storage capacity and repair bandwidth, which are two important performance metrics in data storage systems. However, existing co... 详细信息
来源: 评论
fast Unbalanced Three-phase Adjustment base on Single-phase Load Switching
收藏 引用
Telkomnika - Indonesian Journal of Electrical Engineering 2013年 第8期11卷 4327-4334页
作者: Zheng, Yanwei Zou, Lisheng He, Jian Su, Yongyi Feng, Zhiquan Shandong Provincial Key Laboratory of Network based Intelligent Computing School of Information Science and Engineering University of Jinan 106 Jiwei road 250022 Jinan city China Department of Production and Technology Linyi Power Supply Corp. 130 Jinqueshan road 276001 Linyi city China
To balance three-phase loads in distribution network with abundant of single-phase loads, a new wiring method and three-phase loads adjustment policy was proposed in this paper. In the wiring method, a single-phase lo... 详细信息
来源: 评论
Software structure evaluation based on the interaction and encapsulation of methods
收藏 引用
Science China(Information Sciences) 2012年 第12期55卷 2816-2825页
作者: ZHENG QingHua 1,2,OU ZhiJiang 1,2,LIU Ting 1,YANG ZiJiang 3,HOU YuQiao 1,2 & ZHENG Chao 1,2 1 MOE key laboratory for Intelligent networks and network security,Xi'an Jiaotong University,Xian 710049,China 2 Shaanxi key laboratory of Satellite-terrestrial network technology R&D,Xi'an Jiaotong University,Xian 710049,China 3 Department of Computer Science,Western Michigan University,Michigan,USA 1. MOE Key Laboratory for Intelligent Networks and Network Security Xi’an Jiaotong University Xian 710049 China2. Shaanxi Key Laboratory of Satellite-terrestrial Network Technology R&D Xi’an Jiaotong University Xian 710049 China3. Department of Computer Science Western Michigan University Michigan USA
Software structure is the most important factor affecting the quality of a *** evaluation of software structure is a foundational technique for software ***,the traditional evaluation criteria,such as "high cohes... 详细信息
来源: 评论
A cross layer collaborating cache scheme to improve performance of HTTP clients in MANETs
收藏 引用
International Journal of u- and e- Service, Science and technology 2013年 第6期6卷 51-57页
作者: Liu, Jin Ren, Hongmin Wang, Jin Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China Shanghai International Shipping Institute Shanghai Maritime University Shanghai China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China College of Information Engineering Shanghai Maritime University Shanghai China
This paper proposes a novel cross layer collaborating cache scheme for HTTP clients. It is designed to accelerate the process that an HTTP client retrieves Web content in mobile ad hoc network environment. Unlike othe... 详细信息
来源: 评论
BIDE-based parallel mining of frequent closed sequences with MapReduce
BIDE-based parallel mining of frequent closed sequences with...
收藏 引用
12th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2012
作者: Yu, Dongjin Wu, Wei Zheng, Suhang Zhu, Zhixiang School of Computer Hangzhou Dianzi University Hangzhou China Zhejiang Provincial Key Laboratory of Network Technology and Information Security Hangzhou China
Parallel processing is essential to mining frequent closed sequences from massive volume of data in a timely manner. On the other hand, MapReduce is an ideal software framework to support distributed computing on larg... 详细信息
来源: 评论
Efficient and random oracle-free conditionally anonymous ring signature
Efficient and random oracle-free conditionally anonymous rin...
收藏 引用
6th International Conference on Provable security, ProvSec 2012
作者: Zeng, Shengke Qin, Zhiguang Lu, Qing Li, Qinyi School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Network and Data Security Key Laboratory of Sichuan Province China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security China
Compared to conventional ring signature schemes, conditionally anonymous ring signatures allow to revoke the anonymity of actual signer without the group manager's help if necessary. When the actual signer intends... 详细信息
来源: 评论
Corrigendum to “A variable-length model for masquerade detection” [J. Syst. Softw. 85 (2012) 2470–2478]
收藏 引用
Journal of Systems and Software 2013年 第3期86卷 868-868页
作者: Xi Xiao Xinguang Tian Qibin Zhai Shutao Xia Graduate School at Shenzhen Tsinghua University 518055 Shenzhen China State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences 100049 Beijing China Key Laboratory of Network Science and Technology Institute of Computing Technology Chinese Academy of Sciences 100190 Beijing China
来源: 评论
Efficient DPCA SAR imaging with fast iterative spectrum reconstruction method
收藏 引用
Science China(Information Sciences) 2012年 第8期55卷 1838-1851页
作者: FANG Jian1,ZENG JinShan1,XU ZongBen1&ZHAO Yao2 1M inistry of Education key Lab for Intelligent networks and network security Xi'an Jiaotong University,Xi'an 710049,China 2N ational key laboratory of Science and technology on Microwave Imaging&Institute of Electronics,Chinese Academy of Sciences,Beijing 100049,China 1. Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an 710049 China2. National Key Laboratory of Science and Technology on Microwave Imaging & Institute of Electronics Chinese Academy of Sciences Beijing 100049 China
The displaced phase center antenna(DPCA)technique is an effective strategy to achieve wide-swath synthetic aperture radar(SAR)imaging with high azimuth ***,traditionally,it requires strict limitation of the pulse repe... 详细信息
来源: 评论
Decomposition equation of basis images with consideration of global illumination
Decomposition equation of basis images with consideration of...
收藏 引用
1st International Conference on Computational Visual Media, CVM 2012
作者: Qin, Xueying Zhang, Rui Lin, Lili Zhong, Fan Xing, Guanyu Peng, Qunsheng School of Computer Science and Technology Shandong University China Shandong Provincial Key Laboratory of Network Based Intelligent Computing China State Key Laboratory of CAD and CG Zhejiang University China
In augmented reality, it is required to sense the changing of the light condition for achieving illumination consistency. In this paper, we build up the decomposition equation of basis images of static scenes for this... 详细信息
来源: 评论
Mining protocol state machines by interactive grammar inference
Mining protocol state machines by interactive grammar infere...
收藏 引用
2012 3rd International Conference on Digital Manufacturing and Automation, ICDMA 2012
作者: Zhang, Zhao Wen, Qiao-Yan Tang, Wen State Key Laboratory of Network and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China IT Security Cooperate Technology Siemens Ltd. Beijing 100102 China
Protocol state machine is very essential in network security and implementation fields, however, improper management of software evolution, compounded by changing and imprecise requirements, along with "short tim... 详细信息
来源: 评论