咨询与建议

限定检索结果

文献类型

  • 13 篇 会议
  • 7 篇 期刊文献

馆藏范围

  • 20 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 13 篇 工学
    • 11 篇 计算机科学与技术...
    • 6 篇 软件工程
    • 4 篇 光学工程
    • 4 篇 动力工程及工程热...
    • 3 篇 电气工程
    • 3 篇 信息与通信工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 交通运输工程
    • 1 篇 机械工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 生物医学工程(可授...
    • 1 篇 安全科学与工程
  • 11 篇 理学
    • 7 篇 数学
    • 6 篇 物理学
    • 2 篇 系统科学
    • 2 篇 统计学(可授理学、...
  • 4 篇 管理学
    • 3 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学
    • 1 篇 公共卫生与预防医...

主题

  • 4 篇 crosstalk
  • 2 篇 optical devices
  • 2 篇 encoding
  • 1 篇 reliability
  • 1 篇 collaborative fi...
  • 1 篇 compressed sensi...
  • 1 篇 integrated optic...
  • 1 篇 plasmons
  • 1 篇 generative adver...
  • 1 篇 filtering
  • 1 篇 statistics
  • 1 篇 anomaly detectio...
  • 1 篇 network topology
  • 1 篇 pattern matching
  • 1 篇 dimensionality r...
  • 1 篇 neural networks
  • 1 篇 bandwidth
  • 1 篇 convolution
  • 1 篇 optical losses
  • 1 篇 finite differenc...

机构

  • 5 篇 college of elect...
  • 5 篇 guangxi colleges...
  • 4 篇 school of inform...
  • 4 篇 guangxi cooperat...
  • 4 篇 school of comput...
  • 3 篇 guangxi cooperat...
  • 3 篇 chongqing key la...
  • 3 篇 key laboratory o...
  • 2 篇 guangxi colleges...
  • 2 篇 guangxi key labo...
  • 2 篇 school of comput...
  • 2 篇 key laboratory o...
  • 2 篇 guangxi colleges...
  • 2 篇 key laboratory o...
  • 1 篇 college of compu...
  • 1 篇 the key laborato...
  • 1 篇 college of softw...
  • 1 篇 guangxi cooperat...
  • 1 篇 school of cybers...
  • 1 篇 college of compu...

作者

  • 5 篇 xie yiyuan
  • 3 篇 ye yichen
  • 3 篇 su ye
  • 3 篇 chai junxiong
  • 2 篇 ye miao
  • 2 篇 lei xiaochun
  • 2 篇 fu pengju
  • 2 篇 jiang xiao
  • 2 篇 qiang baohua
  • 2 篇 yang hongyu
  • 2 篇 miao ye
  • 2 篇 chen junyan
  • 2 篇 yiyuan xie
  • 2 篇 wang yong
  • 2 篇 xie wu
  • 2 篇 yong wang
  • 2 篇 fan ya
  • 1 篇 jia didi
  • 1 篇 guo songtao
  • 1 篇 guo rui

语言

  • 18 篇 英文
  • 2 篇 其他
检索条件"机构=Key Laboratory of Networks and Cloud Computing Security of Universities"
20 条 记 录,以下是11-20 订阅
排序:
A Blockchain-based Revocable Certificateless Signature Scheme for IoT Device
收藏 引用
International Journal of Network security 2021年 第6期23卷 1012-1027页
作者: Chen, Yushuang Zheng, Dong Guo, Rui Zhang, Yinghui Tao, Xiaoling School of Cyberspace Security Xi’an University of Posts and Telecommunications Xi’an710121 China State Key Laboratory of Integrated Services Networks Xidian University Xi’an710071 China National Engineering Laboratory for Wireless Security Xi’an University of Posts and Telecommunications Guilin University of Electronic Technology Guilin541004 China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin541004 China
With the rapid development of Internet of Things (IoT) technology, completing a transaction with intelligent devices has been an essential communication mode in our daily life. Generally, lightweight smart devices con... 详细信息
来源: 评论
An improved method of cache prefetching for small files in ceph system  5th
An improved method of cache prefetching for small files in c...
收藏 引用
5th Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2018
作者: Fan, Ya Wang, Yong Ye, Miao Lu, Xiaoxia Huan, YiMing School of Computer Science and Information Security Guilin University of Electronic Technology GuilinGuangxi541004 China School of Information and Communication Guilin University of Electronic Technology GuilinGuangxi541004 China Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems Guilin University of Electronic Technology GuilinGuangxi541004 China
To improve the inefficiency of file access for massive small files in the distributed file system, prefetching the small files into the cache is the most conventional method to be adopted. As the number of cached file... 详细信息
来源: 评论
Publication recommendations of manuscripts using improved C4.5 decision tree algorithm  2nd
Publication recommendations of manuscripts using improved C4...
收藏 引用
2nd International Conference on Intelligent and Interactive Systems and Applications, IISA 2017
作者: Jia, Didi Xie, Wu Chen, Zhiyong Qiang, Baohua School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex System Guilin541004 China Guangxi Key Laboratory of Trusted Software Guilin541004 China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin541004 China
In view of the problem that the result accuracy of the research publication recommendations of manuscripts is often low. It is very difficult for many contributors to find the suitable journals from many recommendatio... 详细信息
来源: 评论
Multi-criteria collaborative filtering based on matrix filling  4
Multi-criteria collaborative filtering based on matrix filli...
收藏 引用
4th IEEE International Conference on Computer and Communications, ICCC 2018
作者: Ye, Li Wu, Chunming Qiang, Baohua Xie, Wu College of Computer Information Science Southwest University Chongqing China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin China Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex System Guilin University of Electronic Technology Guilin China
In multi-criteria collaborative filtering, the data sparsity is a critical factor affecting the effectiveness of the algorithm. Existing solutions generally remove low-efficiency data through dimensionality reduction,... 详细信息
来源: 评论
Network Traffic Outlier Detection Based on Full Convolutional Network
Network Traffic Outlier Detection Based on Full Convolutiona...
收藏 引用
International Conference on Computational Intelligence and security
作者: Jingrong Mo Yong Wang Miao Ye School of Computer Science and Information Security Guilin University of Electronic Technology Guilin Guangxi China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin Guangxi China Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems Guilin University of Electronic Technology Guilin Guangxi China School of Information and Communication Guilin University of Electronic Technology Guilin Guangxi China
Network traffic flow can be represented as time series. Outliers of these time series is important for the computer network security. The existing methods for the time series anomaly detection mainly operate on the en... 详细信息
来源: 评论
A New Construction Method of Regeneration Tree for Single Node Fault Repair Mechanism in Distributed Storage System
A New Construction Method of Regeneration Tree for Single No...
收藏 引用
International Conference on Computational Intelligence and security
作者: Wei Guo Yong Wang Miao Ye School of Computer Science and Information Security Guilin University of Electronic Technoloay Guilin Guangxi China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin Guangxi China Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems Guilin University of Electronic Technology Guilin Guangxi China School of Information and Communication Guilin University of Electronic Technology Guilin Guangxi China
Comparing with the classic redundancy policy of multi-replica technology, Erasure code is preferred due to its higher utilization rate of storage space in distributed storage system. As one kind of the important Erasu... 详细信息
来源: 评论
Real-time network traffic classification based on CDH pattern matching  14
Real-time network traffic classification based on CDH patter...
收藏 引用
14th International Conference on Computational Intelligence and security, CIS 2018
作者: Li, Xunzhang Wang, Yong Ke, Wenlong Feng, Hao School of Computer Science and Information Security Guilin University of Electronic Technology Guilin Guangxi541004 China School of Information and Communication Guilin University of Electronic Technology Guilin Guangxi541004 China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin Guangxi541004 China Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems Guilin University of Electronic Technology Guilin Guangxi541004 China
In recent years, with the rapid development of the Internet, the data scale of application behavior and application traffic have exploded. How to classify the real-time traffic of network becomes a big challenge. How ... 详细信息
来源: 评论
Design of People Flow Monitoring System in Public Place based on MD-MCNN
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1606卷
作者: Xiong Tianmin Lei Xiaochun Zheng Xingwen Chen Junyan Feng Yizhou School of computer and information security Guilin University of Electronic Technology Guilin 541004 China Guangxi Colleges and Universities Key Laboratory of Intelligent Processing of Computer Images and Graphics Guilin 541004 China Guangxi Cooperative Innovation Center of cloud computing and Big Data Guilin University of Electronic Technology Guilin 541004 China
Due to the limitation of hardware resources, the traditional people flow monitoring system based on computer vision in public places can't meet different crowd-scale scenarios. Therefore, a people flow monitoring ...
来源: 评论
Design of Intelligent Robot Platform based on Multi-sensor Fusion
收藏 引用
Journal of Physics: Conference Series 2020年 第1期1606卷
作者: Ya Dajin Lei Xiaochun Li Yue Chen Junyan Huang Rongcun Lan Lin School of computer and information security Guilin University of Electronic Technology Guilin 541004 China Guangxi Colleges and Universities Key Laboratory of Intelligent Processing of Computer Images and Graphics Guilin 541004 China Guangxi Cooperative Innovation Center of cloud computing and Big Data Guilin University of Electronic Technology Guilin 541004 China
The mobile robot adapts to the more complicated indoor and outdoor environments, and can expand its scope of application. In order to reduce the influence of the cumulative error caused by navigation in complex enviro...
来源: 评论
Multi-criteria Collaborative Filtering Based on Matrix Filling
Multi-criteria Collaborative Filtering Based on Matrix Filli...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Li Ye Chunming Wu Baohua Qiang Wu Xie College of Computer & Information Science Southwest University Chongqing China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin China Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex System Guilin University of Electronic Technology Guilin China
In multi-criteria collaborative filtering, the data sparsity is a critical factor affecting the effectiveness of the algorithm. Existing solutions generally remove low-efficiency data through dimensionality reduction,... 详细信息
来源: 评论