咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 179 篇 期刊文献

馆藏范围

  • 785 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 345 篇 工学
    • 272 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 82 篇 信息与通信工程
    • 72 篇 电气工程
    • 42 篇 控制科学与工程
    • 27 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 26 篇 网络空间安全
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 19 篇 交通运输工程
    • 17 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 97 篇 数学
    • 39 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 10 篇 化学
    • 10 篇 系统科学
  • 81 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 25 篇 法学
    • 15 篇 社会学
    • 12 篇 法学
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 4 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 99 篇 feature extracti...
  • 93 篇 accuracy
  • 61 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 50 篇 data models
  • 44 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 deep learning
  • 30 篇 adaptation model...
  • 28 篇 robustness
  • 24 篇 privacy
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 23 篇 attention mechan...
  • 21 篇 optimization
  • 21 篇 visualization
  • 21 篇 measurement
  • 20 篇 real-time system...

机构

  • 265 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shandong provinc...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang
  • 12 篇 zhenyu yang
  • 12 篇 lei zhu

语言

  • 676 篇 英文
  • 107 篇 其他
  • 8 篇 中文
检索条件"机构=Laboratory for Network Computing and Security Technology"
785 条 记 录,以下是771-780 订阅
排序:
Enhancing fairness: A novel C2C e-commerce community member reputation algorithm based on transaction social networks
Enhancing fairness: A novel C2C e-commerce community member ...
收藏 引用
IADIS International Conference WWW/Internet 2010
作者: Feng, Wangsen Zhang, Bei Xia, Yunni Li, Jiajing Meng, Tao Key Laboratory of Network and Software Security Assurance of Ministry of Education Computing Center Peking University Beijing 100871 China College of Computer Science Chongqing University Chongqing 400044 China School of Mechanical Electronic and Information Engineering China University of Mining and Technology Beijing 100083 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
Today, almost all the C2C e-commerce community member reputation evaluating algorithms are time sensitive. The reputation of a community member is accumulated after transactions and the increment of reputation after a... 详细信息
来源: 评论
Threshold Signature Scheme Based on Non-internative Diffie-Hellman Signature
Threshold Signature Scheme Based on Non-internative Diffie-H...
收藏 引用
International Conference on networking and Distributed computing (ICNDC)
作者: Xiuqun Wang Lican Huang Key Laboratory of Information System Security Ministry of Education Tsinghua University Beijing China Institute of Network and Distributed Computing Zhejiang Science and Technology University Hangzhou China
We present a threshold signature based on non-internative Diffie-Hellman signature. It works in asynchronous communication system and can tolerate Byzantine faults with optimal resilience n ≥ = 3t + 1, where n is the... 详细信息
来源: 评论
A collaborative framework for privacy protection in online social networks
A collaborative framework for privacy protection in online s...
收藏 引用
International Conference on Collaborative computing: networking, Applications and Worksharing (CollaborateCom)
作者: Yan Zhu Zexing Hu Huaixi Wang Hongxin Hu Gail-Joon Ahn Key Laboratory of Network and Software Security Assurance Ministry of Education Peking University China Institute of Computer Science and Technology Peking University Beijing China School of Mathematical Sciences Peking University Beijing China Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University Tempe AZ USA
With the wide use of online social networks (OSNs), the problem of data privacy has attracted much attention. Several approaches have been proposed to address this issue. One of privacy management approaches for OSN l... 详细信息
来源: 评论
Analysis and computing of Association Degree of SMS Feature Words
Analysis and Computing of Association Degree of SMS Feature ...
收藏 引用
International Conference on networking and Services (ICNS)
作者: Qindong Sun Hongli Qiao Nan Wang Network Computing and Security Key Laboratory of Shaanxi Xi''an University of Technology Xi'an China MOE Key Laboratory of Intelligent and Network Security Xi''an Jiaotong University Xi'an China
How to judge the relationship between mobile short messages is the key technology of mobile short message topic detection. The characteristics of the mobile SMS text are discussed in this paper, and the association of... 详细信息
来源: 评论
SkyF2F: Censorship Resistant via Skype Overlay network
SkyF2F: Censorship Resistant via Skype Overlay Network
收藏 引用
WASE International Conference on Information Engineering, ICIE
作者: Shoufeng Cao Longtao He Zhongxian Li Yixian Yang Information Security Center State Key Laboratory of Networking and Switching Technology Key Laboratory of network and information attack & defence technology of MOE Beijing University of Posts and Telecommunications China Research Center of Information Security Institute of Computing Technology Chinese Academy and Sciences Beijing China
Internet censorship is on the rise as an increasing number of countries and companies block or monitor access to parts of the Internet. Many censorship resistant systems have been proposed, which rely on deploying man... 详细信息
来源: 评论
Quick Finding of network Video Stream
Quick Finding of Network Video Stream
收藏 引用
International Conference on Computer Science and Information technology (CSIT)
作者: Qindong Sun Shengli Li Xiaojun Guo Network Computing and Security Key Laboratory of Shaanxi Xi'an University of Technology Xi'an China School of Electronics and Information Engineering Xi'an Jiaotong University Xi'an China Department of Research and Development Xi'an Anzhi Science and Technology Corporation Xi'an China
network video technology develops quickly in recent years and the applications of network video are various. The effectively managing of the application based on network video is necessary for network flow management,... 详细信息
来源: 评论
A real-time adaptive control of autonomic computing environments  07
A real-time adaptive control of autonomic computing environm...
收藏 引用
2007 Conference of the Center for Advanced Studies on Collaborative Research, CASCON '07
作者: Solomon, Bogdan Ionescu, Dan Litoiu, Marin Mihaescu, Mircea Network Computing and Control Technologies Research Laboratory School of Information Technology and Engineering University of Ottawa Canada IBM Centre for Advanced Studies Toronto Canada Centre for Advanced Studies IBM Toronto Laboratory Canada IBM WebAhead Development and Security Innovations United States
Autonomic computing has received a great deal of attention from the research community in recent years. Many techniques have been proposed to monitor, analyze, and change the system under observation, but less attenti... 详细信息
来源: 评论
Fuzzy Model for Trust Evaluation
收藏 引用
Railway Engineering Science 2006年 第1期000卷 23-28页
作者: Zhang Shibin He Dake Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu 610031 China Department of Network Engineering Chengdu University of Information Technology Chengdu 610225 China Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu 610031 China
Based on fuzzy set theory, a fuzzy trust model is established by using membership function to describe the fuzziness of trust. The trust vectors of subjective trust are obtained based on a mathematical model of fuzzy ... 详细信息
来源: 评论
Fuzzy Model for Trust Evaluation
收藏 引用
Journal of Southwest Jiaotong University(English Edition) 2006年 第1期14卷 23-28页
作者: 张仕斌 何大可 Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu 610031 ChinaDepartment of Network Engineering Chengdu University of Information Technology Chengdu 610225 China Information Security and National Computing Grid Laboratory Southwest Jiaotong University Chengdu 610031 China
Based on fuzzy set theory, a fuzzy trust model is established by using membership function to describe the fuzziness of trust. The trust vectors of subjective trust are obtained based on a mathematical model of fuzzy ... 详细信息
来源: 评论
Dynamic right-sizing in FTP (drsFTP): Enhancing Grid performance in user-space
Dynamic right-sizing in FTP (drsFTP): Enhancing Grid perform...
收藏 引用
International Symposium on High Performance Distributed computing
作者: M.K. Gardner Wu-chun Feng M. Fisk Research & Development in Advanced Network Technology (RADIANT) Computer & Computational Sciences Division Los Alamos National Laboratory Los Alamos NM USA Network Security Team Network Engineering Group Computing Communications & Networking Division Los Alamos National Laboratory Los Alamos NM USA
With the advent of computational grids, networking performance over the wide-area network (WAN) has become a critical component in the grid infrastructure. Unfortunately, many high-performance grid applications only u... 详细信息
来源: 评论