咨询与建议

限定检索结果

文献类型

  • 325 篇 会议
  • 120 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 447 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 290 篇 工学
    • 159 篇 计算机科学与技术...
    • 96 篇 软件工程
    • 89 篇 信息与通信工程
    • 38 篇 电子科学与技术(可...
    • 31 篇 仪器科学与技术
    • 28 篇 网络空间安全
    • 27 篇 控制科学与工程
    • 18 篇 电气工程
    • 16 篇 机械工程
    • 10 篇 生物工程
    • 6 篇 光学工程
    • 4 篇 材料科学与工程(可...
    • 4 篇 土木工程
    • 4 篇 化学工程与技术
    • 3 篇 动力工程及工程热...
    • 3 篇 建筑学
    • 3 篇 航空宇航科学与技...
  • 84 篇 管理学
    • 73 篇 管理科学与工程(可...
    • 16 篇 工商管理
    • 13 篇 图书情报与档案管...
  • 69 篇 理学
    • 36 篇 数学
    • 14 篇 物理学
    • 13 篇 统计学(可授理学、...
    • 12 篇 生物学
    • 11 篇 系统科学
    • 6 篇 化学
  • 16 篇 文学
    • 15 篇 新闻传播学
  • 11 篇 法学
    • 6 篇 社会学
    • 4 篇 法学
  • 10 篇 军事学
    • 8 篇 军队指挥学
  • 2 篇 经济学
  • 2 篇 农学
  • 1 篇 医学

主题

  • 23 篇 security
  • 14 篇 feature extracti...
  • 13 篇 algorithm design...
  • 11 篇 signal to noise ...
  • 10 篇 training
  • 9 篇 scheduling
  • 8 篇 routing
  • 8 篇 throughput
  • 8 篇 network topology
  • 8 篇 vectors
  • 8 篇 internet
  • 8 篇 clustering algor...
  • 7 篇 noise
  • 7 篇 switches
  • 7 篇 semantics
  • 6 篇 load balancing
  • 6 篇 architecture
  • 6 篇 computer archite...
  • 6 篇 image edge detec...
  • 6 篇 wireless communi...

机构

  • 102 篇 national digital...
  • 46 篇 national digital...
  • 39 篇 national digital...
  • 18 篇 china national d...
  • 11 篇 china national d...
  • 11 篇 school of cyber ...
  • 10 篇 purple mountain ...
  • 9 篇 china national d...
  • 9 篇 national digital...
  • 8 篇 national digital...
  • 8 篇 national digital...
  • 8 篇 national digital...
  • 8 篇 national digital...
  • 7 篇 national digital...
  • 7 篇 information engi...
  • 6 篇 national digital...
  • 6 篇 state key labora...
  • 5 篇 school of cyber ...
  • 5 篇 national digital...
  • 5 篇 department of el...

作者

  • 23 篇 kaizhi huang
  • 17 篇 guozhen cheng
  • 16 篇 julong lan
  • 16 篇 jiangxing wu
  • 15 篇 hongchang chen
  • 14 篇 xinsheng ji
  • 13 篇 bin yan
  • 11 篇 hongchao hu
  • 10 篇 yunfei guo
  • 10 篇 ruiyang huang
  • 10 篇 liang jin
  • 10 篇 fucai chen
  • 9 篇 jianpeng zhang
  • 9 篇 jian chen
  • 9 篇 huang kaizhi
  • 9 篇 binqiang wang
  • 9 篇 hu yuxiang
  • 8 篇 lan julong
  • 8 篇 peng yi
  • 8 篇 yuxiang hu

语言

  • 428 篇 英文
  • 14 篇 中文
  • 5 篇 其他
检索条件"机构=National Digital Switching System Engineering& Technological R&D Center"
447 条 记 录,以下是291-300 订阅
排序:
Analysis of VANET Security Based on routing Protocol Information
Analysis of VANET Security Based on Routing Protocol Informa...
收藏 引用
4th International Conference on Intelligent Control and Information Processing (ICICIP)
作者: Chen, Lu Tang, Hongbo Wang, Junfei National Digital Switching System Engineering Technological R&D Center. China|c|
VANET is new kind of Ad hoc. It is widely used in ITS (Intelligent Transportation systems), which has many characteristics as large scale network, fast moving nodes, the frequently changing topological structure and e... 详细信息
来源: 评论
NetFlow Using Single Parallel Multi-linked Lists
NetFlow Using Single Parallel Multi-linked Lists
收藏 引用
2013 IEEE 4th International Conference on Software engineering and Service Science
作者: diqiu Ye dongnian Cheng Yufeng Li National Digital System Engineering & Technological R&D Center
The bottleneck of NetFlow is the memory *** solve this problem,we propose continuous reading and writing method whose efficiency reaches 90% or *** single parallel multi-linked lists method used to handle the inactive... 详细信息
来源: 评论
detecting App-ddoS attacks based on marking access and d-SVdd
Detecting App-DDoS attacks based on marking access and d-SVD...
收藏 引用
2013 International Conference on Precision Mechanical Instruments and Measurement Technology, ICPMIMT 2013
作者: Li, Jin-Ling Wang, Bin-Qiang National Digital Switching System Engineering and Technological R and D Center Zhengzhou China
In order to enhance the extensibility of current attack feature extracted and detection means for App-ddoS(Application Layer distributed denial of Service, App-ddoS)attacks, a novel feature extracted method based on m... 详细信息
来源: 评论
Video copy detection based on fusion of spatio-temporal features
Video copy detection based on fusion of spatio-temporal feat...
收藏 引用
2013 International Conference on Precision Mechanical Instruments and Measurement Technology, ICPMIMT 2013
作者: Bao, Wei Ji, Li Xin Gao, Shi Lin Li, Xing Liu, Li Xiong National Digital switching System Engineering and Technological R and D Center Zhengzhou China
A video copy detection method based on fusion of spatio-temporal features is proposed in this paper. Firstly, trajectories are built and lens boundaries are detected by SUrF features analyzing, then normalized histogr... 详细信息
来源: 评论
SIFT feature extraction algorithm for image in dCT domain
SIFT feature extraction algorithm for image in DCT domain
收藏 引用
2013 International Conference on Precision Mechanical Instruments and Measurement Technology, ICPMIMT 2013
作者: Wu, Zhen Xu, Zhe Zhang, rui-Nian Li, Shao-Mei National Computer Network and Information Security Administration Center Beijing 100029 China National Digital switching System Engineering and Technological R and D Center Zhengzhou 450002 China
Image feature extraction is an important technology in image matching and retrieval. For the problem of high computational complexity of spatial domain image feature extraction using the SIFT algorithm, and by studyin... 详细信息
来源: 评论
Network Traffic Anomaly detection Based on Self-similarity Using FrFT
Network Traffic Anomaly Detection Based on Self-similarity U...
收藏 引用
2013 IEEE 4th International Conference on Software engineering and Service Science
作者: Xiaolong Ye Julong Lan Wanwei Huang Department of National Digital Switching System Engineering Technological R&D Center
Since traditional abnormal detection methods have poor performance,and Hurst parameter estimation was affected by non-stationary *** abnormal detection method based on Hurst parameter estimation using Fractional Fouri... 详细信息
来源: 评论
Physical-layer security based on joint scrambling with spatial and frequency resource
Physical-layer security based on joint scrambling with spati...
收藏 引用
International Conference on Information Science and Technology (ICIST)
作者: Mingliang Li Kaizhi Huang Zhou Zhong National Digital Switching System Engineering & Technological R&D Center Zhengzhou Henan PRC
The projection of the random multi-antenna weighted vector structured with spatial scrambling is of constant modulus on the main channel, Eavesdropper can take the advantage of multi-antenna to intercept private infor... 详细信息
来源: 评论
Adaptive key generation based on quantization of channel characteristics  3rd
Adaptive key generation based on quantization of channel cha...
收藏 引用
International Conference on Information Science and Technology (ICIST)
作者: Qiao dai Jin Liang Kaizhi Huang China National Digital Switching System Engineering & Technological R&D Center Zhengzhou PRC
Length and mismatch rate of secret bit strings derived from channel characteristics by legitimate users for key generation are affected by quantization algorithm significantly. Existing schemes cannot achieve both a s... 详细信息
来源: 评论
A cooperative jamming based security algorithm for multi-user MIMO systems
A cooperative jamming based security algorithm for multi-use...
收藏 引用
International Conference on Information Science and Technology (ICIST)
作者: Huawei Song Meiyue Yang Xiangyang Xu Wenyu Luo National Digital Switching System Engineering & Technological R&D Center Zhengzhou Henan PRC
The existing physical layer security algorithm could guarantee secure communication to a certain extent. However, eavesdropper can get more information from legitimate receivers whose channel condition is worse than o... 详细信息
来源: 评论
Practical on-line near-duplicate detection for web video
Practical on-line near-duplicate detection for web video
收藏 引用
International Conference on Information Science and Technology (ICIST)
作者: Wei Bao Lixin Ji Lixiong Liu National Digital switching System Engineering & Technological R&D Center Zhengzhou Henan PRC
This paper proposes an alternative point of view on the use of ordinal measures to detect near-duplicate web videos. Ordinal measure fingerprints are first extracted in the core area of videos, and ordinal measures ar... 详细信息
来源: 评论