咨询与建议

限定检索结果

文献类型

  • 375 篇 会议
  • 184 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 561 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 372 篇 工学
    • 187 篇 计算机科学与技术...
    • 116 篇 软件工程
    • 113 篇 信息与通信工程
    • 55 篇 电子科学与技术(可...
    • 40 篇 仪器科学与技术
    • 33 篇 电气工程
    • 32 篇 控制科学与工程
    • 31 篇 网络空间安全
    • 26 篇 机械工程
    • 17 篇 材料科学与工程(可...
    • 17 篇 化学工程与技术
    • 13 篇 生物工程
    • 10 篇 土木工程
    • 9 篇 光学工程
    • 8 篇 动力工程及工程热...
    • 8 篇 航空宇航科学与技...
    • 6 篇 冶金工程
  • 106 篇 理学
    • 43 篇 数学
    • 27 篇 物理学
    • 20 篇 化学
    • 16 篇 生物学
    • 15 篇 统计学(可授理学、...
    • 12 篇 系统科学
  • 95 篇 管理学
    • 81 篇 管理科学与工程(可...
    • 19 篇 工商管理
    • 16 篇 图书情报与档案管...
  • 16 篇 文学
    • 15 篇 新闻传播学
  • 14 篇 法学
    • 9 篇 社会学
  • 10 篇 医学
    • 8 篇 临床医学
  • 10 篇 军事学
    • 8 篇 军队指挥学
  • 2 篇 经济学
  • 2 篇 农学

主题

  • 24 篇 security
  • 14 篇 feature extracti...
  • 13 篇 algorithm design...
  • 11 篇 signal to noise ...
  • 11 篇 training
  • 10 篇 throughput
  • 10 篇 scheduling
  • 9 篇 routing
  • 8 篇 network topology
  • 8 篇 bandwidth
  • 8 篇 vectors
  • 8 篇 switches
  • 8 篇 internet
  • 8 篇 clustering algor...
  • 7 篇 noise
  • 7 篇 semantics
  • 7 篇 virtualization
  • 7 篇 heterogeneous ne...
  • 6 篇 load balancing
  • 6 篇 architecture

机构

  • 102 篇 national digital...
  • 45 篇 national digital...
  • 39 篇 national digital...
  • 18 篇 china national d...
  • 11 篇 national digital...
  • 11 篇 china national d...
  • 11 篇 school of cyber ...
  • 10 篇 purple mountain ...
  • 9 篇 china national d...
  • 9 篇 national digital...
  • 8 篇 national digital...
  • 8 篇 national digital...
  • 8 篇 national digital...
  • 8 篇 national digital...
  • 7 篇 national digital...
  • 7 篇 information engi...
  • 6 篇 national digital...
  • 6 篇 state key labora...
  • 5 篇 school of cyber ...
  • 5 篇 national digital...

作者

  • 24 篇 kaizhi huang
  • 18 篇 guozhen cheng
  • 17 篇 jiangxing wu
  • 16 篇 julong lan
  • 15 篇 hongchang chen
  • 14 篇 xinsheng ji
  • 14 篇 bin yan
  • 12 篇 hongchao hu
  • 11 篇 wang binqiang
  • 11 篇 yunfei guo
  • 10 篇 lan julong
  • 10 篇 jian chen
  • 10 篇 binqiang wang
  • 10 篇 ruiyang huang
  • 10 篇 liang jin
  • 10 篇 fucai chen
  • 9 篇 jianpeng zhang
  • 9 篇 huang kaizhi
  • 9 篇 peng yi
  • 9 篇 hu yuxiang

语言

  • 532 篇 英文
  • 18 篇 中文
  • 8 篇 其他
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=National Digital Switching System Engineering and Technology R&D Center"
561 条 记 录,以下是401-410 订阅
排序:
Multi-channel Feedback data-Curtail Identification
Multi-channel Feedback Data-Curtail Identification
收藏 引用
Pacific-Asia Conference on Knowledge engineering and Software engineering
作者: Zhao, Bo Liu, Qinrang Yuan, Bo National Digital Switching System Engineering and Technological R and D Center Zhengzhou China
Single method may hardly satisfy fast and full-scale identification owing to the limitation of capability and speed, especially under the trend of new applications emerging and capacity expanding in Internet. An onlin... 详细信息
来源: 评论
A new evidence combination scheme for decision assistant
A new evidence combination scheme for decision assistant
收藏 引用
4th International Conference on Cyber-Enabled distributed Computing and Knowledge discovery, CyberC 2012
作者: Wang, Wanqing Zhao, Yongjun Huang, Jie National Digital Switching System Engineering and Technological R and D Center China
In d-S evidence theory, the dempster's rule always leads to counter-intuitive results when combining conflicting evidences. The methods proposed to solve these problems all simply focus on BBA features, and ignore... 详细信息
来源: 评论
Parameter pollution vulnerabilities detection study based on tree edit distance
Parameter pollution vulnerabilities detection study based on...
收藏 引用
14th International Conference on Information and Communications Security, ICICS 2012
作者: Cao, Yan Wei, Qiang Wang, Qingxian National Digital Switching System Engineering and Technological R and D Center Zhengzhou China
A new web attack pattern called HTTP Parameter Pollution has been presented in recent years. The harm and detection method about HPP has become a hot topic in the field of web application security. In the paper, we st... 详细信息
来源: 评论
research and design of interception and control model in video communication system based on SIP
Research and design of interception and control model in vid...
收藏 引用
2012 International Conference on Computer Science and Service system, CSSS 2012
作者: Ge, Lin Ji, Xinsheng Liu, Caixia National Digital Switching System Engineering Technological R and D Center Zhengzhou Henan China
With the development of NGN which has SIP as the core protocol, there are more and more video communication services. It becomes focused on how to implement the interception and control in Video communication system b... 详细信息
来源: 评论
Self-adaptive detection Method for ddoS Attack Based on Fractional Fourier Transform and Self-similarity
Self-adaptive Detection Method for DDoS Attack Based on Frac...
收藏 引用
2012 4th International Conference on Signal Processing systems(ICSPS 2012)
作者: Chen Shi-wen Wu Jiang-xing Guo Tong Lan Ju-long National Digital Switching System Engineering and Technological R&D Center
Hurst parameter estimation accuracy is very important in ddoS attack detection model based on traffic self-similarity changes. If the estimation accuracy is poor, the undetected and false detection should happen. This... 详细信息
来源: 评论
A Scheme of Online P2P Flow Identification
A Scheme of Online P2P Flow Identification
收藏 引用
2012 International Conference on Intelligent Control and Information Processing(ICIP 2012)
作者: Kunpeng Jiang Huifang Guo Julong Lan National Digital Switching System Engineering & Technological R&D Center
Since the emergence of Peer-to-Peer(P2P) networking in the late 90's, P2 P applications are evolving rapidly. In contrast to the first-generation P2 P which used well-defined port numbers, current P2 P application... 详细信息
来源: 评论
A novel multi-next hop routing algorithm based on node potential
收藏 引用
Journal of Networks 2012年 第10期7卷 1646-1653页
作者: Bu, You-Jun He, Wei Wang, Bin-Qiang Jiang, Kunpeng Zhao, Liang National Digital Switching System Engineering and Technology R and D Center Zhengzhou China
Single next hop routing algorithm which widely used centralize the transmission paths and leads to a waste of network resources and transmission congestion. For better performance, recently researches focus on multi n... 详细信息
来源: 评论
dynamic functional connectivity analysis of Taichong (Lr3) acupuncture effects in various brain regions
收藏 引用
Neural regeneration research 2012年 第6期7卷 451-456页
作者: Wenjuan Qiu Bin Yan Hongjian He Li Tong Jianxin Li National Digital Switching System Engineering & Technological R&D Center Zhengzhou 450002 Henan Province China Zhejiang University Hangzhou 310027 Zhejiang Province China
The present study conducted a multi-scale dynamic functional connectivity analysis to evaluate dynamic behavior of acupuncture at Taichong (Lr3) and sham acupoints surrounding Taichong results showed differences in ... 详细信息
来源: 评论
random User Selection Method for LPI in Multiuser MISO-OFdMA system
Random User Selection Method for LPI in Multiuser MISO-OFDMA...
收藏 引用
2012 IEEE 14th International Conference on Communication technology
作者: Bo Wu Jianxun Zhao Wenyu Luo Zhongzhou University National Digital Switching System Engineering & Technological R&D Center
The problem of wireless security for the downlink of MISO-OFdMA systems operating over a frequency-selective channel is *** exploiting the dimensions provided by multiuser MISO-OFdMA systems for random user selection ... 详细信息
来源: 评论
A Method and Implementation of Control Flow Obfuscation Using SEH
A Method and Implementation of Control Flow Obfuscation Usin...
收藏 引用
International Conference on Multimedia Information Networking and Security (MINES)
作者: Xinlei Yao Jianmin Pang Yichi Zhang Yong Yu Jianping Lu National Digital Switching System Engineering and Technological R&D Center Zhengzhou China
Control flow obfuscation is an important way of software copyright protection, the main purpose is to make the static analysis tools produce wrong control flow graph, and then prevent malicious use of reverse engineer... 详细信息
来源: 评论