咨询与建议

限定检索结果

文献类型

  • 442 篇 会议
  • 327 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 771 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 474 篇 工学
    • 220 篇 计算机科学与技术...
    • 138 篇 软件工程
    • 133 篇 信息与通信工程
    • 77 篇 电子科学与技术(可...
    • 48 篇 电气工程
    • 47 篇 仪器科学与技术
    • 41 篇 控制科学与工程
    • 35 篇 网络空间安全
    • 32 篇 机械工程
    • 31 篇 材料科学与工程(可...
    • 27 篇 化学工程与技术
    • 22 篇 光学工程
    • 18 篇 核科学与技术
    • 16 篇 生物工程
    • 14 篇 动力工程及工程热...
    • 14 篇 土木工程
    • 12 篇 冶金工程
    • 12 篇 航空宇航科学与技...
    • 10 篇 生物医学工程(可授...
  • 231 篇 理学
    • 128 篇 物理学
    • 63 篇 数学
    • 30 篇 化学
    • 21 篇 生物学
    • 21 篇 统计学(可授理学、...
    • 15 篇 系统科学
  • 110 篇 管理学
    • 90 篇 管理科学与工程(可...
    • 20 篇 工商管理
    • 18 篇 图书情报与档案管...
  • 24 篇 医学
    • 19 篇 临床医学
  • 19 篇 文学
    • 18 篇 新闻传播学
  • 15 篇 法学
  • 12 篇 军事学
  • 6 篇 农学
  • 2 篇 经济学
  • 1 篇 艺术学

主题

  • 27 篇 security
  • 16 篇 algorithm design...
  • 15 篇 feature extracti...
  • 13 篇 training
  • 12 篇 signal to noise ...
  • 11 篇 throughput
  • 11 篇 bandwidth
  • 10 篇 high energy phys...
  • 9 篇 routing
  • 9 篇 wireless communi...
  • 9 篇 vectors
  • 9 篇 switches
  • 9 篇 clustering algor...
  • 9 篇 scheduling
  • 8 篇 network topology
  • 8 篇 interference
  • 8 篇 noise
  • 8 篇 internet
  • 8 篇 semantics
  • 7 篇 resource allocat...

机构

  • 104 篇 national digital...
  • 74 篇 florida state un...
  • 74 篇 lawrence livermo...
  • 74 篇 center for nucle...
  • 71 篇 university of ne...
  • 71 篇 oak ridge nation...
  • 71 篇 vanderbilt unive...
  • 70 篇 department of ph...
  • 70 篇 weizmann institu...
  • 69 篇 riken bnl resear...
  • 69 篇 university of te...
  • 69 篇 yonsei universit...
  • 69 篇 abilene christia...
  • 68 篇 los alamos natio...
  • 68 篇 hiroshima univer...
  • 67 篇 laboratoire lepr...
  • 67 篇 nagasaki institu...
  • 67 篇 institute of phy...
  • 66 篇 dapnia cea sacla...
  • 66 篇 iowa state unive...

作者

  • 74 篇 a. bazilevsky
  • 74 篇 y. v. efremenko
  • 74 篇 m. rosati
  • 74 篇 e. kistenev
  • 74 篇 k. shigaki
  • 74 篇 d. jouan
  • 74 篇 s. nagamiya
  • 74 篇 s. l. fokin
  • 73 篇 j. g. lajoie
  • 73 篇 m. l. purschke
  • 73 篇 a. a. vinogradov
  • 73 篇 s. p. stoll
  • 73 篇 j. t. mitchell
  • 72 篇 v. bumazhnov
  • 72 篇 j. s. haggerty
  • 72 篇 r. seto
  • 72 篇 a. yanovich
  • 72 篇 v. riabov
  • 71 篇 k. tanida
  • 71 篇 i. j. choi

语言

  • 714 篇 英文
  • 31 篇 其他
  • 23 篇 中文
  • 2 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=National Digital Switching System Engineering and Technology R and D Center"
771 条 记 录,以下是471-480 订阅
排序:
Enhancing wireless security with theory of ill-posed problem: A novel physical-layer encryption mechanism
Enhancing wireless security with theory of ill-posed problem...
收藏 引用
International Conference on Information Science and technology (ICIST)
作者: Xiangyang Xu Wenyu Luo Huawei Song Lizhi Zhang National Digital Switching System Engineering & Technological R&D Center Zhengzhou Henan PRC
This paper studies physical-layer security without knowing the eavesdropper's channel state information. The use of ill-posed theory to protect wireless transmissions is proposed. Firstly, the problem of randomize... 详细信息
来源: 评论
Analysis and Prevention for Cross-site Scripting Attack Based on Encoding
Analysis and Prevention for Cross-site Scripting Attack Base...
收藏 引用
2013 IEEE 4th International Conference on Electronics Information and Emergency Communication
作者: ding Lan Wu ShuTing Ye Xing Zhang Wei Library of Zhengzhou Teachers College Department of Intelligence and Reconnaissance Zhengzhou Teachers CollegeSpecial Police Academy China National Digital Switching System Engineering &Technological R&D Center Information Engineering University
With the development of Web application, cross-site scripting attacks have been rapidly increasing, and the technique of those attacks is constantly updating. There has been some special advanced attacks such as the o... 详细信息
来源: 评论
A polynomial estimation algorithm for PN sequence based on reliability accumulation  3rd
A polynomial estimation algorithm for PN sequence based on r...
收藏 引用
International Conference on Information Science and technology (ICIST)
作者: Meiyue Yang Kaizhi Huang Wenyu Luo National Digital Switching System Engineering & Technological R&D Center Zhengzhou Henan PRC
To solve the problems of current polynomial estimation algorithms for PN sequence, such as insufficient efficiency and error-tolerance, a novel algorithm based on reliability accumulation is proposed combining BM iter... 详细信息
来源: 评论
A partial CSI based Affinity propagation dynamic clustering algorithm
A partial CSI based Affinity propagation Dynamic clustering ...
收藏 引用
International Conference on Information Science and technology (ICIST)
作者: Xiaomin ran Min Tong Youquan Mo National Digital Switching System Engineering & Technological R&D Center Zhengzhou Henan PRC
The precondition of the whole known channel state information (CSI) is impractical in realistic system. To deal with this problem, a partial CSI based Affinity propagation dynamic clustering algorithm was proposed in ... 详细信息
来源: 评论
A multicarrier-based physical layer security scheme for the multicast systems  3rd
A multicarrier-based physical layer security scheme for the ...
收藏 引用
International Conference on Information Science and technology (ICIST)
作者: Tong Lin Kai-Zhi Huang Wen-Yu Luo National Digital Switching System Engineering & Technological R&D Center NDSC Zhengzhou Henan P.R. China
Traditional physical layer security methods, such as artificial noise, commonly require that the sender has more antennas than that of the receivers, which is not practical in the multicasting system. To solve this pr... 详细信息
来源: 评论
An effective community detection algorithm of the social networks
An effective community detection algorithm of the social net...
收藏 引用
International Conference on Information Science and technology (ICIST)
作者: Yuan Huang Wei Hou Xiaowei Li Shaomei Li National Computer Network and Information Security Administration Center Beijing China National Digital Switching System Engineering & Technological R&D Center Zhengzhou
The traditional social network community detection algorithms generally lack of consideration of link attributes, and full expression using link attribute information model and mechanism. Aiming at this issue, this pa... 详细信息
来源: 评论
Eavesdropping against artificial noise: Hyperplane clustering
Eavesdropping against artificial noise: Hyperplane clusterin...
收藏 引用
International Conference on Information Science and technology (ICIST)
作者: Lu Liu Jin Liang Kaizhi Huang National Digital Switching System Engineering & Technological R&D Center Zhengzhou Henan PRC Information Engineering University Zhengzhou Henan PRC
Wireless secure communication using artificial noise can guarantee security when the transmitter has more antennas than the eavesdropper. Contrarily, this paper considers the problem of eavesdropping when sufficient a... 详细信息
来源: 评论
Garbage collection and wear leveling for flash memory: Past and future
Garbage collection and wear leveling for flash memory: Past ...
收藏 引用
International Conference on Smart Computing (SMArTCOMP)
作者: Ming-Chang Yang Yu-Ming Chang Che-Wei Tsao Po-Chun Huang Yuan-Hao Chang Tei-Wei Kuo Institute of Information Science Academia Sinica Taipei Taiwan R.O.C. Graduate Institute of Networking and Multimedia National Taiwan University Taipei Taiwan R.O.C. Macronix International Co. Ltd. Emerging System Lab. Hsinchu Taiwan R.O.C. Department of Computer Science and Engineering Innovation Center for Big Data and Digital Convergence Yuan Ze University Taoyuan Taiwan R.O.C. Research Center for Information Technology Innovation Academia Sinica Taipei Taiwan R.O.C. Department of Computer Science and Information Engineering National Taiwan University Taipei Taiwan R.O.C.
recently, storage systems have observed a great leap in performance, reliability, endurance, and cost, due to the advance in non-volatile memory technologies, such as NANd flash memory. However, although delivering be... 详细信息
来源: 评论
A second-order spatial hopping transmission scheme for physical layer security
A second-order spatial hopping transmission scheme for physi...
收藏 引用
International Conference on Information Science and technology (ICIST)
作者: XinSheng Ji XiaoLei Kang KaiZhi Huang KeMing Ma China National Digital Switching System Engineering & Technological R&D Center Zhengzhou Henan P.R. China China Nat. Digital Switching Syst. Eng. & Technol. R&D Center Zhengzhou China
The method of physical layer security in wireless relay communication based on cooperative jamming scheme need the channel of legitimate user keep constant. It fails if the eavesdropper has more antennas than the send... 详细信息
来源: 评论
An analysis of the radar backscatter from oil-covered sea surfaces using moment method and Monte-Carlo simulation: preliminary results
收藏 引用
Acta Oceanologica Sinica 2013年 第1期32卷 59-67页
作者: YANG Chan-Su PArK Seong-Min OH Yisok OUCHI Kazuo Korea Ocean Satellite Center Korea Institute of Ocean Science & Technology (KIOST) Marine Environmental System Science University of Science and Technology ISR R&D Laboratory LIG Nex1 Company Department of Electronics Information and Communication Engineering Hongik University Department of Computer Science School of Electrical and Computer Engineering National Defense Academy
An analysis of the radar backscattering from the ocean surface covered by oil spill is presented using a mi- crowave scattering model and Monte-Carlo simulation. In the analysis, a one-dimensional rough sea sur- face ... 详细信息
来源: 评论