咨询与建议

限定检索结果

文献类型

  • 42 篇 会议
  • 21 篇 期刊文献

馆藏范围

  • 63 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 37 篇 工学
    • 26 篇 计算机科学与技术...
    • 19 篇 软件工程
    • 8 篇 信息与通信工程
    • 6 篇 电气工程
    • 6 篇 电子科学与技术(可...
    • 6 篇 生物工程
    • 4 篇 控制科学与工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 建筑学
    • 2 篇 网络空间安全
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 化学工程与技术
    • 1 篇 航空宇航科学与技...
    • 1 篇 环境科学与工程(可...
    • 1 篇 城乡规划学
  • 14 篇 理学
    • 8 篇 数学
    • 8 篇 生物学
    • 3 篇 统计学(可授理学、...
    • 1 篇 物理学
    • 1 篇 化学
  • 11 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 4 篇 工商管理
    • 2 篇 图书情报与档案管...
    • 1 篇 公共管理
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...

主题

  • 5 篇 computer archite...
  • 4 篇 grid computing
  • 4 篇 real-time system...
  • 4 篇 costs
  • 4 篇 semantics
  • 3 篇 deep learning
  • 3 篇 laboratories
  • 3 篇 authentication
  • 3 篇 protocols
  • 3 篇 blockchains
  • 3 篇 streaming media
  • 3 篇 open source soft...
  • 2 篇 computer science
  • 2 篇 base stations
  • 2 篇 real time system...
  • 2 篇 ontologies
  • 2 篇 resource managem...
  • 2 篇 predictive model...
  • 2 篇 databases
  • 2 篇 consensus algori...

机构

  • 10 篇 school of inform...
  • 8 篇 key laboratory o...
  • 5 篇 key laboratory o...
  • 5 篇 engineering rese...
  • 4 篇 travelsky techno...
  • 4 篇 national enginee...
  • 3 篇 department of el...
  • 3 篇 china academy of...
  • 3 篇 institute for ne...
  • 3 篇 school of networ...
  • 3 篇 school of comput...
  • 3 篇 school of cyber ...
  • 3 篇 key laboratory o...
  • 2 篇 distributed comp...
  • 2 篇 key laboratory o...
  • 2 篇 jin yinhu labora...
  • 2 篇 beijing universi...
  • 2 篇 network interfac...
  • 2 篇 ministry of educ...
  • 2 篇 national enginee...

作者

  • 10 篇 songlin sun
  • 5 篇 dongbin wang
  • 4 篇 jiaqi zou
  • 4 篇 wang dongbin
  • 3 篇 shaokang wang
  • 2 篇 zhang tao
  • 2 篇 yang bo
  • 2 篇 min luo
  • 2 篇 gao yibo
  • 2 篇 zhang chao
  • 2 篇 gao hui
  • 2 篇 li zhen
  • 2 篇 han jing
  • 2 篇 xu mingying
  • 2 篇 xu shouhuai
  • 2 篇 zou deqing
  • 2 篇 li yating
  • 2 篇 lu yueming
  • 2 篇 xu zhang
  • 2 篇 hui zhi

语言

  • 57 篇 英文
  • 4 篇 其他
  • 2 篇 中文
检索条件"机构=Network Distributed Computing Laboratory"
63 条 记 录,以下是1-10 订阅
排序:
k-TEVS: A k-Times E-Voting Scheme on Blockchain With Supervision
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年 第3期22卷 2326-2337页
作者: Liu, Yang He, Debiao Luo, Min Wang, Lianhai Peng, Cong Wuhan University School of Cyber Science and Engineering Wuhan430072 China Shenzhen Institute of Information Technology Institute of Information Technology Shenzhen518172 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Matrix Elements Technologies Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Shanghai200232 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
Thee-vote is regarded as a waytoexpress the opinion that the voters ask for. Actually, the e-vote could be applied wildly likequestionnaire,***,thecoexistences of efficiency and security as well as transparency and pr... 详细信息
来源: 评论
SMDPG: Identifying Metabolite-Disease Associations via Optimized Negative Sampling and Sparse Graph Convolutional network
IEEE Transactions on Computational Biology and Bioinformatic...
收藏 引用
IEEE Transactions on Computational Biology and Bioinformatics 2025年 第2期22卷 672-683页
作者: Yiran Huang Qiulong Pu Wei Lan Cuiyu Huang Cheng Zhong School of Computer Electronics and Information Guangxi University Nanning China Guangxi Universities Key Laboratory of Parallel and Distributed Computing and Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi University Nanning China College of Chemistry Nankai University Tianjin China
Identifying disease-associated metabolites could provide critical clues for the diagnosis and treatment of diseases. Although computational approaches have been proposed to predict disease-associated metabolites by tr... 详细信息
来源: 评论
ATHENA: An In-vehicle CAN Intrusion Detection Framework Based on Physical Characteristics of Vehicle Systems
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Kai Sun, Zhen Wang, Bailing Fan, Qilin Li, Ming Zhang, Hongke School of Computer Science and Technology Harbin Institute of Technology Weihai China Shandong Key Laboratory of Industrial Network Security China School of Big Data and Software Engineering Chongqing University Chongqing China Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing University Chongqing China Jinan Key Laboratory of Distributed Databases Shandong Inspur Database Technology Co. Ltd Jinan China School of Electronic and Information Engineering Beijing Jiaotong University Beijing China
With the growing interconnection between In-Vehicle networks (IVNs) and external environments, intelligent vehicles are increasingly vulnerable to sophisticated external network attacks. This paper proposes ATHENA, th... 详细信息
来源: 评论
network Traffic Generation Based on Statistical Packet-Level Characteristics
收藏 引用
China Communications 2015年 第S2期12卷 144-148页
作者: WANG Dongbin ZHUO Weihan ZHANG Junhui WU Kexin OUYANG Wen School of Software Engineering Beijing University of Posts and Telecommunications National Engineering Laboratory for Mobile Network Security (BUPT) Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education
network traffic is very important for testing network equipment, network services, and security products. A new method of generating traffic based on statistical packet-level characteristics is proposed. In every time... 详细信息
来源: 评论
A New Pipeline for Knowledge Graph Reasoning Enhanced by Large Language Models Without Fine-Tuning
A New Pipeline for Knowledge Graph Reasoning Enhanced by Lar...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Chen, Zhongwu Bai, Long Li, Zixuan Huang, Zhen Jin, Xiaolong Dou, Yong National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
Conventional Knowledge Graph Reasoning (KGR) models learn the embeddings of KG components over the structure of KGs, but their performances are limited when the KGs are severely incomplete. Recent LLM-enhanced KGR mod... 详细信息
来源: 评论
Fog computing for vehicular Ad-hoc networks: paradigms, scenarios, and issues
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2016年 第2期23卷 56-65,96页
作者: Kang Kai Wang Cong Luo Tao School of Software Engineering Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts Telecommunications School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts Telecommunications
Vehicular Ad-hoc networks(VANETs) are kinds of mobile Ad-hoc networks(MANETs), which consist of mobile vehicles with on-board units(OBUs) and roadside units(RSUs). With the rapid development of computation and... 详细信息
来源: 评论
Predicting cement compressive strength using double-layer multi-expression programming
Predicting cement compressive strength using double-layer mu...
收藏 引用
4th International Conference on Computational and Information Sciences, ICCIS 2012
作者: Zhang, Qingke Yang, Bo Wang, Lin Zhu, Fuxiang Shandong Province Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan China Computer Networks and Distributed Systems Laboratory Beijing Institute Technology Beijing China
This paper presents a novel algorithm named Double-layer Multi-expression Programming (DMEP). Then DMEP model is applied to the prediction of 28-day Portland cement compressive strength. We compare DMEP model with oth... 详细信息
来源: 评论
Rigorous punishment promotes cooperation in prisoners’ dilemma game  7th
Rigorous punishment promotes cooperation in prisoners’ dile...
收藏 引用
7th International ICST Conference on Bio-Inspired Models of network, Information, and computing Systems, BIONETICS 2012
作者: Ling, Yun Liu, Jian Zhu, Ping Wei, Guiyi Networking and Distributed Computing Laboratory Zhejiang Gongshang University 18 Xuezheng St Xiasha Higher Education Park Hangzhou China Wasu Media Network Co. Ltd Hangzhou China
In this paper, we introduce a rigorous punishment mechanism into the prisoners’ dilemma game. In our model, the punisher punishes the defector with fine β at the cost of γ. Monte-Carlo simulations show the evolutio... 详细信息
来源: 评论
Threshold signature scheme based on non-interactive Diffie-Hellman signature
Threshold signature scheme based on non-interactive Diffie-H...
收藏 引用
1st International Conference on networking and distributed computing, ICNDC 2010
作者: Wang, Xiuqun Huang, Lican Key Laboratory for Information System Security Ministry of Education Tsinghua University and Beijing Certification Authority Beijing China Institute of Network and Distributed Computing Zhejiang Sci-Tech University Hangzhou China
We present a threshold signature based on non-interactive Diffie-Hellman signature. It works in asynchronous communication system and can tolerate Byzantine faults with optimal resiliencen ≥ 3t + 1, where n is the nu... 详细信息
来源: 评论
Modeling and design of notarial system supporting secure transactions in electronic commerce based on the Internet
Modeling and design of notarial system supporting secure tra...
收藏 引用
International Conference on Information networking
作者: Sung-Woo Tak Ryu-Seok Bae Jong-Moon Son Distributed Computing Laboratory Network Computing Department Systems Engineering Research Institute Daejeon South Korea
In this paper, we analyze notarial requirements in the electronic commerce based on the Internet and design the notarial system to support secure transactions, which provides the notarial service for assurance of tran... 详细信息
来源: 评论