咨询与建议

限定检索结果

文献类型

  • 25 篇 会议
  • 22 篇 期刊文献

馆藏范围

  • 47 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 34 篇 工学
    • 29 篇 计算机科学与技术...
    • 23 篇 软件工程
    • 11 篇 信息与通信工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 控制科学与工程
    • 3 篇 仪器科学与技术
    • 3 篇 生物工程
    • 2 篇 交通运输工程
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电气工程
    • 1 篇 航空宇航科学与技...
  • 8 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 4 篇 图书情报与档案管...
  • 7 篇 理学
    • 4 篇 数学
    • 3 篇 生物学
    • 2 篇 物理学
    • 2 篇 统计学(可授理学、...
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 4 篇 servers
  • 3 篇 authentication
  • 3 篇 protocols
  • 3 篇 encryption
  • 3 篇 cloud computing
  • 2 篇 data processing
  • 2 篇 time delay
  • 2 篇 ports (computers...
  • 2 篇 benchmarking
  • 2 篇 vehicles
  • 2 篇 privacy
  • 1 篇 internet of thin...
  • 1 篇 global positioni...
  • 1 篇 node.js
  • 1 篇 implicit emotion...
  • 1 篇 patents
  • 1 篇 system domain is...
  • 1 篇 ntru lattice
  • 1 篇 elliptic curve
  • 1 篇 parallel process...

机构

  • 10 篇 school of comput...
  • 7 篇 beijing engineer...
  • 6 篇 department of co...
  • 4 篇 department of el...
  • 4 篇 beijing engineer...
  • 4 篇 beijing engineer...
  • 3 篇 beijing engineer...
  • 3 篇 shanghai radio e...
  • 3 篇 beijing eng. res...
  • 2 篇 school of comput...
  • 2 篇 beijing eng. res...
  • 2 篇 overhaul branch ...
  • 2 篇 beijing engineer...
  • 2 篇 research center ...
  • 1 篇 beijing eng. res...
  • 1 篇 faculty of engin...
  • 1 篇 science and tech...
  • 1 篇 beijing engineer...
  • 1 篇 school of comput...
  • 1 篇 beijing institut...

作者

  • 11 篇 zhu liehuang
  • 7 篇 liehuang zhu
  • 6 篇 du xiaojiang
  • 6 篇 gao yang
  • 6 篇 guizani mohsen
  • 5 篇 zhang chuan
  • 5 篇 xu chang
  • 5 篇 heyan huang
  • 5 篇 sharif kashif
  • 5 篇 huang heyan
  • 4 篇 yang yizhe
  • 4 篇 li jiawei
  • 4 篇 li yinghao
  • 4 篇 sun huashan
  • 3 篇 li yuanzhang
  • 3 篇 tan yu'an
  • 3 篇 tan yu-an
  • 3 篇 yu xiao
  • 2 篇 zhang quanxin
  • 2 篇 wu yixiao

语言

  • 46 篇 英文
  • 1 篇 中文
检索条件"机构=Research Center of Massive Language Information Processing and Cloud Computing Application"
47 条 记 录,以下是11-20 订阅
排序:
A novel audio information hiding scheme based on rMAC
A novel audio information hiding scheme based on rMAC
收藏 引用
2012 International Conference on information Technology and Software Engineering, ITSE 2012
作者: Yu, Litao Zhu, Liehuang Liu, Dan Xie, Yuzhou Beijing Eng. Res. Center of Massive Language Information Processing and Cloud Computing Application School of Computer Science and Technology Beijing Institute of Technology Beijing 100086 China
We present a novel audio information hiding scheme based on robust message authentication code (rMAC). By combining coefficient quantization based information hiding scheme with rMAC and chaotic encryption, proposed s... 详细信息
来源: 评论
The adaptive multicast data origin authentication protocol
The adaptive multicast data origin authentication protocol
收藏 引用
2nd CCF Internet Conference of China, ICoC 2013
作者: Zhu, Liehuang Yang, Hao Yang, Zhenghe Beijing Eng. Research Center of Massive Language Info. Processing and Cloud Computing Application School of Computer Science and Technology Beijing Institute of Technology Beijing China
Most multicast data origin authentication schemes work under the fixed parameters without taking the problem of changeable network environment into account. However, the network conditions will obviously influence the... 详细信息
来源: 评论
SSD lifespan-oriented cache optimization in SSD/HDD hybrid storage system
SSD lifespan-oriented cache optimization in SSD/HDD hybrid s...
收藏 引用
International Conference on Environmental Engineering and Computer application, ICEECA 2014
作者: Wang, X. Zhang, Q.X. Tan, Y.A. Qu, J.Q. Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application School of Computer Science and Technology Beijing Institute of Technology Beijing China Shanghai Radio Equipment Research Institute Shanghai China
Layered SSD/HDD hybrid storage system has been widely used. However, most traditional designs are performance oriented, and not optimized for SSD lifespan. In this paper, SSD lifespan oriented layered model and cache ... 详细信息
来源: 评论
Knowledge-enriched joint-learning model for implicit emotion cause extraction
收藏 引用
CAAI Transactions on Intelligence Technology 2023年 第1期8卷 118-128页
作者: Chenghao Wu Shumin Shi Jiaxing Hu Heyan Huang School of Computer Science and Technology Beijing Institute of TechnologyBeijingChina Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications BeijingChina
Emotion cause extraction(ECE)task that aims at extracting potential trigger events of certain emotions has attracted extensive attention ***,current work neglects the implicit emotion expressed without any explicit em... 详细信息
来源: 评论
Enhanced privacy preserving pattern-code based data aggregation in wireless sensor networks
Enhanced privacy preserving pattern-code based data aggregat...
收藏 引用
9th IEEE International Conference on Mobile Ad-Hoc and Sensor Networks, MSN 2013
作者: Ntirenganya, Bernard Zhang, Zijian Zhu, Liehuang Tan, Yu-An Yang, Zhen Guo, Cong Beijing Eng. Research Center of Massive Language Information and Cloud Computation Application School of Computer Science Beijing Institute of Technology Beijing 100081 China
In their nature, wireless sensor nodes are resource restrained, such as low power capabilities and small memory. These limitations inevitably affect secure energy-efficient wireless sensor networks protocols in such w... 详细信息
来源: 评论
An Efficient and Secure RFID Batch Authentication Protocol with Group Tags Ownership Transfer
An Efficient and Secure RFID Batch Authentication Protocol w...
收藏 引用
International Conference on Collaborative computing: Networking, applications and Worksharing (CollaborateCom)
作者: Rong Zhang Liehuang Zhu Chang Xu Yi Yi Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application Beijing Institute of Technology Beijing China
Tag Authentication is an essential issue in RFID system which is wildly applied in many areas. Compared to the per-tag-based authentication, the batch-mode authentication has better performance for complex application... 详细信息
来源: 评论
cloud Storage-oriented Secure information Gateway
Cloud Storage-oriented Secure Information Gateway
收藏 引用
International Conference on cloud and Service computing (CSC)
作者: Qiongyu Zhang Liehuang Zhu Huishan Bian Xiaoyao Peng Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application Beijing Institute of Technology Beijing China
The Secure Channel Free Public Key Encryption with Keyword Search (SCF-PEKS) scheme, which enables one to search for the encrypted keywords without leaking the privacy. In this paper, we point out the inefficiency of ... 详细信息
来源: 评论
Large Scale Network Topology Visualization System Based on ***
Large Scale Network Topology Visualization System Based on *...
收藏 引用
2016 International Conference on Artificial Intelligence: Technologies and applications (ICAITA 2016)
作者: Yuxiao Wang Yuanzhang Li Yu'an Tan Quanxin Zhang Jun Zheng School of Computer Science and Technology Beijing Institute of Technology Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application
with the rapid development of visualization,network visualization has become an important branch,which is applied in many aspects of life such as business,education and virtual *** existed network visualization system... 详细信息
来源: 评论
PSST: A Benchmark for Evaluation-driven Text Public-Speaking Style Transfer
PSST: A Benchmark for Evaluation-driven Text Public-Speaking...
收藏 引用
2024 Conference on Empirical Methods in Natural language processing, EMNLP 2024
作者: Sun, Huashan Wu, Yixiao Ye, Yuhao Yang, Yizhe Li, Yinghao Li, Jiawei Gao, Yang School of Computer Science and Technology Beijing Institute of Technology Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications China
language style is necessary for AI systems to understand and generate diverse human language ***, previous text style transfer primarily focused on sentence-level data-driven approaches, limiting exploration of potent... 详细信息
来源: 评论
The Adaptive Multicast Data Origin Authentication Protocol
The Adaptive Multicast Data Origin Authentication Protocol
收藏 引用
第二届中国互联网学术年会
作者: Liehuang Zhu Hao Yang Zhenghe Yang Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application School of Computer Science and Technology Beijing Institute of Technology China Beijing
Most multicast data origin authentication schemes work under the fixed parameters without taking the problem of changeable network environment into ***,the network conditions will obviously influence the efficiency of... 详细信息
来源: 评论