咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 4 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 3 篇 计算机科学与技术...
    • 3 篇 软件工程
    • 1 篇 电气工程
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 化学工程与技术
    • 1 篇 网络空间安全
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理

主题

  • 1 篇 secret sharing
  • 1 篇 computational co...
  • 1 篇 graph-based
  • 1 篇 quality variable...
  • 1 篇 adversary struct...
  • 1 篇 soft sensor
  • 1 篇 machine learning
  • 1 篇 data-driven mode...
  • 1 篇 computer network...
  • 1 篇 ensemble pruning
  • 1 篇 chemical process

机构

  • 2 篇 school of comput...
  • 1 篇 school of electr...
  • 1 篇 institute of aut...
  • 1 篇 sch. of computin...
  • 1 篇 key laboratory o...
  • 1 篇 school of inform...
  • 1 篇 ministry of educ...
  • 1 篇 school of electr...
  • 1 篇 school of busine...
  • 1 篇 key laboratory o...
  • 1 篇 key laboratory o...

作者

  • 2 篇 ma jianfeng
  • 1 篇 guo yuanbo
  • 1 篇 xiao-jun wang
  • 1 篇 wang chao
  • 1 篇 xiao-yan wang
  • 1 篇 zhi-zhong mao
  • 1 篇 shi ting-jun
  • 1 篇 zhu jianming
  • 1 篇 qiang zhang
  • 1 篇 guo yuan-bo
  • 1 篇 ma jian-feng
  • 1 篇 wang yadi

语言

  • 3 篇 英文
  • 1 篇 中文
检索条件"机构=School of Computing and Automatization"
4 条 记 录,以下是1-10 订阅
排序:
The soft sensor of the molten steel temperature using the modified maximum entropy based pruned bootstrap feature subsets ensemble method
收藏 引用
Chemical Engineering Science 2018年 189卷 401-412页
作者: Xiao-Jun Wang Xiao-Yan Wang Qiang Zhang Zhi-Zhong Mao Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education Dalian University Dalian 116622 China School of Business Administration Dongbei University of Finance and Economics Dalian 116025 China Institute of Automatization College of Information Science and Engineering Northeastern University Shenyang 110004 China
The molten steel temperature in ladle furnace is a significant variable, but it is hard to be measured by real-time detection, which has some bad effects on productions. Soft sensors are alternative and effective tech... 详细信息
来源: 评论
Design and implementation of survivable network systems
Design and implementation of survivable network systems
收藏 引用
International Conference on Intelligent computing, ICIC 2005
作者: Wang, Chao Ma, Jianfeng Zhu, Jianming Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China School of Computing and Automatization TianJin Polytechnic University Tianjin 300160 China School of Information Central University of Finance and Economics Beijing 100081 China
As their scales and complexities increase, the computer-based network systems suffer from increasing probability of being intruded or crashed and decreasing dependability. Such a problem can be solved by extending the... 详细信息
来源: 评论
Efficient secret sharing scheme realizing graph-based adversary structures
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2005年 第5期42卷 877-882页
作者: Guo, Yuanbo Ma, Jianfeng Wang, Yadi Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China School of Electronic Technology Information Engineering University of PLA Zhengzhou 450004 China School of Computing and Automatization Tianjin Polytechnic University Tianjin 300160 China
Most of the existing secret sharing schemes are constructed to realize general access structure, which is defined in term of authorized groups of participants, and is unable to be applied directly to the design of an ... 详细信息
来源: 评论
An efficient construction of secret sharing for generalized adversary structure and its reduction
An efficient construction of secret sharing for generalized ...
收藏 引用
2004 International Conference on Communications, Circuits and Systems
作者: Guo, Yuan-Bo Shi, Ting-Jun Ma, Jian-Feng Ministry of Education Key Lab. Comp. Netwk./Info. Secty. Xidian University Xi'an 710071 China School of Electronic Technology Information Engineering University Zhengzhou Henan 450004 China Sch. of Computing and Automatization TianJin Polytechnic University Tianjin 300160 China
A secret sharing scheme for generalized adversary structure is a method of sharing a secret among a finite set of participants in such a way that only certain pre-specified subsets of participants cannot recover the s... 详细信息
来源: 评论