咨询与建议

限定检索结果

文献类型

  • 74 篇 会议
  • 28 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 103 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 61 篇 工学
    • 47 篇 计算机科学与技术...
    • 40 篇 软件工程
    • 9 篇 控制科学与工程
    • 8 篇 信息与通信工程
    • 6 篇 电子科学与技术(可...
    • 4 篇 机械工程
    • 4 篇 生物工程
    • 3 篇 仪器科学与技术
    • 3 篇 动力工程及工程热...
    • 3 篇 电气工程
    • 3 篇 交通运输工程
    • 3 篇 网络空间安全
    • 2 篇 光学工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 生物医学工程(可授...
    • 2 篇 安全科学与工程
    • 1 篇 力学(可授工学、理...
  • 19 篇 理学
    • 13 篇 数学
    • 4 篇 生物学
    • 4 篇 系统科学
    • 3 篇 物理学
    • 2 篇 统计学(可授理学、...
  • 18 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 5 篇 工商管理
    • 3 篇 图书情报与档案管...
  • 5 篇 医学
    • 5 篇 临床医学
    • 3 篇 基础医学(可授医学...
  • 2 篇 军事学
    • 2 篇 军队指挥学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学

主题

  • 6 篇 wireless communi...
  • 6 篇 wireless sensor ...
  • 5 篇 approximation al...
  • 4 篇 optimization
  • 4 篇 computational mo...
  • 4 篇 robot sensing sy...
  • 4 篇 virtualization
  • 3 篇 conferences
  • 3 篇 runtime
  • 3 篇 registers
  • 3 篇 linux
  • 3 篇 throughput
  • 3 篇 graphics process...
  • 3 篇 semantics
  • 3 篇 algorithm design...
  • 3 篇 receivers
  • 3 篇 protocols
  • 3 篇 kernel
  • 3 篇 hardware
  • 3 篇 robot kinematics

机构

  • 25 篇 shanghai key lab...
  • 10 篇 shanghai key lab...
  • 9 篇 school of softwa...
  • 9 篇 state key labora...
  • 8 篇 shanghai key lab...
  • 7 篇 school of softwa...
  • 6 篇 shanghai key lab...
  • 6 篇 department of co...
  • 5 篇 school of electr...
  • 4 篇 department of co...
  • 4 篇 school of softwa...
  • 4 篇 intel china soft...
  • 4 篇 school of softwa...
  • 4 篇 department of co...
  • 3 篇 school of softwa...
  • 3 篇 national key lab...
  • 3 篇 school of inform...
  • 3 篇 department of co...
  • 3 篇 alibaba group
  • 2 篇 school of mathem...

作者

  • 21 篇 guan haibing
  • 13 篇 haibing guan
  • 11 篇 guihai chen
  • 10 篇 liang alei
  • 10 篇 qi zhengwei
  • 7 篇 alei liang
  • 6 篇 haipeng dai
  • 5 篇 zhengwei qi
  • 5 篇 chen kai
  • 5 篇 wu fan
  • 5 篇 chen guihai
  • 4 篇 dong yaozu
  • 4 篇 xiaofeng gao
  • 4 篇 ma ruhui
  • 4 篇 bin yao
  • 4 篇 xiaobing wu
  • 4 篇 li wu-jun
  • 4 篇 fan wu
  • 3 篇 chen kefei
  • 3 篇 kai chen

语言

  • 98 篇 英文
  • 4 篇 其他
  • 1 篇 中文
检索条件"机构=School of Software and Shanghai Key Laboratory of Scalable Computing and Systems"
103 条 记 录,以下是61-70 订阅
排序:
Accountable authority key policy attribute-based encryption
收藏 引用
Science China(Information Sciences) 2012年 第7期55卷 1631-1638页
作者: WANG YongTao 1,2 ,CHEN KeFei 1,3 ,LONG Yu 1,4 & LIU ZhaoHui 2 1 Department of Computer Science and Engineering,shanghai Jiao Tong University,shanghai 200240,China 2 China Information Technology Security Evaluation Center,Beijing 100085,China 3 shanghai key laboratory of scalable computing and systems,shanghai Jiao Tong University,shanghai,200240,China 4 State key laboratory of Information Security,Graduate school of Chinese Academy of Sciences,100039,China 1. Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China2. China Information Technology Security Evaluation Center Beijing 100085 China3. Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai 200240 China4. State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing 100039 China
We present an accountable authority key policy attribute-based encryption (A-KPABE) *** this paper,we extend Goyal's work to key policy attribute-based encryption *** first generalize the notion of accountable aut... 详细信息
来源: 评论
On the Security of Double-Block-Length Hash Functions with Rate 1
收藏 引用
电子学报(英文版) 2012年 第3期21卷 566-570页
作者: GONG Zheng LUO Yiyuan LAI Xuejia CHEN Kefei School of Computer Science South China Normal University Guangzhou 510631 China Department of Computer Science Shanghai Jiaotong University Shanghai 200240 China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
The security of double-block-length hash functions with rate 1, which are based on a block cipher with a block length of n bits and a key length of 2n bits, was analyzed by Satoh et al. and Hirose. In this paper, we r... 详细信息
来源: 评论
High Availability through Output Continuity
High Availability through Output Continuity
收藏 引用
IEEE International Conference on Cluster computing Workshops and Posters (CLUSTER WORKSHOPS)
作者: Wei Ye Yaozu Dong Ruhui Ma Alei Liang Haibing Guan Shanghai Key Laboratory of Scalable Computing and Systems Department of Computer Science and Engineering Shanghai Jiaotong University Shanghai China Intel China Software Center Shanghai China
Virtual machine (VM) based state machine approaches, i.e. VM replication, provide high availability without source code modifications, unfortunately, existing VM replication approaches suffer from excessive replicatio... 详细信息
来源: 评论
The sharing at roadside: Vehicular content distribution using parked vehicles
The sharing at roadside: Vehicular content distribution usin...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE Computer and Communications Societies
作者: Nianbo Liu Ming Liu Guihai Chen Jiannong Cao School of Computer Science and Engineering University of Electronic Science and Technology Chengdu China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiaotong University Shanghai China Department of Computing Hong Kong Polytechnic University Hong Kong China
In Vehicular Ad Hoc Networks (VANETs), content distribution directly relies on the fleeting and dynamic contacts between moving vehicles, which often leads to prolonged downloading delay and terrible user experience. ... 详细信息
来源: 评论
A PSO-inspired multi-robot search algorithm independent of global information
A PSO-inspired multi-robot search algorithm independent of g...
收藏 引用
IEEE Symposium on Swarm Intelligence
作者: Zhu, Qian Liang, Alei Guan, Haibing School of Software Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China Department of Computer Science Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China
This paper presents an algorithm that coordinates mobile robots to find the desired targets without depending on precise global information. We compare the abstract solution space in PSO and physical environment that ... 详细信息
来源: 评论
An improved content-based data dissemination in human contact-based network
An improved content-based data dissemination in human contac...
收藏 引用
2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011
作者: Jiang, Chao Peng, Tao Liang, Alei Guan, Haibing School of Software Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China Department of Computer Science Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China
Limited wireless communication devices carried by individuals make up human contact-based network. Such network often suffers from intermittent connectivity. This fact decreases successful ratio of information spreadi... 详细信息
来源: 评论
An algorithm for self-organized aggregation of swarm robotics using timer
An algorithm for self-organized aggregation of swarm robotic...
收藏 引用
IEEE Symposium on Swarm Intelligence
作者: Yan, Xinan Liang, Alei Guan, Haibing School of Software Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China Department of Computer Science Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China
Aggregation is a basic collective behavior in biology, and is a prerequisite for many applications of swarm robotics. This paper proposes a new distributed algorithm for aggregation of swarm robotics under the constra... 详细信息
来源: 评论
Combining static and dynamic analysis to discover software vulnerabilities
Combining static and dynamic analysis to discover software v...
收藏 引用
2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous computing, IMIS 2011
作者: Zhang, Ruoyu Huang, Shiqiu Qi, Zhengwei Guan, Haibin School of Software Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China School of Electronic Information and Electrical Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University China
Dynamic taint analysis has been proved to be very effective in solving security problems recently, especially in software vulnerability detection and malicious behavior prevention. Unfortunately, most of current resea... 详细信息
来源: 评论
Performance of a multi-channel MAC protocol implemented in multi-robot system
Performance of a multi-channel MAC protocol implemented in m...
收藏 引用
2011 7th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2011
作者: Zhang, Feng Liang, Alei Guan, Haibing School of Software Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China Department of Computer Science Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China
In the wireless network, the throughput decreases rapidly with increasing the number of nodes while using single-channel communication simultaneously. Using multi-channel schemes is a solution of boosting throughput. ... 详细信息
来源: 评论
DsVD: An effective low-overhead dynamic software vulnerability discoverer
DsVD: An effective low-overhead dynamic software vulnerabili...
收藏 引用
International Workshop on Assurance in Distributed systems and Networks
作者: Wang, Zhuo Tang, Zhushou Zhou, Kan Zhang, Ruoyu Qi, Zhengwei Guan, Haibin School of Software Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China School of Electronic Information and Electrical Engineering Shanghai Key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai China
Dynamic taint analysis based software vulnerability and malware detection is an effective method to detect a wide range of vulnerabilities. Unfortunately, existing systems suffer from requirement of source code, high ... 详细信息
来源: 评论