咨询与建议

限定检索结果

文献类型

  • 324 篇 会议
  • 155 篇 期刊文献

馆藏范围

  • 479 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 165 篇 工学
    • 90 篇 计算机科学与技术...
    • 51 篇 电气工程
    • 50 篇 软件工程
    • 32 篇 电子科学与技术(可...
    • 16 篇 船舶与海洋工程
    • 14 篇 信息与通信工程
    • 14 篇 控制科学与工程
    • 5 篇 机械工程
    • 3 篇 光学工程
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 化学工程与技术
    • 3 篇 网络空间安全
    • 2 篇 交通运输工程
    • 2 篇 生物医学工程(可授...
    • 1 篇 力学(可授工学、理...
  • 125 篇 理学
    • 67 篇 物理学
    • 65 篇 数学
    • 9 篇 统计学(可授理学、...
    • 8 篇 天文学
    • 8 篇 系统科学
    • 3 篇 化学
    • 1 篇 地球物理学
    • 1 篇 生物学
  • 18 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 4 篇 工商管理
    • 4 篇 图书情报与档案管...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 法学
    • 2 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学

主题

  • 82 篇 mathematics
  • 73 篇 computer science
  • 23 篇 educational inst...
  • 14 篇 data mining
  • 14 篇 mathematical mod...
  • 13 篇 algorithm design...
  • 13 篇 humans
  • 12 篇 computational mo...
  • 12 篇 control systems
  • 12 篇 testing
  • 12 篇 equations
  • 11 篇 application soft...
  • 11 篇 neural networks
  • 10 篇 internet
  • 10 篇 clustering algor...
  • 9 篇 statistics
  • 9 篇 computational in...
  • 9 篇 costs
  • 8 篇 parallel process...
  • 8 篇 databases

机构

  • 15 篇 dep. math. compu...
  • 8 篇 drug discovery p...
  • 8 篇 inst. of math. &...
  • 7 篇 comput. sci. tel...
  • 6 篇 coll. of math. &...
  • 6 篇 dept. of math. s...
  • 5 篇 dept. of comput....
  • 5 篇 dept. of math. &...
  • 5 篇 dept. of math. &...
  • 5 篇 dept. of math. &...
  • 4 篇 dept. of comput....
  • 4 篇 dept. of math. s...
  • 4 篇 comput. sci. tel...
  • 4 篇 centre for math....
  • 4 篇 dept. of appl. m...
  • 4 篇 dept. of math. a...
  • 4 篇 div. of math. & ...
  • 4 篇 argonne national...
  • 4 篇 dept. of math. &...
  • 4 篇 sch. of comput. ...

作者

  • 10 篇 m. randic
  • 7 篇 alan p. kozikows...
  • 7 篇 harn l
  • 7 篇 n. trinajstic
  • 5 篇 jinhu lu
  • 5 篇 mohamed-slim alo...
  • 5 篇 milan randic
  • 4 篇 chen zhi-zhong
  • 4 篇 shen xj
  • 4 篇 subhash c. basak
  • 4 篇 s. nikolic
  • 3 篇 wen jianjun
  • 3 篇 sakata shojiro
  • 3 篇 jiang tao
  • 3 篇 a.y. cairns
  • 3 篇 s.s.-t. yau
  • 3 篇 toptsis a.a.
  • 3 篇 cox w
  • 3 篇 stephan reiff-ma...
  • 3 篇 lin guohui

语言

  • 430 篇 英文
  • 44 篇 其他
  • 5 篇 中文
检索条件"机构=Sci. Comput. & Comput. Math. Program"
479 条 记 录,以下是51-60 订阅
排序:
LOCALIZATION AND GLASS-TRANSITION IN 2-DIMENSIONAL LIQUIDS
收藏 引用
JOURNAL OF PHYSICS-CONDENSED MATTER 1994年 第7期6卷 1299-1308页
作者: RANGANATHAN, S Dept. of Math. & Comput. Sci. R. Mil. Coll. of Canada Kingston Ont. Canada
Molecular dynamic comput.r simulations of a two-dimensional Lennard-Jones liquid, along several isotherms, have been carried out to search for a distinct transition from a compressed liquid to an amorphous solid. The ... 详细信息
来源: 评论
Tumbling toast, Murphy's law and the fundamental constants
收藏 引用
European Journal of Physics 1995年 第4期16卷 172-172页
作者: Matthews, R.A.J. Dept. of Appl. Math. & Comput. Sci. Aston Univ. Birmingham UK
We investigate the dynamics of toast tumbling from a table to the floor. Popular opinion is that the final state is usually butter-side down, and constitutes prima facie evidence of Murphy's Law ('If it can go...
来源: 评论
GROUP-ORIENTED (T,N) THRESHOLD DIGITAL SIGNATURE SCHEME AND DIGITAL MULTISIGNATURE
收藏 引用
IEE PROCEEDINGS-comput.RS AND DIGITAL TECHNIQUES 1994年 第5期141卷 307-313页
作者: HARN, L Comput. Sci. Telecommun. Program Missouri Univ. Kansas City USA
The paper presents group-oriented (t, n) threshold digital signature schemes based on the difficulty of solving the discrete logarithm problem. By employing these schemes, any t out of n users in a group can represent... 详细信息
来源: 评论
SERIES ANALYSIS OF THE 2-DIMENSIONAL STEP MODEL
收藏 引用
JOURNAL OF PHYSICS A-math.MATICAL AND GENERAL 1985年 第3期18卷 495-499页
作者: NYMEYER, A GUTTMANN, AJ Dept. of Math. Stat. & Comput. Sci. Newcastle Univ. NSW Australia
An n-fit series analysis of the susceptibility of the two-dimensional step model is carried out. The work follows a similar analysis of Ferer and Velgakis of the planar and XY models. Due to the nature of the interact...
来源: 评论
EFFICIENT SHARING (BROADCASTING) OF MULTIPLE SECRETS
收藏 引用
IEE PROCEEDINGS-comput.RS AND DIGITAL TECHNIQUES 1995年 第3期142卷 237-240页
作者: HARN, L Comput. Sci. Telecommun. Program Missouri Univ. Kansas City USA
Instead of using the conventional m out of n perfect secret sharing scheme to protect a single secret among n users, the authors propose a secret sharing scheme based on one cryptographic assumption to protect multipl... 详细信息
来源: 评论
2-DIMENSIONAL COMPRESSED LIQUID - A MOLECULAR-DYNAMICS STUDY
收藏 引用
JOURNAL OF PHYSICS-CONDENSED MATTER 1993年 第4期5卷 387-396页
作者: RANGANATHAN, S DUBEY, GS Dept. of Math. & Comput. Sci. R. Mil. Coll. Kingston Ont. Canada
Extensive molecular-dynamics comput.r simulation results are presented for a two-dimensional (2D) Lennard-Jones system as it is compressed isothermally well beyond its normal liquid state. They show systematic changes...
来源: 评论
DESIGN OF GENERALIZED ELGAMAL TYPE DIGITAL SIGNATURE SCHEMES BASED ON DISCRETE LOGARITHM
收藏 引用
ELECTRONICS LETTERS 1994年 第24期30卷 2025-2026页
作者: HARN, L XU, Y Comput. Sci. Telecommun. Program Missouri Univ. Kansas City MO
The ElGamal type digital signature schemes have received dde attention recently. ElGamal type signature schemes can provide 'subliminal' channel, message recovery, multisignature, etc, The authors investigate ... 详细信息
来源: 评论
ENHANCING THE SECURITY OF ELGAMAL SIGNATURE SCHEME
收藏 引用
IEE PROCEEDINGS-comput.RS AND DIGITAL TECHNIQUES 1994年 第4期141卷 249-252页
作者: HE, J KIESLER, T Comput. Sci. Telecommun. Program Missouri Univ. Kansas City USA
The paper proposes the use of more than one hard problem in the design of cryptographic protocols to enhance their security. Specifically, both the discrete logarithm problem and the factorisation problem are embedded... 详细信息
来源: 评论
Parameter-ellipticity for mixed-order elliptic boundary problems
COMPTES RENDUS DE L ACADEMIE DES SCIENCES SERIE I-MATHEMATIQ...
收藏 引用
COMPTES RENDUS DE L ACADEMIE DES sci.NCES SERIE I-math.MATIQUE 1997年 第12期324卷 1361-1366页
作者: Kozhevnikov, A Dept. of Math and Comput. Sci. Univ. of Haifa 31905 Israel
The aim of this Note is to formulate a parameter-ellipticity condition for the mixed order (Douglis-Nirenberg) boundary-value problems and to prove a theorem on the minimal growth of the resolvent.
来源: 评论
THRESHOLD CRYPTOSYSTEM WITH MULTIPLE SECRET SHARING POLICIES
收藏 引用
IEE PROCEEDINGS-comput.RS AND DIGITAL TECHNIQUES 1994年 第2期141卷 142-144页
作者: HARN, L LIN, HY YANG, S Comput. Sci. Telecommun. Program Missouri Univ. Kansas City USA
In a group-oriented threshold cryptosystem, each group, instead of each individual member within the group, publishes a single group public key. An outsider can use this group public key to send encrypted messages to ... 详细信息
来源: 评论