咨询与建议

限定检索结果

文献类型

  • 795 篇 会议
  • 642 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,438 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 947 篇 工学
    • 512 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 365 篇 信息与通信工程
    • 241 篇 电子科学与技术(可...
    • 152 篇 电气工程
    • 97 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 54 篇 机械工程
    • 48 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 31 篇 土木工程
    • 31 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 556 篇 理学
    • 279 篇 数学
    • 207 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 165 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 35 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 training
  • 23 篇 optimization
  • 23 篇 accuracy
  • 21 篇 cognitive radio
  • 21 篇 semantics
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 15 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 24 篇 key laboratory o...
  • 21 篇 key laboratory o...
  • 19 篇 school of cyber ...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of inform...
  • 17 篇 university of el...
  • 17 篇 school of inform...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 xu zhan

语言

  • 1,344 篇 英文
  • 60 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology of Communication and Information Security Control Laboratory"
1438 条 记 录,以下是1401-1410 订阅
排序:
An approach for design and formal verification of safety-critical software
An approach for design and formal verification of safety-cri...
收藏 引用
2010 International Conference on Computer Application and System Modeling, ICCASM 2010
作者: Ma, Wei-Gang Hei, Xin-Hong School of Computer Science and Engineering Xi'an University of Technology Xi'an Shaanxi 710071 China Key Laboratory of Computer Networks and Information Security Xidian University Ministry of Education Xi'an Shaanxi 710071 China State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing 100044 China
A modeling and verification methodology is presented for railway interlocking system which is regarded as a safety-critical system. The methodology utilizes UML (Unified Modeling Language) to model the function requir... 详细信息
来源: 评论
Properties of Prisoner's Dilemma Game based on genetic algorithm
Properties of Prisoner's Dilemma Game based on genetic algor...
收藏 引用
作者: Wang, Tao Chen, Zhi-Gang Deng, Xiao-Heng Zhagn, Jin School of Information Science and Engineering Center South University Changsha 410083 China School of Computer and Communication Hunan University Changsha 410082 China National Laboratory of Industrial Control Technology Zhejiang University Hangzhou 310027 China
Evolutionary games are widely studied in the fields of biology, sociology, economics and informatics. People's interests focus on how cooperation emerged in a system that individuals are selfish. We studied the it... 详细信息
来源: 评论
Analyzing and Correlating security Events Using State Machine
Analyzing and Correlating Security Events Using State Machin...
收藏 引用
International Conference on Computer and information technology (CIT)
作者: Feng Xuewei Wang Dongxia Zeng Jiemei Ma Guoqing Li Jin National Key Laboratory of Science and Technology on Information System Security Beijing Institute Beijing China Beijing Aerospace Control Center Beijing China
It is unfeasible to analyze the security events by the manual way for the security manager, because the number of the events is huge and the information contained in the events is meaningless. After analyzing the exis... 详细信息
来源: 评论
A variable step size blind equalization algorithm for QAM signals
A variable step size blind equalization algorithm for QAM si...
收藏 引用
International Conference on Microwave and Millimeter Wave technology Proceedings
作者: Xue Wei Yang Xiaoniu Zhang Zhaoyang Department of Information Science and Electronic Engineering University of Zhejiang Hangzhou Zhejiang China National Laboratory of Information Control Technology for Communication System Jiaxing Zhejiang China
The constant modulus algorithm (CMA) is one widely used algorithm for blind equalization of quadrature amplitude modulation (QAM) signals. The algorithm exhibits slow convergence rate and large steady state mean squar... 详细信息
来源: 评论
Recognition and Parameter Estimation of MPSK Signals Based on Instantaneous Phase Difference
Recognition and Parameter Estimation of MPSK Signals Based o...
收藏 引用
International Conference on Wireless communications, Networking and Mobile Computing (WiCom)
作者: Chunyun Song Yi Zhan Lin Guo Control Technology of Communication System No.36 Research Institute of CETC National Laboratory for Information Science and Technology Zhejiang China Shanghai Acoustic Laboratory Institute of Acoustic Chinese Academy and Sciences Shanghai China
There many researches about modulation mode classification of the MPSK signals, but these studies pay few attentions to some especial MPSK signals such as OQPSK or π/4QPSK. However, the signals are very important in ... 详细信息
来源: 评论
A model checking approach for solving epistemic riddles
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2010年 第3期33卷 406-413页
作者: Luo, Xiang-Yu Su, Kai-Le Gu, Ming Key Laboratory of Security for Information System of Ministry of Education School of Software Tsinghua University Beijing 100084 China School of Computer and Control Guilin University of Electronic Technology Guilin Guangxi 541004 China School of Electronics Engineering and Computer Science Peking University Beijing 100871 China
This paper aims to model and solve the Sum and Product Riddle in public announcement logic. A dynamic epistemic model is proposed, that is the linear temporal combination of the epistemic model of environment and the ... 详细信息
来源: 评论
A Carrier Recovery Algorithm for High Order QAM Signals
A Carrier Recovery Algorithm for High Order QAM Signals
收藏 引用
International Conference on Wireless communications, Networking and Mobile Computing (WiCom)
作者: Wei Xue Xiaoniu Yang Zhaoyang Zhang Department of Information Science and Electronic Engineering Zhejiang Uinversity Hangzhou Zhejiang China National Laboratory of Information Control Technology for Communication System Jiaxing Zhejiang China Dept. of Inf. Sci. & Electron. Eng. Zhejiang Uinversity Hangzhou China
The carrier recovery is one key technique in the demodulation of high order quadrature amplitude modulation (QAM) signals. A carrier recovery algorithm which switches between multi-threshold polarity decision mode and... 详细信息
来源: 评论
Properties of Prisoner's Dilemma Game based on genetic algorithm
Properties of Prisoner's Dilemma Game based on genetic algor...
收藏 引用
Chinese control Conference (CCC)
作者: Tao Wang Zhi-Gang Chen Xiao-Heng Deng Jin Zhagn School of Computer and Communication Hunan University Changsha P.R.China School of Information Science and Engineering Center South University Changsha P.R.China National Laboratory of Industrial Control Technology Zhejiang University Hangzhou P.R.China
Evolutionary games are widely studied in the fields of biology, sociology, economics and informatics. People's interests focus on how cooperation emerged in a system that individuals are selfish. We studied the it... 详细信息
来源: 评论
Threshold Quantum Secret Sharing of Secure Direct communication
收藏 引用
Chinese Physics Letters 2009年 第1期26卷 21-24页
作者: 李宝奎 杨宇光 温巧燕 Department of Automatic Control School of Information Science and Technology Beijing Institute of Technology Beijing 100081 College of Computer Science and Technology Beijing University of Technology Beijing 100124 State Key Laboratory of Integrated Services Network Xidian University Xi'an 710071 State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876
We propose a (L, n)-threshold quantum secret sharing protocol of secure direct communication following some ideas of Zhang's protocol [Phys. Lett. A 342 (2005) 60] and Tokunaga et al.'s protocol [Phys. Rev. A 71... 详细信息
来源: 评论
Ear Detection Based on Arc-Masking Extraction and AdaBoost Polling Verification
Ear Detection Based on Arc-Masking Extraction and AdaBoost P...
收藏 引用
International Conference on Intelligent information Hiding and Multimedia Signal Processing (IIHMSP)
作者: Hao-Chung Shih Chian C. Ho Hsuan T. Chang Chin-Song Wu Department of Electrical Engineering National Yunlin University of Science and Technology Yunlin Taiwan Information & Communication Security Laboratory Chunghwa Telecom Laboratories Taoyuan Taiwan
This paper proposes a simple but practical 2D ear detection algorithm based on arc-masking candidate extraction and AdaBoost polling verification. In the first half phase of the proposed ear detection algorithm, a few... 详细信息
来源: 评论