咨询与建议

限定检索结果

文献类型

  • 396 篇 会议
  • 194 篇 期刊文献

馆藏范围

  • 590 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 393 篇 工学
    • 199 篇 计算机科学与技术...
    • 159 篇 软件工程
    • 147 篇 信息与通信工程
    • 111 篇 电子科学与技术(可...
    • 56 篇 电气工程
    • 46 篇 仪器科学与技术
    • 43 篇 控制科学与工程
    • 37 篇 光学工程
    • 32 篇 生物工程
    • 30 篇 机械工程
    • 19 篇 材料科学与工程(可...
    • 18 篇 网络空间安全
    • 16 篇 土木工程
    • 14 篇 安全科学与工程
    • 13 篇 建筑学
    • 13 篇 化学工程与技术
    • 12 篇 动力工程及工程热...
    • 11 篇 生物医学工程(可授...
  • 202 篇 理学
    • 104 篇 数学
    • 68 篇 物理学
    • 35 篇 统计学(可授理学、...
    • 34 篇 生物学
    • 18 篇 化学
    • 16 篇 系统科学
  • 62 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 20 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 14 篇 军事学
  • 13 篇 医学
    • 10 篇 基础医学(可授医学...
    • 10 篇 临床医学
    • 9 篇 药学(可授医学、理...
  • 9 篇 法学
  • 4 篇 农学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 22 篇 feature extracti...
  • 18 篇 deep learning
  • 16 篇 simulation
  • 16 篇 cognitive radio
  • 13 篇 bandwidth
  • 13 篇 modulation
  • 11 篇 object detection
  • 11 篇 neural networks
  • 11 篇 accuracy
  • 11 篇 training
  • 10 篇 security
  • 9 篇 signal to noise ...
  • 9 篇 metamaterials
  • 9 篇 optimization
  • 9 篇 clustering algor...
  • 9 篇 heuristic algori...
  • 8 篇 graphics process...
  • 8 篇 interference
  • 8 篇 computational mo...
  • 8 篇 algorithm design...

机构

  • 180 篇 science and tech...
  • 66 篇 science and tech...
  • 43 篇 science and tech...
  • 16 篇 institute of cyb...
  • 14 篇 no.36 research i...
  • 13 篇 the 36th researc...
  • 12 篇 dept. of microwa...
  • 11 篇 science and tech...
  • 11 篇 college of infor...
  • 10 篇 science and tech...
  • 9 篇 beijing aerospac...
  • 9 篇 college of under...
  • 9 篇 school of commun...
  • 8 篇 the science and ...
  • 7 篇 school of inform...
  • 7 篇 science and tech...
  • 7 篇 university of el...
  • 7 篇 school of comput...
  • 6 篇 no.36 research i...
  • 6 篇 college of scien...

作者

  • 23 篇 yang xiaoniu
  • 23 篇 hua jun
  • 19 篇 xiaoniu yang
  • 17 篇 wu qun
  • 16 篇 xuan qi
  • 14 篇 shilian zheng
  • 13 篇 zheng shilian
  • 13 篇 zhu huijie
  • 11 篇 wang lijun
  • 11 篇 lijun wang
  • 11 篇 huijie zhu
  • 10 篇 wang wei
  • 10 篇 xiaofeng xu
  • 9 篇 huaji zhou
  • 9 篇 yong zhang
  • 9 篇 jiahao dai
  • 8 篇 dai jiahao
  • 8 篇 weiguo shen
  • 8 篇 wei wang
  • 7 篇 wang yiteng

语言

  • 551 篇 英文
  • 23 篇 中文
  • 16 篇 其他
检索条件"机构=Science and Technology on Commuication Information Security Control Laboratory"
590 条 记 录,以下是581-590 订阅
排序:
Parallel Spatial Hashing for Collision Detection of Deformable Surfaces
Parallel Spatial Hashing for Collision Detection of Deformab...
收藏 引用
IEEE International Conference on Computer-Aided Design and Computer Graphics
作者: Wenshan Fan Bin Wang Jianliang Zhou Jiaguang Sun Tsinghua University Beijing Beijing CN Key Laboratory for Information System Security Ministry of Education of China China School of Software Tsinghua University China Tsinghua National Laboratory for Information Science and Technology China Beijing AeroSpace Control Center China
We present a fast collision detection method for deformable surfaces with parallel spatial hashing on GPU architecture. The efficient update and access of the uniform grid are exploited to accelerate the performance i... 详细信息
来源: 评论
Analyzing and correlating security events using state machine
Analyzing and correlating security events using state machin...
收藏 引用
10th IEEE International Conference on Computer and information technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, 10th IEEE Int. Conf. Scalable Computing and Communications, ScalCom-2010
作者: Feng, Xuewei Wang, Dongxia Zeng, Jiemei Ma, Guoqing Li, Jin National Key Laboratory of Science and Technology on Information System Security Beijing Institute of System Engineer Beijing 100101 China Beijing Aerospace Control Center Beijing 100296 China
It is unfeasible to analyze the security events by the manual way for the security manager, because the number of the events is huge and the information contained in the events is meaningless. After analyzing the exis... 详细信息
来源: 评论
An approach for design and formal verification of safety-critical software
An approach for design and formal verification of safety-cri...
收藏 引用
2010 International Conference on Computer Application and System Modeling, ICCASM 2010
作者: Ma, Wei-Gang Hei, Xin-Hong School of Computer Science and Engineering Xi'an University of Technology Xi'an Shaanxi 710071 China Key Laboratory of Computer Networks and Information Security Xidian University Ministry of Education Xi'an Shaanxi 710071 China State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing 100044 China
A modeling and verification methodology is presented for railway interlocking system which is regarded as a safety-critical system. The methodology utilizes UML (Unified Modeling Language) to model the function requir... 详细信息
来源: 评论
Analyzing and Correlating security Events Using State Machine
Analyzing and Correlating Security Events Using State Machin...
收藏 引用
International Conference on Computer and information technology (CIT)
作者: Feng Xuewei Wang Dongxia Zeng Jiemei Ma Guoqing Li Jin National Key Laboratory of Science and Technology on Information System Security Beijing Institute Beijing China Beijing Aerospace Control Center Beijing China
It is unfeasible to analyze the security events by the manual way for the security manager, because the number of the events is huge and the information contained in the events is meaningless. After analyzing the exis... 详细信息
来源: 评论
A model checking approach for solving epistemic riddles
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2010年 第3期33卷 406-413页
作者: Luo, Xiang-Yu Su, Kai-Le Gu, Ming Key Laboratory of Security for Information System of Ministry of Education School of Software Tsinghua University Beijing 100084 China School of Computer and Control Guilin University of Electronic Technology Guilin Guangxi 541004 China School of Electronics Engineering and Computer Science Peking University Beijing 100871 China
This paper aims to model and solve the Sum and Product Riddle in public announcement logic. A dynamic epistemic model is proposed, that is the linear temporal combination of the epistemic model of environment and the ... 详细信息
来源: 评论
Threshold Quantum Secret Sharing of Secure Direct Communication
收藏 引用
Chinese Physics Letters 2009年 第1期26卷 21-24页
作者: 李宝奎 杨宇光 温巧燕 Department of Automatic Control School of Information Science and Technology Beijing Institute of Technology Beijing 100081 College of Computer Science and Technology Beijing University of Technology Beijing 100124 State Key Laboratory of Integrated Services Network Xidian University Xi'an 710071 State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876
We propose a (L, n)-threshold quantum secret sharing protocol of secure direct communication following some ideas of Zhang's protocol [Phys. Lett. A 342 (2005) 60] and Tokunaga et al.'s protocol [Phys. Rev. A 71... 详细信息
来源: 评论
A new wireless mesh network authentication scheme based on threshold method
A new wireless mesh network authentication scheme based on t...
收藏 引用
9th International Conference for Young Computer Scientists, ICYCS 2008
作者: YataoYang Gu, Yonghao Tan, Xi Lina, Ma. Beijing Electronic Science and Technology Institute Beijing 100070 China Information Security Center Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Beijing 100876 China State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing 100044 China
Access authentication is one of the secure issues which are eager to be resolved in wireless mesh networking. This paper proposes new wireless mesh network authentication architecture based on threshold signature tech... 详细信息
来源: 评论
Research on Restraining Low Frequency Oscillation with Flywheel Energy Storage System
Research on Restraining Low Frequency Oscillation with Flywh...
收藏 引用
International Conference on Power System technology (POWERCON)
作者: Yun Zhong Jiancheng Zhang Gengyin Li Zhiyuan Chen School of Information Engineering University of Nanchang Baoding Jiangxi China Department of Electrical power Engineering North China Electric Power University Baoding Hebei China Key Laboratory of Power System Protection and Dynamic Security Monitoring and Control under Ministry of Education North China Electric Power University Baoding Hebei China Baoding Zhongli Power Science and Technology Development Company Limited Baoding Hebei China
Low frequency oscillations in the interconnected power systems are observed all around the world. Besides conventional PSS to suppress Low frequency oscillation, there are other modern FACTS devices to damp oscillatio... 详细信息
来源: 评论
Weight hierarchies of extremal non-chain ternary codes of dimension 4
Weight hierarchies of extremal non-chain ternary codes of di...
收藏 引用
IEEE International Symposium on information Theory
作者: Wende Chen T. Klove Laboratory of Systems and Control Institute of Systems Science Academy of Mathematics and Systems Science Chinese Academy of Sciences China Key State Laboratory of Information Security Graduate School of Academia Sinica Chinese Academy and Sciences Beijing China Department of Informatics Bergen High Technology Center University of Bergen Bergen Norway
The weight hierarchy of a linear [n,k;q] code C over GF(q) is the sequence (d/sub 1/,d/sub 2/,...,d/sub k/) where d/sub r/ is the smallest support of an r-dimensional subcode of C. An [n,k;q] code is extremal non-chai... 详细信息
来源: 评论
IBAQ: Frequency-Domain Backdoor Attack Threatening Autonomous Driving via Quadratic Phase
收藏 引用
ACM Transactions on Autonomous and Adaptive Systems 1000年
作者: Jinghan Qiu Honglong Chen Junjian Li Yudong Gao Junwei Li Xingang Wang College of Control Science and Engineering China University of Petroleum China the Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology China
The rapid evolution of backdoor attacks has emerged as a significant threat to the security of autonomous driving models. An attacker injects a backdoor into the model by adding triggers to the samples, which can be a... 详细信息
来源: 评论