咨询与建议

限定检索结果

文献类型

  • 2,399 篇 会议
  • 1,989 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,404 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,880 篇 工学
    • 1,964 篇 计算机科学与技术...
    • 1,527 篇 软件工程
    • 601 篇 信息与通信工程
    • 386 篇 电气工程
    • 369 篇 控制科学与工程
    • 327 篇 电子科学与技术(可...
    • 258 篇 生物工程
    • 222 篇 机械工程
    • 206 篇 光学工程
    • 166 篇 生物医学工程(可授...
    • 155 篇 仪器科学与技术
    • 145 篇 动力工程及工程热...
    • 141 篇 化学工程与技术
    • 103 篇 交通运输工程
    • 101 篇 网络空间安全
    • 90 篇 材料科学与工程(可...
    • 84 篇 土木工程
    • 84 篇 安全科学与工程
    • 80 篇 建筑学
  • 1,447 篇 理学
    • 708 篇 数学
    • 395 篇 物理学
    • 310 篇 生物学
    • 210 篇 统计学(可授理学、...
    • 156 篇 化学
    • 144 篇 系统科学
  • 764 篇 管理学
    • 510 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 200 篇 工商管理
  • 179 篇 医学
    • 148 篇 临床医学
    • 115 篇 基础医学(可授医学...
  • 117 篇 法学
  • 73 篇 经济学
  • 53 篇 农学
  • 25 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 104 篇 feature extracti...
  • 92 篇 semantics
  • 80 篇 computational mo...
  • 78 篇 deep learning
  • 72 篇 computer science
  • 67 篇 training
  • 65 篇 computer archite...
  • 59 篇 optimization
  • 59 篇 cloud computing
  • 57 篇 servers
  • 56 篇 laboratories
  • 55 篇 accuracy
  • 53 篇 scalability
  • 52 篇 grid computing
  • 50 篇 protocols
  • 49 篇 predictive model...
  • 48 篇 bandwidth
  • 48 篇 machine learning
  • 45 篇 data models
  • 43 篇 resource managem...

机构

  • 131 篇 school of comput...
  • 101 篇 national enginee...
  • 95 篇 hubei province k...
  • 90 篇 school of comput...
  • 79 篇 department of co...
  • 53 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 47 篇 national enginee...
  • 46 篇 hubei province k...
  • 45 篇 services computi...
  • 44 篇 state key labora...
  • 42 篇 school of cyber ...
  • 39 篇 huazhong univers...
  • 38 篇 tsinghua nationa...
  • 38 篇 university of ch...
  • 36 篇 school of inform...
  • 35 篇 school of comput...
  • 35 篇 national enginee...
  • 33 篇 key laboratory o...

作者

  • 234 篇 hai jin
  • 188 篇 jin hai
  • 53 篇 xiaofei liao
  • 37 篇 liao xiaofei
  • 34 篇 niyato dusit
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 shi xuanhua
  • 29 篇 zou deqing
  • 27 篇 shen linlin
  • 27 篇 song wu
  • 25 篇 hu shengshan
  • 24 篇 wang wei
  • 21 篇 li peng
  • 19 篇 liu yang
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 zhang xiaolong
  • 18 篇 liu jun
  • 18 篇 li bo

语言

  • 3,641 篇 英文
  • 629 篇 其他
  • 149 篇 中文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4404 条 记 录,以下是3371-3380 订阅
排序:
An adaptively secure multi-authority ciphertext-policy ABE scheme on prime order groups
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2014年 第4期42卷 696-702页
作者: Li, Qi Ma, Jian-Feng Xiong, Jin-Bo Liu, Xi-Meng Ma, Jun School of Computer Science and Technology Xidian University Xi'an Shaanxi 710071 China School of Telecommunication Engineering Xidian University Xi'an Shaanxi 710071 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an Shaanxi 710071 China
Previous adaptively secure multi-authority attribute-based encryption (ABE) schemes suffered from superfluous computation overhead on composite order groups. To tackle this problem, an adaptively secure multi-authorit... 详细信息
来源: 评论
vPatcher: VMI-Based Transparent Data Patching to Secure Software in the Cloud
vPatcher: VMI-Based Transparent Data Patching to Secure Soft...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Hao Zhang Lei Zhao Lai Xu Lina Wang Deming Wu Computer School Wuhan University Wuhan China Ministry of Education The Key Laboratory of Aerospace Information and Trusted Computing Wuhan China The State Key Laboratory for Novel Software Technology Nanjing University China The Key Laboratory of Science and Technology in information Assurance Technology
Quick defense against the spread of software exploits is an important problem, and hot patching is an attractive approach to solve this problem. However, these approaches cannot adapt to cloud well, which brings new c... 详细信息
来源: 评论
Waveform decreasing multi-copy based routing in low node density DTNs
Waveform decreasing multi-copy based routing in low node den...
收藏 引用
Joint International Conference on Pervasive computing and the Networked World, ICPCA/SWS 2012
作者: Yu, Chen Zhang, Longbo Jin, Hai Services Computing Technology and System Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Delay Tolerant Networks (DTN) is one of the mobile wireless networks that topology logic may change frequently. Variable topology logic characteristics lead to several low efficiency routing problems, and in which how... 详细信息
来源: 评论
Friends based keyword search over online social networks
收藏 引用
8th International Conference on Grid and Pervasive computing, GPC 2013
作者: Huang, Jinzhou Jin, Hai Services Computing Technology and System Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Online social networks are rapidly becoming popular for users to share, organize and locate interesting content. Users pay much attention to their close friends, those direct or two-hop friends. Users of Facebook comm... 详细信息
来源: 评论
Cranduler: A dynamic and reusable scheduler for cloud infrastructure service
Cranduler: A dynamic and reusable scheduler for cloud infras...
收藏 引用
Joint International Conference on Pervasive computing and the Networked World, ICPCA/SWS 2012
作者: Shi, Xuanhua Xie, Bo Wu, Song Jin, Hai Zhu, Hongqing Services Computing Technology and System Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
As an import trend of cyberspace in the future, cloud computing has attracted much attention from the IT industry. Many research institutions and companies have launched their own cloud platforms, which have virtual m... 详细信息
来源: 评论
Cloud authentication based on anonymous one-time password
Cloud authentication based on anonymous one-time password
收藏 引用
7th International Conference on Ubiquitous Information Technologies and Applications, CUTE 2012
作者: Yassin, Ali A. Jin, Hai Ibrahim, Ayad Qiang, Weizhong Zou, Deqing Services Computing Technology and System Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Cloud computing contains many enterprise applications that require from each user to perform authenticate at first step. Then, he will gain a permit from the service provider to access resources at second step. The is... 详细信息
来源: 评论
Scalable SAPRQL querying processing on large RDF data in cloud computing environment
Scalable SAPRQL querying processing on large RDF data in clo...
收藏 引用
Joint International Conference on Pervasive computing and the Networked World, ICPCA/SWS 2012
作者: Wu, Buwen Jin, Hai Yuan, Pingpeng Services Computing Technology and System Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Recently the flexibility of RDF data model makes increasing number of organizations and communities keep their data available in the RDF format. There is a growing need for querying these data in scalable and efficien... 详细信息
来源: 评论
An enhanced security mechanism for web service based systems
An enhanced security mechanism for web service based systems
收藏 引用
Joint International Conference on Pervasive computing and the Networked World, ICPCA/SWS 2012
作者: Jiang, Wenbin Dong, Hao Jin, Hai Xu, Hui Liao, Xiaofei Services Computing Technology and System Lab. School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China
Web service technologies have been widely used in diverse applications. However, there are still many security challenges in reliability, confidentiality and data nonrepudiation, which are prominent especially in some... 详细信息
来源: 评论
Temporal Verification for Business Cloud Workflows: Open Research Issues
Temporal Verification for Business Cloud Workflows: Open Res...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Zhou Zhao Futian Wang Xiaoliang Fan Xiao Liu Shanghai Key Laboratory of Trustworthy Computing East China Normal University China School of Computer Science and Technology Anhui University China School of Information Science & Engineering Lanzhou University China
In recent years, cloud computing is establishing itself as the latest high-performance and high-throughput computing paradigm, and thus doing business in the cloud is becoming a reality. However, due to the dynamic na... 详细信息
来源: 评论
Ventral stream plays an important role in statistical graph comprehension: An fMRI study
Ventral stream plays an important role in statistical graph ...
收藏 引用
2014 International Conference on Brain Informatics and Health, BIH 2014
作者: Li, Mi Lu, Shengfu Wang, Jing Ma, Liwang Zhang, Mengjie Zhong, Ning International WIC Institute Beijing University of Technology Beijing 100024 China School of Computer and Communication Engineering Liaoning ShiHua University Liaoning 113001 China Dept. of Life Science and Informatics Maebashi Institute of Technology Maebashi-City 371-0816 Japan Beijing International Collaboration Base on Brain Informatics and Wisdom Services China Beijing Key Laboratory of MRI and Brain Informatics China
Although statistical graph comprehension has been investigated in cognitive psychology, it has not been reported in cognitive neuroscience. The study designed an experimental condition, i.e., a statistical graph (SG),... 详细信息
来源: 评论