咨询与建议

限定检索结果

文献类型

  • 264 篇 会议
  • 221 篇 期刊文献

馆藏范围

  • 485 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 328 篇 工学
    • 251 篇 计算机科学与技术...
    • 225 篇 软件工程
    • 79 篇 信息与通信工程
    • 38 篇 生物工程
    • 33 篇 电气工程
    • 30 篇 控制科学与工程
    • 29 篇 电子科学与技术(可...
    • 27 篇 网络空间安全
    • 15 篇 光学工程
    • 14 篇 机械工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 仪器科学与技术
    • 10 篇 化学工程与技术
    • 10 篇 交通运输工程
    • 9 篇 安全科学与工程
    • 7 篇 土木工程
  • 160 篇 理学
    • 99 篇 数学
    • 39 篇 生物学
    • 31 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 15 篇 系统科学
    • 11 篇 化学
  • 80 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 16 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 11 篇 医学
    • 9 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 9 篇 军事学
    • 8 篇 军队指挥学
  • 6 篇 经济学
  • 4 篇 农学
  • 3 篇 教育学
  • 2 篇 文学

主题

  • 22 篇 semantics
  • 16 篇 deep learning
  • 15 篇 feature extracti...
  • 12 篇 computational mo...
  • 12 篇 network security
  • 12 篇 training
  • 10 篇 authentication
  • 10 篇 predictive model...
  • 9 篇 neural networks
  • 9 篇 optimization
  • 9 篇 security
  • 9 篇 accuracy
  • 9 篇 cloud computing
  • 9 篇 data models
  • 9 篇 cryptography
  • 7 篇 image enhancemen...
  • 7 篇 image segmentati...
  • 7 篇 petri nets
  • 7 篇 blockchain
  • 7 篇 federated learni...

机构

  • 39 篇 school of comput...
  • 37 篇 shaanxi key labo...
  • 36 篇 school of comput...
  • 30 篇 shaanxi key labo...
  • 19 篇 school of comput...
  • 13 篇 key lab of infor...
  • 11 篇 xi'an university...
  • 11 篇 shaanxi key labo...
  • 10 篇 school of comput...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 8 篇 shaanxi key labo...
  • 8 篇 tianjin key labo...
  • 7 篇 department of co...
  • 7 篇 shaanxi key labo...
  • 7 篇 haihe lab of ita...
  • 7 篇 school of comput...
  • 7 篇 shaanxi key labo...
  • 7 篇 key lab of netwo...
  • 7 篇 zhejiang lab

作者

  • 27 篇 yichuan wang
  • 27 篇 meng deyu
  • 26 篇 xinhong hei
  • 21 篇 wang yichuan
  • 18 篇 hei xinhong
  • 17 篇 shen yulong
  • 16 篇 liu jun
  • 16 篇 cao xiangyong
  • 15 篇 zheng qinghua
  • 12 篇 li wei
  • 12 篇 haiyan jin
  • 11 篇 jin haiyan
  • 11 篇 wenjiang ji
  • 10 篇 luo minnan
  • 10 篇 dong xuewen
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 wang lei
  • 9 篇 xiaoxue liu
  • 9 篇 tan zuowen

语言

  • 443 篇 英文
  • 27 篇 其他
  • 16 篇 中文
检索条件"机构=Shaanxi Key Lab Network Computer and Security Technology"
485 条 记 录,以下是371-380 订阅
排序:
Paralleled Extraction Method for Content of Invoice Image Based on TPL
Paralleled Extraction Method for Content of Invoice Image Ba...
收藏 引用
2015 International Conference on Advanced Management Science and Information Engineering(AMSIE 2015)
作者: H.Y.Jin B.Xing X.H.Hei School of Computer Science & Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
The paper mainly uses a mixed strategy of data and task parallelism to realize parallel extraction date information of *** at the deficiency of ordinary pipeline mode for parallel extraction date information from invo... 详细信息
来源: 评论
Research on Storage and Retrieval Method of Mass Data for High-Speed Train
Research on Storage and Retrieval Method of Mass Data for Hi...
收藏 引用
International Conference on Computational Intelligence and security
作者: Bin Wang Fan Li Xinhong Hei Weigang Ma Lei Yu Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Xi'an China
In order to ensure the safeties of high-speed train, a lot of sensors are installed in the train to real-time monitor its operation status. These sensors collect amounts of data which may be several GBs for one time o... 详细信息
来源: 评论
A method of oversized image generation based on stitching JPEG file streams
International Journal of Signal Processing, Image Processing...
收藏 引用
International Journal of Signal Processing, Image Processing and Pattern Recognition 2015年 第8期8卷 159-168页
作者: Sun, Qindong Hua, Wu Tian, Minying Wang, Yan School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory of Network Computing and Security Xi’an University of Technology Xi’an China
Due to memory limitation, the displaying and processing of the oversized images have been a bottleneck for various applications, which is a hot research spot in the image processing field. The traditional methods are ... 详细信息
来源: 评论
Linear (k, n) Secret Sharing Scheme with Cheating Detection
Linear (k, n) Secret Sharing Scheme with Cheating Detection
收藏 引用
International Conference on computer and Information technology (CIT)
作者: Yan-xiao Liu Zhi-xiao Wang Wen-yao Yan Shaanxi Key Lab for Network Computing and Security Xian University of Technology Xian China Xian Innovation College Yanan University Xian China
Linear (k,n) secret sharing scheme is a class of (k,n) secret sharing, where all the n shares of a secret satisfy a linear relationship. It plays an important role in other cryptographic systems, such as multi-party c... 详细信息
来源: 评论
Analysis and improvement of a provable secure fuzzy identity-based signature scheme
收藏 引用
Science China(Information Sciences) 2014年 第9期57卷 156-160页
作者: XIONG Hu CHEN YaNan ZHU GuoBin QIN ZhiGuang School of Computer Science and Engineering University of Electronic Science and Technology of China Chongqing Key Lab of Computer Network and Communication Technology Key Lab of Network Security and Cryptology Fujian Normal University School of Traffic and Transportation Beijing Jiaotong University
To enjoy the property of error tolerance in the biometric identities extraction,the fuzzy identitybased signature has been initialized to issue a signature on behalf of a descriptive attributes setωinstead of a singl... 详细信息
来源: 评论
An ML estimation based robust Chinese remainder theorem for reals
An ML estimation based robust Chinese remainder theorem for ...
收藏 引用
IEEE China Summit & International Conference on Signal and Information Processing (ChinaSIP)
作者: Wenjie Wang Xiaoping Li Xiang-Gen Xia MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xian Shaanxi P. R. China Xidian University Xian China Department of Electrical and Computer Engineering University of Delaware Newark DE USA
In this paper, we consider the CRT problem for real numbers with noisy remainders that follow wrapped Gaussian distributions. We propose the maximum likelihood (ML) estimation based CRT when the remainder noises may n... 详细信息
来源: 评论
Next Generation of Web-based Information Management System for National Volunteer Service
Next Generation of Web-based Information Management System f...
收藏 引用
2015 Joint International Mechanical,Electronic and Information technology Conference(JIMET 2015)
作者: Feng Tian Yundong Yao Tian Lan Qinghua Zheng Jingjing Kou Haifei Fu Nazaraf Shah Systems Engineering Institute Xi'an Jiaotong University Shaanxi Province Key Lab.of Satellite and Terrestrial Network Tech.R&D Department of Computer Science and Technology Xi'an Jiaotong University
This paper presents a survey about the existing web-based information management system for volunteer services. Based on the survey results the paper highlights the new features and functions of the next generation of... 详细信息
来源: 评论
Alias Detection Across Multi-online Applications Based on User's Behavior Characteristics
Alias Detection Across Multi-online Applications Based on Us...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Zhaoli Liu Tao Qin Xiaohong Guan Xiaoqiang Niu Tao Yang MoE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an Shaanxi China Tsinghua National Laboratory for Information Science and Technology Tsinghua University Beijing China Department of Automation Northwestern Polytechnical University Xi'an China
The quickly development of many online applications benefit our daily life. But on the other hand, user usually holds several aliases in different online applications. The aliases across multi-online applications dete... 详细信息
来源: 评论
Energy management of cooperative microgrids with P2P energy sharing in distribution networks
Energy management of cooperative microgrids with P2P energy ...
收藏 引用
IEEE International Conference on Smart Grid Communications (SmartGridComm)
作者: Tian Liu Xiaoqi Tan Bo Sun Yuan Wu Xiaohong Guan Danny H. K. Tsang Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology Hong Kong MOE Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China College of Information Engineering Zhejiang University of Technology Hangzhou China
To handle the mismatch problem between local demand and local generation in microgrids (MGs), the paradigm of peer-to-peer (P2P) energy sharing among neighboring MGs has been considered as a promising solution for imp... 详细信息
来源: 评论
Stability analysis of information spreading on SNS based on refined SEIR model
收藏 引用
China Communications 2014年 第11期11卷 24-33页
作者: Wang, Chao Hu, Yuanping Liu, Chengyuan Liu, Zhihong Ma, Jianfeng School of Computer Science and Technology Xidian University Xi'an 710071 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an 710071 China
Investigating the stability of information spreading over SNS helps to understand the principles inherent in the spreading behavior. This paper explores the mechanisms of information spreading including stifling mecha... 详细信息
来源: 评论