咨询与建议

限定检索结果

文献类型

  • 270 篇 会议
  • 224 篇 期刊文献

馆藏范围

  • 494 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 338 篇 工学
    • 260 篇 计算机科学与技术...
    • 228 篇 软件工程
    • 80 篇 信息与通信工程
    • 38 篇 生物工程
    • 35 篇 控制科学与工程
    • 34 篇 电气工程
    • 30 篇 电子科学与技术(可...
    • 28 篇 网络空间安全
    • 15 篇 光学工程
    • 14 篇 机械工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 10 篇 交通运输工程
    • 9 篇 安全科学与工程
    • 7 篇 土木工程
  • 163 篇 理学
    • 100 篇 数学
    • 39 篇 生物学
    • 31 篇 统计学(可授理学、...
    • 28 篇 物理学
    • 15 篇 系统科学
    • 13 篇 化学
  • 80 篇 管理学
    • 40 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 16 篇 法学
    • 10 篇 社会学
    • 7 篇 法学
  • 11 篇 医学
    • 9 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 9 篇 军事学
    • 8 篇 军队指挥学
  • 6 篇 经济学
  • 4 篇 农学
  • 3 篇 教育学
  • 2 篇 文学

主题

  • 22 篇 semantics
  • 16 篇 deep learning
  • 15 篇 feature extracti...
  • 12 篇 computational mo...
  • 12 篇 network security
  • 12 篇 training
  • 10 篇 authentication
  • 10 篇 predictive model...
  • 9 篇 neural networks
  • 9 篇 optimization
  • 9 篇 security
  • 9 篇 accuracy
  • 9 篇 cloud computing
  • 9 篇 data models
  • 9 篇 cryptography
  • 7 篇 image enhancemen...
  • 7 篇 image segmentati...
  • 7 篇 petri nets
  • 7 篇 blockchain
  • 7 篇 federated learni...

机构

  • 40 篇 school of comput...
  • 38 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 31 篇 shaanxi key labo...
  • 20 篇 school of comput...
  • 13 篇 key lab of infor...
  • 12 篇 shaanxi key labo...
  • 11 篇 xi'an university...
  • 11 篇 school of comput...
  • 9 篇 department of co...
  • 9 篇 school of comput...
  • 8 篇 shaanxi key labo...
  • 8 篇 tianjin key labo...
  • 7 篇 department of co...
  • 7 篇 shaanxi key labo...
  • 7 篇 school of comput...
  • 7 篇 haihe lab of ita...
  • 7 篇 school of comput...
  • 7 篇 shaanxi key labo...
  • 7 篇 key lab of netwo...

作者

  • 27 篇 yichuan wang
  • 27 篇 meng deyu
  • 26 篇 xinhong hei
  • 22 篇 wang yichuan
  • 19 篇 hei xinhong
  • 17 篇 liu jun
  • 17 篇 shen yulong
  • 16 篇 cao xiangyong
  • 15 篇 zheng qinghua
  • 12 篇 li wei
  • 12 篇 haiyan jin
  • 11 篇 luo minnan
  • 11 篇 jin haiyan
  • 11 篇 wenjiang ji
  • 10 篇 dong xuewen
  • 10 篇 lei zhu
  • 10 篇 wei wei
  • 9 篇 wang lei
  • 9 篇 xiaoxue liu
  • 9 篇 tan zuowen

语言

  • 442 篇 英文
  • 37 篇 其他
  • 16 篇 中文
检索条件"机构=Shaanxi Key Lab Network Computer and Security Technology"
494 条 记 录,以下是411-420 订阅
排序:
IFSDA: An Intuitionistic Fuzzy Set-based Data Aggregation Approach for Software Maintainability Evaluation
IFSDA: An Intuitionistic Fuzzy Set-based Data Aggregation Ap...
收藏 引用
The 2014 10th International Conference on Natural Computation (ICNC 2014) and the 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2014)(第十届自然计算和第十一届模糊系统与知识发现国际会议)
作者: Yan Nan Hengshan Zhang Qinghua Zheng Di Wang Ting Liu Boqin Feng MOE Key Lab. for Intelligent Networks and Network Security Department of Computer Science and Technology Xi'an Jiaotong University710049Xi'anChina
The software maintainability which is an important part of software quality and trustworthiness has always been a hot topic in software engineering *** measurements of the software are multi-source and heterogeneous d... 详细信息
来源: 评论
Adaptively secure key-policy ABE scheme with fast decryption
收藏 引用
Tongxin Xuebao/Journal on Communications 2014年 35卷 26-32页
作者: Li, Qi Ma, Jian-Feng Xiong, Jin-Bo Liu, Xi-Meng School of Computer Science and Technology Xidian University Xi'an710071 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an710071 China Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China Faculty of Software Fujian Normal University Fuzhou350108 China School of Telecommunication Engineering Xidian University Xi'an710071 China
In the existing adaptively secure ABE (attribute-based encryption) schemes, the decryption cost goes linearly with the number of attributes that are used in decryption. An adaptively secure key-policy ABE (FKP-ABE) sc... 详细信息
来源: 评论
The cross-layer design of wireless mesh networks based on multimedia services
收藏 引用
Journal of Computational Information Systems 2013年 第11期9卷 4495-4504页
作者: Sun, Qindong Zhang, Benliang Yang, Min Wang, Qian Key Lab. for Network Computing and Security of Shaanxi Province Xi'an University of Technology Xi'an 710048 China
In this paper, we have introduced a cross-layer design model which is based on multimedia services in order to favor the QoS demand in wireless mesh networks. By means of this model the relevant parameters in each lay... 详细信息
来源: 评论
A Case Study of Learning Action and Emotion from a Perspective of Learning Analytics
A Case Study of Learning Action and Emotion from a Perspecti...
收藏 引用
IEEE International Conference on Computational Science and Engineering, CSE
作者: Haiping Zhu Xinhui Zhang Xinhong Wang Yan Chen Bin Zeng Department of Computer Science and Technology Shaanxi Province Key Lab. of Satellite and Terrestrial Network Tech. R & D Xi'an China Department of Computer Science and Technology Xi'an Jiaotong University Xi'an China School of Public Policy and Administration Xi'an Jiaotong University Xi'an China
With the rapid development of online learning, users have more and more diverse ways to learning. The advantage of online learning is that the e-learners' behaviors can be completely recorded in the log events. So... 详细信息
来源: 评论
A random walk approach to selectional preferences based on preference ranking and propagation
A random walk approach to selectional preferences based on p...
收藏 引用
51st Annual Meeting of the Association for Computational Linguistics, ACL 2013
作者: Tian, Zhenhua Xiang, Hengheng Liu, Ziqi Zheng, Qinghua Ministry of Education Key Lab for Intelligent Networks and Network Security Department of Computer Science and Technology Xi'an Jiaotong University Xi'an Shaanxi 710049 China
This paper presents an unsupervised random walk approach to alleviate data sparsity for selectional preferences. Based on the measure of preferences between predicates and arguments, the model aggregates all the trans... 详细信息
来源: 评论
25th Annual Computational Neuroscience Meeting CNS-2016, Seogwipo City, South Korea, July 2-7, 2016 Abstracts
收藏 引用
BMC NEUROSCIENCE 2016年 第1期17卷 1-112页
作者: [Anonymous] Computational Neurobiology Laboratory The Salk Institute for Biological Studies San Diego USA UNIC CNRS Gif sur Yvette France The European Institute for Theoretical Neuroscience (EITN) Paris France ATR Computational Neuroscience Laboratories Kyoto Japan Krembil Research Institute University Health Network Toronto Canada Department of Physiology University of Toronto Toronto Canada Department of Medicine (Neurology) University of Toronto Toronto Canada Department of Physics University of New Hampshire Durham USA Department of Neurophysiology Nencki Institute of Experimental Biology Warsaw Poland Department of Theory Wigner Research Centre for Physics of the Hungarian Academy of Sciences Budapest Hungary Department of Mathematical Sciences KAIST Daejoen Republic of Korea Department of Mathematics University of Houston Houston USA Department of Biochemistry & Cell Biology and Institute of Biosciences and Bioengineering Rice University Houston USA Department of Biology and Biochemistry University of Houston Houston USA Grupo de Neurocomputación Biológica Dpto. de Ingeniería Informática Escuela Politécnica Superior Universidad Autónoma de Madrid Madrid Spain Department of Biological Sciences University of Southern California Los Angeles USA Center for Neuroscience Korea Institute of Science and Technology Seoul South Korea Department of Neurology Albert Einstein College of Medicine Bronx USA Center for Neuroscience KIST Seoul South Korea Department of Neuroscience University of Science and Technology Daejon South Korea Systems Neuroscience Group QIMR Berghofer Medical Research Institute Herston Australia Department of Psychology Yonsei University Seoul South Korea Department of Psychiatry Kyung Hee University Hospital at Gangdong Seoul South Korea Department of Psychiatry Veterans Administration Boston Healthcare System and Harvard Medical School Brockton USA Department of Electrical and Electronic Engineering The University of Melbourne Parkvil
A1 Functional advantages of cell-type heterogeneity in neural circuits Tatyana O. Sharpee A2 Mesoscopic modeling of propagating waves in visual cortex Alain Destexhe A3 Dynamics and biomarkers of mental disorders Mits...
来源: 评论
Detecting GPS information leakage in Android applications
Detecting GPS information leakage in Android applications
收藏 引用
2013 IEEE Global Communications Conference, GLOBECOM 2013
作者: Ma, Siyuan Tang, Zhushou Xiao, Qiuyu Liu, Jiafa Duong, Tran Triet Lin, Xiaodong Zhu, Haojin Department of Computer Science and Engineering Shanghai Jiao Tong University China University of Ontario Institute of Technology Canada Key Lab of Information Network Security Ministry of Public Security China
Location Based Service(LBS) becomes very popular in mobile computing platforms, such as Android. However, it could also leak highly personal information about the phone owner if used by Malwares. It has been witnessed... 详细信息
来源: 评论
A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh networks
收藏 引用
Wireless Personal Communications 2013年 第3期75卷 1611-1633页
作者: Hui Lin Jia Hu Jianfeng Ma Li Xu Atulya Nagar Shaanxi Key Laboratory of Network and System Security Xidian University Xi’an China Key Lab of Network Security and Cryptology Fujian Normal University Fuzhou China Department of Mathematics and Computer Science Liverpool Hope University Liverpool UK
Wireless Mesh networks (WMNs) have drawn much attention for emerging as a promising technology to meet the challenges in next generation networks. security and privacy protection have been the primary concerns in push...
来源: 评论
security flaw of an ECC-based signcryption scheme with anonymity
收藏 引用
International Journal of network security 2013年 第4期15卷 317-320页
作者: Xiong, Hu Hu, Jianbin Chen, Zhong School of Computer Science and Engineering University of Electronic Science and Technology of China No. 4 North Jianshe Road Chenghua District Chengdu Sichuan 610054 China Key Lab of Network Security and Cryptology Fujian Normal University No. 8 Shangsan Road Cangshan District Fuzhou Fujian 350007 China Institute of Software School of Electronics Engineering and Computer Science Peking University No. 5 Yiheyuan Road Haidian District Beijing 100085 China
Signcryption is a cryptographic primitive that performs digital signature and public key encryption simultaneously, at lower computational costs and communication overhead than signing and encrypting separately. Recen... 详细信息
来源: 评论
Analysis on Topic Map oriented e-Learner Behavior and Study Efficiency
Analysis on Topic Map oriented e-Learner Behavior and Study ...
收藏 引用
International Workshop on Intelligent Communication and Social networks
作者: Hongying Bao Haiping Zhu Jun Liu Feng Tian Yan Chen Department of Computer Science and Technology Xi'an Jiaotong University Shaanxi Province Key Lab. of Satellite and Terrestrial Network Tech. R&D
To begin with, this paper introduces a topic map oriented e-learning platform - Yotta. We compare the Yotta with the traditional e-learning platform Moodle from the aspects of learning resources organization, design o... 详细信息
来源: 评论