咨询与建议

限定检索结果

文献类型

  • 6 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4 篇 工学
    • 4 篇 计算机科学与技术...
    • 4 篇 软件工程
    • 1 篇 信息与通信工程
    • 1 篇 安全科学与工程
  • 3 篇 理学
    • 3 篇 数学
    • 2 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
    • 2 篇 工商管理
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 2 篇 clustering algor...
  • 2 篇 encryption
  • 1 篇 outsourcing
  • 1 篇 data privacy
  • 1 篇 product
  • 1 篇 multiplexing
  • 1 篇 bandwidth
  • 1 篇 servers
  • 1 篇 wireless sensor ...
  • 1 篇 costs
  • 1 篇 topology
  • 1 篇 inner
  • 1 篇 database
  • 1 篇 protocols
  • 1 篇 correlation
  • 1 篇 game theory
  • 1 篇 predicate
  • 1 篇 cpa
  • 1 篇 encrypted
  • 1 篇 cloud computing

机构

  • 5 篇 shenzhen applied...
  • 4 篇 public service p...
  • 2 篇 school of comput...
  • 2 篇 shenzhen key lab...
  • 2 篇 harbin institute...
  • 1 篇 department of co...
  • 1 篇 jinan university
  • 1 篇 department of sh...
  • 1 篇 intelligence com...
  • 1 篇 hksar the univer...
  • 1 篇 guangdong provin...
  • 1 篇 department of sh...
  • 1 篇 c302 hit campus ...
  • 1 篇 school of electr...
  • 1 篇 ier building sou...
  • 1 篇 intelligence com...
  • 1 篇 university of ho...
  • 1 篇 shenzhen graduat...
  • 1 篇 the university o...
  • 1 篇 department of sh...

作者

  • 4 篇 wang xuan
  • 3 篇 xuan wang
  • 2 篇 yao lin
  • 2 篇 zoe l. jiang
  • 1 篇 s. m. yiu
  • 1 篇 lingmin zhang
  • 1 篇 li jingpeng
  • 1 篇 xiaoyan liu
  • 1 篇 zhang jiajia
  • 1 篇 zhixiang he
  • 1 篇 chonglin gu
  • 1 篇 zechao liu
  • 1 篇 zhi-hui liu
  • 1 篇 chen shi
  • 1 篇 junbin fang
  • 1 篇 yabin jin
  • 1 篇 hejiao huang
  • 1 篇 ye li
  • 1 篇 chuting tan
  • 1 篇 jiangtao zhang

语言

  • 7 篇 英文
检索条件"机构=Shenzhen Applied Technology Engineering Laboratory for Internet Multimedia Application"
7 条 记 录,以下是1-10 订阅
排序:
Dynamic resource provision for cloud broker with multiple reserved instance terms  1
收藏 引用
15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015
作者: Zhang, Jiangtao Chen, Shi Huang, Hejiao Wang, Xuan Du, Dingzhu School of Computer Science and Technology Harbin Institute of Technology Shenzhen Graduate School Shenzhen518055 China Public Service Platform of Mobile Internet Application Security Industry Shenzhen518057 China Shenzhen Key Laboratory of Internet of Information Collaboration Shenzhen518055 China Shenzhen Applied Technology Engineering Laboratory for Internet Multimedia Application Shenzhen518055 China Department of Computer Science University of Texas at Dallas RichardsonTX75080 United States
Relying on the knowledge of the pricing benefit of long-term reserved resource and multiplexing gains, cloud broker strives to minimize its cost by utilizing infrastructure resources from public cloud service provider... 详细信息
来源: 评论
Outsourcing privacy-preserving ID3 decision tree over horizontally partitioned data for multiple parties
Outsourcing privacy-preserving ID3 decision tree over horizo...
收藏 引用
作者: Li, Ye Wang, Xuan Jiang, Zoe L. Yiu, S.M. Harbin Institute of Technology Shenzhen Graduate School Shenzhen518055 China Shenzhen Applied Technology Engineering Laboratory for Internet Multimedia Application Shenzhen518055 China Guangdong Provincial Key Laboratory of High Performance Computing Guangzhou510275 China University of Hong Kong Hong Kong Hong Kong
Today, many small and medium-sized companies want to share data for data mining;however, privacy and security concerns restrict such data sharing. Privacy-preserving data mining has emerged as a solution to this probl... 详细信息
来源: 评论
Using Kuliback-Leibler divergence to model opponents in poker  28
Using Kuliback-Leibler divergence to model opponents in poke...
收藏 引用
28th AAAI Conference on Artificial Intelligence, AAAI 2014
作者: Zhang, Jiajia Wang, Xuan Yao, Lin Li, Jingpeng Shen, Xuedong Intelligence Computing Research Center Harbin Institute of Technology Shenzhen Applied Technology Engineering Laboratory for Internet Multimedia Application China Intelligence Computing Research Center Harbin Institute of Technology Public Service Platform of Mobile Internet Application Security Industry China School of Electronics Engineering and Computer Science Peking University China C302 HIT Campus Shenzhen University Town NanShan District XiLi Shenzhen518055 China IER Building Soutn Area Shenzhen High-Tech Industrial Park Shenzhen518055 China
Opponent modeling is an essential approach for building competitive computer agents in imperfect information games. This paper presents a novel approach to develop opp onent modeling techniques. The approach applies n... 详细信息
来源: 评论
SLA aware cost efficient virtual machines placement in cloud computing
SLA aware cost efficient virtual machines placement in cloud...
收藏 引用
IEEE International Conference on Performance, Computing and Communications (IPCCC)
作者: Jiangtao Zhang Zhixiang He Hejiao Huang Xuan Wang Chonglin Gu Lingmin Zhang School of Computer Science and Technology Harbin Institute of Technology Shenzhen Graduate School Shenzhen China Public Service Platform of Mobile Internet Application Security Industry Shenzhen China Shenzhen Key Laboratory of Internet of Information Collaboration Shenzhen China Shenzhen Applied Technology Engineering Laboratory for Internet Multimedia Application Shenzhen China
Servers and network contribute about 60% to the total cost of data center in cloud computing. How to efficiently place virtual machines so that the cost can be saved as much as possible, while guaranteeing the quality... 详细信息
来源: 评论
Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks
Outsourcing Two-Party Privacy Preserving K-Means Clustering ...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Xiaoyan Liu Zoe L. Jiang S. M. Yiu Xuan Wang Chuting Tan Ye Li Zechao Liu Yabin Jin Junbin Fang Harbin Institute of Technology Shenzhen Graduate School Shenzhen China Shenzhen Applied Technology Engineering Laboratory for Internet Multimedia Application HKSAR The University of Hong Kong China Public Service Platform of Mobile Internet Application Security Industry Jinan University
Nowadays wireless sensor network (WSN) is widely used in human-centric applications and environmental monitoring. Different institutes deploy their own WSNs for data collection and processing. It becomes a challenging... 详细信息
来源: 评论
A New Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
A New Predicate Encryption Supporting Disjunctions, Polynomi...
收藏 引用
中国密码学会2014年密码算法学术会议
作者: Zhi-hui Liu Zoe L. Jiang Xuan Wang S.M. Yiu Shenzhen Graduate School Harbin Institute of Technology Shenzhen 518055 China Public Service Platform of Mobile Internet Application Security Industry Shenzhen 518055 Shenzhen Applied Technology Engineering Laboratory for Internet Multimedia Application Shenzhen 518055 The University of Hong Kong Hong Kong SAR China
Predicate encryption allows flexible fine-grained control over access to encrypted data and achieves attribute *** [1] supporting inner product is the most expressive predicate encryption scheme currently with large a... 详细信息
来源: 评论
Using risk dominance strategy in poker
收藏 引用
Journal of Information Hiding and multimedia Signal Processing 2014年 第3期5卷 555-566页
作者: Zhang, Jia Jia Wang, Xuan Yao, Lin Li, Jing Peng Shen, X.D. Department of ShenZhen Graduate School Harbin Institute of Technology Shenzhen Applied Technology Engineering Laboratory for Internet Multimedia Application HIT Part of XiLi University Town NanShan 518055 ShenZhen GuangDong China Department of ShenZhen Graduate School Harbin Institute of Technology Public Service Platform of Mobile Internet Application Security Industry HIT Part of XiLi University Town NanShan 518055 ShenZhen GuangDong China Department of ShenZhen Graduate School Harbin Institute of Technology HIT Part of XiLi University Town NanShan 518055 ShenZhen GuangDong China
Risk dominance strategy is a complementary part of game theory decision strategy besides payoff dominance. It is widely used in decision of economic behavior and other game conditions with risk characters. In research... 详细信息
来源: 评论