咨询与建议

限定检索结果

文献类型

  • 9 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 6 篇 计算机科学与技术...
    • 6 篇 软件工程
    • 2 篇 控制科学与工程
    • 1 篇 化学工程与技术
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
    • 1 篇 安全科学与工程
  • 4 篇 理学
    • 3 篇 数学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 2 篇 servers
  • 2 篇 clustering algor...
  • 2 篇 encryption
  • 1 篇 runtime
  • 1 篇 data privacy
  • 1 篇 distillation
  • 1 篇 product
  • 1 篇 multiplexing
  • 1 篇 bandwidth
  • 1 篇 androids
  • 1 篇 monitoring
  • 1 篇 wireless sensor ...
  • 1 篇 computational mo...
  • 1 篇 practice
  • 1 篇 costs
  • 1 篇 analytical model...
  • 1 篇 topology
  • 1 篇 hids
  • 1 篇 inner
  • 1 篇 database

机构

  • 4 篇 public service p...
  • 4 篇 shenzhen applied...
  • 3 篇 shenzhen enginee...
  • 2 篇 school of comput...
  • 2 篇 shenzhen key lab...
  • 1 篇 college of compu...
  • 1 篇 school of mathem...
  • 1 篇 research institu...
  • 1 篇 department of co...
  • 1 篇 school of comput...
  • 1 篇 institute of adv...
  • 1 篇 department of co...
  • 1 篇 school of inform...
  • 1 篇 department of co...
  • 1 篇 jinan university
  • 1 篇 department of sh...
  • 1 篇 china national g...
  • 1 篇 intelligence com...
  • 1 篇 school of inform...
  • 1 篇 institute of uro...

作者

  • 3 篇 xuan wang
  • 3 篇 wang xuan
  • 2 篇 yao lin
  • 2 篇 zoe l. jiang
  • 1 篇 tan rendy
  • 1 篇 s. m. yiu
  • 1 篇 lingmin zhang
  • 1 篇 xin luo
  • 1 篇 yuqin he
  • 1 篇 li jingpeng
  • 1 篇 xiaoyan liu
  • 1 篇 ding shijin
  • 1 篇 zhang jiajia
  • 1 篇 zhixiang he
  • 1 篇 chonglin gu
  • 1 篇 zechao liu
  • 1 篇 zhi-hui liu
  • 1 篇 chen guohua
  • 1 篇 chen shi
  • 1 篇 guo ju

语言

  • 11 篇 英文
检索条件"机构=Shenzhen Engineering Laboratory for Mobile Internet Application Middleware Technology"
11 条 记 录,以下是1-10 订阅
排序:
Non-negativity Constrained Missing Data Estimation for High-dimensional and Sparse Matrices
Non-negativity Constrained Missing Data Estimation for High-...
收藏 引用
IEEE International Conference on Automation Science and engineering
作者: Xin Luo Shuai Li Institute of Green and Intelligent Technology Shenzhen Engineering Laboratory for Mobile Internet Application Middleware Technology of Shenzhen University Shenzhen China Department of Computing Hong Kong Polytechnic University Hong Kong China
Latent factor (LF) models have proven to be accurate and efficient in extracting hidden knowledge from high-dimensional and sparse (HiDS) matrices. However, most LF models fail to fulfill the non-negativity constraint... 详细信息
来源: 评论
Dynamic resource provision for cloud broker with multiple reserved instance terms  1
收藏 引用
15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015
作者: Zhang, Jiangtao Chen, Shi Huang, Hejiao Wang, Xuan Du, Dingzhu School of Computer Science and Technology Harbin Institute of Technology Shenzhen Graduate School Shenzhen518055 China Public Service Platform of Mobile Internet Application Security Industry Shenzhen518057 China Shenzhen Key Laboratory of Internet of Information Collaboration Shenzhen518055 China Shenzhen Applied Technology Engineering Laboratory for Internet Multimedia Application Shenzhen518055 China Department of Computer Science University of Texas at Dallas RichardsonTX75080 United States
Relying on the knowledge of the pricing benefit of long-term reserved resource and multiplexing gains, cloud broker strives to minimize its cost by utilizing infrastructure resources from public cloud service provider... 详细信息
来源: 评论
Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks
Outsourcing Two-Party Privacy Preserving K-Means Clustering ...
收藏 引用
International Conference on mobile Ad-hoc and Sensor Networks, MSN
作者: Xiaoyan Liu Zoe L. Jiang S. M. Yiu Xuan Wang Chuting Tan Ye Li Zechao Liu Yabin Jin Junbin Fang Harbin Institute of Technology Shenzhen Graduate School Shenzhen China Shenzhen Applied Technology Engineering Laboratory for Internet Multimedia Application HKSAR The University of Hong Kong China Public Service Platform of Mobile Internet Application Security Industry Jinan University
Nowadays wireless sensor network (WSN) is widely used in human-centric applications and environmental monitoring. Different institutes deploy their own WSNs for data collection and processing. It becomes a challenging... 详细信息
来源: 评论
A DNA-based cryptosystem with length-fixed sticker model
收藏 引用
Journal of Computational and Theoretical Nanoscience 2015年 第12期12卷 5421-5424页
作者: Lin, Xuheng Ming, Zhong Guo, Ju Yan, Zhixiang Tan, Rendy Sun, Heng Department of Computer Science Jinan University Guangzhou510632 China Shenzhen Engineering Laboratory for Mobile Internet Application Middleware Technology Shenzhen University Shenzhen518060 China College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Institute of Urology Nanchang University Nanchang330006 China China National Genebank Shenzhen518083 China
As the computing power of computers is developed faster and faster nowadays, the traditional cryptosystems are challenged. In this paper, the traditional sticker model is modified to design a new cryptosystem. As a no... 详细信息
来源: 评论
Towards automatic consistency checking between web application and its mobile application  26
Towards automatic consistency checking between web applicati...
收藏 引用
26th International Conference on Software engineering and Knowledge engineering, SEKE 2014
作者: Chen, Xiangping Xu, Zhensheng Institute of Advanced Technology Sun Yat-sen University National Engineering Research Center of Digital Life Guangzhou China Shenzhen Engineering Laboratory for Mobile Internet Application Middleware Technology Shenzhen China Research Institute Sun Yat-sen University in Shenzhen Shenzhen China School of Information Science and Technology Sun Yat-sen University National Engineering Research Center of Digital Life Guangzhou China
With the increasing usage of mobile devices in daily life, a lot of websites delivered another mobile application version of application with the same services. If the mobile application is inconsistent with the web a... 详细信息
来源: 评论
Using Kuliback-Leibler divergence to model opponents in poker  28
Using Kuliback-Leibler divergence to model opponents in poke...
收藏 引用
28th AAAI Conference on Artificial Intelligence, AAAI 2014
作者: Zhang, Jiajia Wang, Xuan Yao, Lin Li, Jingpeng Shen, Xuedong Intelligence Computing Research Center Harbin Institute of Technology Shenzhen Applied Technology Engineering Laboratory for Internet Multimedia Application China Intelligence Computing Research Center Harbin Institute of Technology Public Service Platform of Mobile Internet Application Security Industry China School of Electronics Engineering and Computer Science Peking University China C302 HIT Campus Shenzhen University Town NanShan District XiLi Shenzhen518055 China IER Building Soutn Area Shenzhen High-Tech Industrial Park Shenzhen518055 China
Opponent modeling is an essential approach for building competitive computer agents in imperfect information games. This paper presents a novel approach to develop opp onent modeling techniques. The approach applies n... 详细信息
来源: 评论
SLA aware cost efficient virtual machines placement in cloud computing
SLA aware cost efficient virtual machines placement in cloud...
收藏 引用
IEEE International Conference on Performance, Computing and Communications (IPCCC)
作者: Jiangtao Zhang Zhixiang He Hejiao Huang Xuan Wang Chonglin Gu Lingmin Zhang School of Computer Science and Technology Harbin Institute of Technology Shenzhen Graduate School Shenzhen China Public Service Platform of Mobile Internet Application Security Industry Shenzhen China Shenzhen Key Laboratory of Internet of Information Collaboration Shenzhen China Shenzhen Applied Technology Engineering Laboratory for Internet Multimedia Application Shenzhen China
Servers and network contribute about 60% to the total cost of data center in cloud computing. How to efficiently place virtual machines so that the cost can be saved as much as possible, while guaranteeing the quality... 详细信息
来源: 评论
A New Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
A New Predicate Encryption Supporting Disjunctions, Polynomi...
收藏 引用
中国密码学会2014年密码算法学术会议
作者: Zhi-hui Liu Zoe L. Jiang Xuan Wang S.M. Yiu Shenzhen Graduate School Harbin Institute of Technology Shenzhen 518055 China Public Service Platform of Mobile Internet Application Security Industry Shenzhen 518055 Shenzhen Applied Technology Engineering Laboratory for Internet Multimedia Application Shenzhen 518055 The University of Hong Kong Hong Kong SAR China
Predicate encryption allows flexible fine-grained control over access to encrypted data and achieves attribute *** [1] supporting inner product is the most expressive predicate encryption scheme currently with large a... 详细信息
来源: 评论
An Example-Driven Approach for Automatic Extension of Monitoring Model
An Example-Driven Approach for Automatic Extension of Monito...
收藏 引用
International Conference on Digital Home (ICDH)
作者: Yuqin He Xiangping Chen School of Information Science and Technology Sun Vat-sen University National Engineering Research Center of Digital Life Corporation Limited Guangzhou China Shenzhen Engineering Laboratory for Mobile Internet Application Middleware Technology Shenzhen China Institute of Advanced Technology Sun Yat-sen University Guangzhou China
Digital home refers to the use of computer and information technology to control home appliances and features. Management applications of home devices are building based on runtime information of the devices. The runt... 详细信息
来源: 评论
Using risk dominance strategy in poker
收藏 引用
Journal of Information Hiding and Multimedia Signal Processing 2014年 第3期5卷 555-566页
作者: Zhang, Jia Jia Wang, Xuan Yao, Lin Li, Jing Peng Shen, X.D. Department of ShenZhen Graduate School Harbin Institute of Technology Shenzhen Applied Technology Engineering Laboratory for Internet Multimedia Application HIT Part of XiLi University Town NanShan 518055 ShenZhen GuangDong China Department of ShenZhen Graduate School Harbin Institute of Technology Public Service Platform of Mobile Internet Application Security Industry HIT Part of XiLi University Town NanShan 518055 ShenZhen GuangDong China Department of ShenZhen Graduate School Harbin Institute of Technology HIT Part of XiLi University Town NanShan 518055 ShenZhen GuangDong China
Risk dominance strategy is a complementary part of game theory decision strategy besides payoff dominance. It is widely used in decision of economic behavior and other game conditions with risk characters. In research... 详细信息
来源: 评论