咨询与建议

限定检索结果

文献类型

  • 2,169 篇 会议
  • 1,777 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 3,960 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,790 篇 工学
    • 2,079 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 524 篇 信息与通信工程
    • 339 篇 控制科学与工程
    • 242 篇 生物工程
    • 215 篇 电子科学与技术(可...
    • 210 篇 电气工程
    • 174 篇 机械工程
    • 163 篇 光学工程
    • 129 篇 生物医学工程(可授...
    • 110 篇 仪器科学与技术
    • 109 篇 化学工程与技术
    • 100 篇 材料科学与工程(可...
    • 96 篇 动力工程及工程热...
    • 79 篇 网络空间安全
    • 74 篇 建筑学
    • 69 篇 交通运输工程
    • 67 篇 土木工程
  • 1,285 篇 理学
    • 772 篇 数学
    • 272 篇 生物学
    • 246 篇 物理学
    • 203 篇 统计学(可授理学、...
    • 131 篇 系统科学
    • 120 篇 化学
  • 761 篇 管理学
    • 456 篇 管理科学与工程(可...
    • 348 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 103 篇 医学
    • 91 篇 临床医学
    • 74 篇 基础医学(可授医学...
  • 84 篇 法学
    • 63 篇 社会学
  • 57 篇 经济学
  • 38 篇 农学
  • 22 篇 教育学
  • 11 篇 艺术学
  • 9 篇 军事学
  • 8 篇 文学
  • 6 篇 哲学

主题

  • 102 篇 semantics
  • 69 篇 software enginee...
  • 67 篇 computer science
  • 66 篇 training
  • 63 篇 computational mo...
  • 58 篇 data mining
  • 57 篇 deep learning
  • 54 篇 web services
  • 50 篇 optimization
  • 49 篇 educational inst...
  • 49 篇 feature extracti...
  • 46 篇 algorithm design...
  • 45 篇 machine learning
  • 45 篇 clustering algor...
  • 45 篇 software
  • 40 篇 laboratories
  • 40 篇 cloud computing
  • 40 篇 data models
  • 38 篇 accuracy
  • 37 篇 quality of servi...

机构

  • 297 篇 state key labora...
  • 216 篇 school of comput...
  • 200 篇 state key labora...
  • 150 篇 state key labora...
  • 106 篇 state key labora...
  • 89 篇 state key labora...
  • 86 篇 school of comput...
  • 85 篇 state key lab. o...
  • 74 篇 state key lab of...
  • 71 篇 school of comput...
  • 69 篇 computer school ...
  • 65 篇 state key lab. f...
  • 57 篇 university of ch...
  • 52 篇 school of comput...
  • 49 篇 state key labora...
  • 46 篇 state key labora...
  • 45 篇 school of comput...
  • 43 篇 state key labora...
  • 41 篇 department of co...
  • 40 篇 international sc...

作者

  • 41 篇 huang di
  • 41 篇 xiao limin
  • 35 篇 gao yang
  • 35 篇 shi yinghuan
  • 32 篇 liu jin
  • 31 篇 limin xiao
  • 30 篇 ruan li
  • 26 篇 dou wanchun
  • 23 篇 bai xiao
  • 22 篇 zhao jian
  • 22 篇 tao dacheng
  • 21 篇 shen furao
  • 21 篇 he keqing
  • 21 篇 xu xiaolong
  • 21 篇 qi lei
  • 20 篇 qi lianyong
  • 20 篇 li bing
  • 20 篇 he yanxiang
  • 20 篇 li yuanxiang
  • 20 篇 du bo

语言

  • 3,656 篇 英文
  • 199 篇 其他
  • 105 篇 中文
  • 1 篇 法文
检索条件"机构=State Key Lab of Software Engineering and School of Computer"
3960 条 记 录,以下是3571-3580 订阅
排序:
Research and Implement of Secure Bootstrap for Virtual Machine Based on Trusted Computing Platform
Research and Implement of Secure Bootstrap for Virtual Machi...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Zhiqiang Zhu Mingdi Xu Huanguo Zhang School of Computer Wuhan University of China Wuhan China The Key Laboratory of AeroSpace Information Security and Trust Computing Ministry of Education Wuhan China State Key Laboratory of Software Engineering Wuhan University of China Wuhan China
Secure bootstrap usually use integrity measurement scheme to verify code or data before they are loaded into memory. As to traditional PC (personal computer) architecture, this method is hard to protect security of sy... 详细信息
来源: 评论
Security Analysis of OIAP Implementation Based on BAN Logic
Security Analysis of OIAP Implementation Based on BAN Logic
收藏 引用
International Conference on Multimedia Information Networking and Security (MINES)
作者: Xu Shiwei Zhang Huanguo Yan Fei Xu Mingdi Li Zhide School of Computer Wuhan University of China Wuhan China School of Computer State Key Laboratory of Software Engineering Key Laboratory of AeroSpace Information Security and Trust Computing Ministry of Education Wuhan University of China Wuhan China Guangdong Dongguan Supervision Testing Institute of Quality and Metrology Dongguan China
In the specification of trusted platform module (TPM), object-independent authorization protocol (OIAP) is the protocol which guarantees the security of the communication between TPM and its users. Nowadays, there are... 详细信息
来源: 评论
A Framework for a File View Model in Intranets
A Framework for a File View Model in Intranets
收藏 引用
International Conference on computer Sciences and Convergence Information Technology (ICCIT)
作者: Yong Ai Hongbin Dong Yiwen Liang R.I. McKay Computer School Wuhan University of China Wuhan China State Key Laboratory of Software Engineering Wuhan University of China Wuhan China Structural Complexity Laboratory Seoul National University South Korea
Today, a new security problem is arising in intranets. The threats from inside an organization account for a rapidly increasing proportion of losses. The DAC (discretionary access control) model, which is the primary ... 详细信息
来源: 评论
A Hybrid Particle Swarm Optimization Algorithm for Multimodal Function Optimization
A Hybrid Particle Swarm Optimization Algorithm for Multimoda...
收藏 引用
International Workshop on Intelligent Systems and Applications, ISA
作者: Jirong Gu Lin Lin Hui Wang College of Geography and Resources Sciences Sichuan Normal University China Department of Computer Science Yili Normal School Yining China State Key Laboratory of Software Engineering Wuhan University of China China
Particle swarm optimization (PSO) has shown its good performance on numerical function problems. However, on some multimodal functions the PSO easily suffers from premature convergence because of the rapid decline in ... 详细信息
来源: 评论
Multi-attributes controlled point-based rendering architecture for mobile devices
Multi-attributes controlled point-based rendering architectu...
收藏 引用
11th IEEE International Conference on computer-Aided Design and computer Graphics(第11届IEEE国际计算机辅助设计与图形学学术会议 IEEE CAD/GRAPHICS 2009)
作者: Zhiying He Xiaohui Liang State Key Lab. of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang UniversityBeijing 100191 P.R. China
Taking the characteristics of mobile devices and the demands for graphics rendering into account, this paper gives a set of definitions of attributes to express the performance of mobile terminals and algorithm pe... 详细信息
来源: 评论
Prediction of interspecies transmission for avian influenza a virus based on BP neural network
Prediction of interspecies transmission for avian influenza ...
收藏 引用
International Conference on Bio-Inspired Computing: Theories and Applications, BICTA
作者: Xiaoli Qiang Zheng Kou School of Electronic Engineering and Computer Science Key Laboratory of High Confidence Software Technologies of Ministry of Education Peking University Beijing China State Key Laboratory of Virology Wuhan Institute of Virology Chinese Academy and Sciences Wuhan China
The prediction of the transmissibility of avian influenza A viruses from birds to humans is very important for the public health. Recently, two categories of molecular patterns, which were associated with the phenotyp... 详细信息
来源: 评论
Solving Global Unconstrained Optimization Problems by Symmetry-Breaking
Solving Global Unconstrained Optimization Problems by Symmet...
收藏 引用
International Conference on computer and Information Science (ACIS)
作者: Xiaohui Ji Feifei Ma Jian Zhang School of Information Engineering China University of Geoscience Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy and Sciences Beijing China Chinese Academy of Sciences Beijing Beijing CN
Global optimization has many real-world applications. Most methods for solving it are based on search,so decreasing its search space can increase the efficiency for their solving. Symmetry-breaking is an important tec... 详细信息
来源: 评论
A Model-Based Fuzz Framework to the Security Testing of TCG software Stack Implementations
A Model-Based Fuzz Framework to the Security Testing of TCG ...
收藏 引用
International Conference on Multimedia Information Networking and Security (MINES)
作者: Yang Yang Huanguo Zhang Mi Pan Jian Yang Fan He Zhide Li School of Computer Wuhan University of China Wuhan China School of Computer State Key Laboratory of Software Engineering Wuhan University of China Wuhan China Key Laboratory of Aerospace Information Security and Trust Computing Ministry of Education Wuhan China Guangdong Dongguan Supervision Testing Institute of Quality and Metrology Dongguan China
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally fuzz testing tools use random inputs and watch the resulting values. In this paper, we present a model-based fuzz ... 详细信息
来源: 评论
A RFID Anti-Collision Algorithm Based on Pipeline and Pre-Detecting Mechanism
A RFID Anti-Collision Algorithm Based on Pipeline and Pre-De...
收藏 引用
IEEE International Symposium on computer Network and Multimedia Technology, CNMT
作者: Wenbin Hu Zhengbing Hu Ya Liu Wen Su Mao Ding Ziyao Pan Computer School Wuhan University Wuhan China State Key Lab. For Novel Software Technology Nanjing University P. R. China Department of Information Technology Huazhong Normal University China
This paper is going to present a new algorithm called "PP" (a RFID anti-collision algorithm based on pipeline and pre-detecting mechanism) to solve the problem of collisions among the tags in RFID system. Th... 详细信息
来源: 评论
Multi-objective Optimization about Functions of the East Lake in Wuhan
Multi-objective Optimization about Functions of the East Lak...
收藏 引用
第十三届世界湖泊大会
作者: 李新民 李蓉 Editorial Office of Central China Normal University Hankou Branch Department of Computer Science Central China Normal University Department of Geography Central China Normal University State Key Lab of Software Engineering Wuhan University
After multiple-objective optimized decision about the East Lake in Wuhan,combining of expert system 's identification and adjustment,we get weights of F(tourism function),F(flood storage function),F(water sup...
来源: 评论