咨询与建议

限定检索结果

文献类型

  • 67 篇 会议
  • 23 篇 期刊文献

馆藏范围

  • 90 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 71 篇 工学
    • 49 篇 计算机科学与技术...
    • 39 篇 软件工程
    • 17 篇 信息与通信工程
    • 9 篇 电子科学与技术(可...
    • 6 篇 机械工程
    • 6 篇 建筑学
    • 5 篇 光学工程
    • 5 篇 控制科学与工程
    • 5 篇 生物医学工程(可授...
    • 5 篇 生物工程
    • 4 篇 仪器科学与技术
    • 4 篇 土木工程
    • 4 篇 航空宇航科学与技...
    • 3 篇 力学(可授工学、理...
    • 3 篇 化学工程与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 冶金工程
    • 2 篇 动力工程及工程热...
    • 2 篇 电气工程
  • 31 篇 理学
    • 19 篇 数学
    • 10 篇 物理学
    • 5 篇 生物学
    • 5 篇 统计学(可授理学、...
    • 3 篇 化学
    • 1 篇 地球物理学
    • 1 篇 系统科学
  • 19 篇 管理学
    • 14 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 3 篇 法学
    • 3 篇 社会学
  • 1 篇 农学
  • 1 篇 医学

主题

  • 7 篇 graphics process...
  • 5 篇 computational mo...
  • 5 篇 analytical model...
  • 4 篇 computer archite...
  • 4 篇 routing protocol...
  • 4 篇 virtual reality
  • 3 篇 parallel process...
  • 3 篇 graphics
  • 3 篇 acceleration
  • 3 篇 semantics
  • 3 篇 testing
  • 3 篇 solid modeling
  • 2 篇 computer simulat...
  • 2 篇 image enhancemen...
  • 2 篇 computer science
  • 2 篇 deep learning
  • 2 篇 concurrent compu...
  • 2 篇 prototypes
  • 2 篇 deformation
  • 2 篇 finger vein

机构

  • 18 篇 state key labora...
  • 9 篇 school of comput...
  • 8 篇 state key labora...
  • 6 篇 school of automa...
  • 6 篇 state key labora...
  • 5 篇 state key lab. o...
  • 5 篇 state key lab. o...
  • 4 篇 state key labora...
  • 4 篇 school of electr...
  • 4 篇 state key lab of...
  • 4 篇 state key labora...
  • 3 篇 state key lab of...
  • 3 篇 state key lab of...
  • 3 篇 state key lab of...
  • 2 篇 university of wü...
  • 2 篇 university of sc...
  • 2 篇 beijing key lab ...
  • 2 篇 beijing institut...
  • 2 篇 guangdong univer...
  • 2 篇 state key lab. o...

作者

  • 9 篇 gao xiaopeng
  • 9 篇 xia chunhe
  • 7 篇 liang xiaohui
  • 6 篇 han wan
  • 5 篇 long xiang
  • 5 篇 chunhe xia
  • 5 篇 wan han
  • 5 篇 xiang long
  • 4 篇 lv liangshuang
  • 4 篇 he zhiying
  • 4 篇 wang haiquan
  • 4 篇 xiaopeng gao
  • 3 篇 shan yao
  • 3 篇 jiao jian
  • 3 篇 wang zhiqiang
  • 3 篇 liang xiaoyan
  • 3 篇 wei wu
  • 3 篇 bo yang
  • 3 篇 yao shan
  • 2 篇 jian jiao

语言

  • 87 篇 英文
  • 3 篇 中文
检索条件"机构=State Key Lab. of Virtual Reality Technology and System School of Computer Science and Technology"
90 条 记 录,以下是11-20 订阅
排序:
Network penetration testing scheme description language
Network penetration testing scheme description language
收藏 引用
2011 International Conference on Computational and Information sciences, ICCIS 2011
作者: Dai, Zhiyong Lv, Liangshuang Liang, Xiaoyan Bo, Yang State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing China
Penetration testing is widely used to help ensure the security of the network. Traditional penetration testings were manually performed by tester according to scheme, the process is usually complex resulting in that i... 详细信息
来源: 评论
The research of 3D computer graphics on mobile devices
The research of 3D computer graphics on mobile devices
收藏 引用
computer Graphics and Visualization 2008 and Gaming 2008: Design for Engaging Experience and Social Interaction 2008, MCCSIS'08 - IADIS Multi Conference on computer science and Information systems
作者: Xiaohui, Liang Qidi, Xu Xiaoxiao, Wu Zhiying, He State Key Lab. of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University Beijing 100083 China
It is a challenging task to provide real-time, realistic 3D graphics on mobile devices because of the constraints of computing, storage and network bandwidth. In this paper, we first overview current researches of 3D ... 详细信息
来源: 评论
Automatic generation for penetration testing scheme analysis model for network
Automatic generation for penetration testing scheme analysis...
收藏 引用
2011 International Conference on Computational and Information sciences, ICCIS 2011
作者: Shen, Lu Liang, Xiaoyan Bo, Yang Xia, Chunhe State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing China
The existing penetration testing systems need to rely on the professional skills in the testing process, so they increase the penetration testing of human resources and costs. While it also reduces the efficiency of t... 详细信息
来源: 评论
Conflict detection model of access control policy in collab.rative environment
Conflict detection model of access control policy in collabo...
收藏 引用
2011 International Conference on Computational and Information sciences, ICCIS 2011
作者: Fan, Beibei Liang, Xiaoyan Luo, Yang Bo, Yang Xia, Chunhe State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing China
Cross-domain interoperation based on role-mapping increasingly becomes a representative research field of collab.rative environment. However, in this collab.rative environment, there would still be more permission or ... 详细信息
来源: 评论
Accelerate cache simulation with generic GPU
Accelerate cache simulation with generic GPU
收藏 引用
IEEE 9th International Conference on computer and Information technology, CIT 2009
作者: Han, Wan Xiaopeng, Gao Zhiqiang, Wang State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing China
Trace-driven cache simulation is the most widely used method to evaluate different cache structures. Several techniques have been proposed to reduce the simulation time of sequential trace-driven simulation. An obviou... 详细信息
来源: 评论
A Network Security Situation Analysis framework based on information fusion
A Network Security Situation Analysis framework based on inf...
收藏 引用
2011 6th IEEE Joint International Information technology and Artificial Intelligence Conference, ITAIC 2011
作者: Zhang, Songmei Yao, Shan Ye, Xin'En Xia, Chunhe State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing 100191 China
With the rapid development of the Internet, the network structure becomes larger and more complicated and attacking methods are more sophisticated, too. To enhance network security, Network Security Situation Analysis... 详细信息
来源: 评论
Seamless virtual machine live migration on network security enhanced hypervisor
Seamless virtual machine live migration on network security ...
收藏 引用
2009 2nd IEEE International Conference on Broadband Network and Multimedia technology, IEEE IC-BNMT2009
作者: Xianqin, Chen Han, Wan Sumei, Wang Xiang, Long State Key Laboratory of Virtual Reality Technology System School of Computer Science and Technology Beijing University of Aeronautics and Astronautics Beijing 100191 China
Since the virtual network traffic is invisible outside the hypervisor, it is impossible for traditional network-base security devices to harness the attacks happened in virtual computing environment. Industry and acad... 详细信息
来源: 评论
Accelerate Smoothed Particle Hydrodynamics using GPU
Accelerate Smoothed Particle Hydrodynamics using GPU
收藏 引用
2010 IEEE Youth Conference on Information, Computing and Telecommunications, YC-ICT 2010
作者: Gao, Xiaopeng Wang, Zhiqiang Wan, Han Long, Xiang State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University 100191 Beijing China
Physic-based fluid simulation is used extensively nowadays;however the traditional serial algorithm can't satisfy the realtime requirement due to its complexity and compute-intensive. The development of modern GPU... 详细信息
来源: 评论
SimRC: An architecture modeling and simulator generation tool for reconfigurable computing development
SimRC: An architecture modeling and simulator generation too...
收藏 引用
IASTED International Conference on Modelling, Simulation, and Identification, MSI 2009
作者: Liu, Yuexiao Gao, Xiaopeng Wu, Xingbo Lv, Liangshuang State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing 100191 China
A modeling and simulation tool called SimRC is described in this paper. It is dedicated to improve the efficiency of reconfigurable computing development. In SimRC, a new architecture description language is designed ... 详细信息
来源: 评论
Simplification for texture mapping models with mesh segmentation
Simplification for texture mapping models with mesh segmenta...
收藏 引用
2010 16th International Conference on virtual systems and Multimedia, VSMM 2010
作者: Wang, Lili Ma, Zhiqiang Xue, Bing Shen, Zhe State Key Laboratory of Virtual Reality Technology and System School of Computer Science and Engineering Beihang University Beijing 100191 China
To reduce the loss of visual details in simplification for textured meshes, this paper presents a simplification method based on mesh segmentation. Firstly, the model is partitioned into some sub-meshes according to t... 详细信息
来源: 评论