咨询与建议

限定检索结果

文献类型

  • 103 篇 期刊文献
  • 44 篇 会议

馆藏范围

  • 147 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 128 篇 工学
    • 71 篇 计算机科学与技术...
    • 42 篇 信息与通信工程
    • 28 篇 网络空间安全
    • 24 篇 电气工程
    • 20 篇 仪器科学与技术
    • 20 篇 软件工程
    • 19 篇 电子科学与技术(可...
    • 16 篇 机械工程
    • 13 篇 控制科学与工程
    • 8 篇 材料科学与工程(可...
    • 4 篇 测绘科学与技术
    • 4 篇 地质资源与地质工...
    • 3 篇 光学工程
    • 3 篇 动力工程及工程热...
    • 2 篇 化学工程与技术
    • 2 篇 航空宇航科学与技...
    • 2 篇 农业工程
  • 31 篇 管理学
    • 30 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 23 篇 理学
    • 11 篇 数学
    • 5 篇 物理学
    • 4 篇 天文学
    • 4 篇 地理学
    • 4 篇 系统科学
    • 1 篇 海洋科学
  • 9 篇 教育学
    • 8 篇 教育学
    • 1 篇 体育学
  • 3 篇 军事学
    • 3 篇 军队指挥学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 2 篇 农学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
  • 1 篇 医学

主题

  • 11 篇 计算机网络
  • 5 篇 web
  • 4 篇 internet
  • 4 篇 cryptography
  • 4 篇 网络安全
  • 4 篇 quantum
  • 3 篇 xml
  • 3 篇 wap网关
  • 3 篇 无线网络
  • 3 篇 体系结构
  • 3 篇 threshold
  • 2 篇 通信协议
  • 2 篇 地理信息系统
  • 2 篇 认证
  • 2 篇 service
  • 2 篇 cims
  • 2 篇 fault tolerance
  • 2 篇 图像取证
  • 2 篇 资源预留
  • 2 篇 网络

机构

  • 22 篇 东南大学
  • 13 篇 西安电子科技大学
  • 5 篇 武警工程学院
  • 4 篇 college of compu...
  • 3 篇 教育部计算机网络...
  • 3 篇 state key labora...
  • 3 篇 state key labora...
  • 3 篇 state key labora...
  • 2 篇 ministry of educ...
  • 2 篇 教育部计算机网络...
  • 2 篇 school of comput...
  • 2 篇 上海交通大学
  • 2 篇 华南理工大学
  • 2 篇 陕西师范大学
  • 2 篇 山西大学
  • 2 篇 中南大学
  • 1 篇 南京邮电学院
  • 1 篇 福建师范大学
  • 1 篇 shaanxi key labo...
  • 1 篇 school of electr...

作者

  • 15 篇 china
  • 14 篇 顾冠群
  • 5 篇 马建峰
  • 4 篇 杨晓元
  • 3 篇 沈军
  • 3 篇 赵阿群
  • 3 篇 吴国新
  • 3 篇 杨鹏
  • 2 篇 3 state key labo...
  • 2 篇 王汝传
  • 2 篇 许勇
  • 2 篇 潘峰
  • 2 篇 4 state key labo...
  • 2 篇 hefei
  • 2 篇 yang yuguang1 2 ...
  • 2 篇 罗军舟
  • 2 篇 ministry of educ...
  • 2 篇 瞿裕忠
  • 2 篇 李晖
  • 2 篇 杜庆伟

语言

  • 75 篇 中文
  • 72 篇 英文
检索条件"作者=2 Key Laboratory of Computer Network and Information Integration , Ministry of Education, nanjing 210096, china"
147 条 记 录,以下是1-10 订阅
排序:
Heuristic for no-wait flow shops with makespan minimization based on total idle-time increments
收藏 引用
Science in china(Series F) 2008年 第7期51卷 896-909页
作者: LI XiaoPing1,2 & WU Cheng3 1 School of computer Science & Engineering, Southeast University, nanjing 210096, china 2 key laboratory of computer network and information integration (Southeast University), ministry of education, nanjing 210096, china 3 Department of Automation, Tsinghua University, Beijing 100084, china School of computer Science & Engineering Southeast University key laboratory of computer network and information integration (Southeast University) Ministry of Education Department of Automation Tsinghua University
No-wait flow shops with makespan minimization are classified as NP-hard. In this paper, the optimization objective is equivalently transformed to total idle-time minimization. The independence relationship between tas... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Restrictive mechanism of flow control among non-cooperative Internet users
收藏 引用
Science china(information Sciences) 2011年 第1期54卷 12-22页
作者: TAO Jun1,2,ZHONG Xiao1,2 & LU YiFei1,2 1key laboratory of computer network and information integration,Southeast University, ministry of education,nanjing 210096,china 2School of computer Science and Engineering,Southeast University,nanjing 210096,china key laboratory of computer network and information integration Southeast University Ministry of Education School of computer Science and Engineering Southeast University
The flow and congestion control methods based on one-shot game model with non-cooperative game theory can explain the non-cooperative behavior of Internet ***,the low effciency of equilibrium solutions affects their *... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Non-blocking message total ordering protocol
收藏 引用
Science in china(Series F) 2008年 第12期51卷 1919-1934页
作者: WANG Yun & WANG JunLing School of computer Science & Engineering, Southeast University key Lab of computer network & information integration, MOE, nanjing 210096, china School of computer Science & Engineering Southeast University key Lab of computer network & information integration MOE
Message total ordering is a critical part in active replication in order to maintain consistency among members in a fault tolerant group. The paper proposes a non-blocking message total ordering protocol (NBTOP) for... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Fair Non-Repudiation for Web Services Transactions
收藏 引用
Wuhan University Journal of Natural Sciences 2010年 第5期15卷 385-392页
作者: SU Ruidan,FU Shaofeng,ZHOU Lihua key laboratory of computer network and information Security of the ministry of education,Xidian University,Xi’an 710071,Shaanxi,china key laboratory of computer network and information Security of the ministry of education Xidian University Xi’an Shaanxi China
To safeguard the interests of transacting parties,non-repudiation mechanisms need to assure fairness and *** non-repudiation service currently implemented usually does not consider the requirement of fairness and the ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Evolutionary cryptography theory based generating method for a secure Koblitz elliptic curve and its improvement by a hidden Markov models
收藏 引用
Science china(information Sciences) 2012年 第4期55卷 911-920页
作者: WANG Chao 1,ZHANG HuanGuo 2,3 & LIU LiLi 4 1 key Lab of Specialty Fiber Optics and Optical Access network,ministry of education,Shanghai University,Shanghai 200072,china 2 computer School of Wuhan University,Wuhan 430072,china 3 key laboratory of Aerospace information Security and Trusted Computing ministry of education,Wuhan 430072,china 4 Huawei Technologies CO.LTD.,Shanghai 201206,china key Lab of Specialty Fiber Optics and Optical Access network Ministry of Education Shanghai University computer School of Wuhan University key laboratory of Aerospace information Security and Trusted Computing ministry of education Huawei Technologie
Considering potential attacks from cloud-computing and quantum-computing,it is becoming nec-essary to provide higher security elliptic *** hidden Markov models are introduced for designing the trace-vector computation... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
基于粒子群优化的ad hoc网络最小能耗多播路由算法
收藏 引用
通信学报 2012年 第3期33卷 52-58页
作者: 朱晓建 沈军 东南大学计算机科学与工程学院 江苏南京211189 东南大学计算机网络和信息集成教育部重点实验室 江苏南京211189
在无线ad hoc网络中,设备使用电池提供能量,随着多播应用日益广泛,如何构造最小能耗多播树是一个重要问题。针对选择不同的中继节点集对构造最小能耗多播树的影响,提出了一种优化最小能耗多播树构造的离散粒子群算法。为了避免离散粒子... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
无线/移动网络中自适应的接纳控制算法及性能分析
收藏 引用
通信学报 2004年 第6期25卷 147-156页
作者: 姜爱全 赵阿群 东南大学计算机科学与工程系 江苏南京210096 教育部计算机网络和信息集成支撑技术重点实验室 江苏南京210096
无线/移动网络中重要的连接级QoS性能指标包括新连接请求阻塞率(CBP)、切换连接请求丢弃率(HDP)等。其中,更不希望因切换连接请求的丢弃而导致服务的终止。为降低HDP,通常采用资源预留方案。但这种方案导致CBP较高、资源利用率低。本文... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Threshold proxy quantum signature scheme with threshold shared verification
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第8期51卷 1079-1088页
作者: YANG YuGuang1,3,4 & WEN QiaoYan2 1 College of computer Science and Technology,Beijing University of Technology,Beijing 100124,china 2 State key laboratory of networking and Switching Technology,Beijing University of Posts and Tele-communications,Beijing 100876,china 3 State key laboratory of Integrated Services network,Xidian University,Xi’an 710071,china 4 State key laboratory of information Security(Graduate University of Chinese Academy of Sciences) ,Beijing 100049,china College of computer Science and Technology Beijing University of Technology Beijing China State key laboratory of Integrated Services network Xidian University Xi’an China State key laboratory of information Security (Graduate University of Chinese Academy of Sciences) Beijing China State key laboratory of networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
A threshold proxy quantum signature scheme with threshold shared verification is proposed. An original signer could authorize a group as its proxy signers. Then only t or more of n persons in the proxy group can gener... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Quantum threshold group signature
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第10期51卷 1505-1514页
作者: YANG YuGuang1,2,3 & WEN QiaoYan4 1 College of computer Science and Technology, Beijing University of Technology, Beijing 100124, china 2 State key laboratory of Integrated Services network, Xidian University, Xi’an 710071, china 3 State key laboratory of information Security (Graduate University of Chinese Academy of Sciences), Beijing 100049, china 4 State key laboratory of networking and Switching Technology, Beijing University of Posts and Tele-communications, Beijing 100876, china College of computer Science and Technology Beijing University of Technology Beijing China State key laboratory of Integrated Services network Xidian University Xi’an China State key laboratory of information Security Graduate University of Chinese Academy of Sciences Beijing China State key laboratory of networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signatu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Threshold quantum secret sharing between multi-party and multi-party
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第9期51卷 1308-1315页
作者: YANG YuGuang1,2,3 & WEN QiaoYan4 1 College of computer Science and Technology,Beijing University of Technology,Beijing 100124,china 2 State key laboratory of Integrated Services network,Xidian University,Xi’an 710071,china 3 State key laboratory of information Security (Graduate University of Chinese Academy of Sciences),Beijing 100049,china 4 State key laboratory of networking and Switching Technology,Beijing University of Posts and Tele-communications,Beijing 100876,china College of computer Science and Technology Beijing University of Technology Beijing China State key laboratory of Integrated Services network Xidian University Xi’an China State key laboratory of information Security (Graduate University of Chinese Academy of Sciences) Beijing China State key laboratory of networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single photons,which is useful and efficient when the parties of communication are not all present.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论