咨询与建议

限定检索结果

文献类型

  • 101 篇 期刊文献
  • 44 篇 会议

馆藏范围

  • 145 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 122 篇 工学
    • 56 篇 计算机科学与技术...
    • 25 篇 网络空间安全
    • 23 篇 信息与通信工程
    • 19 篇 仪器科学与技术
    • 19 篇 软件工程
    • 14 篇 机械工程
    • 13 篇 电子科学与技术(可...
    • 9 篇 控制科学与工程
    • 4 篇 测绘科学与技术
    • 4 篇 地质资源与地质工...
    • 3 篇 光学工程
    • 3 篇 电气工程
    • 2 篇 农业工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 交通运输工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 核科学与技术
    • 1 篇 安全科学与工程
  • 30 篇 管理学
    • 30 篇 管理科学与工程(可...
  • 20 篇 理学
    • 9 篇 数学
    • 4 篇 物理学
    • 4 篇 地理学
    • 4 篇 系统科学
  • 8 篇 教育学
    • 7 篇 教育学
    • 1 篇 体育学
  • 3 篇 军事学
    • 3 篇 军队指挥学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 2 篇 农学
    • 1 篇 作物学
  • 2 篇 艺术学
    • 2 篇 设计学(可授艺术学...
  • 1 篇 医学

主题

  • 11 篇 计算机网络
  • 4 篇 internet
  • 4 篇 cryptography
  • 4 篇 网络安全
  • 4 篇 quantum
  • 4 篇 web
  • 3 篇 xml
  • 3 篇 wap网关
  • 3 篇 无线网络
  • 3 篇 体系结构
  • 3 篇 threshold
  • 2 篇 通信协议
  • 2 篇 地理信息系统
  • 2 篇 认证
  • 2 篇 service
  • 2 篇 cims
  • 2 篇 fault tolerance
  • 2 篇 图像取证
  • 2 篇 资源预留
  • 2 篇 网络

机构

  • 22 篇 东南大学
  • 13 篇 西安电子科技大学
  • 5 篇 武警工程学院
  • 4 篇 college of compu...
  • 3 篇 教育部计算机网络...
  • 3 篇 state key labora...
  • 3 篇 state key labora...
  • 3 篇 state key labora...
  • 2 篇 ministry of educ...
  • 2 篇 教育部计算机网络...
  • 2 篇 华南理工大学
  • 2 篇 陕西师范大学
  • 2 篇 山西大学
  • 2 篇 中南大学
  • 1 篇 南京邮电学院
  • 1 篇 福建师范大学
  • 1 篇 shaanxi key labo...
  • 1 篇 school of electr...
  • 1 篇 常州技术师范学院
  • 1 篇 department of co...

作者

  • 15 篇 china
  • 14 篇 顾冠群
  • 5 篇 马建峰
  • 4 篇 杨晓元
  • 3 篇 沈军
  • 3 篇 赵阿群
  • 3 篇 吴国新
  • 3 篇 杨鹏
  • 2 篇 3 state key labo...
  • 2 篇 王汝传
  • 2 篇 许勇
  • 2 篇 潘峰
  • 2 篇 4 state key labo...
  • 2 篇 hefei
  • 2 篇 yang yuguang1 2 ...
  • 2 篇 罗军舟
  • 2 篇 ministry of educ...
  • 2 篇 瞿裕忠
  • 2 篇 李晖
  • 2 篇 杜庆伟

语言

  • 73 篇 中文
  • 72 篇 英文
检索条件"作者=2.Key Laboratory of computer Network and Information Integration , Ministry of Education, nanjing 2.0096, china"
145 条 记 录,以下是1-10 订阅
排序:
Restrictive mechanism of flow control among non-cooperative Internet users
收藏 引用
Science china(information Sciences) 2011年 第1期54卷 12-22页
作者: TAO Jun1,2,ZHONG Xiao1,2 & LU YiFei1,2 1key laboratory of computer network and information integration,Southeast University, ministry of education,nanjing 2.0096,china 2School of computer Science and Engineering,Southeast University,nanjing 2.0096,china key laboratory of computer network and information integration Southeast University Ministry of Education Nanjing China School of computer Science and Engineering Southeast University Nanjing China
The flow and congestion control methods based on one-shot game model with non-cooperative game theory can explain the non-cooperative behavior of Internet ***,the low effciency of equilibrium solutions affects their *... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Heuristic for no-wait flow shops with makespan minimization based on total idle-time increments
收藏 引用
Science in china(Series F) 2008年 第7期51卷 896-909页
作者: LI XiaoPing1,2 & WU Cheng3 1 School of computer Science & Engineering, Southeast University, nanjing 2.0096, china 2.key laboratory of computer network and information integration (Southeast University), ministry of education, nanjing 2.0096, china 3 Department of Automation, Tsinghua University, Beijing 100084, china School of computer Science & Engineering Southeast University Nanjing China key laboratory of computer network and information integration (Southeast University) Ministry of Education Nanjing China Department of Automation Tsinghua University Beijing China
No-wait flow shops with makespan minimization are classified as NP-hard. In this paper, the optimization objective is equivalently transformed to total idle-time minimization. The independence relationship between tas... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Non-blocking message total ordering protocol
收藏 引用
Science in china(Series F) 2008年 第12期51卷 1919-1934页
作者: WANG Yun & WANG JunLing School of computer Science & Engineering, Southeast University key Lab of computer network & information integration, MOE, nanjing 2.0096, china School of computer Science & Engineering Southeast University key Lab of computer network & information integration MOE Nanjing China
Message total ordering is a critical part in active replication in order to maintain consistency among members in a fault tolerant group. The paper proposes a non-blocking message total ordering protocol (NBTOP) for... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
基于粒子群优化的ad hoc网络最小能耗多播路由算法
收藏 引用
通信学报 2012年 第3期33卷 52-58页
作者: 朱晓建 沈军 东南大学计算机科学与工程学院 江苏南京211189 东南大学计算机网络和信息集成教育部重点实验室 江苏南京211189
在无线ad hoc网络中,设备使用电池提供能量,随着多播应用日益广泛,如何构造最小能耗多播树是一个重要问题。针对选择不同的中继节点集对构造最小能耗多播树的影响,提出了一种优化最小能耗多播树构造的离散粒子群算法。为了避免离散粒子... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Fair Non-Repudiation for Web Services Transactions
收藏 引用
Wuhan University Journal of Natural Sciences 2010年 第5期15卷 385-392页
作者: SU Ruidan,FU Shaofeng,ZHOU Lihua key laboratory of computer network and information Security of the ministry of education,Xidian University,Xi’an 710071,Shaanxi,china key laboratory of computer network and information Security of the ministry of education Xidian University Xi’an Shaanxi China
To safeguard the interests of transacting parties,non-repudiation mechanisms need to assure fairness and *** non-repudiation service currently implemented usually does not consider the requirement of fairness and the ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Evolutionary cryptography theory based generating method for a secure Koblitz elliptic curve and its improvement by a hidden Markov models
收藏 引用
Science china(information Sciences) 2012年 第4期55卷 911-920页
作者: WANG Chao 1,ZHANG HuanGuo 2,3 & LIU LiLi 4 1 key Lab of Specialty Fiber Optics and Optical Access network,ministry of education,Shanghai University,Shanghai 200072,china 2 computer School of Wuhan University,Wuhan 430072,china 3 key laboratory of Aerospace information Security and Trusted Computing ministry of education,Wuhan 430072,china 4 Huawei Technologies CO.LTD.,Shanghai 201206,china key Lab of Specialty Fiber Optics and Optical Access network Ministry of Education Shanghai University Shanghai China computer School of Wuhan University Wuhan China key laboratory of Aerospace information Security and Trusted Computing ministry of education Wuhan China Huawei Technologies CO. LTD. Shanghai China
Considering potential attacks from cloud-computing and quantum-computing,it is becoming nec-essary to provide higher security elliptic *** hidden Markov models are introduced for designing the trace-vector computation... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Quantum threshold group signature
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第10期51卷 1505-1514页
作者: YANG YuGuang1,2,3 & WEN QiaoYan4 1 College of computer Science and Technology, Beijing University of Technology, Beijing 100124, china 2 State key laboratory of Integrated Services network, Xidian University, Xi’an 710071, china 3 State key laboratory of information Security (Graduate University of Chinese Academy of Sciences), Beijing 100049, china 4 State key laboratory of networking and Switching Technology, Beijing University of Posts and Tele-communications, Beijing 100876, china College of computer Science and Technology Beijing University of Technology Beijing China State key laboratory of Integrated Services network Xidian University Xi’an China State key laboratory of information Security Graduate University of Chinese Academy of Sciences Beijing China State key laboratory of networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signatu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Threshold quantum secret sharing between multi-party and multi-party
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第9期51卷 1308-1315页
作者: YANG YuGuang1,2,3 & WEN QiaoYan4 1 College of computer Science and Technology,Beijing University of Technology,Beijing 100124,china 2 State key laboratory of Integrated Services network,Xidian University,Xi’an 710071,china 3 State key laboratory of information Security (Graduate University of Chinese Academy of Sciences),Beijing 100049,china 4 State key laboratory of networking and Switching Technology,Beijing University of Posts and Tele-communications,Beijing 100876,china College of computer Science and Technology Beijing University of Technology Beijing China State key laboratory of Integrated Services network Xidian University Xi’an China State key laboratory of information Security (Graduate University of Chinese Academy of Sciences) Beijing China State key laboratory of networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single photons,which is useful and efficient when the parties of communication are not all present.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Threshold proxy quantum signature scheme with threshold shared verification
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第8期51卷 1079-1088页
作者: YANG YuGuang1,3,4 & WEN QiaoYan2 1 College of computer Science and Technology,Beijing University of Technology,Beijing 100124,china 2 State key laboratory of networking and Switching Technology,Beijing University of Posts and Tele-communications,Beijing 100876,china 3 State key laboratory of Integrated Services network,Xidian University,Xi’an 710071,china 4 State key laboratory of information Security(Graduate University of Chinese Academy of Sciences) ,Beijing 100049,china College of computer Science and Technology Beijing University of Technology Beijing China State key laboratory of Integrated Services network Xidian University Xi’an China State key laboratory of information Security (Graduate University of Chinese Academy of Sciences) Beijing China State key laboratory of networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
A threshold proxy quantum signature scheme with threshold shared verification is proposed. An original signer could authorize a group as its proxy signers. Then only t or more of n persons in the proxy group can gener... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Research on heart sound identification technology
收藏 引用
Science china(information Sciences) 2012年 第2期55卷 281-292页
作者: CHENG XieFeng1,3,MA Yong2,LIU Chen1,ZHANG XueJun1 & GUO YuFeng11School of Electronic Science and Engineering,nanjing University of Posts and Telecommunications,nanjing 210003,china 2School of computer Science and Technology,nanjing University of Science and Technology,nanjing 210094,china 3key Lab of Broudbard Wireless Communication and Sensor network Technology(nanjing University of Posts and Telecommunications),ministry of education,nanjing 210094,china School of Electronic Science and Engineering Nanjing University of Posts and Telecommunications Nanjing China ministry of education Key Lab of Broudbard Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications) Nanjing China School of computer Science and Technology Nanjing University of Science and Technology Nanjing China
In this article,both the basic principles and the experimental methods of identity recognition technology based on heart sounds are ***,the characteristics of heart sounds and the feasibility of heart sounds as a biom... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论