咨询与建议

限定检索结果

文献类型

  • 9 篇 会议
  • 5 篇 期刊文献

馆藏范围

  • 14 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 10 篇 工学
    • 4 篇 计算机科学与技术...
    • 3 篇 仪器科学与技术
    • 2 篇 电气工程
    • 2 篇 信息与通信工程
    • 2 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 建筑学
  • 5 篇 理学
    • 5 篇 数学
    • 1 篇 统计学(可授理学、...
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 1 篇 message modifica...
  • 1 篇 access
  • 1 篇 control
  • 1 篇 communication
  • 1 篇 fractal dust
  • 1 篇 人群仿真
  • 1 篇 k-d tree
  • 1 篇 数据放置
  • 1 篇 线性规划
  • 1 篇 m-tbac
  • 1 篇 exponential smoo...
  • 1 篇 deadlock
  • 1 篇 trust
  • 1 篇 内容感知
  • 1 篇 message dependen...
  • 1 篇 cryptography
  • 1 篇 位置局部性
  • 1 篇 teaching evaluat...
  • 1 篇 signcryption sch...
  • 1 篇 数据中心网络

机构

  • 2 篇 山东省分布式计算...
  • 2 篇 山东师范大学
  • 1 篇 软件新技术与产业...
  • 1 篇 state key lab of...
  • 1 篇 山东省教育招生考...
  • 1 篇 苏州大学
  • 1 篇 江苏省计算机信息...
  • 1 篇 shandong provinc...
  • 1 篇 department of co...
  • 1 篇 school of inform...
  • 1 篇 department of co...

作者

  • 2 篇 陆佃杰
  • 2 篇 2.shandong provi...
  • 2 篇 china
  • 1 篇 zhaoxia shang ho...
  • 1 篇 zhang zhuyu~(1 2...
  • 1 篇 王琛
  • 1 篇 周经亚
  • 1 篇 shandong provinc...
  • 1 篇 张桂娟
  • 1 篇 shandong normal ...
  • 1 篇 shandong provinc...
  • 1 篇 ma hong-wei scho...
  • 1 篇 2 department of ...
  • 1 篇 jiang jianmin 1 ...
  • 1 篇 wang wen 1 2 liu...
  • 1 篇 zhang wenying1 2...
  • 1 篇 2state key lab o...
  • 1 篇 3shandong provin...
  • 1 篇 赵天骐
  • 1 篇 china xue wen-ju...

语言

  • 11 篇 英文
  • 3 篇 中文
检索条件"作者=2.shandong provincial key laboratory for distributed computer software novel technology 3.shandong JianzhuUniversity,Jinan:250001"
14 条 记 录,以下是1-10 订阅
排序:
Application of Fractals in Architectural Shape Design
Application of Fractals in Architectural Shape Design
收藏 引用
2010 IEEE 2nd Symposium on Web Society
作者: WANG Wen 1,2,LIU Hong1,MA Xueqiang 1,3 1.shandong Normal University,jinan:2 50001 2.shandong provincial key laboratory for distributed computer software novel technology 3.shandong jianzhuuniversity,jinan:250001
<正>A computer-aided method for architectural shape design was developed based on fractal *** method is creative,intelligent and *** algorithm applied here generates fractal dust as the data of unorganized *** the i... 详细信息
来源: cnki会议 评论
A new one-bit diFFerence collision attack on HAVAL-128
收藏 引用
Science China(Information Sciences) 2012年 第11期55卷 2521-2529页
作者: ZHANG WenYing1,2,3,LI YanYan1 & WU Lei1 1School of Information Science and Engineering,shandong Normal University,jinan 250014,China 2State key Lab of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China 3shandong provincial key laboratory for novel distributed computer software technology,jinan 250014,China School of Information Science and Engineering Shandong Normal University Jinan China State key Lab of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China shandong provincial key laboratory for novel distributed computer software technology Jinan China
In this paper,we give a new fast attack on *** attack includes many present methods of constructing hash ***,we present a neighborhood *** propose a new difference path different from the previous *** conclusion is th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Teaching Quality Evaluation System based on PSK-means Clustering
A Teaching Quality Evaluation System based on PSK-means Clus...
收藏 引用
2012 International Symposium on Information Technologies in Medicine and Education(ITME2012)
作者: MA Hong-wei School of Information Science and Engineering shandong Normal University shandong provincial key laboratory for distributed computer software novel technology jinan China ZHENG Xiang-wei School of Information Science and Engineering shandong Normal University shandong provincial key laboratory for distributed computer software novel technology jinan China WANG Zhi-hao School of Information Science and Engineering shandong Normal University shandong provincial key laboratory for distributed computer software novel technology jinan China
With the development of Internet,e-learning becomes a new modern teaching *** evaluation is an important part of network teaching system and an important means to improve the teaching ***-means algorithm is used in te... 详细信息
来源: cnki会议 评论
A Signcryption Scheme with Message Link Recovery
A Signcryption Scheme with Message Link Recovery
收藏 引用
2012 International Symposium on Information Technologies in Medicine and Education(ITME2012)
作者: LIU Pei-yu School of Information Science and Engineering shandong provincial key laboratory for distributed computer software novel technology shandong Normal University jinan China XUE Wen-juan School of Information Science and Engineering shandong provincial key laboratory for distributed computer software novel technology shandong Normal University jinan China
For large amount of computation in elliptic curve cryptography,we combined with Message Linkage Recovery Based on Elliptic Curve and proposed a new signcryption scheme with message link recovery by signcryption equati... 详细信息
来源: cnki会议 评论
Multi-Agent Network Security Audit System based on Information Entropy
Multi-Agent Network Security Audit System based on Informati...
收藏 引用
2010 IEEE 2nd Symposium on Web Society
作者: Lü Taoxia~(1,2),Liu Peiyu~(2,1) 1.School of Information Science and Engineering,shandong Normal University,Ji''nan 250014, China 2.shandong provincial key laboratory for distributed computer software novel technology,Ji''nan 250014,China
<正>Because of the confidential and important information contained inside the local area network (LAN) of the companies or government departments, the network interior’s security problem highlights *** the basis...
来源: cnki会议 评论
Trust-Based Service Matching Access Control Model
Trust-Based Service Matching Access Control Model
收藏 引用
2012 National Conference on Information technology and computer Science
作者: Zhang Yongsheng School of Information Science and Engineering,shandong Normal University shandong provincial key laboratory for novel distributed computer software technology Ji''nan 250014,China Li Yuanyuan School of Information Science and Engineering,shandong Normal University shandong provincial key laboratory for novel distributed computer software technology Ji''nan 250014,China Wu Mingfeng School of Information Science and Engineering,shandong Normal University shandong provincial key laboratory for novel distributed computer software technology Ji''nan 250014,China
By the research of Web service architecture,the article puts forward a new trust-based access control model,which is based on service-oriented architecture (SOA) and combines with service *** model puts the trust as... 详细信息
来源: cnki会议 评论
The Research on Portfolio Optimization Model and Strategy for Multiple Objectives
The Research on Portfolio Optimization Model and Strategy fo...
收藏 引用
2010 IEEE 2nd Symposium on Web Society
作者: Zhaoxia Shang,Hong Liu, School of Information Science and Engineering,shandong Normal University, shandong provincial key laboratory for distributed computer software novel technology.250014,China
<正>Application of multi-objective optimization method,the issue of portfolio risk is analyzed and simulated and the feasibility of the scheme is validated under the uncertain investment *** the use of multi-objecti...
来源: cnki会议 评论
Application Research of 3D Collaborative Design System Based on HSF
Application Research of 3D Collaborative Design System Based...
收藏 引用
2010 IEEE 2nd Symposium on Web Society
作者: Chao Men~(1,2),Hong Liu~(1,2) 1 School of Information Science and Engineering,shandong Normal University, jinan shandong 250014,China 2.shandong provincial key laboratory for distributed computer software novel technology, jinan shandong 250014,China
<正>In a collaborative design,especially in an internet- based collaboration,the implement of real-time collaboration is difficult to achieve as a result of many factors such as network bandwidth *** files proposed ...
来源: cnki会议 评论
Fuzzy Value-at-Risk and Fuzzy Conditional Value-at-Risk:Two Risk Measures under Fuzzy Uncertainty
Fuzzy Value-at-Risk and Fuzzy Conditional Value-at-Risk:Two ...
收藏 引用
2010 IEEE 2nd Symposium on Web Society
作者: Zhaoxia Shang,Hong Liu,Xiaoxian Ma,Yanmin Liu *School of Information Science and Engineering,shandong Normal University,shandong provincial key laboratory for distributed computer software novel technology. 250014
<正>This paper deals with two risk management tools and their application on Economical crisis *** points out some problems in their research and application and the direction of research, introduced some concept an...
来源: cnki会议 评论
Research of An Improved Web Visit Statistical Method Applying in User’s Interest Degree
Research of An Improved Web Visit Statistical Method Applyin...
收藏 引用
2010 IEEE 2nd Symposium on Web Society
作者: Zhang Zhuyu~(1,2),Liu Peiyu~(2,1),Zhu Zhenfang~(1,2),Shan Guojie~1 1.School of Information Science and Engineering,shandong Normal University,Ji''nan 250014, China 2.shandong provincial key laboratory for distributed computer software novel technology,Ji''nan 250014,China
<正>To solve the issue that traditional web visit statistical method in hits as the standard expresses the web visit amount inaccurately,both of the existing methods are analyzed,an improved visit statistical method...
来源: cnki会议 评论