咨询与建议

限定检索结果

文献类型

  • 4,813 篇 期刊文献
  • 2,994 篇 会议

馆藏范围

  • 7,807 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,703 篇 工学
    • 1,493 篇 计算机科学与技术...
    • 1,038 篇 控制科学与工程
    • 810 篇 软件工程
    • 798 篇 机械工程
    • 790 篇 仪器科学与技术
    • 785 篇 网络空间安全
    • 776 篇 信息与通信工程
    • 691 篇 电子科学与技术(可...
    • 199 篇 材料科学与工程(可...
    • 188 篇 电气工程
    • 171 篇 航空宇航科学与技...
    • 146 篇 光学工程
    • 138 篇 地质资源与地质工...
    • 105 篇 测绘科学与技术
    • 103 篇 化学工程与技术
    • 96 篇 农业工程
  • 1,999 篇 理学
    • 733 篇 数学
    • 588 篇 系统科学
    • 251 篇 物理学
    • 129 篇 生物学
    • 101 篇 大气科学
  • 1,357 篇 管理学
    • 1,023 篇 管理科学与工程(可...
    • 119 篇 图书情报与档案管...
    • 114 篇 工商管理
    • 113 篇 公共管理
  • 329 篇 经济学
    • 310 篇 应用经济学
  • 299 篇 农学
    • 123 篇 农业资源与环境
    • 89 篇 作物学
  • 212 篇 军事学
    • 194 篇 军队指挥学
  • 206 篇 医学
    • 102 篇 临床医学
  • 149 篇 法学
  • 127 篇 教育学
  • 82 篇 艺术学
  • 57 篇 文学
  • 18 篇 历史学
  • 15 篇 哲学

主题

  • 62 篇 网络安全
  • 54 篇 中国
  • 53 篇 internet
  • 45 篇 model
  • 41 篇 信息安全
  • 40 篇 simulation
  • 39 篇 数字签名
  • 38 篇 genetic algorith...
  • 34 篇 安全性
  • 34 篇 adaptive control
  • 33 篇 gis
  • 31 篇 计算机网络
  • 30 篇 电子商务
  • 29 篇 fault diagnosis
  • 28 篇 设计
  • 27 篇 linear matrix in...
  • 25 篇 analysis
  • 25 篇 support vector m...
  • 25 篇 optimization
  • 25 篇 information

机构

  • 171 篇 国防科技大学
  • 102 篇 西安电子科技大学
  • 94 篇 上海交通大学
  • 80 篇 武汉大学
  • 68 篇 北京邮电大学
  • 44 篇 四川大学
  • 41 篇 清华大学
  • 40 篇 南京大学
  • 37 篇 北京大学
  • 35 篇 山东大学
  • 33 篇 西北工业大学
  • 33 篇 中南大学
  • 32 篇 信息工程大学
  • 30 篇 东南大学
  • 29 篇 浙江大学
  • 29 篇 中国科学院大学
  • 28 篇 华中科技大学
  • 27 篇 同济大学
  • 26 篇 解放军信息工程大...
  • 25 篇 中国科学技术大学

作者

  • 530 篇 china
  • 78 篇 p.r.china
  • 53 篇 beijing
  • 33 篇 杨义先
  • 27 篇 china)
  • 21 篇 p. r. china
  • 20 篇 tsinghua univers...
  • 17 篇 shanghai
  • 17 篇 zhejiang univers...
  • 16 篇 wuhan
  • 15 篇 肖国镇
  • 14 篇 huazhong univers...
  • 14 篇 hangzhou
  • 13 篇 胡正名
  • 13 篇 吴玲达
  • 13 篇 hubei
  • 13 篇 李建华
  • 13 篇 钮心忻
  • 13 篇 china agricultur...
  • 12 篇 beijing 100083

语言

  • 5,386 篇 英文
  • 2,421 篇 中文
检索条件"作者=2School of national information security, Nanjing University, Nanjing 210093, china"
7807 条 记 录,以下是1-10 订阅
排序:
Asymmetric encryption and signature method with DNA technology
收藏 引用
Science china(information Sciences) 2010年 第3期53卷 506-514页
作者: LAI XueJia1, LU MingXin2, QIN Lei3, HAN JunSong4 & FANG XiWen11Department of Computer Science & Engineering, Shanghai Jiao Tong university, Shanghai 200030, china 2school of national information security, nanjing university, nanjing 210093, china 3BIOCOMPLEX, 4915 Bathurst St. Unit# 209-366, ON M2R 1X9, Canada 4national Engineering Center for BioChip at Shanghai, Shanghai 201203, china 1. Department of Computer Science & Engineering Shanghai Jiao Tong University Shanghai 200030 China2. School of National Information Security Nanjing University Nanjing 210093 China3. BIOCOMPLEX 4915 Bathurst St. Unit# 209-366 Toronto ON M2R 1X9 Canada4. National Engineering Center for BioChip at Shanghai Shanghai 201203 China
This paper proposes DNA-PKC, an asymmetric encryption and signature cryptosystem by combining the technologies of genetic engineering and cryptology. It is an exploratory research of biological cryptology. Similar to ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Basin filling algorithm for the circular packing problem with equilibrium behavioral constraints
收藏 引用
Science china(information Sciences) 2010年 第5期53卷 885-895页
作者: LIU JingFa1& LI Gang2 1school of Computer and Software, nanjing university of information Science & Technology, nanjing 210044, china 2school of Mathematics and Physics, nanjing university of information Science & Technology, nanjing 210044, china 1. school of Computer and Software Nanjing University of Information Science & Technology Nanjing 210044 China2. School of Mathematics and Physics Nanjing University of Information Science & Technology Nanjing 210044 China
With the background of the satellite module layout design, the circular packing problem with equilibrium behavioral constraints is a layout optimization problem and NP-hard problem in math. For lack of a powerful opti... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
SOME RESULTS ON GENERALIZED DIFFERENCE SETS
收藏 引用
Journal of Systems Science & Complexity 2008年 第1期21卷 76-84页
作者: Xiwang CAO school of Mathematical Science, nanjing university of Aeronautics and Astronautics, nanjing 210016, china State Key Lab. of information security, Beijing 100049, china. school of Mathematical Science Nanjing University of Aeronautics Astronautics Nanjing 210016 China State Key Lab. of information security Beijing 100049 China
Sequences with ideal correlation functions have important applications in communications such as CDMA, FDMA, etc. It has been shown that difference sets can be used to construct such sequences. The author extends Pott... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A new heuristic algorithm for the circular packing problem with equilibrium constraints
收藏 引用
Science china(information Sciences) 2011年 第8期54卷 1572-1584页
作者: LIU JingFa 1,2,LI Gang 3 & GENG HuanTong 1 1 school of Computer and Software,nanjing university of information Science & Technology,nanjing 210044,china 2 Network information Center,nanjing university of information Science & Technology, nanjing 210044,china 3 school of Mathematics and Physics,nanjing university of information Science & Technology,nanjing 210044,china 1. school of Computer and Software Nanjing University of Information Science & Technology Nanjing 210044 China2. Network Information Center Nanjing University of Information Science & Technology Nanjing 210044 China3. School of Mathematics and Physics Nanjing University of Information Science & Technology Nanjing 210044 China
The circular packing problem with equilibrium constraints is an optimization problem about simplified satellite module layout design.A heuristic algorithm based on tabu search is put forward for solving this *** algor... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
MMSE relay precoding schemes based on quantization error compensation for multi-relay system
收藏 引用
Science china(information Sciences) 2010年 第12期53卷 2548-2556页
作者: LI Ting 1,2 & YANG LuXi 2 1 College of Communication and information Engineering,nanjing university of Posts and Telecommunications,nanjing 210003,china 2 school of information Science and Engineering,Southeast university,nanjing 210096,china 1. College of Communication and information Engineering Nanjing University of Posts and Telecommunications Nanjing 210003 China2. School of Information Science and Engineering Southeast University Nanjing 210096 China
In order to deal with the performance degradation resulting from the quantization error,this paper introduces the statistics of Grassmannian codebook's quantization error into relay precoding design for multirelay ***... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Comparing logic coverage criteria on test case prioritization
收藏 引用
Science china(information Sciences) 2012年 第12期55卷 2826-2840页
作者: FANG ChunRong 1,2,CHEN ZhenYu 1,2 & XU BaoWen 1 1 State Key Laboratory for Novel Software Technology,nanjing university,nanjing 210093,china 2 Software Institute,nanjing university,nanjing 210093,china 1. State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China2. Software Institute Nanjing University Nanjing 210093 China
Logic coverage criteria have been widely used in the testing of safety-critical *** the past few years,fault-based logic coverage criteria have been studied intensively both in theory and in ***,there is a lack of aut... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Restrictive mechanism of flow control among non-cooperative Internet users
收藏 引用
Science china(information Sciences) 2011年 第1期54卷 12-22页
作者: TAO Jun1,2,ZHONG Xiao1,2 & LU YiFei1,2 1Key Laboratory of Computer Network and information Integration,Southeast university, Ministry of Education,nanjing 210096,china 2school of Computer Science and Engineering,Southeast university,nanjing 210096,china 1. Key Laboratory of Computer Network and information Integration Southeast University Ministry of Education Nanjing 210096 China2. School of Computer Science and Engineering Southeast University Nanjing 210096 China
The flow and congestion control methods based on one-shot game model with non-cooperative game theory can explain the non-cooperative behavior of Internet ***,the low effciency of equilibrium solutions affects their *... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Exploiting remote learners in Internet environment with agents
收藏 引用
Science china(information Sciences) 2010年 第1期53卷 64-76页
作者: LI Ming, WANG Wei & ZHOU ZhiHua national Key Laboratory for Novel Software Technology, nanjing university, nanjing 210093, china 1. national Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China
Data in the Internet are scattered on different sites indeliberately, and accumulated and updated frequently but not synchronously. It is infeasible to collect all the data together to train a global learner for predi... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Performance analysis of variable-power adaptive modulation in space-time block coded MIMO diversity systems
收藏 引用
Science china(information Sciences) 2010年 第10期53卷 2106-2115页
作者: YU XiangBin 1,2 & SHI HuiBin 1 1 College of information Science and Technology, nanjing university of Aeronautics and Astronautics, nanjing 210016, china 2 national Mobile Communications Research Laboratory, Southeast university, nanjing 210096, china 1. College of information Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing 210016 China2. National Mobile Communications Research Laboratory Southeast University Nanjing 210096 China
In this paper, the performance analysis of multi-antenna MIMO systems with variable-power (VP) adaptive modulation and space-time coding is presented. The fading gain value is partitioned into a number of regions by w... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Selection of unitary operations in quantum secret sharing without entanglement
收藏 引用
Science china(information Sciences) 2011年 第9期54卷 1837-1842页
作者: XU Juan 1,CHEN HanWu 1,LIU WenJie 1,2 & LIU ZhiHao 1 1 school of Computer Science and Engineering,Southeast university,nanjing 210096,china 2 school of Computer and Software,nanjing university of information Science and Technology,nanjing 210044,china 1. school of Computer Science and Engineering Southeast University Nanjing 210096 China2. School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China
We propose a substitute-Bell-state attack strategy for quantum secret sharing schemes without entanglement,as well as a definition of the minimum failure probability of such attack strategy.A quantitative analysis of ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论