咨询与建议

限定检索结果

文献类型

  • 93 篇 期刊文献
  • 84 篇 会议

馆藏范围

  • 177 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 137 篇 工学
    • 58 篇 计算机科学与技术...
    • 42 篇 软件工程
    • 22 篇 机械工程
    • 22 篇 控制科学与工程
    • 17 篇 仪器科学与技术
    • 15 篇 电子科学与技术(可...
    • 14 篇 信息与通信工程
    • 13 篇 网络空间安全
    • 5 篇 航空宇航科学与技...
    • 4 篇 交通运输工程
    • 3 篇 水利工程
    • 3 篇 化学工程与技术
    • 2 篇 光学工程
    • 2 篇 测绘科学与技术
    • 2 篇 农业工程
    • 2 篇 环境科学与工程(可...
  • 33 篇 理学
    • 18 篇 数学
    • 7 篇 系统科学
    • 4 篇 地球物理学
    • 3 篇 物理学
    • 3 篇 生物学
  • 33 篇 管理学
    • 30 篇 管理科学与工程(可...
    • 3 篇 工商管理
  • 10 篇 农学
    • 2 篇 作物学
    • 2 篇 农业资源与环境
    • 2 篇 植物保护
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 教育学
    • 2 篇 教育学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 文学
  • 1 篇 医学
  • 1 篇 艺术学

主题

  • 5 篇 数据库
  • 3 篇 rough set
  • 2 篇 数据仓库
  • 2 篇 nrf905
  • 2 篇 铁路
  • 2 篇 modeling
  • 2 篇 语音识别
  • 2 篇 component
  • 2 篇 可靠性
  • 2 篇 数据清洗
  • 2 篇 response
  • 2 篇 computational
  • 2 篇 数据挖掘
  • 2 篇 ds18b20
  • 2 篇 计算机
  • 2 篇 face recognition
  • 2 篇 计算机网络
  • 2 篇 trust region met...
  • 2 篇 multi-agent syst...
  • 2 篇 unconstrained op...

机构

  • 8 篇 中国科学院计算技...
  • 7 篇 中国科技大学
  • 6 篇 key laboratory o...
  • 5 篇 中国科学院计算技...
  • 4 篇 graduate univers...
  • 3 篇 福州大学
  • 3 篇 中科院计算技术研...
  • 3 篇 中科院计算所智能...
  • 3 篇 中国科学院软件研...
  • 3 篇 institute of com...
  • 3 篇 铁道科学研究院电...
  • 2 篇 福建江夏学院
  • 2 篇 中国科学院网络数...
  • 2 篇 中国科学院高能物...
  • 2 篇 中国铁道科学研究...
  • 2 篇 云南师范大学
  • 1 篇 college of life ...
  • 1 篇 中科院计算技术研...
  • 1 篇 dongguan guangmi...
  • 1 篇 beijing institut...

作者

  • 29 篇 china
  • 11 篇 史忠植
  • 4 篇 何清
  • 4 篇 beijing
  • 3 篇 戴国忠
  • 3 篇 chinese academy ...
  • 3 篇 institute of com...
  • 2 篇 2 graduate unive...
  • 2 篇 廖祥文
  • 2 篇 beijing 100190
  • 2 篇 2.key laboratory...
  • 2 篇 李志平
  • 2 篇 2 key laboratory...
  • 2 篇 程学旗
  • 2 篇 许榕生
  • 2 篇 韦卫
  • 2 篇 魏晶晶
  • 2 篇 王行刚
  • 2 篇 贾自艳
  • 2 篇 李雪莹

语言

  • 126 篇 英文
  • 51 篇 中文
检索条件"作者=3. Key Laboratory of Intelligent Information Processing, institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080,china"
177 条 记 录,以下是11-20 订阅
排序:
Multiparty simultaneous quantum identity authentication with secret sharing
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第3期51卷 321-327页
作者: YANG YuGuang1,2,WEN QiaoYan3.& ZHANG Xing4,5 1 College of Computer Science and technology,beijing University of technology,beijing 100022,china 2 State key laboratory of information Security (Graduate University of the chinese academy of sciences),beijing 100049,china 3.School of Science,beijing University of Posts and Telecommunications,beijing 100876,china 4 institute of Electronic technology,information Engineering University,Zhengzhou 450004,china 5 Trusted computing laboratory,beijing University of technology,beijing 100022,china College of Computer Science and technology Beijing University of Technology Beijing China State key laboratory of information Security (Graduate University of the{3.) Beijing China School of Science Beijing University of Posts and Telecommunications Beijing China institute of Electronic technology Information Engineering University Zhengzhou China Trusted computing laboratory Beijing University of Technology Beijing China
Two multiparty simultaneous quantum identity authentication (MSQIA) protocols based on secret sharing are presented. All the users can be authenticated by a trusted third party (TTP) simultaneously. In the first proto... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
2.5-dimensional angle potential field algorithm for the real-time autonomous navigation of outdoor mobile robots
收藏 引用
Science china(information sciences) 2011年 第10期54卷 2100-2112页
作者: QIU Quan 1,3.& HAN JianDa 2 1 beijing Research Center of intelligent Equipment for Agriculture,beijing 100097,{3. 2 State key laboratory of Robotics,Shenyang institute of Automation,chinese academy of sciences,Shenyang 110016,{3. 3.National Research Center for intelligent Agricultural Equipment,beijing 100097,{3. beijing Research Center of intelligent Equipment for Agriculture Beijing China National Research Center for intelligent Agricultural Equipment Beijing China State key laboratory of Robotics Shenyang Institute of Automation Chinese Academy of Sciences Shenyang China
A new real-time algorithm for the autonomous navigation of mobile robots equipped with laser scanners is proposed in this *** from the existing algorithms designed for 2-dimensional navigation problems,the new algorit... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Analysis of moment invariants under general linear transformation
收藏 引用
Science china(information sciences) 2010年 第7期53卷 1305-1311页
作者: DIAO LuHong1, LI Hua2, ZHANG Sen1 & LIU Lei1 1College of Applied sciences, beijing University of technology, beijing 100124, china 2National Center of intelligent computing, institute of computing technology, chinese academy of Science, beijing 100080, china College of Applied sciences Beijing University of Technology Beijing China National Center of intelligent computing Institute of Computing Technology Chinese Academy of Science Beijing China
This paper presents the necessary and sufficient condition of moment invariants under general linear transformation. Based on this condition, arbitrary order and dimensional moment invariant sets can be constructed. D... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Restarted Conjugate Gradient Method for Ill-posed Problems
收藏 引用
Acta Mathematicae Applicatae Sinica 2003年 第1期19卷 31-40页
作者: Yan-fei Wanglaboratory of Remote Sensing information sciences, {3. of Remote Sensing Applications, chinese academy of sciences, P.O. Box 9718, beijing 100101, chinaState key laboratory of Scientific and Engineering computing, {3. of Computational Mathematics and Scientific/Engineering computing, chinese academy of sciences, P.O. Box 2719,{13., china laboratory of Remote Sensing information sciences Institute of Remote Sensing Applications Chinese Academy of Sciences Beijing China State key laboratory of Scientific and Engineering computing Institute of Computational Mathematics and Scientific/Engineering computing Chinese Academy of Sciences Beijing China
Abstract This paper presents a restarted conjugate gradient iterative algorithm for solving ill-posed problems. The damped Morozov's discrepancy principle is used as a stopping rule. Numerical experiments are given to... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Strict constraints on 2D primitive pairs for engineering symbol recognition:Theory and application
收藏 引用
Science china(information sciences) 2012年 第5期55卷 1032-1041页
作者: LI Ting 1,2,QIU XianJie 1,HUANG He 1 & WANG ZhaoQi 1 1 Virtual Reality laboratory,institute of computing {3. chinese academy of sciences,beijing 100190,china 2 Graduate University of chinese academy of sciences,beijing 100049,china Virtual Reality laboratory Institute of Computing Technology Chinese Academy of Sciences Beijing China Graduate University of chinese academy of sciences Beijing China
Geometric constraints on the line-line pair,line-arc pair and arcarc pair are *** con-straints are able to encode the geometric relations between lines,arcs and circles.A geometric proof is presented to demonstrate th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Paillier's trapdoor function hides Θ(n) bits
收藏 引用
Science china(information sciences) 2011年 第9期54卷 1827-1836页
作者: SU Dong & Lü KeWei State key laboratory of information Security,Graduate University of{3.,beijing 100049,china State key laboratory of information Security Graduate University of Chinese Academy of Sciences Beijing China
In this paper,we re-examine the bit security of Paillier’s trapdoor *** show that given a random w=gcyN mod N2 ∈ZN2* the most significant bit of its class c is a hard-core predicate,under a standard assumption that ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Human knowledge acquisition from 3. interaction in virtual environments
收藏 引用
Science china(information sciences) 2012年 第7期55卷 1528-1540页
作者: CHENG Cheng,JIANG Ru & DONG XueMei beijing laboratory of intelligent {3. technology,School of Computer Science,beijing institute of technology,beijing 100081,china beijing laboratory of intelligent {3. technology School of Computer Science Beijing Institute of Technology Beijing China
Recently,virtual environment (VE) based design and planning,which is a kind of interaction intensive computing,has shown great *** users of such systems are specialists or technicians and their 3. interactions with th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
The Constrained Solutions of Two Matrix Equations
收藏 引用
Acta Mathematica Sinica,English Series 2002年 第4期18卷 671-678页
作者: An Ping LIAO Zhong Zhi BAI Department of Mathematics. Hunan University. Changshu, 410082. P. R. china Department of Mathematics and information Science, Changsha University, Changsha 410003. P. R. china {3. of Mathematics and System. sciences. chinese academy of sciences. beijing 100080. P. R. china State key laboratory of Scientific/Engineering computing. chinese academy of sciences. institute of Computational Mathematics and Scientific/Engineering computing. {3. of Mathematics and System sciences. chinese academy of sciences. P. O. Box 2719. beijing 100080. P. R. china Department of Mathematics Hunan University Changsha P. R. China Department of Mathematics and information sciences Changsha University Changsha P. R. China academy of Mathematics and System sciences Chinese Academy of Sciences Beijing P. R. China State key laboratory of Scientific/Engineering computing Chinese Academy of Sciences Institue of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and System Sciences Chinese Academy of Sciences Beijing P. R. China
We study the symmetric positive semidefinite solution of the matrix equation AX_1A^T + BX_2B^T=C. where A is a given real m×n matrix. B is a given real m×p matrix, and C is a given real m×m matrix, with m, n, p pos... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A NEW FAMILY OF TRUST REGION ALGORITHMS FOR UNCONSTRAINED OPTIMIZATION
收藏 引用
Journal of Computational Mathematics 2003年 第2期21卷 221-228页
作者: Yuhong Dai Dachuan Xu(State key laboratory of Scientific/Engineering computing, {3. of Computational Mathematicsand Scientific/Engineering computing, academy of Mathematics and System sciences, chineseacademy of sciences, P.O. Box 2719, beijing 100080, china) institute of Computational Mathematics and Scientific/Engineering computing Academy of Mathematics and System Sciences Chinese Academy of Sciences State Key Laboratory of Scientific/Engineering Computing 北京 100080
Trust region (TR) algorithms are a class of recently developed algorithms for nonlinear optimization. A new family of TR algorithms for unconstrained optimization, which is the extension of the usual TR method, is pre... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Mechanical decision for a class of integral inequalities
收藏 引用
Science china(information sciences) 2010年 第9期53卷 1800-1815页
作者: YANG Lu1,3.YU WenSheng1,2* & YUAN RuYi2 1Shanghai key laboratory of Trustworthy computing,Software Engineering {3.,East china Normal University,Shanghai 200062,china 2The key laboratory of Complex Systems and Intelligence Science,{3. of Automation,chinese academy of sciences,beijing 100190,china 3.1} for Automated Reasoning and Programming,Chengdu {3. of Computer Applications,chinese academy of sciences,Chengdu 610041,china Shanghai key laboratory of Trustworthy computing Software Engineering Institute East China Normal University Shanghai China laboratory for Automated Reasoning and Programming Chengdu Institute of Computer Applications Chinese Academy of Sciences Chengdu China The key laboratory of Complex Systems and Intelligence Science Institute of Automation Chinese Academy of Sciences Beijing China
A class of integral inequalities is transformed into homogeneous symmetric polynomial inequalities beyond Tarski model,where the number of elements of the polynomial,say n,is also a variable and the coefficients are f... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论