咨询与建议

限定检索结果

文献类型

  • 43 篇 期刊文献
  • 16 篇 会议

馆藏范围

  • 59 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 57 篇 工学
    • 24 篇 计算机科学与技术...
    • 12 篇 信息与通信工程
    • 12 篇 网络空间安全
    • 11 篇 仪器科学与技术
    • 10 篇 软件工程
    • 7 篇 电子科学与技术(可...
    • 4 篇 机械工程
    • 3 篇 控制科学与工程
    • 1 篇 光学工程
  • 14 篇 管理学
    • 14 篇 管理科学与工程(可...
  • 6 篇 军事学
    • 6 篇 军队指挥学
  • 5 篇 理学
    • 3 篇 物理学
    • 2 篇 数学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 3 篇 threshold
  • 3 篇 quantum
  • 2 篇 xml
  • 2 篇 load-balancing a...
  • 2 篇 signature
  • 2 篇 cryptography
  • 2 篇 heterogeneous cl...
  • 2 篇 cloud computing
  • 2 篇 web services
  • 1 篇 asn.1
  • 1 篇 hierarchical clu...
  • 1 篇 background traff...
  • 1 篇 gradual forgetti...
  • 1 篇 proxy
  • 1 篇 reliability
  • 1 篇 business-driven ...
  • 1 篇 移动智能网
  • 1 篇 ilms
  • 1 篇 single
  • 1 篇 context discreti...

机构

  • 11 篇 北京邮电大学
  • 4 篇 state key labora...
  • 4 篇 state key labora...
  • 3 篇 [a]state key lab...
  • 3 篇 [a] state key la...
  • 3 篇 telecommunicatio...
  • 3 篇 beijing universi...
  • 3 篇 switching techno...
  • 3 篇 china
  • 3 篇 beijing 100876
  • 2 篇 state key labora...
  • 2 篇 state key lab of...
  • 2 篇 college of compu...
  • 1 篇 china mobile inf...
  • 1 篇 1. state key lab...
  • 1 篇 sloan school of ...
  • 1 篇 1. state key lab...
  • 1 篇 信息保障技术重点...
  • 1 篇 information secu...
  • 1 篇 state key labora...

作者

  • 6 篇 china
  • 5 篇 杨义先
  • 4 篇 beijing universi...
  • 3 篇 廖建新
  • 3 篇 钮心忻
  • 3 篇 beijing
  • 2 篇 3 state key labo...
  • 2 篇 4 state key labo...
  • 2 篇 yang yuguang1 2 ...
  • 2 篇 wu naixing liao ...
  • 2 篇 马兆丰
  • 2 篇 shuai zhao
  • 2 篇 马旭涛
  • 2 篇 王励成
  • 2 篇 2 state key labo...
  • 2 篇 beijing 100876
  • 2 篇 朱晓民
  • 1 篇 dalian 116024
  • 1 篇 王连海
  • 1 篇 xu changqiao

语言

  • 46 篇 英文
  • 13 篇 中文
检索条件"作者=4 State Key laboratory of Networking and Switching technology, beij.ng University of Posts and Tele-communications, beij.ng 100876, china"
59 条 记 录,以下是1-10 订阅
排序:
Search recommendation model based on user search behavior and gradual forgetting collaborative filtering strategy
收藏 引用
The Journal of china Universities of posts and telecommunications 2010年 第3期17卷 110-117页
作者: LIU Chuan-chang state key laboratory of networking and switching technology, beij.ng university of posts and telecommunications, beij.ng 100876, china [a] state key laboratory of networking switching technology Beijing University of Posts telecommunications Beijing 100876 China
The existing search engines are lack of the consideration of personalization and display the same search results for different users despite their differences in interesting and purpose. By analyzing user's dynamic s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Threshold quantum secret sharing between multi-party and multi-party
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第9期51卷 1308-1315页
作者: YAng YuGuang1,2,3 & WEN QiaoYan4 1 College of Computer Science and technology,beij.ng university of technology,beij.ng 100124,china 2 state key laboratory of Integrated Services Network,Xidian university,Xi’an 710071,china 3 state key laboratory of Information Security (Graduate university of Chinese Academy of Sciences),beij.ng 100049,china 4 state key laboratory of networking and switching technology,beij.ng university of posts and tele-communications,beij.ng 100876,china College of Computer Science and technology Beijing University of Technology Beijing 100124 China state key laboratory of Integrated Services Network Xidian University Xi’an 710071 China state key laboratory of Information Security (Graduate university of Chinese Academy of Sciences) Beijing 100049 China state key laboratory of networking and switching technology Beijing University of Posts and Telecommunications Beijing 100876 China
A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single photons,which is useful and efficient when the parties of communication are not all present.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Quantum threshold group signature
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第10期51卷 1505-1514页
作者: YAng YuGuang1,2,3 & WEN QiaoYan4 1 College of Computer Science and technology, beij.ng university of technology, beij.ng 100124, china 2 state key laboratory of Integrated Services Network, Xidian university, Xi’an 710071, china 3 state key laboratory of Information Security (Graduate university of Chinese Academy of Sciences), beij.ng 100049, china 4 state key laboratory of networking and switching technology, beij.ng university of posts and tele-communications, beij.ng 100876, china College of Computer Science and technology Beijing University of Technology Beijing 100124 China state key laboratory of Integrated Services Network Xidian University Xi’an 710071 China state key laboratory of Information Security Graduate University of Chinese Academy of Sciences Beijing 100049 China state key laboratory of networking and switching technology Beijing University of Posts and Telecommunications Beijing 100876 China
In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signatu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Threshold proxy quantum signature scheme with threshold shared verification
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第8期51卷 1079-1088页
作者: YAng YuGuang1,3,4 & WEN QiaoYan2 1 College of Computer Science and technology,beij.ng university of technology,beij.ng 100124,china 2 state key laboratory of networking and switching technology,beij.ng university of posts and tele-communications,beij.ng 100876,china 3 state key laboratory of Integrated Services Network,Xidian university,Xi’an 710071,china 4 state key laboratory of Information Security(Graduate university of Chinese Academy of Sciences) ,beij.ng 100049,china 1. College of Computer Science and technology Beijing University of Technology Beijing 100124 China 3. state key laboratory of Integrated Services Network Xidian University Xi’an 710071 China 4. state key laboratory of Information Security (Graduate university of Chinese Academy of Sciences) Beijing 100049 China 2. state key laboratory of networking and switching technology Beijing University of Posts and Telecommunications Beijing 100876 China
A threshold proxy quantum signature scheme with threshold shared verification is proposed. An original signer could authorize a group as its proxy signers. Then only t or more of n persons in the proxy group can gener... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Modified chaotic ant swarm to function optimization
收藏 引用
The Journal of china Universities of posts and telecommunications 2009年 第1期16卷 58-63页
作者: LI Yu-ying , WEN Qiao-yan, LI Li-xiang state key laboratory of networking and switching technology, beij.ng university of posts and telecommunications, beij.ng 100876, china [a]state key laboratory of networking and switching technology beij.ng university of posts and telecommunications beij.ng 100876 china
The chaotic ant swarm algorithm (CAS) is an optimization algorithm based on swarm intelligence theory, and it is inspired by the chaotic and self-organizing behavior of the ants in nature. Based on the analysis of t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Automatic composition of information-providing web services based on query rewriting
收藏 引用
Science china(Information Sciences) 2012年 第11期55卷 2428-2444页
作者: ZHAO WenFeng,LIU ChuanChang & CHEN JunLiang state key laboratory of networking and switching technology,beij.ng university of posts and telecommunications,beij.ng 100876,china 1. state key laboratory of networking and switching technology Beijing University of Posts and Telecommunications Beijing 100876 China
Compared with normal web services,information-providing services have unique features that have seldom been considered in existing research on the automatic composition of web *** this paper,we present a simple,yet we... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Dynamic weighted random load balancing algorithm for SIP application server
收藏 引用
The Journal of china Universities of posts and telecommunications 2009年 第4期16卷 67-70页
作者: TEng Sheng-bo,LIAO Jian-xin,ZHU Xiao-min state key laboratory of networking and switching technology,beij.ng university of posts and telecommunications,beij.ng 100876,china [a]state key laboratory of networking and switching technology beij.ng university of posts and telecommunications beij.ng 100876 china
A new load balancing algorithm named dynamic weighed random (DWR) algorithm for the session initiation protocol (SIP) application server cluster is proposed. It uses weighted hashing random algorithm that supports... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Context-aware end-to-end QoS diagnosis and quantitative guarantee based on Bayesian network
收藏 引用
The Journal of china Universities of posts and telecommunications 2010年 第6期17卷 106-112页
作者: LIN Xiang-tao,CHNEG Bo,CHEN Jun-liang,QIAO Xiu-quan state key laboratory of networking and switching technology,beij.ng university of posts and telecommunications,beij.ng 100876,china [a] state key laboratory of networking switching technology Beijing University of Posts telecommunications Beijing 100876 China
To support quality of service (QoS) management on current Internet working with best effort,we bring forth a systematic approach for end-to-end QoS diagnosis and quantitative guarantee. For QoS diagnosis,we take con... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Relaying strategy for peer-to-peer content distribution based on genetic algorithm
收藏 引用
The Journal of china Universities of posts and telecommunications 2010年 第2期17卷 85-91页
作者: HE Qian ,MEng Xiang-wu,SHAng Yan-lei,CHEN Jun-liang state key laboratory of networking and switching technology,beij.ng university of posts and telecommunications,beij.ng 100876,china [a] state key laboratory of networking switching technology Beijing University of Posts telecommunications Beijing 100876 China
This article proposes a cooperative relaying strategy to efficiently utilize the relaying resources of Interact service providers (ISPs), speedup distribution and save server bandwidth costs. ISPs cooperatively rela... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Detecting feature interactions in Web services with model checking techniques
收藏 引用
The Journal of china Universities of posts and telecommunications 2007年 第3期14卷 108-112页
作者: ZHAng Jian-yin,YAng Fang-chun,SU Sen state key laboratory of networking and switching technology,beij.ng university of posts and telecommunications,beij.ng 100876,china [a]state key laboratory of networking and switching technology beij.ng university of posts and telecommunications beij.ng 100876 china
As a platform-independent software system,a Web service is designed to offer interoperability among diverse and heterogeneous *** the introduction of service composition in the Web service creation,various message int... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论