咨询与建议

限定检索结果

文献类型

  • 2,502 篇 期刊文献
  • 1,018 篇 会议

馆藏范围

  • 3,520 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,765 篇 工学
    • 1,107 篇 计算机科学与技术...
    • 603 篇 软件工程
    • 441 篇 机械工程
    • 348 篇 控制科学与工程
    • 299 篇 仪器科学与技术
    • 250 篇 信息与通信工程
    • 217 篇 电子科学与技术(可...
    • 158 篇 网络空间安全
    • 114 篇 土木工程
    • 102 篇 力学(可授工学、理...
    • 82 篇 建筑学
    • 78 篇 交通运输工程
    • 77 篇 水利工程
    • 65 篇 动力工程及工程热...
    • 64 篇 电气工程
    • 61 篇 材料科学与工程(可...
    • 58 篇 航空宇航科学与技...
    • 55 篇 地质资源与地质工...
    • 39 篇 化学工程与技术
    • 32 篇 光学工程
  • 778 篇 理学
    • 479 篇 数学
    • 141 篇 系统科学
    • 53 篇 物理学
    • 37 篇 生物学
    • 35 篇 统计学(可授理学、...
  • 648 篇 管理学
    • 617 篇 管理科学与工程(可...
  • 87 篇 经济学
    • 86 篇 应用经济学
  • 60 篇 教育学
    • 56 篇 教育学
  • 51 篇 农学
  • 50 篇 医学
  • 45 篇 艺术学
    • 45 篇 设计学(可授艺术学...
  • 36 篇 军事学
    • 36 篇 军队指挥学
  • 10 篇 文学
  • 8 篇 法学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 60 篇 计算机网络
  • 40 篇 并行计算
  • 39 篇 计算机
  • 30 篇 计算
  • 29 篇 遗传算法
  • 29 篇 网格计算
  • 28 篇 simulation
  • 27 篇 算法
  • 27 篇 有限元
  • 27 篇 cloud computing
  • 26 篇 移动计算
  • 26 篇 云计算
  • 24 篇 internet
  • 24 篇 神经网络
  • 23 篇 genetic algorith...
  • 23 篇 分布式计算
  • 23 篇 人工智能
  • 23 篇 数据挖掘
  • 22 篇 数学模型
  • 21 篇 设计

机构

  • 122 篇 上海交通大学
  • 78 篇 清华大学
  • 60 篇 同济大学
  • 50 篇 西北工业大学
  • 44 篇 西安交通大学
  • 40 篇 中国科学院计算技...
  • 39 篇 南京大学
  • 39 篇 北京大学
  • 39 篇 武汉大学
  • 38 篇 安徽大学
  • 37 篇 天津大学
  • 36 篇 华中科技大学
  • 35 篇 浙江大学
  • 33 篇 东北大学
  • 33 篇 中南大学
  • 32 篇 复旦大学
  • 31 篇 国防科技大学
  • 30 篇 中国科技大学
  • 27 篇 中国科学技术大学
  • 27 篇 四川大学

作者

  • 260 篇 china
  • 43 篇 p.r.china
  • 20 篇 beijing
  • 19 篇 wuhan
  • 14 篇 陆鑫达
  • 13 篇 hubei
  • 11 篇 shanghai
  • 11 篇 金先龙
  • 9 篇 wuhan university...
  • 9 篇 尤晋元
  • 9 篇 沈孟育
  • 8 篇 陈国良
  • 8 篇 wuhan university...
  • 8 篇 张耀科
  • 8 篇 张伟
  • 7 篇 江建慧
  • 7 篇 曾广周
  • 7 篇 china)
  • 7 篇 许进
  • 6 篇 赵海

语言

  • 1,884 篇 中文
  • 1,636 篇 英文
检索条件"作者=5 Trusted Computing Laboratory,Beijing university of technology,Beijing 100022,China"
3520 条 记 录,以下是81-90 订阅
排序:
Markov Skeleton Processes and Applications to Queueing Systems
收藏 引用
Acta Mathematicae Applicatae Sinica 2002年 第4期18卷 537-552页
作者: Zhen-ting HouSchool of Mathematical Sciences and computing technology, Central South university. Changsha 410075, china School of Mathematical Sciences and computing technology Central South University Changsha 410075 China
In this paper, we apply the backward equations of Markov skeleton processes to qucueing systems. The transient distribution of the waiting time of a GI/G/1 queueing system, the transient distribution of the length of ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
SENSITIVITY ANALYSIS IN BILEVEL LINEARPROGRAMMING
收藏 引用
Systems Science and Mathematical Sciences 1998年 第4期11卷 359-366页
作者: JIA Fuchen(School of Mathematics, Statistics and computing, university Of Greenwich London, SE18 6PF, U.K.)YANG Fengmei(Department of Applied Mathematics and Physics, beijing university Of Chemical technology,beijing 100027, china)WANG Shouyang(Institute
In this paper, we study sensitivity analysis of bilevel linear programming. Twocases of the leader’s objective function and the right-hand side of the constraints includingparameters are discussed separately. We pres... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Extended multivariate public key cryptosystems with secure encryption function
收藏 引用
Science china(Information Sciences) 2011年 第6期54卷 1161-1171页
作者: WANG HouZhen 1,2 , ZHANG HuanGuo 1,2 , WANG ZhangYi 1,2 & TANG Ming 1,2 1 The Key laboratory of Aerospace Information Security and trusted computing, Ministry of Education, School of Computer, Wuhan university, Wuhan 430079, china 2 State Key laboratory of Software Engineering, Wuhan university, Wuhan 430072, china 1. The Key laboratory of Aerospace Information Security and trusted computing Ministry of Education School of Computer Wuhan University Wuhan 430079 China2. State Key Laboratory of Software Engineering Wuhan University Wuhan 430072 China
Advances in quantum computers pose great threats on the currently used public key cryptographic algorithms such as RSA and ECC. As a promising candidate secure against attackers equipped with quantum computational pow... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Remote Attestation-Based Access Control on trusted computing Platform
收藏 引用
Wuhan university Journal of Natural Sciences 2010年 第3期15卷 190-194页
作者: LIU Xian'gang ZHANG Xing FU Yingfang SHEN Changxiang Institute of Computer Science and technology Beijing University of Technology Beijing 100022 China
Existing remote attestation schemes based on trusted computing have some merits on enhancing security assurance level, but they usually do not integrate tightly with the classical system security mechanism. In this pa... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Many-Knot Spline Interpolating Curves and Their Applications in Font Design
收藏 引用
Computer Aided Drafting,Design and Manufacturing 1999年 第1期9卷 1-8页
作者: Yan Weiqi Qi Dongxu(CAD laboratory, Institute of computing technology. Academic Sinica. beijing.P.R.china 100080 CAD Research Center. North china university of technology, beijing.P.R.china,100041)
Many-knot spline interpolating is a class of curves and surfaces fitting method presentedin 1974. Many-knot spline interpolating curves are suitable to computer aided geometric design anddata points interpolation. In ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Oblique derivative problems for nonlinear elliptic systems with measurable coefficients
收藏 引用
Communications in Nonlinear Science and Numerical Simulation 2001年 第2期6卷 93-96页
作者: Guochun WEN and Zuoliang XU Department of Mathematics, Peking university, beijing 100871, china Institute of Computational Mathematics and Scientific/Engineering computing, Chinese Academy of Sciences, beijing 100080, china Department of Mathematics Peking University Beijing 100871 China Institute of Computational Mathematics and Scientific/Engineen:ng computing Chinese Academy of Sciences Beijing 100080 China
An oblique derivative boundary value Problem for nonlinear nondivergent elliptic systems with measurable coefficients in a multiply connected domain is considered. Firstly, we give a priori estimates of solutions for ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
2-LEVEL FORMAL SEMANTICS AND SEMANTICS-DIRECTED COMPILATION
收藏 引用
Science in china,Ser.A 1985年 第9期28卷 991-1001页
作者: 唐稚松 郑茂松 李新 Institute of computing technology Academia Silica beijing Northeast university Xi’an
This paper proposes a method to formalize semantics. It makes the formal semantics more harmonious with compilation. This method is established on the basis of a temporal logic language, which is, on the one hand, a l... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Thermodynamic Analysis of Desulfurization and Its Connection With Deoxidation and Temperature for SPHC in JISC During LF Refining Process
收藏 引用
Journal of Iron and Steel Research International 2011年 第S2期18卷 135-140页
作者: GUO Jing1, CHENG Zi-jian1,2, CHENG Shu-sen1, CHENG Ze-wei1, ZOU Ming2, MA Ming-sheng2 (1. State Key laboratory of Advanced Metallurgy, university of Science and technology of beijing, beijing 100083, china 2. china’s Hongxing Stock Company of Jiugang,Jiugang 735000,Gansu,china) Univ Sci & Technol beijing State Key Lab Adv Met Beijing 100083 Peoples R China chinas Hongxing Stock Co Jiugang Jiugang 735000 Gansu Peoples R China
The thermodynamic characteristics of desulfurization reaction (CaO)+[S]=(CaS)+[O] is analyzed based on the detailed composition of liquid steel and slag of Steel Plate Hot Commercial (SPHC) in Jiuquan Iron & Steel Cor... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
computing rarity on uncertain data
收藏 引用
Science china(Information Sciences) 2011年 第10期54卷 2028-2039页
作者: JIN CheQing,ZHOU MinQi & ZHOU AoYing Shanghai Key laboratory of Trustworthy computing,Software Engineering Institute,East china Normal university,Shanghai 200062,china 1. Shanghai Key laboratory of Trustworthy computing Software Engineering Institute East China Normal University Shanghai 200062 China
The essence of uncertain data management has been well adopted since data uncertainty widely exists in lots of applications,such as Web,sensor networks,*** of the uncertain data models are based on the possible world ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A New Process and Framework for Direct Anonymous Attestation Based on Symmetric Bilinear Maps
收藏 引用
Wuhan university Journal of Natural Sciences 2011年 第5期16卷 369-375页
作者: TAN Liang1,2, ZHOU Mingtian3 1. College of Computer/Key Lab of Visualization in Scientific computing and Virtual Reality of Sichuan, Sichuan Normal university, Chengdu 610066, Sichuan, china 2. Institute of computing technology, Chinese Academy of Sciences, beijing 100190, china 3. School of Computer Science and Engineering, university of Electronic Science and technology of china, Chengdu 610054, Sichuan, china College of Computer/Key Lab of Visualization in Scientific computing and Virtual Reality of Sichuan Sichuan Normal University Chengdu Sichuan China Institute of computing technology Chinese Academy of Sciences Beijing China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu Sichuan China
For the problem of the original direct anonymous attestation (DAA) scheme's complexity and great time consumption, a new DAA scheme based on symmetric bilinear pairings is presented, which gives a practical solutio... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论