咨询与建议

限定检索结果

文献类型

  • 2,500 篇 期刊文献
  • 1,018 篇 会议

馆藏范围

  • 3,518 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,763 篇 工学
    • 1,107 篇 计算机科学与技术...
    • 602 篇 软件工程
    • 443 篇 机械工程
    • 348 篇 控制科学与工程
    • 299 篇 仪器科学与技术
    • 250 篇 信息与通信工程
    • 217 篇 电子科学与技术(可...
    • 158 篇 网络空间安全
    • 114 篇 土木工程
    • 102 篇 力学(可授工学、理...
    • 82 篇 建筑学
    • 78 篇 交通运输工程
    • 77 篇 水利工程
    • 65 篇 动力工程及工程热...
    • 64 篇 电气工程
    • 61 篇 材料科学与工程(可...
    • 58 篇 航空宇航科学与技...
    • 54 篇 地质资源与地质工...
    • 39 篇 化学工程与技术
    • 32 篇 光学工程
  • 779 篇 理学
    • 480 篇 数学
    • 141 篇 系统科学
    • 55 篇 物理学
    • 37 篇 生物学
    • 35 篇 统计学(可授理学、...
  • 648 篇 管理学
    • 617 篇 管理科学与工程(可...
  • 87 篇 经济学
    • 86 篇 应用经济学
  • 60 篇 教育学
    • 56 篇 教育学
  • 51 篇 农学
  • 51 篇 医学
  • 45 篇 艺术学
    • 45 篇 设计学(可授艺术学...
  • 36 篇 军事学
    • 36 篇 军队指挥学
  • 10 篇 文学
  • 8 篇 法学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 60 篇 计算机网络
  • 40 篇 并行计算
  • 39 篇 计算机
  • 30 篇 计算
  • 29 篇 遗传算法
  • 29 篇 网格计算
  • 28 篇 simulation
  • 27 篇 算法
  • 27 篇 有限元
  • 27 篇 cloud computing
  • 26 篇 移动计算
  • 26 篇 云计算
  • 24 篇 internet
  • 24 篇 神经网络
  • 23 篇 genetic algorith...
  • 23 篇 分布式计算
  • 23 篇 人工智能
  • 23 篇 数据挖掘
  • 22 篇 数学模型
  • 21 篇 设计

机构

  • 122 篇 上海交通大学
  • 78 篇 清华大学
  • 60 篇 同济大学
  • 50 篇 西北工业大学
  • 44 篇 西安交通大学
  • 40 篇 中国科学院计算技...
  • 40 篇 南京大学
  • 39 篇 北京大学
  • 39 篇 武汉大学
  • 38 篇 安徽大学
  • 37 篇 天津大学
  • 36 篇 华中科技大学
  • 35 篇 浙江大学
  • 33 篇 东北大学
  • 33 篇 复旦大学
  • 33 篇 中南大学
  • 32 篇 国防科技大学
  • 30 篇 中国科技大学
  • 27 篇 中国科学技术大学
  • 27 篇 四川大学

作者

  • 260 篇 china
  • 43 篇 p.r.china
  • 20 篇 beijing
  • 19 篇 wuhan
  • 14 篇 陆鑫达
  • 13 篇 hubei
  • 11 篇 shanghai
  • 11 篇 金先龙
  • 9 篇 wuhan university...
  • 9 篇 尤晋元
  • 9 篇 沈孟育
  • 8 篇 陈国良
  • 8 篇 wuhan university...
  • 8 篇 张耀科
  • 8 篇 张伟
  • 7 篇 江建慧
  • 7 篇 曾广周
  • 7 篇 china)
  • 7 篇 许进
  • 6 篇 赵海

语言

  • 1,881 篇 中文
  • 1,637 篇 英文
检索条件"作者=5 Trusted Computing laboratory,beijing University of technology,beijing 100022,china"
3518 条 记 录,以下是71-80 订阅
排序:
Accountable authority key policy attribute-based encryption
收藏 引用
Science china(Information Sciences) 2012年 第7期55卷 1631-1638页
作者: WANG YongTao 1,2 ,CHEN KeFei 1,3 ,LONG Yu 1,4 & LIU ZhaoHui 2 1 Department of Computer Science and Engineering,Shanghai Jiao Tong university,Shanghai 200240,china 2 china Information technology Security Evaluation Center,beijing 100085,china 3 Shanghai Key laboratory of Scalable computing and Systems,Shanghai Jiao Tong university,Shanghai,200240,china 4 State Key laboratory of Information Security,Graduate School of Chinese Academy of Sciences,100039,china Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China china Information technology Security Evaluation Center Beijing China Shanghai Key laboratory of Scalable computing and Systems Shanghai Jiao Tong University Shanghai China State Key laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing China
We present an accountable authority key policy attribute-based encryption (A-KPABE) *** this paper,we extend Goyal's work to key policy attribute-based encryption *** first generalize the notion of accountable authori... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
The structural analysis of fuzzy measures
收藏 引用
Science china(Information Sciences) 2011年 第1期54卷 38-50页
作者: ZHANG Ling1,ZHANG Bo2 & ZHANG YanPing1 1 Computer Science College,Anhui university,Hefei 230039,china 2State Key Lab of Intelligent technology & Systems Tsinghua National Lab for Information Science & technology Information Science & technology College,Computer Science & technology,Tsinghua university,beijing 100084,china Computer Science College Anhui University Hefei China State Key Lab of Intelligent technology & Systems Tsinghua National Lab for Information Science & technology Information Science & technology College Computer Science & Technology Tsinghua University Beijing China
From quotient space based granular computing theory we explore the fuzzy measures of fuzzy sets. Based on the structural analysis of fuzzy sets,we present an"isotropism"*** this assumption we achieved the following in... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
The New Architecture with Time-Spatial Consistency for 5G Networks
收藏 引用
china Communications 2016年 第1期13卷 68-79页
作者: SUN Zhennian XU Xu CHAI Xiaomeng ZHANG Tianyu TIAN Lin ZHANG Zhongshan beijing Engineering and technology Center for Convergence Networks and Ubiquitous Services University of Science and Technology Beijing (USTB) Beijing China 100083 NEC Laboratories china (NLC) Beijing 100084 China Institute of computing technology Chinese Academy of Sciences Beijing China 100190
While operators have started deploying fourth generation(4G) wireless communication systems,which could provide up to1 Gbps downlink peak data rate,the improved system capacity is still insufficient to meet the drasti... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
STATE SPACE TREE METHOD AND EXACT DECOMPOSITION ALGORITHM FOR FINDING NETWORK OVERALL RELIABILITY
收藏 引用
Journal of Electronics(china) 1990年 第4期7卷 296-305页
作者: 黄汝激 beijing university of Science and technology Beijing
First,the state space tree method for finding communication network overall re-liability is *** directly generates one disjoint tree multilevel polynomial of a *** advantages are smaller computational effort(its compu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Bifurcation of travelling wave solutions for (2+1)-dimension nonlinear dispersive long wave equation
收藏 引用
Applied Mathematics(A Journal of Chinese Universities) 2009年 第3期24卷 291-297页
作者: RONG Ji-hong TANG Sheng-qiang School of Mathematics and computing Science,Guilin university of Electronic technology,Guilin541004,china School of Mathematics and computing Science Guilin University of Electronic Technology Guilin China
In this paper,the bifurcation of solitary,kink,anti-kink,and periodic waves for (2+1)-dimension nonlinear dispersive long wave equation is studied by using the bifurcation theory of planar dynamical *** parameter s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
TWO-DIMENSIONAL SIMULATION OF FLOWS IN PLANE-WALL DIFFUSERS
收藏 引用
Journal of Hydrodynamics 1992年 第4期4卷 43-53页
作者: Yuan Ming-shun Department of Hydraulic Engineering,Tsinghua university,beijing 100084,P.R.china
A numerical model has been developed for computing turbulent flow in plane-wall *** model solves the weakly compressible flow equations with the application of the Smagorinsky's subgrid-scale turbulence model and the ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Approximate Algorithm of Generating Variates with Arbitrary Continuous Statistical Distributions
收藏 引用
Journal of Systems Engineering and Electronics 1996年 第1期7卷 35-42页
作者: Zhang Zhengjun Yang Ziqiang Zhang Chunming&Feng Yuncheng(School of Management, beijing university of Aeronautics&Astronautics, beijing 100083, china) (Institute of Computational Math.& Set. Eng. computing,Academia Sinica, beijing 100080, china) (Dept. o School of Management Beijing University of Aeronautics & Astronautics Beijing 100083 China Institute of Computational Math. & Sci. Eng. computing Academia Sinica Beijing 100080 China Dept. of Statistics University of North Carolina Chapel Hill U.S.A.
This paper discusses an approximate algorithm method which can be used to generate arbitrary non-uniform continuous variates. Percentile calculations of arbitrary continuous distributions are *** addition, the idea Of... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Formal Verification under Unknown Constraints
收藏 引用
Wuhan university Journal of Natural Sciences 2005年 第1期10卷 43-46页
作者: LI Guang-hui 1,2,3 , LI Xiao-wei 2,31. School of Information Engineering, Zhejiang Forestry College, Hangzhou 311300, Zhejiang, china 2. Institute of computing technology, Chinese Academy of Sciences, beijing 100080, china 3. Graduate School of the Chinese Academy of Sciences, beijing 100039, china School of Information Engineering Zhejiang Forestry College Hangzhou Zhejiang China Institute of computing technology Chinese Academy of Sciences Beijing China Graduate School of the Chinese Academy of Sciences Beijing China
We present a formal method of verifying designs with unknown constraints (e.g., black boxes) using Boolean satisfiability (SAT). This method is based on a new encoding scheme of unknown constraints, and solves the cor... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Improved taboo search algorithm for designing DNA sequences
收藏 引用
Progress in Natural Science:Materials International 2008年 第5期18卷 623-627页
作者: Kai Zhang a, Jin Xu a,b, Xiutang Geng a, Jianhua Xiao a, Linqiang Pana, a The Key laboratory of Image Processing and Intelligent Control, Department of Control Science and Engineering, Huazhong university of Science and technology, Wuhan 430074, china b School of Electronic Engineering and Computer Science, Peking university, beijing 100871, china The Key laboratory of Image Processing and Intelligent Control Department of Control Science and Engineering Huazhong University of Science and Technology Wuhan 430074 China School of Electronic Engineering and Computer Science Peking University Beijing 100871 China
The design of DNA sequences is one of the most practical and important research topics in DNA computing. We adopt taboo search algorithm and improve the method for the systematic design of equal-length DNA sequences, ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Multiscale modeling for classification of SAR imagery using hybrid EM algorithm and genetic algorithm
收藏 引用
Progress in Natural Science:Materials International 2009年 第8期19卷 1033-1036页
作者: Xianbin Wen a,b, Hua Zhang a,b, Jianguang Zhang a,b, Xu Jiao a,b, Lei Wang a,b a Tianjin Key laboratory of Intelligence computing and Novel Software technology, Tianjin university of technology, Tianjin 300191, china b Key laboratory of Computer Vision and System (Tianjin university of technology), Ministry of Education, Tianjin 300191, china Tianjin Key laboratory of Intelligence computing and Novel Software technology Tianjin University of Technology Tianjin 300191 China Key laboratory of Computer Vision and System (Tianjin university of technology) Ministry of Education Tianjin 300191 China
A novel method that hybridizes genetic algorithm (GA) and expectation maximization (EM) algorithm for the classification of synthetic aperture radar (SAR) imagery is proposed by the finite Gaussian mixtures model (GMM... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论