咨询与建议

限定检索结果

文献类型

  • 2,502 篇 期刊文献
  • 1,018 篇 会议

馆藏范围

  • 3,520 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,765 篇 工学
    • 1,107 篇 计算机科学与技术...
    • 603 篇 软件工程
    • 441 篇 机械工程
    • 348 篇 控制科学与工程
    • 299 篇 仪器科学与技术
    • 250 篇 信息与通信工程
    • 217 篇 电子科学与技术(可...
    • 158 篇 网络空间安全
    • 114 篇 土木工程
    • 102 篇 力学(可授工学、理...
    • 82 篇 建筑学
    • 78 篇 交通运输工程
    • 77 篇 水利工程
    • 65 篇 动力工程及工程热...
    • 64 篇 电气工程
    • 61 篇 材料科学与工程(可...
    • 58 篇 航空宇航科学与技...
    • 55 篇 地质资源与地质工...
    • 39 篇 化学工程与技术
    • 32 篇 光学工程
  • 778 篇 理学
    • 479 篇 数学
    • 141 篇 系统科学
    • 53 篇 物理学
    • 37 篇 生物学
    • 35 篇 统计学(可授理学、...
  • 648 篇 管理学
    • 617 篇 管理科学与工程(可...
  • 87 篇 经济学
    • 86 篇 应用经济学
  • 60 篇 教育学
    • 56 篇 教育学
  • 51 篇 农学
  • 50 篇 医学
  • 45 篇 艺术学
    • 45 篇 设计学(可授艺术学...
  • 36 篇 军事学
    • 36 篇 军队指挥学
  • 10 篇 文学
  • 8 篇 法学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 60 篇 计算机网络
  • 40 篇 并行计算
  • 39 篇 计算机
  • 30 篇 计算
  • 29 篇 遗传算法
  • 29 篇 网格计算
  • 28 篇 simulation
  • 27 篇 算法
  • 27 篇 有限元
  • 27 篇 cloud computing
  • 26 篇 移动计算
  • 26 篇 云计算
  • 24 篇 internet
  • 24 篇 神经网络
  • 23 篇 genetic algorith...
  • 23 篇 分布式计算
  • 23 篇 人工智能
  • 23 篇 数据挖掘
  • 22 篇 数学模型
  • 21 篇 设计

机构

  • 122 篇 上海交通大学
  • 78 篇 清华大学
  • 60 篇 同济大学
  • 50 篇 西北工业大学
  • 44 篇 西安交通大学
  • 40 篇 中国科学院计算技...
  • 39 篇 南京大学
  • 39 篇 北京大学
  • 39 篇 武汉大学
  • 38 篇 安徽大学
  • 37 篇 天津大学
  • 36 篇 华中科技大学
  • 35 篇 浙江大学
  • 33 篇 东北大学
  • 33 篇 中南大学
  • 32 篇 复旦大学
  • 31 篇 国防科技大学
  • 30 篇 中国科技大学
  • 27 篇 中国科学技术大学
  • 27 篇 四川大学

作者

  • 260 篇 china
  • 43 篇 p.r.china
  • 20 篇 beijing
  • 19 篇 wuhan
  • 14 篇 陆鑫达
  • 13 篇 hubei
  • 11 篇 shanghai
  • 11 篇 金先龙
  • 9 篇 wuhan university...
  • 9 篇 尤晋元
  • 9 篇 沈孟育
  • 8 篇 陈国良
  • 8 篇 wuhan university...
  • 8 篇 张耀科
  • 8 篇 张伟
  • 7 篇 江建慧
  • 7 篇 曾广周
  • 7 篇 china)
  • 7 篇 许进
  • 6 篇 赵海

语言

  • 1,884 篇 中文
  • 1,636 篇 英文
检索条件"作者=5.Trusted Computing Laboratory,beijing University of Technology,beijing 100022,china"
3520 条 记 录,以下是1-10 订阅
排序:
Multiparty simultaneous quantum identity authentication with secret sharing
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第3期51卷 321-327页
作者: YANG YuGuang1,2,WEN QiaoYan3 & ZHANG Xing4,5 1 College of Computer Science and technology,beijing university of technology,beijing 100022,china 2 State Key laboratory of Information Security (Graduate university of the Chinese Academy of Sciences),beijing 100049,china 3 School of Science,beijing university of Posts and Telecommunications,beijing 100876,china 4 Institute of Electronic technology,Information Engineering university,Zhengzhou 450004,china 5.trusted computing laboratory,beijing university of technology,beijing 100022,china College of Computer Science technology Beijing University of Technology Beijing 100022 China State Key laboratory of Information Security [Graduate university of the Chinese Academy of Sciences] Beijing 100049 China School of Science Beijing University of Posts Telecommunications Beijing 100876 China Institute of Electronic technology Information Engineering University Zhengzhou 450004 China trusted computing laboratory Beijing University of Technology Beijing 100022 China
Two multiparty simultaneous quantum identity authentication (MSQIA) protocols based on secret sharing are presented. All the users can be authenticated by a trusted third party (TTP) simultaneously. In the first proto... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A new DNA algorithm to solve graph coloring problem
收藏 引用
Progress in Natural Science:Materials International 2007年 第6期17卷 733-738页
作者: Jiang Xingpeng1, Li Yin2, Meng Ya3 and Meng Dazhi2(1. National laboratory of Pattern Recognition,Institute of Automation, Chinese Academy of Sciences, beijing 100080, china 2. College of Applied Sciences, beijing university of technology, beijing 100022, china 3. School of Science, beijing Institute of technology, beijing 100081, china) National laboratory of Pattern Recognition Institute of Automation Chinese Academy of Sciences Beijing 100080 China College of Applied Sciences Beijing University of Technology Beijing 100022 China School of Science Beijing Institute of Technology Beijing 100081 China
Using a small quantity of DNA molecules and little experimental time to solve complex problems successfully is a goal of DNA computing. Some NP-hard problems have been solved by DNA computing with lower time complexit... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Weighted weak type estimates for commutators of the Marcinkiewicz integrals
收藏 引用
Science china Mathematics 2004年 第1期47卷 83-95页
作者: DING Yong, LU Shanzhen & ZHANG PuDepartment of Mathematics, beijing Normal university, beijing 100875, china Department of Information and computing Science, Zhejiang Institute of Science and technology, Hangzhou 310033, china 1. Department of Mathematics Beijing Normal University 100875 Beijing China 2. Department of Information and computing Science Zhejiang Institute of Science and Technology 310033 Hangzhou China
In this paper the authors give the weighted weak LlogL type estimates for a class of the higher order commutator generated by the Marcinkiewicz integral and a BMO function. In addition, the weak type norm inequalities... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
The correspondence between the concepts in description logics for contexts and formal concept analysis
收藏 引用
Science china(Information Sciences) 2012年 第5期55卷 1106-1122页
作者: MA Yue 1,2,SUI YueFei 1 & CAO CunGen 1 1 Key laboratory of Intelligent Information Processing,Institute of computing technology,Chinese Academy of Sciences,beijing 100190,china 2 Graduate university of Chinese Academy of Sciences,beijing,china 1. Key laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China2. Graduate University of Chinese Academy of Sciences Beijing 100049 China
Formal concept analysis (FCA) and description logic (DL) are meant to be formalizations of concepts.A formal concept in the former consists of its intent and extent,where the intent is the set of all the attributes sh... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An introduction to Tsinghua Cloud
收藏 引用
Science china(Information Sciences) 2010年 第7期53卷 1481-1486页
作者: ZHENG WeiMin1,2 1Department of Computer Science and technology, Tsinghua university, beijing 100084, china 2Tsinghua National laboratory for Information Science and technology, beijing 100084, china 1. Department of Computer Science and technology Tsinghua University Beijing 100084 China2. Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China
Cloud computing has become a trend that draws attention from both academia and industry all over the world. This paper unveils details of Tsinghua Cloud, a comprehensive solution for cloud computing developed by Tsing... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Scan chain design for shift power reduction in scan-based testing
收藏 引用
Science china(Information Sciences) 2011年 第4期54卷 767-777页
作者: LI Jia 1,HU Yu 2 & LI XiaoWei 2 1 The School of Software,Tsinghua university,beijing 100084,china 2 The Institute of computing technology,Chinese Academy of Sciences,beijing 100190,china 1. The School of Software Tsinghua University Beijing 100084 China2. The Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
Test power of VLSI systems has become a challenging issue *** scan shift power dominates the average test power and restricts clock frequency of the shift phase,leading to excessive thermal accumulation and long test ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Design of secure operating systems with high security levels
收藏 引用
Science in china(Series F) 2007年 第3期50卷 399-418页
作者: QING SiHan1,2 & SHEN ChangXiang3 1 Institute of Software, Chinese Academy of Sciences, beijing 100080, china 2 School of Software and Microelectronics, Peking university, beijing 102600, china 3 Institute of computing technology, Navy, beijing 100841, china 1. Institute of Software Chinese Academy of Sciences Beijing 100080 China 2. School of Software and Microelectronics Peking University Beijing 102600 China 3. Institute of computing technology Navy Beijing 100841 China
Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national an... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Strict constraints on 2D primitive pairs for engineering symbol recognition:Theory and application
收藏 引用
Science china(Information Sciences) 2012年 第5期55卷 1032-1041页
作者: LI Ting 1,2,QIU XianJie 1,HUANG He 1 & WANG ZhaoQi 1 1 Virtual Reality laboratory,Institute of computing technology Chinese Academy of Sciences,beijing 100190,china 2 Graduate university of Chinese Academy of Sciences,beijing 100049,china 1. Virtual Reality laboratory Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China2. Graduate University of Chinese Academy of Sciences Beijing 100049 China
Geometric constraints on the line-line pair,line-arc pair and arcarc pair are *** con-straints are able to encode the geometric relations between lines,arcs and circles.A geometric proof is presented to demonstrate th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Giant complete automaton for uncertain multiple string matching and its high speed construction algorithm
收藏 引用
Science china(Information Sciences) 2011年 第8期54卷 1562-1571页
作者: HU Yue 1,2, GAO QingShi 1,2 ,GUO Li 2 & WANG PeiFeng 1 1 School of Information Engineering,university of Science and technology beijing,beijing 100083,china 2 Institute of computing technology,Chinese Academy of Sciences,beijing 100190,china 1. School of Information Engineering University of Science and Technology Beijing Beijing 100083 China2. Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
Multiple string matching is often completed under the presence of U- or V-uncertain-strings,or combinations *** large numbers of strings with U-, V-,and U-V-uncertain-strings,including the interleaving of two or more ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Analysis of moment invariants under general linear transformation
收藏 引用
Science china(Information Sciences) 2010年 第7期53卷 1305-1311页
作者: DIAO LuHong1, LI Hua2, ZHANG Sen1 & LIU Lei1 1College of Applied Sciences, beijing university of technology, beijing 100124, china 2National Center of Intelligent computing, Institute of computing technology, Chinese Academy of Science, beijing 100080, china 1. College of Applied Sciences Beijing University of Technology Beijing 100124 China2. National Center of Intelligent Computing Institute of Computing Technology Chinese Academy of Science Beijing 100080 China
This paper presents the necessary and sufficient condition of moment invariants under general linear transformation. Based on this condition, arbitrary order and dimensional moment invariant sets can be constructed. D... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论