咨询与建议

限定检索结果

文献类型

  • 9 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 3 篇 仪器科学与技术
    • 2 篇 电气工程
    • 2 篇 信息与通信工程
    • 2 篇 计算机科学与技术...
    • 2 篇 网络空间安全
    • 1 篇 建筑学
  • 4 篇 理学
    • 4 篇 数学
    • 1 篇 统计学(可授理学、...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 1 篇 message modifica...
  • 1 篇 access
  • 1 篇 control
  • 1 篇 communication
  • 1 篇 fractal dust
  • 1 篇 k-d tree
  • 1 篇 m-tbac
  • 1 篇 exponential smoo...
  • 1 篇 deadlock
  • 1 篇 trust
  • 1 篇 message dependen...
  • 1 篇 cryptography
  • 1 篇 teaching evaluat...
  • 1 篇 signcryption sch...
  • 1 篇 fractal
  • 1 篇 e-learning
  • 1 篇 collision
  • 1 篇 electronic evide...
  • 1 篇 architectural sh...
  • 1 篇 matching

机构

  • 1 篇 state key lab of...
  • 1 篇 shandong provinc...
  • 1 篇 department of co...
  • 1 篇 school of inform...
  • 1 篇 department of co...

作者

  • 2 篇 2.shandong provi...
  • 2 篇 china
  • 1 篇 zhaoxia shang ho...
  • 1 篇 zhang zhuyu~(1 2...
  • 1 篇 shandong provinc...
  • 1 篇 shandong normal ...
  • 1 篇 shandong provinc...
  • 1 篇 ma hong-wei scho...
  • 1 篇 2 department of ...
  • 1 篇 jiang jianmin 1 ...
  • 1 篇 wang wen 1 2 liu...
  • 1 篇 zhang wenying1 2...
  • 1 篇 2state key lab o...
  • 1 篇 3shandong provin...
  • 1 篇 china xue wen-ju...
  • 1 篇 china zheng xian...
  • 1 篇 2.shandong provi...
  • 1 篇 liu pei-yu schoo...
  • 1 篇 china wang zhi-h...
  • 1 篇 shandong normal ...

语言

  • 11 篇 英文
检索条件"作者=Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology"
11 条 记 录,以下是1-10 订阅
排序:
A Teaching Quality Evaluation System based on PSK-means Clustering
A Teaching Quality Evaluation System based on PSK-means Clus...
收藏 引用
2012 International Symposium on Information Technologies in Medicine and Education(ITME2012)
作者: MA Hong-wei School of Information Science and Engineering shandong Normal University shandong provincial key laboratory for distributed computer software novel technology Jinan China ZHENG Xiang-wei School of Information Science and Engineering shandong Normal University shandong provincial key laboratory for distributed computer software novel technology Jinan China WANG Zhi-hao School of Information Science and Engineering shandong Normal University shandong provincial key laboratory for distributed computer software novel technology Jinan China
With the development of Internet,e-learning becomes a new modern teaching *** evaluation is an important part of network teaching system and an important means to improve the teaching ***-means algorithm is used in te... 详细信息
来源: cnki会议 评论
A Signcryption Scheme with Message Link Recovery
A Signcryption Scheme with Message Link Recovery
收藏 引用
2012 International Symposium on Information Technologies in Medicine and Education(ITME2012)
作者: LIU Pei-yu School of Information Science and Engineering shandong provincial key laboratory for distributed computer software novel technology shandong Normal University Jinan China XUE Wen-juan School of Information Science and Engineering shandong provincial key laboratory for distributed computer software novel technology shandong Normal University Jinan China
For large amount of computation in elliptic curve cryptography,we combined with Message Linkage Recovery Based on Elliptic Curve and proposed a new signcryption scheme with message link recovery by signcryption equati... 详细信息
来源: cnki会议 评论
The Research on Portfolio Optimization Model and Strategy for Multiple Objectives
The Research on Portfolio Optimization Model and Strategy fo...
收藏 引用
2010 IEEE 2nd Symposium on Web Society
作者: Zhaoxia Shang,Hong Liu, School of Information Science and Engineering,shandong Normal University, shandong provincial key laboratory for distributed computer software novel technology.250014,China
<正>Application of multi-objective optimization method,the issue of portfolio risk is analyzed and simulated and the feasibility of the scheme is validated under the uncertain investment *** the use of multi-objecti...
来源: cnki会议 评论
Multi-Agent Network Security Audit System based on Information Entropy
Multi-Agent Network Security Audit System based on Informati...
收藏 引用
2010 IEEE 2nd Symposium on Web Society
作者: Lü Taoxia~(1,2),Liu Peiyu~(2,1) 1.School of Information Science and Engineering,shandong Normal University,Ji''nan 250014, China 2.shandong provincial key laboratory for distributed computer software novel technology,Ji''nan 250014,China
<正>Because of the confidential and important information contained inside the local area network (LAN) of the companies or government departments, the network interior’s security problem highlights *** the basis...
来源: cnki会议 评论
Fuzzy Value-at-Risk and Fuzzy Conditional Value-at-Risk:Two Risk Measures under Fuzzy Uncertainty
Fuzzy Value-at-Risk and Fuzzy Conditional Value-at-Risk:Two ...
收藏 引用
2010 IEEE 2nd Symposium on Web Society
作者: Zhaoxia Shang,Hong Liu,Xiaoxian Ma,Yanmin Liu *School of Information Science and Engineering,shandong Normal University,shandong provincial key laboratory for distributed computer software novel technology. 250014
<正>This paper deals with two risk management tools and their application on Economical crisis *** points out some problems in their research and application and the direction of research, introduced some concept an...
来源: cnki会议 评论
Application Research of 3D Collaborative Design System Based on HSF
Application Research of 3D Collaborative Design System Based...
收藏 引用
2010 IEEE 2nd Symposium on Web Society
作者: Chao Men~(1,2),Hong Liu~(1,2) 1 School of Information Science and Engineering,shandong Normal University, Jinan shandong 250014,China 2 shandong provincial key laboratory for distributed computer software novel technology, Jinan shandong 250014,China
<正>In a collaborative design,especially in an internet- based collaboration,the implement of real-time collaboration is difficult to achieve as a result of many factors such as network bandwidth *** files proposed ...
来源: cnki会议 评论
Application of Fractals in Architectural Shape Design
Application of Fractals in Architectural Shape Design
收藏 引用
2010 IEEE 2nd Symposium on Web Society
作者: WANG Wen 1,2,LIU Hong1,MA Xueqiang 1,3 1.shandong Normal University,Jinan:2 50001 2.shandong provincial key laboratory for distributed computer software novel technology 3.shandong JianzhuUniversity,Jinan:250001
<正>A computer-aided method for architectural shape design was developed based on fractal *** method is creative,intelligent and *** algorithm applied here generates fractal dust as the data of unorganized *** the i... 详细信息
来源: cnki会议 评论
Research of An Improved Web Visit Statistical Method Applying in User’s Interest Degree
Research of An Improved Web Visit Statistical Method Applyin...
收藏 引用
2010 IEEE 2nd Symposium on Web Society
作者: Zhang Zhuyu~(1,2),Liu Peiyu~(2,1),Zhu Zhenfang~(1,2),Shan Guojie~1 1.School of Information Science and Engineering,shandong Normal University,Ji''nan 250014, China 2.shandong provincial key laboratory for distributed computer software novel technology,Ji''nan 250014,China
<正>To solve the issue that traditional web visit statistical method in hits as the standard expresses the web visit amount inaccurately,both of the existing methods are analyzed,an improved visit statistical method...
来源: cnki会议 评论
A new one-bit diFFerence collision attack on HAVAL-128
收藏 引用
Science China(Information Sciences) 2012年 第11期55卷 2521-2529页
作者: ZHANG WenYing1,2,3,LI YanYan1 & WU Lei1 1School of Information Science and Engineering,shandong Normal University,Jinan 250014,China 2State key Lab of Information Security,Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China 3shandong provincial key laboratory for novel distributed computer software technology,Jinan 250014,China School of Information Science and Engineering Shandong Normal University Jinan China State key Lab of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China shandong provincial key laboratory for novel distributed computer software technology Jinan China
In this paper,we give a new fast attack on *** attack includes many present methods of constructing hash ***,we present a neighborhood *** propose a new difference path different from the previous *** conclusion is th... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Trust-Based Service Matching Access Control Model
Trust-Based Service Matching Access Control Model
收藏 引用
2012 National Conference on Information technology and computer Science
作者: Zhang Yongsheng School of Information Science and Engineering,shandong Normal University shandong provincial key laboratory for novel distributed computer software technology Ji''nan 250014,China Li Yuanyuan School of Information Science and Engineering,shandong Normal University shandong provincial key laboratory for novel distributed computer software technology Ji''nan 250014,China Wu Mingfeng School of Information Science and Engineering,shandong Normal University shandong provincial key laboratory for novel distributed computer software technology Ji''nan 250014,China
By the research of Web service architecture,the article puts forward a new trust-based access control model,which is based on service-oriented architecture (SOA) and combines with service *** model puts the trust as... 详细信息
来源: cnki会议 评论