×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州大学 [2]
湖南大学 [2]
清华大学 [1]
兰州理工大学 [1]
西安交通大学 [1]
北京航空航天大学 [1]
更多...
内容类型
期刊论文 [6]
会议论文 [4]
发表日期
2018 [2]
2017 [1]
2016 [3]
2015 [2]
2011 [1]
2010 [1]
更多...
学科主题
computer a... [1]
telecommun... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共10条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Constructing hierarchical spatiotemporal information for action recognition
会议论文
Guangzhou, China, October 7, 2018 - October 11, 2018
作者:
Yao, Guangle
;
Zhong, Jiandan
;
Lei, Tao
;
Liu, Xianyuan
收藏
  |  
浏览/下载:41/0
  |  
提交时间:2019/08/23
Big data
Convolution
Indexing (of information)
Network security
Neural networks
Optical flows
Security systems
Smart city
Trusted computing
SecTube: SGX-based trusted transmission system
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, 卷号: 10699 LNCS, 页码: 231-238
作者:
Chen, J.
;
Dai, B.
;
Wang, Y.
;
Yao, Y.
;
Li, B.
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/30
Transmissions
Trusted computing
Application platforms
Computing paradigm
Design and implementations
Execution environments
Security software
Security technology
Transmission systems
Trusted communications
Cryptography
Service Mining for Trusted Service Composition in Cross-Cloud Environment
期刊论文
IEEE Systems Journal, 2017, 卷号: Vol.11 No.1, 页码: 283-294
作者:
Wu, Taotao
;
Dou, Wanchun
;
Hu, Chunhua
;
Chen, Jinjun
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/31
Quality of service
Measurement
Mobile communication
Mobile handsets
Wireless sensor networks
Servers
Educational institutions
trusted service composition
Cross-cloud
cyber-physical systems (CPS)
service mining
Dependable Traffic Control Strategies for Urban and Freeway Networks
会议论文
作者:
Wan, Kaiyu
;
Nhat Nguyen
;
Alagar, Vangalur
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/02
Intelligent ramp meter
Intelligent roadside unit
Context-awareness
Traffic supervisory network
Autonomic computing principles
Trusted communication
Intersection control
Urban traffic control
Cyber-physical systems
HTTPAS: active authentication against HTTPS man-in-the-middle attacks
期刊论文
IET COMMUNICATIONS, 2016, 卷号: 10, 页码: 2308-2314
作者:
Zhou, Peng[1]
;
Gu, Xiaojing[2]
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2019/04/26
transport protocols
hypermedia
cryptographic protocols
Internet
HTTPAS
active authentication architecture
HTTPS man-in-the-middle attacks
hypertext transfer protocol secure
pre-trusted certificate authorities
CAs
notary-based systems
pre-shared secrets
openSSL suite
Internet path diversity
Understanding graph-based trust evaluation in online social networks: Methodologies and challenges
期刊论文
ACM Computing Surveys, 2016, 卷号: Vol.49 No.1
作者:
Jiang, W.
;
Wang, G.
;
Bhuiyan, M.Z.A.
;
Wu, J.
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/31
A.1
[introductory
and
survey]
Analogy
C.2.4
[computer-communication
networks]:
distributed
systems
Design
Management
Online
social
networks
(OSNs)
Reliability
Simplification
Trust
evaluation
Trust
models
Trusted
graph
Personalized Activity Recognition Using Molecular Complex Detection Clustering
会议论文
11th IEEE International Conference on Ubiquitous Intelligence and Computing and 11th IEEE International Conference on Autonomic and Trusted Computing and 14th IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014, Denpasar, Bali, Indonesia, December 9, 2014 - December 12, 2014
作者:
Zhong, Jun
;
Liu, Li
;
Wei, Ye
;
Luo, Dashi
;
Sun, Letain
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/01/18
Ubiquitous computing
Accelerometers
Complex networks
Complexation
Data handling
Mobile devices
Pattern recognition
Trusted computing
Activity recognition
Human activity recognition
MCODE
Molecular complexes
Personalizations
Self-management systems
Sensor technologies
Triaxial accelerometer
Improving the Architecture of an Autoencoder for Dimension Reduction
会议论文
11th IEEE International Conference on Ubiquitous Intelligence and Computing and 11th IEEE International Conference on Autonomic and Trusted Computing and 14th IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014, Denpasar, Bali, Indonesia, December 9, 2014 - December 12, 2014
作者:
Hu, Changjie
;
Hou, Xiaoli
;
Lu, Yonggang
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2017/01/18
Network architecture
Clustering algorithms
Image reconstruction
Learning systems
Neural networks
Principal component analysis
Stochastic systems
Trusted computing
Ubiquitous computing
Auto encoders
Curse of dimensionality
Deep learning
Dimension reduction
High dimensional data
Locally linear embedding
Principal components analysis
Stochastic neighbor embedding
An efficient and provably secure multi-path Distance Vector Routing
期刊论文
Journal of Computational Information Systems, 2011, 卷号: 7, 期号: 5, 页码: 1638-1647
作者:
Guo, Xian
;
Feng, Tao
;
Yuan, Zhanting
;
Ma, Jianfeng
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2020/11/14
Ad hoc networks
Algorithms
Mobile ad hoc networks
Mobile telecommunication systems
Routing protocols
Acknowledgement mechanism
Ad hoc on demand distance vector
Digital Signature
Distance vector routing
Error checks
Mathematical method
Mobile ad hoc
Multi-path
Multiple-path
Network configuration
Node-disjoint paths
Provably secure
Secure routing
Security requirements
Trusted systems
Framework for secure authentication of nodes in peer-to-peer network
期刊论文
2010, 2010
Zhou Zhou
;
Huang Yongfeng
;
Li Xing
收藏
  |  
浏览/下载:3/0
©版权所有 ©2017 CSpace - Powered by
CSpace