×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
西安交通大学 [22]
兰州大学 [12]
上海电子信息职业技术... [4]
清华大学 [3]
兰州理工大学 [3]
北京航空航天大学 [3]
更多...
内容类型
期刊论文 [31]
会议论文 [24]
SCI/SSCI论文 [1]
会议 [1]
发表日期
2021 [1]
2020 [1]
2019 [2]
2018 [10]
2017 [3]
2016 [2]
更多...
学科主题
biology;or... [1]
chemistry;... [1]
computer s... [1]
engineerin... [1]
engineerin... [1]
engineerin... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共57条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Security and Efficient Authentication Scheme for Mobile Edge Computing
期刊论文
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2021, 卷号: 44, 期号: 1, 页码: 110-116
作者:
Xue, Jian-Bin
;
Bai, Zi-Mei
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2021/06/03
Authentication
Computer terminals
Cryptography
Edge computing
Mobile telecommunication systems
Security systems
Authentication scheme
Computing environments
Efficient authentication
Lightweight identity authentication protocol
Man in the middle attacks
Mutual authentication
Physical layer security
Symmetric crypto systems
CapsNets algorithm
会议论文
Suzhou, China, March 20, 2020 - March 22, 2020
作者:
Zhang, Ping
;
Wei, Ping
;
Han, SHuhuan
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/11/15
Convolutional neural networks
Deep learning
Formal languages
Intelligent computing
Object detection
Semantics
Computer classification
Detection rates
Hostile environments
Neural network structures
Semantic segmentation
Modeling industry 4.0 based fog computing environments for application analysis and deployment
期刊论文
Future Generation Computer Systems, 2019, 卷号: 91, 页码: 48-60
作者:
Verba, Nandor
;
Chao, Kuo-Ming
;
Lewandowski, Jacek
;
Shah, Nazaraf
;
James, Anne
收藏
  |  
浏览/下载:43/0
  |  
提交时间:2019/11/19
Application deployment
Application modeling
Computing environments
Constraint Satisfaction
Deployed applications
Migration
Model based optimization
Physical environments
Optimising data access latencies of virtual machine placement based on greedy algorithm in datacentre
期刊论文
International Journal of Computational Science and Engineering, 2019, 卷号: 18, 页码: 186-194
作者:
Zhang, Xinyan
;
Li, Keqiu
;
Zhang, Yong
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2019/12/02
Branch and bound method
Cloud computing
Linear programming
Network security
Virtual machine, Access latency
Cloud environments
Datacentre
Greedy algorithms
Virtual machine placements, Computational complexity
Fault-tolerant scheduling for scientific workflow with task replication method in cloud
会议论文
作者:
Li, Zhongjin
;
Yu, Jiacheng
;
Hu, Haiyang
;
Chen, Jie
;
Hu, Hua
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/11/19
Big data applications
Cloud computing environments
Deadline constraint
Distributed computing environment
Fault tolerant scheduling
Fault-tolerant
Fault-tolerant mechanism
Scientific workflows
Research on security outsourcing privacy in cloud environments
会议论文
作者:
Wang, Zhuoyan
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/11/19
Cloud computing environments
Cloud computing technologies
Cloud environments
Computational overheads
Computing resource
Data technologies
Long-term development
Security
Research Progress on Emotional Computation Technology Based on Semantic Analysis
期刊论文
Ruan Jian Xue Bao/Journal of Software, 2018, 卷号: 29, 页码: 2397-2426
作者:
Rao, Yuan
;
Wu, Lian-Wei
;
Wang, Yi-Ming
;
Feng, Cong
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/11/19
Artificial emotions
Artificial intelligence technologies
Crowd emotion
Emotional semantic
Evolutionary computing
Multi-model environments
Problems and challenges
Social communications
A feasibility analysis for edge computing fusion in LPWA IoT environment with SDN structure
会议论文
作者:
Kuo, Chien-Ting
;
Chang, Victor
;
Lei, Chin-Laung
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/11/19
Application fields
Comparative analysis
Computing methods
Feasibility analysis
Internet of Things (IOT)
IOT networks
Low Power
Network environments
Energy-efficient virtual content distribution network provisioning in cloud-based data centers
期刊论文
Future Generation Computer Systems, 2018, 卷号: 83, 页码: 347-357
作者:
Liao, Dan
;
Sun, Gang
;
Yang, Guanghua
;
Chang, Victor
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/11/26
Approximate algorithms
Cloud computing environments
Content distribution networks
Energy reduction
Reduce energy consumption
Service Level Agreement (SLA)
Service Level Agreements
Software component
A new BRB model for security-state assessment of cloud computing based on the impact of external and internal environments
期刊论文
2018, 卷号: 73, 页码: 207-218
作者:
Wei, Hang
;
Hu, Guan-Yu
;
Zhou, Zhi-Jie
;
Qiao, Pei-Li
;
Zhou, Zhi-Guo
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/20
Cloud computing
Security state
Belief rule base (BRB)
Hidden behavior assessment
External and internal environments
©版权所有 ©2017 CSpace - Powered by
CSpace