工学 >>> 计算机科学技术 >>> 计算机系统结构 >>> 计算机系统设计 并行处理 分布式处理系统 计算机网络 计算机运行测试与性能评价 计算机系统结构其他学科
搜索结果: 151-165 共查到知识库 计算机系统结构相关记录6878条 . 查询时间(0.811 秒)
This paper describes the current state of RUgle, a system for classifying and indexing papers made available on the World Wide Web, in a domain-independent and universal manner. By building RUgle with...
Over the last decade, significant progress has been made in understanding complex biological systems, however there have been few attempts at incorporating this knowledge into nature inspired optimiza...
The Ouroboros Model     Ouroboros Model       2015/7/29
At the core of the Ouroboros Model lies a self-referential recursive process with alternating phases of data acquisition and evaluation. Memory entries are organized in schemata. Activation at a time ...
In this paper, we explore the interplay between network topology and time criticality in a military logistics system. A general goal of this work (and previous work) is to evaluate land transportation...
In this paper, we explore the interplay between network topology and time criticality in a military logistics system. A general goal of this work (and previous work) is to evaluate land transportation...
The study draws empirical evidence from adolescents (aged 10 to 19 years) and young adults (20 to 24 years) who use the Internet in exploring the relationship between two sets of independent variables...
命名数据网络(NDN)允许内容生成者的数据缓存于网络任何位置,这种数据和数据源分离的网内缓存机制导致的结果是以主机为中心的端到端认证数据传输不能用于命名数据网络。目前提出的NDN内容传输机制要求依赖内容分发网络(CDN)或要求数据源始终在线,然而这些要求不适合移动自组织网络环境。针对这一问题,首先基于El Gamal公钥密码体制设计了一种新的Yaksha系统,然后,基于新的Yaksha系统提出了命...
Search frictions can explain why the ìlaw of one priceî fails in retail markets and why even Örms selling commodity products have pricing power. In online commerce, physical search costs a...
We show that boundedly-rational individuals can, simply by tracking sources of gossip, identify those who are most central in a network according to “diffusion centrality,” which nests other s...
高级持续性威胁(APT,advanced persistent threat)已成为高安全等级网络的最主要威胁之一,其极强的针对性、伪装性和阶段性使传统检测技术无法有效识别,因此新型攻击检测技术成为APT攻击防御领域的研究热点。首先,结合典型APT攻击技术和原理,分析攻击的6个实施阶段,并归纳攻击特点;然后,综述现有APT攻击防御框架研究的现状,并分析网络流量异常检测、恶意代码异常检测、社交网络安...
This study investigates the feasibility of deploying wireless communication and embedded computing for structural control applications. A feedback structural control system involves a network of senso...
This study explores decentralized structural control using wireless sensors and controllers.In a decentralized control scheme, control decisions are based upon data acquired from sensors located in th...
Structural sensing, monitoring and control can benefit from wireless communication and embedded computing technologies in terms of installation cost and time. Our prior research has developed low-cost...
射频识别RFID组证明协议作为RFID应用的实例化,对安全性与轻量性的要求较高。根据验证者在协议中的参与方式的不同,分别提出了验证者在线和离线情况下的基于树形模型的轻量级RFID组证明协议OTLP和FLTP。这2个协议能够满足RFID组证明协议的安全性要求,与现有的组证明协议相比,该协议需要较小的计算复杂度,具有较高的效率与可用性。
This paper discusses model reduction for systems in several different classes; in particular time-varying, multidimensional or uncertain systems, and nonlinear systems in the linear-fractional framewo...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...