×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
安徽大学 [25]
内容类型
期刊论文 [25]
发表日期
2017 [25]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共25条,第1-10条
帮助
限定条件
发表日期:2017
专题:安徽大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Reconstructing complex networks without time series.
期刊论文
Phys Rev E, 2017, 卷号: Vol.96 No.2
作者:
Lai,Ying-Cheng
;
Ma,Chuang
;
Zhang,Hai-Feng
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/04/22
SYSTEMS
EVENTS
Near-optimal dynamic priority scheduling strategy for instance-intensive business workflows in cloud computing
期刊论文
Concurrency and Computation: Practice and Experience, 2017, 卷号: Vol.29 No.18, 页码: e4167
作者:
Wang,Yeguo
;
Xie,Ying
;
Yuan,Dong
;
Xu,Rongbin
;
Yang,Yun
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/04/22
INDEPENDENT TASKS
ALGORITHMS
SYSTEMS
TIME
ENVIRONMENT
PROCESSORS
Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage
期刊论文
Information Sciences, 2017, 卷号: Vol.375, 页码: 48-53
作者:
He,Debiao
;
Zhang,Jianhong
;
Wang,Huaqun
;
Wang,Lina
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/04/22
CHECKING
A secure and efficient identity-based mutual authentication scheme with smart card using elliptic curve cryptography
期刊论文
International Journal of Communication Systems, 2017, 卷号: Vol.30 No.16, 页码: e3333
作者:
He,Debiao
;
Zhang,Yunru
;
Luo,Min
;
Khan,Muhammad Khurram
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/04/22
KEY AGREEMENT SCHEME
WIRELESS SENSOR NETWORKS
PROTOCOL
ENVIRONMENT
BIOMETRICS
DESIGN
A Novel Dynamic Checkpoint Selection Strategy for Time-Constrained Massive Cloud Business Workflows
期刊论文
2017 IEEE 21ST INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2017, 页码: 97-102
作者:
Wang,Yeguo
;
Xie,Ying
;
Yuan,Dong
;
Xu,Rongbin
;
Li,Li
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/04/22
Cloud
Computing
Business
Workflow
Dynamic
Checkpoint
Selection
Temporal
Violation
Parallel
Processes
RGB-D Saliency Detection Based on Integration Feature of Color and Depth Saliency Map
期刊论文
JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2017, 卷号: Vol.39 No.9, 页码: 2148-2154
作者:
Wu Jianguo
;
Shao Ting
;
Liu Zhengyi
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/04/22
Salient
object
detection
Depth
saliency
map
Multi-layer
center
rectangle
Manifold
ranking
Photographic
composition
prior
Background
prior
Improving link prediction in complex networks by adaptively exploiting multiple structural features of networks
期刊论文
Physics Letters A, 2017, 卷号: Vol.381 No.39, 页码: 3369-3376
作者:
Ma,Chuang
;
Zhang,Hai-Feng
;
Bao,Zhong-Kui
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/04/22
WORLD NETWORKS
YEAST
Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography
期刊论文
Wireless Communications and Mobile Computing, 2017, 卷号: Vol.2017
作者:
He,Debiao
;
Liu,Qin
;
Zeadally,Sherali
;
Wang,Huaqun
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/04/22
ADVANCED METERING INFRASTRUCTURE
TO-MACHINE COMMUNICATIONS
SCALABLE KEY MANAGEMENT
AUTHENTICATION SCHEME
Cooperative Query Answer Authentication Scheme Over Anonymous Sensing Data
期刊论文
IEEE Access, 2017, 卷号: Vol.5, 页码: 3216-3227
作者:
Wang,Liangmin
;
Zhong,Hong
;
Xie,Qingqing
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/04/22
THRESHOLD RING SIGNATURE
NON-REPUDIATION PROTOCOL
K-ANONYMITY
CLOUD DATA
PRIVACY
SEARCH
MODEL
Privacy-preserving certificateless provable data possession scheme for big data storage on cloud
期刊论文
Applied Mathematics and Computation, 2017, 卷号: Vol.314, 页码: 31-43
作者:
He,Debiao
;
Choo,Kim-Kwang Raymond
;
Kumar,Neeraj
;
Wang,Huaqun
;
Wang,Lina
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/04/22
DATA INTEGRITY
AUTHENTICATION
ENVIRONMENT
CHECKING
PROTOCOL
©版权所有 ©2017 CSpace - Powered by
CSpace