全文获取类型
收费全文 | 51篇 |
免费 | 1篇 |
国内免费 | 5篇 |
专业分类
综合类 | 1篇 |
建筑科学 | 1篇 |
无线电 | 4篇 |
一般工业技术 | 2篇 |
冶金工业 | 5篇 |
自动化技术 | 44篇 |
出版年
2024年 | 1篇 |
2022年 | 1篇 |
2020年 | 1篇 |
2018年 | 1篇 |
2017年 | 2篇 |
2016年 | 2篇 |
2013年 | 3篇 |
2012年 | 3篇 |
2011年 | 2篇 |
2010年 | 2篇 |
2009年 | 1篇 |
2008年 | 4篇 |
2007年 | 3篇 |
2006年 | 4篇 |
2005年 | 6篇 |
2004年 | 4篇 |
2003年 | 2篇 |
2002年 | 2篇 |
2001年 | 1篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1995年 | 1篇 |
1993年 | 1篇 |
1989年 | 2篇 |
1988年 | 1篇 |
1987年 | 1篇 |
1985年 | 1篇 |
1983年 | 1篇 |
1980年 | 1篇 |
1967年 | 1篇 |
排序方式: 共有57条查询结果,搜索用时 15 毫秒
1.
Xin Liao Author Vitae Qiao-yan Wen Author Vitae Author Vitae Jie Zhang Author Vitae 《Journal of Systems and Software》2010,83(10):1801-1804
In this paper, we address the “multi-party covert communication”, a stronger notion of security than standard secure multi-party communication. Multi-party covert communication guarantees that the process of it cannot be observed. We propose a scheme for steganographic communication based on a channel hidden within quantum secret sharing (QSS). According to our knowledge nobody has ever raised the scheme, providing us the motivation for this work. To an outside observer, participants will engage in a typical instance of QSS, just like the others. But when the session is over, covert multi-party communication has already been done. Further analysis shows that the amount of hidden information one can acquire is 0, even if either an outside observer guesses the covert communication is carrying on or a dishonest participant is eavesdropping. 相似文献
2.
In this paper we survey our research on smart meeting rooms and its relevance for augmented reality meeting support and virtual
reality generation of meetings in real time or off-line. The research reported here forms part of the European 5th and 6th
framework programme projects multi-modal meeting manager (M4) and augmented multi-party interaction (AMI). Both projects aim
at building a smart meeting environment that is able to collect multimodal captures of the activities and discussions in a
meeting room, with the aim to use this information as input to tools that allow real-time support, browsing, retrieval and
summarization of meetings. Our aim is to research (semantic) representations of what takes place during meetings in order
to allow generation, e.g. in virtual reality, of meeting activities (discussions, presentations, voting, etc.). Being able
to do so also allows us to look at tools that provide support during a meeting and at tools that allow those not able to be
physically present during a meeting to take part in a virtual way. This may lead to situations where the differences between
real meeting participants, human-controlled virtual participants and (semi-) autonomous virtual participants disappear.
相似文献
Dirk HeylenEmail: |
3.
安全多方计算协议的研究与应用 总被引:5,自引:0,他引:5
This paper introduces the current research status of the muhi-party computation protocols,briefly shows the current four types of multi-party computation protocols and summarizes the research direction. 相似文献
4.
针对可信问题,提出了一种基于安全多方的区块链可审计签名方案。该方案引入了带有时间戳的信任向量,并构建由多维向量组构成的信任矩阵用以定期记录参与者的可信行为,从而为参与者建立一种可信的评估机制,最后将评估结果存储到区块链中作为查证的依据。在确保参与者可信的前提下,通过秘密共享技术构建了安全可信的签名方案。安全分析表明,该方案可以有效减少恶意参与者带来的破坏,可检测参与者的可信度,并可以抵抗移动攻击。性能分析表明,该方案具有较低的计算复杂度和较高的执行效率。 相似文献
5.
Development of a robust two-way real-time speech translationsystem exposes researchers and system developers to various challenges of machine translation(MT) and spoken language dialogues. The need for communicating in at least two differentlanguages poses problems not present for a monolingual spoken language dialogue system,where no MT engine is embedded within the process flow. Integration of various componentmodules for real-time operation poses challenges not present for text translation. In this paper,we present the CCLINC (Common Coalition Language System at Lincoln Laboratory) English–Koreantwo-way speech translation system prototype trained on doctor–patient dialogues,which integrates various techniques to tackle the challenges of automatic real-time speechtranslation. Key features of the system include (i) language–independent meaning representation which preserves the hierarchicalpredicate–argument structure of an input utterance, providing a powerful mechanism for discourse understanding of utterances originating from different languages,word-sense disambiguation and generation of various word orders of many languages, (ii) adoptionof the DARPA Communicator architecture, a plug-and-play distributed system architecturewhich facilitates integration of component modules and system operation in real time, and (iii)automatic acquisition of grammar rules and lexicons for easy porting of the system to differentlanguages and domains. We describe these features in detail and present experimental results. 相似文献
6.
7.
移动互联网的发展对多方会议的信令系统提出更高要求,分布式多方会议系统适合于面向组的各种协同应用,封闭型会议环境下的此类应用尤为复杂。文章基于扩展SIP协议,设计和实现了一种适合于封闭型环境的分布式多方会议信令系统,并验证其良好的性能。 相似文献
8.
Candace L. Sidner 《Computational Intelligence》1985,1(1):1-10
In a discourse the hearer must recognize the response intended by the speaker. To perform this recognition, the hearer must ascertain what plans the speaker is undertaking and how the utterances in the discourse further that plan. To do so, the hearer can parse the initial intentions (recoverable from the utterance) and recognize the plans the speaker has in mind and intends the hearer to know about. This paper reports on a theory of parsing the intentions in discourse. It also discusses the role of another aspect of discourse, discourse markers, that are valuable to intended response recognition. 相似文献
9.
基于假设推理(abduction-based)的推测计算(speculative computation)是在资源信息不能及时到达时,利用缺省假设进行计算的过程.在计算过程中,如果应答和信念不一致,则主Agent将修正它的信念.为了实现目标,在有限时间内使推测计算的结果更精确,主Agent要通过协商获得尽可能多的实际信息,协商是降低决策风险的主要途径.在介绍假设推理和推测计算的基本原理的基础上,提出了基于时间约束的推测计算扩展框架、基于时间约束的进一步协商框架和基于信念修正的协商算法,并将进一步协商框架和协商算法嵌入到推测计算的过程中,在协商过程中赋予主Agent更强的信念修正能力.最后,在货物运输领域的实验中,证实了基于信念修正的推测计算的有效性. 相似文献
10.
张国荣 《数字社区&智能家居》2006,(8)
隐私保护是数据挖掘中一个重要的研究方向,如何在不违反隐私规定的情况下,利用数据挖掘工具发现有意义的知识是一个热点问题。本文介绍了分布式数据挖掘中隐私保护的现状,着重介绍分布式数据挖掘中隐私保护问题和技术。 相似文献