咨询与建议

限定检索结果

文献类型

  • 1,999 篇 会议
  • 10 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,013 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,633 篇 工学
    • 1,175 篇 计算机科学与技术...
    • 724 篇 软件工程
    • 330 篇 信息与通信工程
    • 239 篇 机械工程
    • 181 篇 材料科学与工程(可...
    • 179 篇 控制科学与工程
    • 153 篇 电气工程
    • 109 篇 电子科学与技术(可...
    • 95 篇 冶金工程
    • 93 篇 化学工程与技术
    • 80 篇 仪器科学与技术
    • 67 篇 力学(可授工学、理...
    • 57 篇 动力工程及工程热...
    • 55 篇 生物医学工程(可授...
    • 53 篇 生物工程
    • 52 篇 土木工程
    • 49 篇 建筑学
    • 44 篇 光学工程
    • 42 篇 交通运输工程
  • 602 篇 理学
    • 362 篇 数学
    • 171 篇 物理学
    • 100 篇 统计学(可授理学、...
    • 80 篇 化学
    • 69 篇 系统科学
    • 62 篇 生物学
  • 463 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 135 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 55 篇 教育学
    • 53 篇 教育学
  • 53 篇 经济学
    • 53 篇 应用经济学
  • 42 篇 农学
  • 41 篇 法学
  • 39 篇 医学
  • 15 篇 文学
  • 10 篇 军事学
  • 9 篇 艺术学

主题

  • 34 篇 educational inst...
  • 32 篇 cloud computing
  • 26 篇 computational mo...
  • 25 篇 genetic algorith...
  • 22 篇 conferences
  • 22 篇 data mining
  • 22 篇 algorithm design...
  • 21 篇 neural networks
  • 21 篇 feature extracti...
  • 20 篇 deep learning
  • 20 篇 mathematical mod...
  • 19 篇 computer archite...
  • 19 篇 servers
  • 19 篇 network security
  • 19 篇 clustering algor...
  • 18 篇 wireless sensor ...
  • 17 篇 vectors
  • 17 篇 neural network
  • 17 篇 computer vision
  • 17 篇 training

机构

  • 9 篇 3-30-1 wajiro-hi...
  • 8 篇 school of comput...
  • 7 篇 beijing key labo...
  • 6 篇 school of comput...
  • 6 篇 kunming universi...
  • 6 篇 national univers...
  • 6 篇 the islamic univ...
  • 5 篇 school of comput...
  • 5 篇 school of inform...
  • 5 篇 college of infor...
  • 5 篇 school of comput...
  • 5 篇 college of infor...
  • 5 篇 college of infor...
  • 5 篇 beijing universi...
  • 5 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 college of compu...
  • 4 篇 school of mathem...
  • 4 篇 college of infor...
  • 4 篇 institute of inf...

作者

  • 8 篇 barolli leonard
  • 7 篇 piao lin hua
  • 6 篇 ikeda makoto
  • 5 篇 kulla elis
  • 5 篇 liu yang
  • 5 篇 xhafa fatos
  • 5 篇 zhang bao li
  • 5 篇 zhao yang
  • 5 篇 li ying
  • 5 篇 li bo
  • 5 篇 zhang jun
  • 5 篇 zhang wei
  • 4 篇 wan ahmad wan fa...
  • 4 篇 kim ji-hwan
  • 4 篇 liu ying
  • 4 篇 park jeong-sik
  • 4 篇 huang lin na
  • 4 篇 xia yao wen
  • 4 篇 tian anhong
  • 4 篇 mei chuan zhi

语言

  • 1,968 篇 英文
  • 38 篇 中文
  • 7 篇 其他
检索条件"任意字段=2013 3rd International Conference on Computer Science and Network Technology, ICCSNT 2013"
2013 条 记 录,以下是41-50 订阅
排序:
Improving Radix-4 Feedforward Scalable Montgomery Modular Multiplier by Precomputation and Double Booth-Encodings  3
Improving Radix-4 Feedforward Scalable Montgomery Modular Mu...
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Wu, Tao Fudan Microelect Corp Guotai Rd Shanghai 200433 Peoples R China
Hardware implementation of multiprecision modular multiplications in public-key cryptography has led to various developments of scalable Montgomery modular multipliers, which are fast enough constrained from limited h... 详细信息
来源: 评论
The Reaserch on Parameters of Spectral Clustering Based on SVD  3
The Reaserch on Parameters of Spectral Clustering Based on S...
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Jia, Zhixian Xinjiang Univ Finance & Econ Network & Expt Teaching Ctr Urumqi 830012 Peoples R China
The spectral clustering algorithm, which cluster by using the eigenvalues and eigenvectors of Laplacian matrix, may not be obtained the desired clustering results in some cases. It is possible to remedy this deficienc... 详细信息
来源: 评论
network Security Situation Awareness Based on Intercepting the Threat Spread  3
Network Security Situation Awareness Based on Intercepting t...
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Zhou, Bo Zhong, Lin-fei Jiujiang Univ Coll Informat Sci & Technol Jiujiang Jiangxi Peoples R China
To increase the security of network system, we propose a network security situation awareness method based on intercepting the threat spread. This method firstly merges security data from different sensors to get the ... 详细信息
来源: 评论
Reliability Analysis and Improvement of OSEK Automotive network Management  3
Reliability Analysis and Improvement of OSEK Automotive Netw...
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Wang, Yuefei Wu, Xiang Hou, Liang Tang, Zhiqiang Hefei Univ Technol Sch Mech & Automot Engn Hefei Peoples R China
OSEK NM (network Management) is one of the important mechanisms to guarantee the safety of the automotive network and its working reliability has direct effect on the network communication. In order to analyze and imp... 详细信息
来源: 评论
The Modeling Research of Wheat Classification Based on NIR and RBF Neural network  3
The Modeling Research of Wheat Classification Based on NIR a...
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Zheng, Hui Sun, Laijun Hui, Guangyan Mao, Xiaodong Gao, Shang Heilongjiang Univ Harbin Peoples R China
Since the traditional detection method of wheat quality was tedious and time-consuming, near infrared reflectance spectroscopy (NIRS) combined with RBF artificial neural network was used to classification and detectio... 详细信息
来源: 评论
Cooperative network Intrusion Detection System (CNIDS) in Mobile Adhoc network based on DSR Protocol  3
Cooperative Network Intrusion Detection System (CNIDS) in Mo...
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Adhikari, Sougato Setua, S. K. Univ Calcutta Dept Comp Sci & Engn Kolkata India
Mobile ad hoc network (MANET) has become an important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerable to different types of attacks due to the open mediu... 详细信息
来源: 评论
Research and Implementation of A Self-Organizing network Dynamic Timeslot Channel Allocation Mechanism  3
Research and Implementation of A Self-Organizing Network Dyn...
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Geng, Daoqu Chai, Jun Li, Xiaolong Zhao, Liuyang Chongqing Univ Posts & Telecommun Minist Educ Key Lab Ind Wireless Network & Networked Control Chongqing Peoples R China
Aimed at the problem of hiding side and channel interference in wireless sensor network communication, a self-adaptively accessing network mechanism which nodes always choose LQI optimal network to access is proposed.... 详细信息
来源: 评论
Training and Application of Process Neural network Based on Quantum Shuffled Frog Leaping Algorithm  3
Training and Application of Process Neural Network Based on ...
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Liu, Lijie Zhang, Qiang Heilongjiang Bayi Agr Univ Coll Informat Technol Daqing 163319 Peoples R China Northeast Petr Univ Sch Comp & Informat Technol Daqing 163318 Peoples R China
Aiming at the problem that it is difficult for BP algorithm to converge because of more parameters in training of process neural networks based on orthogonal basis expansion, a quantum shuffled frog leaping algorithm ... 详细信息
来源: 评论
Resource Aware Packet Scheduling for Multi-resource In-network Nodes  3
Resource Aware Packet Scheduling for Multi-resource In-netwo...
收藏 引用
3rd international conference on computer science and network technology (iccsnt)
作者: Wang, Chunguang Wu, Qingbo Tan, Yusong Ma, Wenqi Wu, Quanyuan Natl Univ Def Technol Coll Comp Changsha Hunan Peoples R China
network has been widely reported as a bottleneck resource for amounts of data transferring in cloud and big data computing frameworks. In this paper, we focus on the heterogeneous flows problem that various flows cons... 详细信息
来源: 评论
The study of algorithms for Multi-VMs bandwidth guarantee in datacenters  3
The study of algorithms for Multi-VMs bandwidth guarantee in...
收藏 引用
2013 3rd international conference on computer science and network technology, iccsnt 2013
作者: Yue, Zheng-Kun Wu, Qing-Bo Tan, Yu-Song Wang, Chun-Guang Ni., Rong School of Computer National University of Defense Technology Changsha410073 China
With the development of the server virtualization technology and the rapid growth of network applications, datacenters have received significant attention because of its cost-effective and promising for large date sto... 详细信息
来源: 评论