咨询与建议

限定检索结果

文献类型

  • 1,033 篇 会议
  • 1,002 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,042 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,309 篇 工学
    • 854 篇 计算机科学与技术...
    • 658 篇 软件工程
    • 343 篇 信息与通信工程
    • 171 篇 电气工程
    • 138 篇 电子科学与技术(可...
    • 137 篇 控制科学与工程
    • 95 篇 生物工程
    • 84 篇 机械工程
    • 74 篇 核科学与技术
    • 73 篇 光学工程
    • 71 篇 网络空间安全
    • 63 篇 生物医学工程(可授...
    • 59 篇 动力工程及工程热...
    • 58 篇 仪器科学与技术
    • 53 篇 化学工程与技术
    • 51 篇 交通运输工程
    • 45 篇 安全科学与工程
  • 711 篇 理学
    • 303 篇 物理学
    • 293 篇 数学
    • 116 篇 生物学
    • 89 篇 统计学(可授理学、...
    • 54 篇 化学
    • 44 篇 系统科学
  • 346 篇 管理学
    • 213 篇 管理科学与工程(可...
    • 143 篇 图书情报与档案管...
    • 76 篇 工商管理
  • 80 篇 医学
    • 61 篇 临床医学
    • 45 篇 基础医学(可授医学...
  • 52 篇 法学
    • 29 篇 社会学
  • 28 篇 经济学
    • 28 篇 应用经济学
  • 17 篇 军事学
  • 13 篇 教育学
  • 13 篇 农学
  • 4 篇 文学
  • 3 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 69 篇 computer network...
  • 56 篇 semantics
  • 48 篇 feature extracti...
  • 44 篇 accuracy
  • 38 篇 computational mo...
  • 35 篇 federated learni...
  • 34 篇 robustness
  • 33 篇 protocols
  • 32 篇 training
  • 28 篇 computer science
  • 28 篇 w & z bosons
  • 28 篇 deep learning
  • 27 篇 bandwidth
  • 27 篇 security
  • 25 篇 internet
  • 24 篇 wireless communi...
  • 24 篇 higgs bosons
  • 24 篇 wireless sensor ...
  • 23 篇 predictive model...

机构

  • 148 篇 centro brasileir...
  • 148 篇 istanbul technic...
  • 147 篇 national and kap...
  • 147 篇 yerevan physics ...
  • 146 篇 university of sp...
  • 145 篇 universidad iber...
  • 144 篇 brunel universit...
  • 144 篇 academy of scien...
  • 143 篇 indian institute...
  • 143 篇 charles universi...
  • 141 篇 department of ph...
  • 140 篇 university of de...
  • 138 篇 imperial college...
  • 138 篇 rwth aachen univ...
  • 137 篇 università di to...
  • 137 篇 indian institute...
  • 134 篇 infn sezione di ...
  • 132 篇 institute for nu...
  • 130 篇 zhejiang univers...
  • 130 篇 centro de invest...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 1,778 篇 英文
  • 226 篇 其他
  • 40 篇 中文
检索条件"机构=Computer Network Engineering Technology Center"
2042 条 记 录,以下是1701-1710 订阅
排序:
Evaluation of web caching consistency
Evaluation of web caching consistency
收藏 引用
作者: Liu, Hai Chen, Maobian Department of Computer Engineering and Technology Guangdong Institute of Science and Technology Zhuhai Guangdong 519090 China Network Center Guangzhou Productivity Promotion Center Guangzhou 510030 China
with the fact of rapid development of the World Wide Web, the web usage has imposed a heavy load on the network and server infrastructure, and significant delays are not uncommon. To mitigate the effects of these incr... 详细信息
来源: 评论
Attribute-Based Signature with Policy-and-Endorsement Mechanism
收藏 引用
Journal of computer Science & technology 2010年 第6期25卷 1293-1304页
作者: 王怀习 朱岩 冯荣权 Stephen S.Yau LMAM School of Mathematical SciencesPeking University Electronic Engineering Institute Institute of Computer Science and Technology Peking University Key Laboratory of Network and Software Security Assurance (Peking University) Ministry of Education Information Assurance Center and School of Computing Informatics and Decision Systems Engineering Arizona State University
In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based *** signature provides a policy-and-endorsement ***... 详细信息
来源: 评论
Optimization of probabilistic neural networks based on center neighbor
Optimization of probabilistic neural networks based on cente...
收藏 引用
International Conference on E-Business and E-Government
作者: Liu, Lianzhong Li, Chunfang Qian, Lipu Key Laboratory of Beijing Network Technology School of Computer Science and Engineering Beihang University Beijing China Network Center Heibei Institute of Physical Education Beihang University Beijing China Network Center Heibei Institute of Physical Education Shijiazhuang China
Probabilistic Neural networks (PNN) learn quickly from examples in one pass and asymptotically achieve the Bayes-optimal decision boundaries. The major disadvantage of PNN is that it requires one node or neuron for ea... 详细信息
来源: 评论
The research of information security risk assessment method based on fault tree
The research of information security risk assessment method ...
收藏 引用
作者: Tao, Huang Xiao Liang, Cai Chi, Wu Qun, Huang Li Network and Computer Center Huazhong University of Science and Technology Wuhan China School of Software Engineering Huazhong University of Science and Technology Wuhan China
Fault tree technology has been broadly used in the industry system but seldom used in the field of risk assessment for information system. In this study, by consulting the standard of BS7799, the fault tree technology... 详细信息
来源: 评论
An algorithm of decision tree construction based on attribute support degree
An algorithm of decision tree construction based on attribut...
收藏 引用
2010 International Conference on Educational and Information technology, ICEIT 2010
作者: Lin, Qing Ding, Zongzhuan Yong, Jianping Zhou, Jun School of Computer Science and Telecommunications Engineering Jiangsu University Zhenjiang Jiangsu China School of Computer Science and Technology Nanjing University of Science and Technology Nanjing China Network Center Zhenjiang College Zhenjiang Jiangsu China
Decision tree algorithms are widely used in data mining and classification systems, because of theirs faster speed, higher accuracy and easier structures. The key to constructing a good decision tree lies in the reaso... 详细信息
来源: 评论
Considering behavior of sender in spam mail detection
Considering behavior of sender in spam mail detection
收藏 引用
6th International Conference on networked Computing, INC2010
作者: Naksomboon, S. Charnsripinyo, C. Wattanapongsakorn, N. Computer Engineering Department King Mongkut's University of Technology Thonburi 126 Pracha-Utid Tung-Kru Bangkok 10140 Thailand Network Technology Laboratory National Electronics and Computer Technology Center Klong Luang Pathumthani 10120 Thailand
Recently, the number of spam mails is exponentially growing. It affects the costs of organizations and annoying the email recipient. Spammers always try to find the way to avoid filtering out from the email system. At... 详细信息
来源: 评论
A new approach for internet worm detection and classification
A new approach for internet worm detection and classificatio...
收藏 引用
6th International Conference on networked Computing, INC2010
作者: Sarnsuwan, N. Charnsripinyo, C. Wattanapongsakorn, N. Computer Engineering Department King Mongkut's University of Technology Thonburi 126 Pracha-Utid Tung-Kru Bangkok 10140 Thailand Network Technology Laboratory National Electronics and Computer Technology Center Klong Luang Pathumthani 10120 Thailand
To detect internet worm, many academic approaches have been proposed. In this paper, we provide a new approach to detect internet worm. We consider behaviors of internet worm that is different from the normal pattern ... 详细信息
来源: 评论
Unsupervised ensemble anomaly detection through time-periodical packet sampling
Unsupervised ensemble anomaly detection through time-periodi...
收藏 引用
IEEE Conference on computer Communications Workshops, INFOCOM 2010
作者: Nawata, Shuichi Uchida, Masato Gu, Yu Tsuru, Masato Oie, Yuji Graduate School of Computer Science and Systems Engineering Kyushu Institute of Technology Japan Network Design Research Center Kyushu Institute of Technology Japan NEC Laboratories America United States
We propose an anomaly detection method that trains a baseline model describing the normal behavior of network traffic without using manually labeled traffic data. The trained baseline model is used as the basis for co...
来源: 评论
A distance-optimized load balancing scheme for network management
A distance-optimized load balancing scheme for network manag...
收藏 引用
6th International Conference on networking and Services, ICNS 2010, Includes LMPCNA 2010;INTENSIVE 2010
作者: Sun, Yantao Yang, Fangnan Liu, Qiang Shi, Zhiqiang School of Computer and Information Technology Beijing Jiaotong University Beijing China Multimedia Communication and Network Engineering Research Center Institute of Software Chinese Academy of Sciences Beijing China
Load balancing is an important factor, which influences the performance of DNMS (distributed network management system). In this paper, a two-layer load balancing scheme is proposed for DNMS based on the latest resear... 详细信息
来源: 评论
Graph cut-based fast texture synthesis with CUDA
Graph cut-based fast texture synthesis with CUDA
收藏 引用
2010 International Conference on computer Design and Applications, ICCDA 2010
作者: Zou, Kun Xu, Xiang Yang, Liang Li, Yueqiao Zhang, Jun Department of Computer Engineering University of Electronic Science and Technology China Zhongshan Institute Zhongshan China Network Maintenance Center China Telecom Corporation Limited Guangzhou Branch Guangzhou China
This paper presents a graph cut-based fast texture synthesis algorithm which utilizes CUDA to greatly accelerate the synthesis speed. The whole sample serves as a patch and is laid into the synthesized image repeatedl... 详细信息
来源: 评论