咨询与建议

限定检索结果

文献类型

  • 1,033 篇 会议
  • 1,002 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,042 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,309 篇 工学
    • 854 篇 计算机科学与技术...
    • 658 篇 软件工程
    • 343 篇 信息与通信工程
    • 171 篇 电气工程
    • 138 篇 电子科学与技术(可...
    • 137 篇 控制科学与工程
    • 95 篇 生物工程
    • 84 篇 机械工程
    • 74 篇 核科学与技术
    • 73 篇 光学工程
    • 71 篇 网络空间安全
    • 63 篇 生物医学工程(可授...
    • 59 篇 动力工程及工程热...
    • 58 篇 仪器科学与技术
    • 53 篇 化学工程与技术
    • 51 篇 交通运输工程
    • 45 篇 安全科学与工程
  • 711 篇 理学
    • 303 篇 物理学
    • 293 篇 数学
    • 116 篇 生物学
    • 89 篇 统计学(可授理学、...
    • 54 篇 化学
    • 44 篇 系统科学
  • 346 篇 管理学
    • 213 篇 管理科学与工程(可...
    • 143 篇 图书情报与档案管...
    • 76 篇 工商管理
  • 80 篇 医学
    • 61 篇 临床医学
    • 45 篇 基础医学(可授医学...
  • 52 篇 法学
    • 29 篇 社会学
  • 28 篇 经济学
    • 28 篇 应用经济学
  • 17 篇 军事学
  • 13 篇 教育学
  • 13 篇 农学
  • 4 篇 文学
  • 3 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 69 篇 computer network...
  • 56 篇 semantics
  • 48 篇 feature extracti...
  • 44 篇 accuracy
  • 38 篇 computational mo...
  • 35 篇 federated learni...
  • 34 篇 robustness
  • 33 篇 protocols
  • 32 篇 training
  • 28 篇 computer science
  • 28 篇 w & z bosons
  • 28 篇 deep learning
  • 27 篇 bandwidth
  • 27 篇 security
  • 25 篇 internet
  • 24 篇 wireless communi...
  • 24 篇 higgs bosons
  • 24 篇 wireless sensor ...
  • 23 篇 predictive model...

机构

  • 148 篇 centro brasileir...
  • 148 篇 istanbul technic...
  • 147 篇 national and kap...
  • 147 篇 yerevan physics ...
  • 146 篇 university of sp...
  • 145 篇 universidad iber...
  • 144 篇 brunel universit...
  • 144 篇 academy of scien...
  • 143 篇 indian institute...
  • 143 篇 charles universi...
  • 141 篇 department of ph...
  • 140 篇 university of de...
  • 138 篇 imperial college...
  • 138 篇 rwth aachen univ...
  • 137 篇 università di to...
  • 137 篇 indian institute...
  • 134 篇 infn sezione di ...
  • 132 篇 institute for nu...
  • 130 篇 zhejiang univers...
  • 130 篇 centro de invest...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 1,778 篇 英文
  • 226 篇 其他
  • 40 篇 中文
检索条件"机构=Computer Network Engineering Technology Center"
2042 条 记 录,以下是1711-1720 订阅
排序:
A generalized file replication scheme with diffusion-based storage load balancing function in unstructured P2P file-sharing networks
A generalized file replication scheme with diffusion-based s...
收藏 引用
2nd International Conference on Intelligent networking and Collaborative Systems, INCOS 2010
作者: Takaoka, Masanori Uchida, Masato Oie, Yuji NCOS Laboratory NEC Communication Systems Kanagawa Japan Graduate School of Computer Science and System Engineering Kyushu Institute of Technology Fukuoka Japan Network Design Research Center Kyushu Institute of Technology Tokyo Japan
In this paper, we provide a generalized file replication scheme with a storage load balancing function in unstructured P2P file-sharing networks. The generalized file replication scheme is expressed as a weighted mixt... 详细信息
来源: 评论
Packet-level forward erasure correction with user fairness in lossy wireless networks
Packet-level forward erasure correction with user fairness i...
收藏 引用
2010 IEEE 21st International Symposium on Personal, Indoor and Mobile Radio Communications Workshops, PIMRC 2010
作者: Hisamatsu, Satoshi Tamura, Hitomi Tsuru, Masato Oie, Yuji Graduate School of Computer Science and Systems Engineering Kyushu Institute of Technology Fukuoka Japan Network Design Research Center Kyushu Institute of Technology Fukuoka Japan National Institute of Information and Communications Technology Tokyo Japan Kyushu Institute of Technology Fukuoka Japan
Packet-level erasure correction is considered for downstream packets each of which is delivered from a base station to an individual receiver (i.e., user) over a lossy shared wireless network where only a very limited... 详细信息
来源: 评论
A new trustworthy access scheme based on short signature and implementation on network processor
A new trustworthy access scheme based on short signature and...
收藏 引用
International Conference on computer Application and System Modeling
作者: Du, Xiu-Juan Jin, Zhi-Gang Network Information Center Qinghai Normal University Xining China School of Computer Science and Technology Tianjin University Tianjin China School of Electronics and Information Engineering Tianjin University Tianjin China
The paper analyzes the security of conventional network access authentication technology and provides a novel IP address pair based short signature technology which strengthens the security of authentication and contr... 详细信息
来源: 评论
Voice communications over 802.11 Ad Hoc networks: Modeling, optimization and call admission control
Voice communications over 802.11 Ad Hoc networks: Modeling, ...
收藏 引用
作者: Xu, Changchun Xu, Yanyi Liu, Gan Liu, Kezhong Computer Network Center Naval University of Engineering China Wuhan Natl. Lab. Optoelect. Dept. of Electronics and Information Engineering Huazhong University of Science and Technology Wuhan 430074 China School of Navigation Wuhan University of Technology China
Supporting quality-of-service (QoS) of multimedia communications over IEEE 802.11 based ad hoc networks is a challenging task. This paper develops a simple 3-D Markov chain model for queuing analysis of IEEE 802.11 MA... 详细信息
来源: 评论
Discussion on the relation between SVM training sample size and correct forecast ratio for simulation experiment results
Discussion on the relation between SVM training sample size ...
收藏 引用
2010 International Conference on Intelligent Computation technology and Automation, ICICTA 2010
作者: Zhu, Shuguang Zhu, Fangzhou Fan, Weibing Mo, Qian Li, Zhiqiang Hu, Xiaofeng Si, Guangya Center for Engineering Design and Research under Headquarters of General Equipment Beijing China College of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Network Center Beijing Technology and Business University Beijing China Department of Information Operation and Command Training National Defense University Beijing China
A series of support vector machine (SVM) forecast experiments are carried out to reveal the relation between the SVM training sample size and SVM correct forecast ratio for simulation experiment results. Experiment re... 详细信息
来源: 评论
Parallel molecular dynamics simulation of lysozyme hydration on IBM blade center cluster
Parallel molecular dynamics simulation of lysozyme hydration...
收藏 引用
2010 IEEE International Conference on Intelligent Computing and Intelligent Systems, ICIS 2010
作者: Sha, Feng Wei, Tao Wei, Ying Network Information Center Xiamen University of Technology Xiamen China Department of Computer and Science Xiamen University Tan Kah Kee College Xiamen China Materials Research Science and Engineering Center Northwestern University Evanston IL 60208 United States
A new Beowulf Clusters with IBM blade HS22 and DELL PC 755 has been built to perform parallel atomistic MD simulations. Lysozyme hydration was used as a model system to evaluate the system performance with different n... 详细信息
来源: 评论
Higher order factor analysis of SERVQUAL - Empirical findings from an e-learning system
Higher order factor analysis of SERVQUAL - Empirical finding...
收藏 引用
IEEE International Conference on Progress in Informatics and Computing (PIC)
作者: Wang, Ruobin Liu, Kecheng Zhang, Mengmeng Ma, Shilai School of Management and Economics Beijing Institute of Technology Beijing China Computer and Network Center North China University of Technology Beijing China Informatics Research Centre University of Reading Reading United Kingdom College of Information Engineering North China University of Technology Beijing China
SERVQUAL model has been used to measure service quality in different industries. In most cases, this model was validated by confirmatory factor analysis approach. The objective of this research is to validate SERVQUAL... 详细信息
来源: 评论
A Vagueness-based Obfuscation Technique for Protecting Location Privacy
A Vagueness-based Obfuscation Technique for Protecting Locat...
收藏 引用
IEEE International Conference on Social Computing (SocialCom)
作者: Jafar Haadi Jafarian Network Security and CERT Center Department of Computer Engineering Sharif University of Technology Tehran Iran
Technical evolution of location technologies has augmented the development and growth of location-based services. With widespread adoption of these services, threats to location privacy are increasing, entailing more ... 详细信息
来源: 评论
Enabling Inter-PMIPv6-Domain Handover with Traffic Distributors
Enabling Inter-PMIPv6-Domain Handover with Traffic Distribut...
收藏 引用
Consumer Communications and networking Conference, CCNC IEEE
作者: Feng Zhong Shengbo Yang Chai Kiat Yeo Bu Sung Lee Center of Multimedia and Network Technology School of Computer Engineering Nanyang Technological University Singapore Singapore
As a local mobility management protocol, Proxy Mobile IPv6 (PMIPv6) is designed to enable mobile nodes to move in a domain without any involvement in the mobility signalling operation. However, a single domain cannot ... 详细信息
来源: 评论
An Opportunistic Spectrum Scheduling Scheme for Multi-Channel Cognitive Radio networks
An Opportunistic Spectrum Scheduling Scheme for Multi-Channe...
收藏 引用
IEEE Conference on Vehicular technology (VTC)
作者: Vamsi Krishna Tumuluru Ping Wang Dusit Niyato Center of Multimedia and Network Technology (CeMNeT) School of Computer Engineering Nanyang Technological University Singapore
In this paper, we develop an opportunistic spectrum scheduling scheme for cognitive radio networks. In the proposed scheme, the channel status (i.e., whether being occupied by primary users) and the instantaneous chan... 详细信息
来源: 评论