咨询与建议

限定检索结果

文献类型

  • 1,026 篇 会议
  • 990 篇 期刊文献
  • 7 册 图书

馆藏范围

  • 2,023 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,295 篇 工学
    • 836 篇 计算机科学与技术...
    • 646 篇 软件工程
    • 330 篇 信息与通信工程
    • 156 篇 电气工程
    • 136 篇 电子科学与技术(可...
    • 127 篇 控制科学与工程
    • 95 篇 生物工程
    • 82 篇 机械工程
    • 82 篇 核科学与技术
    • 72 篇 光学工程
    • 63 篇 生物医学工程(可授...
    • 61 篇 网络空间安全
    • 57 篇 动力工程及工程热...
    • 56 篇 仪器科学与技术
    • 51 篇 化学工程与技术
    • 46 篇 交通运输工程
    • 40 篇 安全科学与工程
  • 705 篇 理学
    • 301 篇 物理学
    • 288 篇 数学
    • 115 篇 生物学
    • 87 篇 统计学(可授理学、...
    • 51 篇 化学
    • 44 篇 系统科学
  • 338 篇 管理学
    • 207 篇 管理科学与工程(可...
    • 142 篇 图书情报与档案管...
    • 74 篇 工商管理
  • 76 篇 医学
    • 57 篇 临床医学
    • 44 篇 基础医学(可授医学...
  • 52 篇 法学
    • 29 篇 社会学
  • 28 篇 经济学
    • 28 篇 应用经济学
  • 16 篇 军事学
  • 13 篇 农学
  • 12 篇 教育学
  • 4 篇 文学
  • 3 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 69 篇 computer network...
  • 56 篇 semantics
  • 48 篇 feature extracti...
  • 43 篇 accuracy
  • 38 篇 computational mo...
  • 35 篇 federated learni...
  • 34 篇 robustness
  • 32 篇 protocols
  • 32 篇 training
  • 28 篇 computer science
  • 28 篇 w & z bosons
  • 27 篇 deep learning
  • 27 篇 bandwidth
  • 27 篇 security
  • 25 篇 internet
  • 24 篇 wireless communi...
  • 24 篇 higgs bosons
  • 24 篇 wireless sensor ...
  • 22 篇 data mining

机构

  • 148 篇 centro brasileir...
  • 148 篇 istanbul technic...
  • 147 篇 national and kap...
  • 147 篇 yerevan physics ...
  • 146 篇 university of sp...
  • 145 篇 universidad iber...
  • 144 篇 brunel universit...
  • 144 篇 academy of scien...
  • 143 篇 indian institute...
  • 143 篇 charles universi...
  • 141 篇 department of ph...
  • 140 篇 university of de...
  • 138 篇 imperial college...
  • 138 篇 rwth aachen univ...
  • 137 篇 università di to...
  • 137 篇 indian institute...
  • 134 篇 infn sezione di ...
  • 132 篇 institute for nu...
  • 130 篇 zhejiang univers...
  • 130 篇 centro de invest...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 1,821 篇 英文
  • 164 篇 其他
  • 40 篇 中文
检索条件"机构=Computer Network Engineering Technology Center"
2023 条 记 录,以下是1751-1760 订阅
排序:
A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic Web
A Temporal Description Logic Based Access Control Model for ...
收藏 引用
International Workshop on Policies for Distributed Systems and networks
作者: Fathieh Faghih Morteza Amini Rasool Jalili Sharif Network Security Center (NSC) Department of Computer Engineering Sharif University of Technology Tehran Iran
An access control model for semantic Web should be compatible with the corresponding semantic model. The access control procedure(s) should also take the semantic relationships between the entities (specified as ontol... 详细信息
来源: 评论
Mask programmable CMOS transistor arrays for wideband RF integrated circuits
Mask programmable CMOS transistor arrays for wideband RF int...
收藏 引用
作者: Rabieirad, Laleh Martinez, Edgar J. Mohammadi, Saeed Department of Electrical Engineering California Institute of Technology Pasadena CA 91125 United States RF Technologies Division Raytheon Network Centric Systems FortWayne IN 46808 United States School of Electrical and Computer Engineering Birck Nanotechnology Center Purdue University West Lafayette IN 47907 United States
A mask programmable technology to implement RF and microwave integrated circuits using an array of standard 90-nm CMOS transistors is presented. Using this technology, three wideband amplifiers with more than 15-dB fo... 详细信息
来源: 评论
A Topology Partition Algorithm based on Link Coarsening in Parallel network Simulation
A Topology Partition Algorithm based on Link Coarsening in P...
收藏 引用
Second International Symposium on Information Science and engineering(第二届信息科学与工程国际会议)
作者: Xianqing Yang Hongli Zhang Hui He Xing Wang Kexin Zheng Department of Computer Science and Engineering Harbin Institute of Technology Harbin China Network Information Center Harbin Institute of Technology Harbin China
Today's networks are facing more and more serious large-scale network attack such as worm and botnet. While such attacks can't and shouldn't be reproduced in the real network, network simulation is become ... 详细信息
来源: 评论
An Interference-Aware Power Control Scheme in Wireless Mesh networks
An Interference-Aware Power Control Scheme in Wireless Mesh ...
收藏 引用
International Conference on networks Security, Wireless Communications and Trusted Computing, NSWCTC
作者: Shuqiang Huang Qi-lun Zheng Network and Educational Technology Center Jinan University Guangzhou China School of Computer Science & Engineering South China University of Technology Guangzhou China
With the ability of simultaneous transmissions, multi-channel multi-interface wireless mesh networks have emerged with great potential in the improvement of network throughput and performance. Interference has the str... 详细信息
来源: 评论
The application of digital image processing technology in the quantitative study of the coarse aggregate shape characteristics
The application of digital image processing technology in th...
收藏 引用
1st International Conference on Information Science and engineering, ICISE2009
作者: Zhang, Juan Huang, Xin-Yuan Wu, Jian Xie, Mao-Jin School of Information Science and Technology Beijing Forestry University Beijing China Department of Information and Engineering Jiangsu Maritime Institute Nanjing China Zhejiang Scientific Research Institute of Communication Hangzhou China Computer Network Information Center Chinese Academy of Science Beijing China
The angularity of coarse aggregate is a key characteristic. The high-temperature stability, low temperature anti-cracking performance and moisture susceptibility of asphalt mixture are influenced greatly when coarse a... 详细信息
来源: 评论
network intrusion detection and classification with Decision Tree and rule based approaches
Network intrusion detection and classification with Decision...
收藏 引用
International Symposium on Communications and Information Technologies (ISCIT)
作者: Thanvarat Komviriyavut Phurivit Sangkatsanee Naruemon Wattanapongsakorn Chalermpol Charnsripinyo Department of Computer Engineering King Mongkut's University of Technology Thonburi Bangkok Thailand Network Technology Laboratory National Electronics and Computer Technology Center Klong Luang Pathum Thani Thailand
Together with the extensive deployment of computer networks, the number of network attacks is greatly increasing. These attacks affect to availability and quality of services of the networks as well as confidentiality... 详细信息
来源: 评论
An Optimized Policy for Automatic Failure Recovery in Microrebootable Distributed Systems
An Optimized Policy for Automatic Failure Recovery in Micror...
收藏 引用
International Conference on Information Science and engineering (ICISE)
作者: Xu Lu Hui-qiang Wang Guo-sheng Zhao College of Computer science and technology Harbin Engineering of Technology Harbin China College of Computer science and technology Harbin Engineer University Harbin China Center of computer network and information Harbin Normal University Harbin China
To overcome the challenges of recovery polices generation in the presence of inaccurate failure detection, a failure recovery model for microrebootable distributed systems based on discounted Partially Observable Mark... 详细信息
来源: 评论
Research of NIDS in IPV6 Based on Protocol Analysis and Pattern Matching
Research of NIDS in IPV6 Based on Protocol Analysis and Patt...
收藏 引用
International Workshop on Knowledge Discovery and Data Mining (WKDD)
作者: Shu-qiang Huang Huan-ming Zhang Guo-xiang Yao Network and Educational Technology Center of Jinan University School of Computer Science & Engineering South China University of Technology Guangzhou China Network and Educational Technology Center of Jinan University Guangzhou China Information Science and Technology school of Jinan University Guangzhou China
Some network intrusion security problems of IPv6 are researched and summarized In this paper. And this paper introduces the model of general IDS and the framework of NIDS of Ipv6. Aiming at the structure characters of... 详细信息
来源: 评论
Gridifying teleco-services for NGN service convergence
Gridifying teleco-services for NGN service convergence
收藏 引用
IFIP/IEEE International Symposium on Integrated network Management
作者: Zhen Liu School of Computer and Information Technology Engineering Research Center of Network Management Technology of High Speed Railway Beijing Jiaotong University BJTU Beijing China
With more and more demands for various network services, there are many kinds of value added services provided by different service providers. These services overlap with each other and can't operate for each othe... 详细信息
来源: 评论
Flow Byte Sizes Estimation from Simple Random Packet Sampling
Flow Byte Sizes Estimation from Simple Random Packet Samplin...
收藏 引用
International Joint Conference on INC, IMS and IDC, NCM
作者: Hai Zhang Zhuxu Yang Wenming Guo Network center Southern Medical University Guangzhou Guangdong China School of computer science Engineering South China University of Technology China
The flow byte sizes is an important metric for network measurement. Previous work on estimating the flow size distribution (in bytes) has been focus on improving sampling technique to increase measurement accuracy. In... 详细信息
来源: 评论