咨询与建议

限定检索结果

文献类型

  • 2,806 篇 会议
  • 2,734 篇 期刊文献

馆藏范围

  • 5,540 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,634 篇 工学
    • 2,413 篇 计算机科学与技术...
    • 1,916 篇 软件工程
    • 904 篇 信息与通信工程
    • 490 篇 电气工程
    • 451 篇 电子科学与技术(可...
    • 434 篇 控制科学与工程
    • 304 篇 生物工程
    • 267 篇 机械工程
    • 220 篇 仪器科学与技术
    • 217 篇 光学工程
    • 177 篇 网络空间安全
    • 160 篇 生物医学工程(可授...
    • 148 篇 化学工程与技术
    • 140 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 材料科学与工程(可...
    • 95 篇 交通运输工程
    • 93 篇 核科学与技术
    • 79 篇 建筑学
  • 1,961 篇 理学
    • 918 篇 数学
    • 734 篇 物理学
    • 341 篇 生物学
    • 284 篇 统计学(可授理学、...
    • 170 篇 化学
    • 170 篇 系统科学
  • 916 篇 管理学
    • 569 篇 管理科学与工程(可...
    • 392 篇 图书情报与档案管...
    • 176 篇 工商管理
  • 138 篇 医学
    • 113 篇 临床医学
    • 84 篇 基础医学(可授医学...
  • 131 篇 法学
  • 70 篇 经济学
  • 59 篇 农学
  • 42 篇 军事学
  • 29 篇 教育学
  • 23 篇 文学
  • 18 篇 艺术学
  • 2 篇 哲学

主题

  • 184 篇 feature extracti...
  • 164 篇 semantics
  • 128 篇 deep learning
  • 124 篇 hadron colliders
  • 121 篇 accuracy
  • 120 篇 computational mo...
  • 117 篇 training
  • 89 篇 wireless sensor ...
  • 82 篇 data models
  • 73 篇 federated learni...
  • 71 篇 optimization
  • 67 篇 neural networks
  • 64 篇 security
  • 61 篇 computer science
  • 61 篇 privacy
  • 58 篇 predictive model...
  • 56 篇 machine learning
  • 53 篇 protocols
  • 52 篇 wireless communi...
  • 52 篇 adaptation model...

机构

  • 231 篇 yerevan physics ...
  • 190 篇 shandong provinc...
  • 149 篇 department for p...
  • 148 篇 departamento de ...
  • 146 篇 centro brasileir...
  • 145 篇 department of ph...
  • 145 篇 national and kap...
  • 144 篇 universidad iber...
  • 144 篇 dipartimento di ...
  • 142 篇 istanbul technic...
  • 142 篇 key laboratory o...
  • 141 篇 university of sp...
  • 141 篇 academy of scien...
  • 140 篇 indian institute...
  • 139 篇 brunel universit...
  • 137 篇 institute of phy...
  • 132 篇 infn sezione di ...
  • 132 篇 università di to...
  • 130 篇 infn sezione di ...
  • 128 篇 charles universi...

作者

  • 112 篇 c. hensel
  • 110 篇 g. tonelli
  • 110 篇 d. barney
  • 110 篇 l. valencia palo...
  • 110 篇 t. liu
  • 100 篇 a. garcia-bellid...
  • 99 篇 w. busza
  • 99 篇 a. babaev
  • 97 篇 a. steen
  • 96 篇 n. cartiglia
  • 92 篇 v. karjavine
  • 90 篇 n. colino
  • 89 篇 f. moortgat
  • 88 篇 b. clerbaux
  • 88 篇 g. sultanov
  • 88 篇 m. a. ciocci
  • 88 篇 k. lamichhane
  • 88 篇 s. maselli
  • 87 篇 e. migliore
  • 87 篇 p. avery

语言

  • 5,074 篇 英文
  • 311 篇 其他
  • 166 篇 中文
  • 2 篇 德文
检索条件"机构=Computer Network Technology Key Laboratory of Jiangsu"
5540 条 记 录,以下是21-30 订阅
排序:
Reliability Assessment of a New General Matching Composed network
收藏 引用
China Communications 2024年 第2期21卷 245-257页
作者: Zhengyuan Liang Junbin Liang Guoxuan Zhong Guangxi Key Laboratory of Multimedia Communications and Network Technology School of ComputerElectronics and InformationGuangxi UniversityNanning 530004China Jiangxi Engineering Laboratory of IoT Technologies for Crop Growth Ji’an 343000China
The reliability of a network is an important indicator for maintaining communication and ensuring its stable operation. Therefore, the assessment of reliability in underlying interconnection networks has become an inc... 详细信息
来源: 评论
Adaptive VDI Session Placement via User Logoff Prediction
收藏 引用
Machine Intelligence Research 2025年 第1期22卷 189-200页
作者: Wenping Fan Puhui Meng Yu Tian Min-Ling Zhang Yao Zhang School of Computer Science and Engineering Southeast UniversityNanjing210096China VMware Information Technology(China)Limited Beijing100190China Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of EducationNanjing210096China
After the global pandemic,DaaS(desktop as a service)has become the first choice of many companies’remote working *** the desktops are usually deployed in the public cloud when using DaaS,customers are more cost-sensi... 详细信息
来源: 评论
Remote Data Auditing for Cloud-Assisted WBANs with Pay-as-You-Go Business Model
收藏 引用
Chinese Journal of Electronics 2023年 第2期32卷 248-261页
作者: LI Yumei ZHANG Futai School of Computer Science Hubei University of Technology Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal University
As an emerging technology, cloud-assisted wireless body area networks(WBANs) provide more convenient services to users. Recently, many remote data auditing protocols have been proposed to ensure the data integrity and... 详细信息
来源: 评论
HyWE: A Hybrid Word Embedding Method for Smart Contract Vulnerability Detection  35
HyWE: A Hybrid Word Embedding Method for Smart Contract Vuln...
收藏 引用
35th IEEE International Symposium on Software Reliability Engineering Workshops, ISSREW 2024
作者: Chen, Jinfu Li, Zhehao Wang, Dongjie Jiangsu University School of Computer Science & Communication Engineering Jiangsu China Jiangsu University Jiangsu Key Laboratory of Security Technology Industrial Cyberspace Jiangsu China
With the rise of blockchain technology, the use of smart contracts has increased, alongside challenges in detecting and addressing unknown vulnerabilities. Existing systems face limitations, including inadequate manua... 详细信息
来源: 评论
Securing STAR-FC-RIS empowered integrated sensing and multiuser communications against target eavesdropping
收藏 引用
Science China(Information Sciences) 2024年 第11期67卷 335-346页
作者: Shuying LIN Yulong ZOU Fu XIAO Bin LI School of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications School of Computer Science Nanjing University of Posts and Telecommunications Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications
This paper investigates a simultaneous-transmitting-and-reflecting fully-connected reconfigurable intelligent surface(STAR-FC-RIS) empowered integrated sensing and multiuser communications(ISAMC) network, where a dual... 详细信息
来源: 评论
Low power consumption reduced state and transition MLSE in optical interconnects
收藏 引用
Science China(Information Sciences) 2023年 第10期66卷 325-326页
作者: Weihao NI Fan LI Wei WANG Zhibin LUO Xingwen YI Yi CAI Zhaohui LI School of Electronics and Information Technology Guangdong Provincial Key Laboratory of Optoelectronic Information Processing Chips and Systems Sun Yat-sen University Southern Marine Science and Engineering Guangdong Laboratory(Zhuhai) Jiangsu Engineering Research Center of Novel Optical Fiber Technology and Communication Network Suzhou Key Laboratory of Advanced Optical Communication Network Technology Soochow University
Intensity modulation/direct detection(IM/DD) optical fiber communication system is an appropriate candidate for optical interconnect applications due to its low cost and low power consumption characteristics [1]. 4-le... 详细信息
来源: 评论
Large Model-Based Data Augmentation for Imbalanced Text Classification  5
Large Model-Based Data Augmentation for Imbalanced Text Clas...
收藏 引用
5th International Seminar on Artificial Intelligence, networking and Information technology, AINIT 2024
作者: Zhang, Dawei Mi, Rongxin Zhou, Peiyao Jin, Dawei Zhang, Manman Song, Tianhang School of Computer Science Jiangsu University of Science and Technology Jiangsu Zhenjiang China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China Key Laboratory of Intelligent Information Processing Beijing China
This study focuses on the application of large models to deal with imbalanced data problems in text classification. In view of the central position of text in web data and the negative impact of class imbalance on cla... 详细信息
来源: 评论
Achieving Physical Layer Security Against Location Unknown Eavesdroppers via Friendly Jammer
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第10期10卷 2038-2040页
作者: Heng Zhang Jianwei Sun Xin Wang Chenglong Gong School of Computer Engineering Jiangsu Ocean UniversityLianyungang 222000China School of Electronic Engineering Jiangsu Ocean UniversityLianyungang 222000China Shandong Provincial Key Laboratory of Computer Networks Shandong Computer Science CenterQilu University of TechnologyJinan 250014China
Dear Editor, This letter is concerning friendly jamming unmanned aerial vehicles(UAVs) to assist in the safe communication of UAV base stations. Due to the openness of UAV wireless communication, it is vulnerable to a... 详细信息
来源: 评论
Mobility-Aware Multi-Task Migration and Offloading Scheme for Internet of Vehicles
收藏 引用
Chinese Journal of Electronics 2023年 第6期32卷 1192-1202页
作者: LI Xujie TANG Jing XU Yuan SUN Ying College of Computer and Information Hohai University State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Key Lab for Wireless Sensor Network and Communication Shanghai Institute of Microsystem School of Information Engineering Jiangsu Open University
In Internet of vehicles, vehicular edge computing(VEC) as a new paradigm can effectively accomplish various tasks. Due to limited computing resources of the roadside units(RSUs), computing ability of vehicles can be a... 详细信息
来源: 评论
Discriminative feature encoding for intrinsic image decomposition
收藏 引用
Computational Visual Media 2023年 第3期9卷 597-618页
作者: Zongji Wang Yunfei Liu Feng Lu Key Laboratory of Network Information System Technology(NIST) Aerospace Information Research InstituteChinese Academy of SciencesBeijing 100190China State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and EngineeringBeihang UniversityBeijing 100191China Peng Cheng Laboratory Shenzhen 518000China
Intrinsic image decomposition is an important and long-standing computer vision *** an input image,recovering the physical scene properties is *** physically motivated priors have been used to restrict the solution sp... 详细信息
来源: 评论