咨询与建议

限定检索结果

文献类型

  • 1,932 篇 期刊文献
  • 1,766 篇 会议
  • 1 册 图书

馆藏范围

  • 3,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,617 篇 工学
    • 1,795 篇 计算机科学与技术...
    • 1,391 篇 软件工程
    • 620 篇 信息与通信工程
    • 375 篇 电气工程
    • 361 篇 控制科学与工程
    • 309 篇 电子科学与技术(可...
    • 225 篇 生物工程
    • 193 篇 机械工程
    • 152 篇 网络空间安全
    • 147 篇 光学工程
    • 135 篇 生物医学工程(可授...
    • 123 篇 仪器科学与技术
    • 108 篇 动力工程及工程热...
    • 101 篇 安全科学与工程
    • 98 篇 交通运输工程
    • 69 篇 建筑学
    • 65 篇 化学工程与技术
    • 64 篇 土木工程
  • 1,279 篇 理学
    • 688 篇 数学
    • 342 篇 物理学
    • 251 篇 生物学
    • 221 篇 统计学(可授理学、...
    • 147 篇 系统科学
    • 68 篇 化学
  • 646 篇 管理学
    • 414 篇 管理科学与工程(可...
    • 257 篇 图书情报与档案管...
    • 151 篇 工商管理
  • 143 篇 法学
    • 92 篇 社会学
  • 135 篇 医学
    • 119 篇 临床医学
    • 98 篇 基础医学(可授医学...
  • 57 篇 经济学
  • 33 篇 军事学
  • 31 篇 农学
  • 25 篇 教育学
  • 14 篇 文学
  • 4 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 59 篇 security
  • 59 篇 cryptography
  • 57 篇 training
  • 56 篇 deep learning
  • 54 篇 computer science
  • 54 篇 blockchain
  • 53 篇 laboratories
  • 53 篇 optimization
  • 52 篇 computational mo...
  • 49 篇 federated learni...
  • 47 篇 privacy
  • 45 篇 authentication
  • 39 篇 accuracy
  • 36 篇 servers
  • 35 篇 information secu...
  • 34 篇 protocols
  • 33 篇 computer archite...
  • 33 篇 data models

机构

  • 148 篇 department of co...
  • 74 篇 national key lab...
  • 66 篇 school of softwa...
  • 58 篇 tsinghua nationa...
  • 50 篇 state key labora...
  • 49 篇 department of co...
  • 48 篇 key laboratory o...
  • 43 篇 hubei province k...
  • 42 篇 school of comput...
  • 39 篇 state key labora...
  • 38 篇 university of ch...
  • 35 篇 department of co...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 34 篇 shandong provinc...
  • 32 篇 department of el...
  • 32 篇 peng cheng labor...
  • 31 篇 school of cyber ...
  • 30 篇 state key labora...
  • 30 篇 key laboratory f...

作者

  • 32 篇 han zhu
  • 29 篇 niyato dusit
  • 20 篇 wang wei
  • 20 篇 cao xiaochun
  • 18 篇 yang yang
  • 18 篇 zhao jinjing
  • 18 篇 ai bo
  • 18 篇 kuang xiaohui
  • 17 篇 hu shengshan
  • 16 篇 yunhao liu
  • 16 篇 jin hai
  • 15 篇 hai jin
  • 14 篇 ding yong
  • 14 篇 zhang leo yu
  • 14 篇 wang bin
  • 14 篇 chang chin-chen
  • 13 篇 wu yuan
  • 13 篇 ming gu
  • 13 篇 guangwen yang
  • 13 篇 wang jianmin

语言

  • 3,342 篇 英文
  • 257 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Science and Technology Department Key Laboratory of Information System Security"
3699 条 记 录,以下是3671-3680 订阅
排序:
Research of Extracting Data from HTML Web Pages Automatically
收藏 引用
Journal of Beijing Institute of technology 2003年 第S1期12卷 104-108页
作者: 王茹 宋瀚涛 陆玉昌 Department of Computer Science and Engineering School of Information Science and TechnologyBeijing Institute of TechnologyBeijing 100081China State Key Laboratory of Intelligent Technology and System Tsinghua UniversityBeijing 100084China
In order to use data information in the Internet, it is necessary to extract data from web pages. An HTT tree model representing HTML pages is presented. Based on the HTT model, a wrapper generation algorithm AGW is p... 详细信息
来源: 评论
A network service framework for mobile pervasive computing
收藏 引用
International Conference on Communication technology (ICCT)
作者: Enyi Chen Yuanchun Shi Guangyou Xu Department of Computer Science and Technology The State Key Laboratory on Intelligence System and Technology Tsinghua University Beijing China
In this paper, we propose a framework for wireless/mobile pervasive computing to augment capabilities and to save scanty resources of mobile host by making full use of available resources in the surrounding. Firstly, ... 详细信息
来源: 评论
Seamless provisioning of service in the ubiquitous computing environment
Seamless provisioning of service in the ubiquitous computing...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: En-Yi Chen De-Gan Zhang Yuan-Chun Shi Guang-You Xu The State Key Laboratory of Intelligence System and Technology Department of Computer Science and Technology Tsinghua University Beijing China
In the ubiquitous computing environment (UCE), how to seamlessly provision the service or application to its occupant or its mobile user is an interesting research topic. This paper introduces our two UCEs called smar... 详细信息
来源: 评论
Online recommendation based on customer shopping model in e-commerce  03
Online recommendation based on customer shopping model in e-...
收藏 引用
IEEE WIC ACM International Conference on Web Intelligence (WI)
作者: Junzhong Ji Zhiqiang Sha Chunnian Liu Ning Zhong College of Computer Science and Technology Beijing Municipal Key Laboratory of Multimedia and Intelligent Software Technology Beijing University of Technology Beijing China Department of Information Engineering Maebashi Institute of Technology Maebashi Japan
As e-commerce developing rapidly, it is becoming a research focus about how to capture or find customer's behavior patterns and realize commerce intelligence by use of Web mining technology. Recommendation system ... 详细信息
来源: 评论
Advances in simulated modeling of vibration systems based on computational intelligence
收藏 引用
自然科学进展(英文版) 2002年 第12期12卷 881-886页
作者: LIANG Yanchun LEE Heow Pueh LIN Wuzhong LIM Siak Piang LEE Kwok Hong Zhou Chunguang College of Computer Science and Technology Jilin University Changchun 130012 China Institute of High Performance Computing Singapore 117528 Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sci Institute of High Performance Computing Singapore 117528 Department of Mechanical Engineering National University of Singapore Singapore 119260 Singapore College of Computer Science and Technology Jilin University Changchun 130012 China
Computational intelligence is the computational simulation of the bio-intelligence, which includes artificial neural networks, fuzzy systems and evolutionary computations. This article summarizes the state of the art ... 详细信息
来源: 评论
Efficient information retrieval based on a combination of vector space and probabilistic models
Efficient information retrieval based on a combination of ve...
收藏 引用
IEEE International Conference on systems, Man and Cybernetics
作者: Min Zhang Shaoping Ma State Key laboratory of Intelligent Technology and System Department of Computer Science and Technology Tsinghua University Beijing China
来源: 评论
A novel learning method for special Bayesian networks
A novel learning method for special Bayesian networks
收藏 引用
World Congress on Intelligent Control and Automation (WCICA)
作者: Tian Fengzhan Xu Ke Zhang Hongwei Lu Yuchang The State Key Laboratory of Intelligent Technology and System Department of Computer Science and Technology Tsinghua University Beijing China
In this paper, a novel learning method for special Bayesian networks which consist of noisy-OR and noisy-AND nodes is introduced. This method can learn networks with hidden variables and discover hidden variables when... 详细信息
来源: 评论
Improving Chinese Storing Text Retrieval systems' security via a Novel Maximal Prefix Coding
收藏 引用
International Journal of computer Processing of Languages 2002年 第4期15卷 379-393页
作者: D. Y. LONG W. J. JIA P. O. AU M. LI Department of Computer Science Zhongshan University Guangzhou 510275 PRC State Key Lab. of Information Security Chinese Academy of Science Beijing 100080 PRC Department of Computer Engineering and Information Technology City University of Hong Kong 83 Tat Chee Avenue Kowloon Hong Kong SAR PRC School of Computing National University of Singapore Singapore
We have seen that Huffman coding has been widely used in data, image, and video compression. In this paper novel maximal prefix coding is introduced. Relationship between the Huffman coding and the optimal maximal pre... 详细信息
来源: 评论
Anaphora resolution in Chinese financial news for information extraction
Anaphora resolution in Chinese financial news for informatio...
收藏 引用
World Congress on Intelligent Control and Automation (WCICA)
作者: Ning Wang Chunfa Yuan K.F. Wong Wenjie Li Department of Computer Science & Technology State Key Laboratory of Intelligent Technology and System Tsinghua University Beijing China Department of System Engineering & Engineering Management Chinese University of Hong Kong Hong Kong China Department of Computing Hong Kong Polytechnic University Hong Kong China
Anaphora always appears in the text and it is a hot topic in linguistics and computational linguistics area. Anaphora resolution is an important part of the information extraction, and it is also important to discours... 详细信息
来源: 评论
On existence of 2-level autocorrelation sequences realized from the decimation-Hadamard transformation
On existence of 2-level autocorrelation sequences realized f...
收藏 引用
IEEE International Symposium on information Theory
作者: G. Gong Z. Dai S.W. Golomb Department of Electrical and Computer Engineering University of Waterloo Waterloo Canada State Key Laboratory of Information Security Graduate School (Beijing) University of Science and Technology Beijing China Communication Sciences Institute Electrical Engineering-Systems University of Southern California Los Angeles CA USA
We investigate the decimation-Hadamard transform (DHT) applied to 2-level autocorrelation sequences. We present the kth-order DHT by a matrix representation and show that odd order DHT cannot realize any 2-level autoc... 详细信息
来源: 评论