咨询与建议

限定检索结果

文献类型

  • 258 篇 会议
  • 122 篇 期刊文献

馆藏范围

  • 380 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 238 篇 工学
    • 180 篇 计算机科学与技术...
    • 149 篇 软件工程
    • 63 篇 信息与通信工程
    • 27 篇 生物工程
    • 26 篇 电气工程
    • 25 篇 控制科学与工程
    • 21 篇 机械工程
    • 21 篇 电子科学与技术(可...
    • 19 篇 光学工程
    • 12 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 10 篇 动力工程及工程热...
    • 10 篇 交通运输工程
    • 10 篇 生物医学工程(可授...
    • 8 篇 环境科学与工程(可...
    • 7 篇 土木工程
    • 7 篇 安全科学与工程
    • 6 篇 建筑学
  • 138 篇 理学
    • 85 篇 数学
    • 32 篇 统计学(可授理学、...
    • 29 篇 生物学
    • 26 篇 物理学
    • 11 篇 化学
    • 7 篇 系统科学
  • 75 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 32 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 20 篇 法学
    • 17 篇 社会学
  • 10 篇 医学
    • 9 篇 临床医学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 3 篇 教育学
  • 3 篇 农学

主题

  • 30 篇 feature extracti...
  • 16 篇 semantics
  • 11 篇 optimization
  • 9 篇 deep learning
  • 9 篇 image segmentati...
  • 9 篇 cloud computing
  • 9 篇 data models
  • 9 篇 training
  • 8 篇 predictive model...
  • 7 篇 reinforcement le...
  • 7 篇 big data
  • 7 篇 data mining
  • 7 篇 machine learning
  • 6 篇 task analysis
  • 6 篇 computational mo...
  • 6 篇 particle swarm o...
  • 6 篇 genetic algorith...
  • 6 篇 clustering algor...
  • 6 篇 computer vision
  • 5 篇 computation offl...

机构

  • 62 篇 college of mathe...
  • 62 篇 college of compu...
  • 38 篇 fujian provincia...
  • 35 篇 fujian key labor...
  • 26 篇 fujian key labor...
  • 19 篇 engineering rese...
  • 18 篇 fujian provincia...
  • 17 篇 key laboratory o...
  • 15 篇 fujian provincia...
  • 11 篇 key laboratory o...
  • 11 篇 key laboratory o...
  • 9 篇 key laboratory o...
  • 7 篇 shandong college...
  • 7 篇 shandong provinc...
  • 7 篇 peng cheng labor...
  • 7 篇 fuzhou universit...
  • 7 篇 college of mathe...
  • 7 篇 fujian provincia...
  • 7 篇 fujian provincia...
  • 7 篇 school of inform...

作者

  • 29 篇 guo wenzhong
  • 20 篇 guo kun
  • 14 篇 wenzhong guo
  • 13 篇 xing chen
  • 13 篇 xianghan zheng
  • 12 篇 wang shiping
  • 12 篇 chen xing
  • 11 篇 yu zhiyong
  • 10 篇 guolong chen
  • 9 篇 xiao ke
  • 9 篇 li jinping
  • 8 篇 xiaodong wu
  • 8 篇 zheng xianghan
  • 8 篇 ke xiao
  • 8 篇 yanhua liu
  • 8 篇 wu ling
  • 7 篇 huang fangwan
  • 7 篇 kun guo
  • 7 篇 genggeng liu
  • 6 篇 lin dazhen

语言

  • 364 篇 英文
  • 14 篇 中文
  • 7 篇 其他
检索条件"机构=Fujian Key Laboratory of Network Computing and Intelligent Information Processing"
380 条 记 录,以下是181-190 订阅
排序:
Mobile Crowd-Sensing System Based on Participant Selection  15th
Mobile Crowd-Sensing System Based on Participant Selection
收藏 引用
15th International Conference on Green, Pervasive, and Cloud computing, GPC 2020
作者: Tu, Chunyu Han, Lei Wang, Leye Yu, Zhiyong College of Mathematics and Computer Science Fuzhou University Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Key Laboratory of Spatial Data Mining and Information Sharing Ministry of Education Fuzhou China Key Lab of High Confidence Software Technologies Peking University Beijing China
Mobile Crowdsensing (MCS) is often accompanied by various adverse objectives when performing data collection, which makes it difficult to collect accurate data of the entire target area with low cost. Therefore, how t... 详细信息
来源: 评论
Abnormal network Traffic Detection based on Leaf Node Density Ratio  2019
Abnormal Network Traffic Detection based on Leaf Node Densit...
收藏 引用
Proceedings of the 2019 the 9th International Conference on Communication and network Security
作者: Huajun Liu Zhanghui Liu Yanhua Liu Xiaoling Gao College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
As the network evolves, cyber-attacks become more and more diverse. In the process of detecting network traffic, the most complicated but also the most important task is to find unknown abnormal network traffic data i... 详细信息
来源: 评论
Self-adaptive resource allocation for cloud-based software services based on progressive QoS prediction model
收藏 引用
Science China(information Sciences) 2019年 第11期62卷 192-194页
作者: Xing CHEN Junxin LIN Yun MA Bing LIN Haijiang WANG Gang HUANG College of Mathematics and Computer Science Fuzhou University Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University School of Software Tsinghua University College of Physics and Energy Fujian Normal University Key Laboratory of High Confidence Software Technologies Ministry of Education
Dear editor,Self-adaptation is a promising approach to allocate resources for cloud-based software services [1, 2].Traditional self-adaptive resource-allocation methods are rule-driven, which leads to high administrat... 详细信息
来源: 评论
Energy Consumption and Time Delay optimization of MEC Based on MultiDimensional Game  5
Energy Consumption and Time Delay optimization of MEC Based ...
收藏 引用
5th IEEE International Conference on Cloud computing and Big Data Analytics, ICCCBDA 2020
作者: Wang, Hui Wang, Yi Lu, Xingjun Hu, Yanjun Anhui University Key Laboratory of Intelligent Computing Signal Processing Ministry of Education Hefei230601 China Key Laboratory of Wireless Sensor Network & Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Shanghai200050 China
Mobile edge computing (MEC) reduces latency and power consumption of mobile devices by deploying servers on the network edge. Due to the limited computing resources of the MEC server, excessive offloading of the users... 详细信息
来源: 评论
Cell-Free Massive MIMO-OFDM for High-Speed Train Communications
arXiv
收藏 引用
arXiv 2022年
作者: Zheng, Jiakang Zhang, Jiayi Björnson, Emil Li, Zhetao Ai, Bo The School of Electronic and Information Engineering Beijing Jiaotong University Beijing100044 China The Department of Computer Science KTH Royal Institute of Technology Kista Sweden The Hunan International Scientific and Technological Cooperation Base of Intelligent Network Key Laboratory of Intelligent Computing & Information Processing Ministry of Education Xiangtan University Hunan411105 China The State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing100044 China
Cell-free (CF) massive multiple-input multiple-output (MIMO) systems show great potentials in low-mobility scenarios, due to cell boundary disappearance and strong macro diversity. However, the great Doppler frequency... 详细信息
来源: 评论
Research on Data Augmentation for Garbage Classification with Target Detection Algorithm
Research on Data Augmentation for Garbage Classification wit...
收藏 引用
International Applied Computational Electromagnetics Society Symposium (ACES)
作者: Jiansong Chen Shikai Zuo Yun Lin Kai Tang Jianhang Zou Naixing Feng Yijun Cai Smart Sensing Integrated Circuit Engineering Research Center of Universities in Fujian Province Xiamen University of Technology Xiamen China Xiamen Wish Information Technology Co. Ltd Xiamen China Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University Hefei China
Garbage classification is an essential work in daily life. With the development of artificial intelligence (AI), we have begun to use object detection to achieve garbage classification. However, the stacking and occlu... 详细信息
来源: 评论
Fine-grained Pseudo-code Generation Method via Code Feature Extraction and Transformer
Fine-grained Pseudo-code Generation Method via Code Feature ...
收藏 引用
Asia-Pacific Conference on Software Engineering
作者: Guang Yang Yanlin Zhou Xiang Chen Chi Yu School of Information Science and Technology Nantong University China Key Laboratory of Safety-Critical Software Nanjing University of Aeronautics and Astronautics Ministry of Industry and Information Technology China The Key Laboratory of Cognitive Computing and Intelligent Information Processing of Fujian Education Institutions Wuyi University China
Pseudo-code written by natural language is helpful for novice developers' program comprehension. However, writing such pseudo-code is time-consuming and laborious. Motivated by the research advancements of sequenc... 详细信息
来源: 评论
A Comprehensive Assessment Method of Asset Importance for key Asset Protection  2019
A Comprehensive Assessment Method of Asset Importance for Ke...
收藏 引用
Proceedings of the 2019 the 9th International Conference on Communication and network Security
作者: Xiaoling Gao Yanhua Liu Yanbin Qiu Huajun Liu College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
In a given system network, an important prerequisite for security risk control is how to accurately calculate the impact of different host assets in the topology on the spread of attack risk. In this regard, we propos... 详细信息
来源: 评论
Attack Intent Analysis Method Based on Attack Path Graph  2019
Attack Intent Analysis Method Based on Attack Path Graph
收藏 引用
Proceedings of the 2019 the 9th International Conference on Communication and network Security
作者: Biqiong Chen Yanhua Liu Shijin Li Xiaoling Gao College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
With the rapid development of network technology, network security problems are gradually increasing, and the network attack situation is very severe. In a complex attack scenario, timely detection of potential attack... 详细信息
来源: 评论
Attack intent analysis method based on attack path graph  9
Attack intent analysis method based on attack path graph
收藏 引用
9th International Conference on Communication and network Security, ICCNS 2019
作者: Chen, Biqiong Liu, Yanhua Li, Shijin Gao, Xiaoling College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
With the rapid development of network technology, network security problems are gradually increasing, and the network attack situation is very severe. In a complex attack scenario, timely detection of potential attack... 详细信息
来源: 评论