咨询与建议

限定检索结果

文献类型

  • 1,705 篇 会议
  • 1,355 篇 期刊文献
  • 68 册 图书

馆藏范围

  • 3,128 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,032 篇 工学
    • 1,541 篇 计算机科学与技术...
    • 1,262 篇 软件工程
    • 453 篇 信息与通信工程
    • 256 篇 生物工程
    • 240 篇 控制科学与工程
    • 221 篇 电气工程
    • 162 篇 光学工程
    • 155 篇 电子科学与技术(可...
    • 147 篇 机械工程
    • 140 篇 生物医学工程(可授...
    • 73 篇 安全科学与工程
    • 72 篇 动力工程及工程热...
    • 72 篇 化学工程与技术
    • 71 篇 仪器科学与技术
    • 71 篇 网络空间安全
  • 1,027 篇 理学
    • 560 篇 数学
    • 285 篇 生物学
    • 275 篇 物理学
    • 169 篇 统计学(可授理学、...
    • 96 篇 系统科学
    • 89 篇 化学
  • 599 篇 管理学
    • 376 篇 管理科学与工程(可...
    • 250 篇 图书情报与档案管...
    • 154 篇 工商管理
  • 149 篇 医学
    • 132 篇 临床医学
    • 110 篇 基础医学(可授医学...
    • 64 篇 公共卫生与预防医...
    • 59 篇 药学(可授医学、理...
  • 109 篇 法学
    • 84 篇 社会学
  • 58 篇 经济学
    • 56 篇 应用经济学
  • 54 篇 教育学
  • 33 篇 农学
  • 17 篇 军事学
  • 12 篇 文学
  • 6 篇 艺术学
  • 2 篇 哲学

主题

  • 79 篇 computer science
  • 79 篇 machine learning
  • 74 篇 deep learning
  • 73 篇 software enginee...
  • 63 篇 feature extracti...
  • 62 篇 training
  • 55 篇 data mining
  • 55 篇 computational mo...
  • 54 篇 artificial intel...
  • 49 篇 accuracy
  • 43 篇 cloud computing
  • 42 篇 semantics
  • 40 篇 internet of thin...
  • 38 篇 predictive model...
  • 37 篇 software
  • 36 篇 authentication
  • 35 篇 data models
  • 34 篇 optimization
  • 33 篇 neural networks
  • 31 篇 support vector m...

机构

  • 75 篇 college of compu...
  • 64 篇 state key labora...
  • 46 篇 school of inform...
  • 46 篇 sri lanka instit...
  • 44 篇 school of comput...
  • 33 篇 department of co...
  • 32 篇 department of co...
  • 30 篇 sri lanka instit...
  • 30 篇 institute of inf...
  • 30 篇 department of co...
  • 29 篇 shenzhen institu...
  • 28 篇 national enginee...
  • 26 篇 university of ch...
  • 25 篇 department of in...
  • 25 篇 guangdong key la...
  • 24 篇 school of comput...
  • 23 篇 school of comput...
  • 23 篇 shanghai key lab...
  • 22 篇 institute of sof...
  • 21 篇 software enginee...

作者

  • 52 篇 shen linlin
  • 32 篇 das ashok kumar
  • 25 篇 mohammad s. obai...
  • 24 篇 fan guisheng
  • 24 篇 du bo
  • 23 篇 chen liqiong
  • 22 篇 obaidat mohammad...
  • 18 篇 ashok kumar das
  • 18 篇 mahmood khalid
  • 17 篇 yu huiqun
  • 16 篇 kasthurirathna d...
  • 16 篇 xie weicheng
  • 15 篇 dharshana kasthu...
  • 15 篇 tao dacheng
  • 15 篇 qiu daowen
  • 15 篇 linlin shen
  • 13 篇 wei sun
  • 13 篇 yu zitong
  • 13 篇 wang wei
  • 13 篇 xiaorui zhang

语言

  • 2,593 篇 英文
  • 487 篇 其他
  • 55 篇 中文
  • 3 篇 德文
  • 2 篇 法文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Institute of Computer Software and Theory of Information Science and Engineering Institute"
3128 条 记 录,以下是2551-2560 订阅
排序:
RFID protocol based on random number and encryption hash
RFID protocol based on random number and encryption hash
收藏 引用
IET International Communication Conference on Wireless Mobile and Computing (CCWMC 2011)
作者: Qian Quan Guo Xiang Zhang Rui School of Computer Engineering & Science State Key Laboratory of Information Security (Institute of Software Chinese Academy of Sciences) Shanghai University Shanghai China
The features of the RFID system and the constraints of RFID devices may bring about various privacy problems. After analyzing some existing RFID protocols, this paper proposes a new protocol based on random number and...
来源: 评论
A skew angle detection algorithm based on maximum gradient difference
A skew angle detection algorithm based on maximum gradient d...
收藏 引用
International Conference on Transportation, Mechanical, and Electrical engineering (TMEE)
作者: Dan Wang Xichang Wang Jiang Liu Institute of Information Science & Engineering Computer Software Novel Technology Shandong China Shandong Oumasoft Co. Ltd Research Institute of Digital Image Processing Shandong China
In order to resolve the problem of skew phenomenon in the handwritten document image during the scanning process, a new skew angle detection algorithm based on maximum gradient difference as well as Hough transform wa... 详细信息
来源: 评论
Multi-population coevolution based on competition-predation hybrid model
收藏 引用
Journal of Computational information Systems 2011年 第3期7卷 886-895页
作者: Shao, Zengzhen Wang, Hongguo Liu, Hong Zhao, Xuechen Institute of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Jinan 250014 China
Learned from the mechanism of competition and predation among populations in the field of biology, this paper creates a novel hybrid model based on competition and predation. To improve the convergence speed, we propo... 详细信息
来源: 评论
Message Security in Multi-Path Ad Hoc Networks Using a Neural Network-Based Cipher
Message Security in Multi-Path Ad Hoc Networks Using a Neura...
收藏 引用
2011 IEEE Global Telecommunications Conference - GLOBECOM 2011
作者: Che-Yu Liu Isaac Woungang Han-Chieh Chao Sanjay K. Dhurandher Ting-Yun Chi Mohammad S. Obaidat Institute of Computer Science & Information Engineering National I-lan University Taiwan Department of Computer Science Ryerson University Toronto ONT Canada Division of Information Technology Netaji Subhas Institute of Technology University of Delhi India Department of Computer Science and Software Engineering Monmouth University West Long Branch NJ USA
Securing the transfer of data in mobile ad hoc networks (MANETs) is still a challenging issue. This paper proposes a method for providing message security in MANETs when nodes cooperate in routing. Our approach combin... 详细信息
来源: 评论
Dual System Encryption Revisited:Attaining Fully Secure Identity-Based Encryption and Its Extensions
Dual System Encryption Revisited:Attaining Fully Secure Iden...
收藏 引用
中国密码学会2011年会
作者: Song Luo Yu Chen Zhong Chen College of Computer Science and Engineering Chongqing University of Technology Chongqing 400054 P Institute of Information Engineering Chinese Academy of Sciences Beijing 100190 P.R.China Instit Institute of Software School of Electronics Engineering and Computer SciencePeking University Bei
Dual system encryption is a new powerful methodology first proposed by Waters in CRYPTO 2009 which can be used to prove full security (or adaptive security) for identity-based encryption and its extensions, e.g., hier...
来源: 评论
The Minimum Principle for Time-Varying Hybrid Systems with State Switching and Jumps
The Minimum Principle for Time-Varying Hybrid Systems with S...
收藏 引用
IEEE Conference on Decision and Control
作者: Benjamin Passenberg Marion Leibold Olaf Stursberg Martin Buss Institute of Automatic Control Department of Electrical Engineering and Information Technology Technische Universitat Munchen Munchen Germany Institute of Control and System Theory Department of Electrical Engineering and Computer Science University of Kassel Kassel Germany
The hybrid minimum principle (HMP) is extended to hybrid systems with autonomous (internally forced) switching on switching manifolds, controlled (externally forced) switching, jumps of the continuous state when switc... 详细信息
来源: 评论
Multi-mark: Multiple watermarking method for privacy data protection in wireless sensor networks
收藏 引用
information Technology Journal 2011年 第4期10卷 833-840页
作者: Wang, Baowei Sun, Xingming Ruan, Zhiqiang Ren, Heng College of Information Science and Engineering Hunan University No. 252 Lushan South Road Changsha 410082 China Institute of Computer and Software Nanjing University of Information Science and Technology No. 219 Ningliu Road Nanjing 210044 China
To achieve a more comprehensive and sustained privacy control and tamper detection for the data in wireless sensor networks, we propose a novel multiple watermarking method, called Multi-mark, which consists of an ann... 详细信息
来源: 评论
MAC Design in MIMO Ad Hoc Networks Based on Three Types of CTS Packets
MAC Design in MIMO Ad Hoc Networks Based on Three Types of C...
收藏 引用
International Conference on Instrumentation, Measurement, computer, Communication and Control (IMCCC)
作者: Zhao Wang Li Yu Hua Yu Weishan Lu Fei Ji Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing China School of Electronic and Information Engineering South China University of Technology Guangzhou China
Parallel RTS Processing MAC Protocol (PRP-MAC) can improve network throughput, but data packets are not always sent in a synchronized way. So PRP-MAC still produces the packet collisions in the network, which impact t... 详细信息
来源: 评论
Closed loop physiological ECMO control
Closed loop physiological ECMO control
收藏 引用
作者: Walter, M. Brendle, C. Bensberg, R. Kopp, R. Arens, J. Stollenwerk, A. Leonhardt, S. Philips Department of Medical Information Technology RWTH Aachen University Pauwelsstrasse 20 Aachen Germany Department of Computer Science 11 RWTH Aachen University Embedded Software Laboratory Germany Department of Cardiovascular Engineering Institute of Applied Medical Engineering RWTH Aachen University Germany Clinic of Operative Intensive Care University Hospital Aachen Germany
Patients suffering acute lung failure depend on artificial ventilation in order to survive. In severe cases, this therapy may not be sufficient any more and long term extracorporeal membrane oxygenation (ECMO) may be ... 详细信息
来源: 评论
Outlier detection based on Hilbert-Huang Transform
Outlier detection based on Hilbert-Huang Transform
收藏 引用
International Conference on Remote Sensing, Environment and Transportation engineering (RSETE)
作者: Yan Geng Shengjun Xue Zhiyuan Shen School of Information and Science Nanjing Audit University Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Control Science and Engineering Harbin Institute of Technology Harbin China
In this paper, we review the main concept and the developing method of Hilbert-Huang Transform (HHT), which is the novel and high-efficiently nonlinear and non-stationary data analysis method. HHT is composed of Empir... 详细信息
来源: 评论