咨询与建议

限定检索结果

文献类型

  • 157 篇 期刊文献
  • 75 篇 会议

馆藏范围

  • 232 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 191 篇 工学
    • 144 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 49 篇 信息与通信工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 机械工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 9 篇 化学工程与技术
    • 6 篇 电气工程
    • 5 篇 仪器科学与技术
    • 5 篇 生物医学工程(可授...
    • 5 篇 网络空间安全
    • 4 篇 光学工程
    • 4 篇 航空宇航科学与技...
  • 87 篇 理学
    • 41 篇 数学
    • 31 篇 物理学
    • 13 篇 生物学
    • 9 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 4 篇 系统科学
  • 47 篇 管理学
    • 26 篇 图书情报与档案管...
    • 25 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 7 篇 医学
    • 5 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 8 篇 steganography
  • 7 篇 wireless sensor ...
  • 7 篇 cloud storage
  • 6 篇 cloud computing
  • 5 篇 blockchain
  • 4 篇 semantics
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 target tracking
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi
  • 3 篇 soft tissue simu...
  • 3 篇 cnn
  • 3 篇 feature extracti...
  • 3 篇 routing protocol...
  • 3 篇 encryption

机构

  • 81 篇 school of comput...
  • 72 篇 jiangsu engineer...
  • 20 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 state key labora...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 7 篇 jiangsu engineer...
  • 6 篇 school of comput...
  • 6 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 36 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 17 篇 wei sun
  • 17 篇 xingming sun
  • 15 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 zhangjie fu
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 7 篇 liu wenjie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 wei fang

语言

  • 228 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=Jiangsu Engineering Center of Network Monitoring&Department of Computer and Software"
232 条 记 录,以下是71-80 订阅
排序:
Quantum relief algorithm
arXiv
收藏 引用
arXiv 2020年
作者: Liu, Wen-Jie Gao, Pei-Pei Yu, Wen-Bin Qu, Zhi-Guo Yang, Ching-Nung Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science & Technology Nanjing210044 China Department of Computer Science and Information Engineering National Dong Hwa University Hualien974 Taiwan
Relief algorithm is a feature selection algorithm used in binary classification proposed by Kira and Rendell, and its computational complexity remarkable increases with both the scale of samples and the number of feat... 详细信息
来源: 评论
Multi-party Quantum Communication Complexity on Composite Boolean-Valued Function  5th
Multi-party Quantum Communication Complexity on Composite Bo...
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Yu, Wenbin Dong, Zangqiang Liu, Wenjie Qu, Zhiguo Xu, Xiaolong Liu, Alex Xiangyang Jiangsu Engineering Center of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology NanjingJiangsu Province210044 China The Department of Computer Science and Application Zhengzhou Institute of Aeronautical Industry Management ZhengzhouHenan Province450015 China Department of Computer Science and Engineering Michigan State University East LansingMI48824-1226 United States
The performance of communication complexity depends on the selected computation model. Even on the specific model the quantum communication complexity is not always better than the classical one. This paper investigat... 详细信息
来源: 评论
Dynamic Resource Scheduling in Emergency Environment
收藏 引用
Journal of Information Hiding and Privacy Protection 2019年 第3期1卷 143-155页
作者: Yuankun Yan Yan Kong Zhangjie Fu School of Computer&Software Nanjing University of Information Science&TechnologyNanjingChina Jiangsu Engineering Center of Network Monitoring School of Computer and SoftwareNanjingChina
Nowadays,emergency accidents could happen at any *** accidents occur unpredictably and the accidents requirements are *** accidents happen in a dynamic environment and the resource should be cooperative to solve the *... 详细信息
来源: 评论
Instance Retrieval Using Region of Interest Based CNN Features
收藏 引用
Journal of New Media 2019年 第2期1卷 87-99页
作者: Jingcheng Chen Zhili Zhou Zhaoqing Pan Ching-nung Yang Jiangsu Engineering Center of Network Monitoring&Department of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Department of Electrical and computer Engineer University of WinsorN9B3P4WinsorONCanada Department of Computer Science and Information Engineering National Dong Hwa University ShoufengHualien 974Taiwan
Recently, image representations derived by convolutional neural networks(CNN) have achieved promising performance for instance retrieval, and they outperformthe traditional hand-crafted image features. However, most o... 详细信息
来源: 评论
Blockchain-Based Trusted Electronic Records Preservation in Cloud Storage
收藏 引用
computers, Materials & Continua 2019年 第1期58卷 135-151页
作者: Zhiliang Deng Yongjun Ren Yepeng Liu Xiang Yin Zixuan Shen Hye-Jin Kim School of Information and Control Nanjing University of Information Science&TechnologyNanjing210044China Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology Nanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science&TechnologyNanjing210044China School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China College of Information Engineering Yangzhou UniversityYangzhou225127China Business Administration Research Institute Sungshin W.UniversitySeoulKorea
Cloud storage represents the trend of intensive,scale and specialization of information technology,which has changed the technical architecture and implementation method of electronic records ***,it will provide a con... 详细信息
来源: 评论
Tigc-Net: Transformer-Improved Graph Convolution network for Spatio-Temporal Prediction
SSRN
收藏 引用
SSRN 2022年
作者: Chen, Kai Yang, Chunfeng Zhou, Zhengyuan Liu, Yao Ji, Tianjiao Sun, Weiya Chen, Yang School of Cyber Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing210096 China The College of Software Engineering Southeast University Nanjing210096 China Laboratory of Image Science and Technology The School of Computer Science and Engineering Southeast University Nanjing210096 China Jiangsu Key Laboratory of Molecular and Functional Imaging Department of Radiology Zhongda Hospital Southeast University Nanjing210009 China Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering Southeast University Nanjing210096 China NHC Key Laboratory of Medical Virology and Viral Diseases National Institute for Viral Disease Control and Prevention Chinese Center for Disease Control and Prevention Beijing China Beijing Institute of Tracking and Communication Technology Beijing100094 China
Modeling spatio-temporal sequences is an important topic yet challenging for existing neural networks. Most of the current spatio-temporal sequence prediction methods usually capture features separately in temporal an... 详细信息
来源: 评论
STR: Secure computation on additive shares using the share-transform-reveal strategy
arXiv
收藏 引用
arXiv 2020年
作者: Xia, Zhihua Gu, Qi Zhou, Wenhao Xiong, Lizhi Weng, Jian Xiong, Naixue N. College of Cyber Security Jinan University Guangzhou510632 China Engineering Research Center of Digital Forensics Ministry of Education School of Computer and Software Jiangsu Engineering Center of Network Monitoring Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology Nanjing University of Information Science & Technology Nanjing210044 China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China The College of Intelligence and Computing Tianjin University Tianjin300350 China
The rapid development of cloud computing probably benefits many of us while the privacy risks brought by semi-honest cloud servers have aroused the attention of more and more people and legislatures. In the last two d... 详细信息
来源: 评论
A Balanced Cloudlet Management Method for Wireless Metropolitan Area networks  13th
A Balanced Cloudlet Management Method for Wireless Metropoli...
收藏 引用
13th EAI International Conference on Testbeds and Research Infrastructures for the Development of networks and Communities, TridentCom 2018
作者: Xu, Xiaolong Chen, Yuhao Qi, Lianyong He, Jing Zhang, Xuyun School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Jiangsu Engineering Centre of Network Monitoring Nanjing University of Information Science and Technology Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Information Science and Engineering Qufu Normal University Jining China Department of Electrical and Computer Engineering University of Auckland Auckland New Zealand
With the rapid development of wireless communication technology, cloudlet-based wireless metropolitan area network, which provides people with more convenient network services, has become an effiective paradigm to mee... 详细信息
来源: 评论
Long short term memory model for analysis and forecast of PM2.5  4th
Long short term memory model for analysis and forecast of PM...
收藏 引用
4th International Conference on Cloud Computing and Security, ICCCS 2018
作者: Yan, Leiming Zhou, Min Wu, Yaowen Yan, Luqi Jiangsu Engineering Center of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
Atmospheric PM2.5 is a pollutant that has a major impact on the atmospheric environment and human health. Based on LSTM, we construct two prediction models, Stack LSTM and Encoder-Decoder, and evaluate the prediction ... 详细信息
来源: 评论
Quantum Blockchain: A Decentralized, Encrypted and Distributed Database Based on Quantum Mechanics
收藏 引用
Journal of Quantum Computing 2019年 第2期1卷 49-63页
作者: Chuntang Li Yinsong Xu Jiahao Tang Wenjie Liu School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China
Quantum blockchain can be understood as a decentralized, encrypted anddistributed database based on quantum computation and quantum information *** the data is recorded in the quantum blockchain, it will not be malici... 详细信息
来源: 评论