咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 77 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 149 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 51 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 13 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 8 篇 化学工程与技术
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 航空宇航科学与技...
  • 92 篇 理学
    • 43 篇 数学
    • 33 篇 物理学
    • 14 篇 生物学
    • 8 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 5 篇 系统科学
  • 47 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 6 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 steganography
  • 7 篇 cloud computing
  • 7 篇 cloud storage
  • 6 篇 wireless sensor ...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 cnn
  • 4 篇 convolutional ne...
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 outsourcing
  • 3 篇 target tracking
  • 3 篇 efficiency
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi

机构

  • 86 篇 school of comput...
  • 77 篇 jiangsu engineer...
  • 22 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 state key labora...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 8 篇 jiangsu engineer...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 5 篇 jiangsu engineer...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 35 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 18 篇 xingming sun
  • 17 篇 wei sun
  • 16 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 zhangjie fu
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 liu wenjie
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 liu qi

语言

  • 242 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=Jiangsu Engineering Center of Network Monitoring School of Computer and Software"
246 条 记 录,以下是21-30 订阅
排序:
Quantum-based Feature Selection for Multi-Classification Problem in Complex Systems with Edge Computing
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Wenjie Chen, Junxiu Wang, Yuxiang Gao, Peipei Lei, Zhibin Ma, Xu Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China 999077 Hong Kong School of Software Qufu Normal University Shandong273165 China
The complex systems with edge computing require a huge amount of multi-feature data to extract appropriate insights for their decision-making, so it is important to find a feasible feature selection method to improve ... 详细信息
来源: 评论
A Phase Estimation Algorithm for Quantum Speed-Up Multi-Party Computing
收藏 引用
computers, Materials & Continua 2021年 第4期67卷 241-252页
作者: Wenbin Yu Hao Feng Yinsong Xu Na Yin Yadang Chen Zhi-Xin Yang Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET) Jiangsu Engineering Center of Network MonitoringSchool of Computer and SoftwareNanjing University of Information Science&TechnologyNanjing210044China Department of Computer Science and Engineering Michigan State UniversityEast Lansing48824MIUSA State Key Laboratory of Internet of Things for Smart City and Department of Electromechanical Engineering University of Macao999078Macao
Security and privacy issues have attracted the attention of researchers in the field of IoT as the information processing scale grows in sensor *** computing,theoretically known as an absolutely secure way to store an... 详细信息
来源: 评论
An incentive mechanism for crowdsourcing markets with social welfare maximization in cloud-edge computing
An incentive mechanism for crowdsourcing markets with social...
收藏 引用
作者: Xu, Xiaolong Cai, Qing Zhang, Guoming Zhang, Jie Tian, Wei Zhang, Xiaorui Liu, Alex X. School of Computer and Software Nanjing University of Information Science and Technology Jiangsu China Jiangsu Engineering Centre of Network Monitoring Nanjing University of Information Science and Technology Jiangsu China State Key Laboratory for Novel Software Technology Nanjing University Jiangsu China Department of Computer Science and Engineering Michigan State University MI United States
Crowdsourcing is emerging as a powerful paradigm that utilizes the distributed devices to sense, collect, and upload data to satisfy the requirements of the users. Currently, with the popularity of edge computing, edg... 详细信息
来源: 评论
A Novel Steganography Algorithm Based on Instance Segmentation
收藏 引用
computers, Materials & Continua 2020年 第4期63卷 183-196页
作者: Ruohan Meng Qi Cui Zhili Zhou Chengsheng Yuan Xingming Sun School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Centre of Network Monitoring Nanjing210044China Department of Electrical and Computer Engineering University of WindsorWindsorCanada
Information hiding tends to hide secret information in image area where is rich texture or high frequency,so as to transmit secret information to the recipient without affecting the visual quality of the image and aro... 详细信息
来源: 评论
A Survey of Image Super Resolution Based on CNN  9th
A Survey of Image Super Resolution Based on CNN
收藏 引用
9th EAI International Conference on Cloud Computing, CloudComp 2019 and the 4th EAI International Conference on Smart Grid and Innovative Frontiers in Telecommunications, SmartGIFT 2019
作者: Xu, Qianxiong Zheng, Yu School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology NanjingJiangsu210044 China
With the advent of the information age in contemporary society, images are everywhere, no matter in military use or in daily life. Therefore, as a medium for people to obtain information, images have become more and m... 详细信息
来源: 评论
Dynamic resource provisioning for workflow scheduling under uncertainty in edge computing environment
Dynamic resource provisioning for workflow scheduling under ...
收藏 引用
作者: Xu, Xiaolong Cao, Hao Geng, Qingfan Liu, Xihua Dai, Fei Wang, Chuanjian School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China Nanjing University of Information Science and Technology Nanjing China Engineering Research Center of Digital Forensics Ministry of Education Nanjing China School of Big Data and Intelligence Engineering Southwest Forestry University Kunming China College of Information Science and Technology Shihezi University Xinjiang China
Edge computing, an extension of cloud computing, is introduced to provide sufficient computing and storage resources for mobile devices. Moreover, a series of computing tasks in a mobile device are set as structured c... 详细信息
来源: 评论
Quantum Algorithms and Experiment Implementations Based on IBM Q
收藏 引用
computers, Materials & Continua 2020年 第11期65卷 1671-1689页
作者: Wenjie Liu Junxiu Chen Yinsong Xu Jiahao Tang Lian Tong Xiaoyu Song Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China School of Information Engineering Jiangsu Maritime InstituteNanjing211100China Department of Electrical and Computer Engineering Portland State UniversityOregon97207USA
With the rapid development of quantum theory and technology in recent years,especially the emergence of some quantum cloud computing platforms,more and more researchers are not satisfied with the theoretical derivatio... 详细信息
来源: 评论
Partial-duplicate image retrieval using spatial and visual contextual clues
Partial-duplicate image retrieval using spatial and visual c...
收藏 引用
作者: Sun, Wendi Wang, Tao Zhou, Zhili School of Computer and Software and Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China
The traditional bag-of-visual-words (BOW) model quantifies the local features to the visual words to achieve efficient content-based image retrieval. However, since it causes considerable quantisation error and ignore... 详细信息
来源: 评论
An efficient and secure arbitrary N-party quantum key agreement protocol using Bell states
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Wen-Jie Xu, Yong Yang, Ching-Nung Gao, Pei-Pei Yu, Wen-Bin Nanjing210044 China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing210044 China School of Computer and Software Nanjing University of Information Science & Technology Nanjing210044 China Department of Computer Science and Information Engineering National Dong Hwa University Hualien974 Taiwan
Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. [Quantum Inf. Process. 13, 2391(2014)]. However, Zhu et al. pointed out that there are some security f... 详细信息
来源: 评论
A blockchain-based computation offloading method for edge computing in 5G networks
A blockchain-based computation offloading method for edge co...
收藏 引用
作者: Xu, Xiaolong Chen, Yi Zhang, Xuyun Liu, Qingxiang Liu, Xihua Qi, Lianyong School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Electrical and Computer Engineering University of Auckland Auckland New Zealand School of Information Science and Engineering Qufu Normal University Qufu China
Edge computing (EC) emerges as a novel computing paradigm to offload computing tasks from user equipments (UEs) to edge notes (ENs) in fifth-generation networks, which definitely breaks the resource limitation of UEs ... 详细信息
来源: 评论