咨询与建议

限定检索结果

文献类型

  • 507 篇 会议
  • 375 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 883 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 655 篇 工学
    • 474 篇 计算机科学与技术...
    • 399 篇 软件工程
    • 182 篇 信息与通信工程
    • 85 篇 控制科学与工程
    • 74 篇 生物工程
    • 54 篇 电气工程
    • 53 篇 生物医学工程(可授...
    • 51 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 34 篇 机械工程
    • 31 篇 网络空间安全
    • 30 篇 化学工程与技术
    • 23 篇 动力工程及工程热...
    • 22 篇 安全科学与工程
    • 20 篇 交通运输工程
    • 19 篇 仪器科学与技术
  • 314 篇 理学
    • 175 篇 数学
    • 84 篇 生物学
    • 67 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 29 篇 化学
    • 28 篇 系统科学
  • 199 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 47 篇 医学
    • 41 篇 临床医学
    • 37 篇 基础医学(可授医学...
    • 23 篇 药学(可授医学、理...
  • 22 篇 法学
    • 18 篇 社会学
  • 21 篇 农学
    • 18 篇 作物学
  • 10 篇 教育学
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 34 篇 feature extracti...
  • 27 篇 semantics
  • 22 篇 image segmentati...
  • 22 篇 convolution
  • 20 篇 training
  • 19 篇 deep learning
  • 16 篇 object detection
  • 16 篇 signal processin...
  • 16 篇 information proc...
  • 15 篇 data mining
  • 13 篇 computer science
  • 12 篇 laboratories
  • 12 篇 computational mo...
  • 12 篇 clustering algor...
  • 11 篇 optimization
  • 10 篇 support vector m...
  • 10 篇 cryptography
  • 9 篇 speech processin...
  • 9 篇 accuracy
  • 9 篇 streaming media

机构

  • 104 篇 provincial key l...
  • 52 篇 fujian provincia...
  • 51 篇 college of compu...
  • 45 篇 school of comput...
  • 41 篇 hunan provincial...
  • 38 篇 fujian provincia...
  • 22 篇 provincial key l...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 college of compu...
  • 17 篇 college of elect...
  • 17 篇 guangdong provin...
  • 16 篇 key laboratory o...
  • 16 篇 school of comput...
  • 16 篇 hunan provincial...
  • 15 篇 jiangsu provinci...
  • 15 篇 national enginee...
  • 14 篇 hunan provincial...
  • 14 篇 jiangsu provinci...
  • 13 篇 school of electr...

作者

  • 49 篇 li zuoyong
  • 32 篇 zhang fuquan
  • 20 篇 zuoyong li
  • 17 篇 yu fei
  • 17 篇 chen yang
  • 17 篇 li lang
  • 17 篇 fan haoyi
  • 17 篇 lang li
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 kong fang
  • 13 篇 zhu qiaoming
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 jiang feibo
  • 10 篇 gao shang
  • 10 篇 zhou guodong
  • 10 篇 wang kezhi
  • 10 篇 cao cungen
  • 10 篇 yang chen

语言

  • 827 篇 英文
  • 34 篇 其他
  • 23 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory for Computer Information Processing Technology"
883 条 记 录,以下是871-880 订阅
排序:
Research on user authentication for grid computing security
Research on user authentication for grid computing security
收藏 引用
2nd International Conference on Semantics, Knowledge, and Grid, SKG 2006
作者: Wu, Ronghui Li, Renfa Yu, Fei Yue, Guangxue Xu, Cheng School of Computer and Communication Hunan University Changsha 410082 China State Key Laboratory of Information Security Graduate School Chinese Academy of Sciences Beijing 100049 China Provincial Key Laboratory of Computer Information Processing Technology Jiangsu Province Suzhou University Suzhou 150063 China College of Informationg Engineering JiaXing University JiaXing 314000 China
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system... 详细信息
来源: 评论
Pyramid: Building Incentive Architecture for Unstructured Peer-to-Peer Network
Pyramid: Building Incentive Architecture for Unstructured Pe...
收藏 引用
Advanced International Conference on Telecommunications (AICT)
作者: Jia Zhao Jian-De Lu Jiangsu Key Laboratory of Computer Information Processing Technology Soochow University Suzhou Jiangsu China
As non-cooperation behaviors such as free-riding do not seems to have been checked according to a recent survey of Gnutella network [3], it hereby calls for more attention to this issue and more efforts in our future ... 详细信息
来源: 评论
A Mobility-Aware Zone-Based Routing Protocol for Mobile Grid Computing
A Mobility-Aware Zone-Based Routing Protocol for Mobile Grid...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Rui Li Rui Li Renfa Li Renfa Li Fei Yu Fei Yu Jigang Wen Jigang Wen School of Computer and Communication Hunan University Changsha China Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou Jiangsu China
Mobile grid computing is a new computing paradigm which joins classic grid computing and mobile computing paradigm to provide dependable, seamless, pervasive access to mobile resources and services. It can use the und...
来源: 评论
A Privacy Policy of P3P Based on Relational Database
A Privacy Policy of P3P Based on Relational Database
收藏 引用
International Multi-Symposiums on computer and Computational Sciences (IMSCCS)
作者: Bin Jiang Da-fung Zhang Chao Yang Guangxue Yue Fei Yu Software School Hunan University Changsha Hunan China College of Computer and Communication Hunan University Changsha Hunan China Provincial Key Laboratory of Computer Information Processing Technology Jiangsu Jiangsu Province China
P3P is an industry standard method that enables users to gain powerful control over their processing of personal information on Web sites being visited. Traditional methods of database access control places great depe... 详细信息
来源: 评论
Data Distribution Algorithm of High-Speed Intrusion Detection system Based on Network Processor
Data Distribution Algorithm of High-Speed Intrusion Detectio...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Cheng Xu Cheng Xu Fei Yu Fei Yu Zhenghui Dai Zhenghui Dai Guangxue Yue Guangxue Yue Renfa Li Renfa Li Provincial Key Laboratory of Computer Information Processing Technology Suzhou Jiangsu China State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing China School of Computer & Communication Hunan University Changsha China College of Informationg Engineering JiaXing University China
Because the processing speed of intrusion detection system can hardly keep pace with the high-speed development of network, improving the speed of intrusion detection has been the problem starved for solve. By adoptin...
来源: 评论
Research on Remote Heterogeneous Disaster Recovery technology in Grid Computing Security
Research on Remote Heterogeneous Disaster Recovery Technolog...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Ronghui Wu Ronghui Wu Renfa Li Renfa Li Fei Yu Fei Yu Guangxue Yue Guangxue Yue Jigang Wen Jigang Wen State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Computer & Communication Hunan University Changsha China Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou Jiangsu Province China College of Informationg Engineering JiaXing University JiaXing China
The tradition standby mechanism can't carry out the dynamic Disaster Recovery of database between distributed isomeric storage systems, accordingly, research the method of allopatric isomeric backup based on grid ...
来源: 评论
Research on User Authentication for Grid Computing Security
Research on User Authentication for Grid Computing Security
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Ronghui Wu Ronghui Wu Renfa Li Renfa Li Fei Yu Fei Yu Guangxue Yue Guangxue Yue Cheng Xu Cheng Xu State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing China School of Computer & Communication Hunan University Changsha China Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou Jiangsu Province China College of Informationg Engineering JiaXing University JiaXing China
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system...
来源: 评论
Classification rules mining based on SOFM networks
Classification rules mining based on SOFM networks
收藏 引用
MIPPR 2005: Geospatial information, Data Mining, and Applications
作者: Yao, Min Jiang, Zhiwei Shen, Bin College of Computer Zhejiang University Hangzhou 310027 China Provincial Key Lab. for Computer Information Processing Technology in Jiangsu Suzhou University Suzhou 215006 China
Self-organization feature mapping (SOFM) networks have strong ability for self-learning and self-adaptive. According to the characteristics of human thought, this paper constructed a kind of combined criterion, which ... 详细信息
来源: 评论
The Applications of Generalized Computing In Knowledge Management
The Applications of Generalized Computing In Knowledge Manag...
收藏 引用
2005年公共管理国际会议
作者: YAO Min SHEN Bin ZHANG Yan-gu College of Computer Zhejiang University Provincial Key Lab. for Computer Information processing Technology in Jiangsu Suzhou University School of Computer Wenzhou Normal College
Generalized computing is a new kind of intelligent computing systems, which combines symbolic intelligence and computational intelligence (including neural computing, fuzzy computing and evolutional computing) togethe... 详细信息
来源: 评论
A multicast routing algorithm with multiple trees
收藏 引用
Journal of Systems Engineering and Electronics 2005年 第2期16卷 426-432页
作者: Cui Xunxue 1,2 , Gao Wei3 & Fang Hongyu41. New Star Research Institute of Applied technology, Hefei 230031, P. R. China 2. jiangsu key laboratory of computer information processing technology,Soochow University, Suzhou 215006, P. R. China 3. Department of Electronic Engineering and information Science,University of Science and technology of China, Hefei 230027, P. R. China 4. School of Electronic Science and technology, Anhui University, Hefei 230039, P. R. China New Star Research Institute of Applied Technology Hefei 230031 P. R. China 2. Jiangsu Key Laboratory of Computer Information Processing Technology Soochow University Suzhou 215006 P. R. China Department of Electronic Engineering and Information Science University of Science and Technology of China Hefei 230027 P. R. China School of Electronic Science and Technology Anhui University Hefei 230039 P. R. China
Quality of service (QoS) multicast routing has continued to be a very important research topic in the Internet. A method of multicast routing is proposed to simultaneously optimize several parameters based on multiobj... 详细信息
来源: 评论