咨询与建议

限定检索结果

文献类型

  • 481 篇 期刊文献
  • 424 篇 会议
  • 1 册 图书

馆藏范围

  • 906 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 654 篇 工学
    • 420 篇 计算机科学与技术...
    • 345 篇 软件工程
    • 161 篇 信息与通信工程
    • 74 篇 生物工程
    • 73 篇 电子科学与技术(可...
    • 64 篇 控制科学与工程
    • 52 篇 光学工程
    • 52 篇 电气工程
    • 41 篇 机械工程
    • 30 篇 网络空间安全
    • 28 篇 仪器科学与技术
    • 28 篇 生物医学工程(可授...
    • 22 篇 化学工程与技术
    • 20 篇 安全科学与工程
    • 19 篇 动力工程及工程热...
    • 19 篇 交通运输工程
    • 15 篇 材料科学与工程(可...
    • 15 篇 航空宇航科学与技...
  • 364 篇 理学
    • 181 篇 数学
    • 119 篇 物理学
    • 83 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 26 篇 系统科学
    • 24 篇 化学
  • 181 篇 管理学
    • 99 篇 图书情报与档案管...
    • 80 篇 管理科学与工程(可...
    • 30 篇 工商管理
  • 31 篇 医学
    • 25 篇 临床医学
    • 17 篇 基础医学(可授医学...
  • 20 篇 法学
    • 14 篇 社会学
  • 12 篇 经济学
  • 9 篇 军事学
  • 6 篇 农学
  • 4 篇 文学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 28 篇 semantics
  • 27 篇 deep learning
  • 15 篇 wireless sensor ...
  • 13 篇 feature extracti...
  • 12 篇 information retr...
  • 12 篇 training
  • 11 篇 authentication
  • 10 篇 reinforcement le...
  • 10 篇 throughput
  • 10 篇 image segmentati...
  • 10 篇 optimization
  • 10 篇 computational mo...
  • 10 篇 machine learning
  • 10 篇 privacy
  • 9 篇 wireless communi...
  • 9 篇 security
  • 9 篇 network security
  • 9 篇 federated learni...
  • 8 篇 learning systems
  • 8 篇 big data

机构

  • 89 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 29 篇 key lab of infor...
  • 27 篇 cas key lab of n...
  • 21 篇 beijing electron...
  • 20 篇 cas key lab of n...
  • 19 篇 key lab of broad...
  • 19 篇 university of am...
  • 18 篇 institute of qua...
  • 18 篇 state informatio...
  • 13 篇 zhejiang lab
  • 11 篇 key lab of broad...
  • 11 篇 key lab of broad...
  • 10 篇 moe key lab for ...
  • 9 篇 faculty of educa...
  • 9 篇 shonan institute...
  • 9 篇 faculty of engin...
  • 9 篇 faculty of syste...
  • 9 篇 center of space ...
  • 9 篇 department of ph...

作者

  • 113 篇 guo jiafeng
  • 108 篇 cheng xueqi
  • 50 篇 zhang ruqing
  • 50 篇 fan yixing
  • 41 篇 lan yanyan
  • 26 篇 pang liang
  • 26 篇 meng deyu
  • 21 篇 bi keping
  • 18 篇 de rijke maarten
  • 16 篇 shen huawei
  • 16 篇 xu jun
  • 13 篇 cao xiangyong
  • 13 篇 wang zhiqiang
  • 13 篇 zheng qinghua
  • 13 篇 chen wei
  • 13 篇 sun xiaoming
  • 11 篇 yang tao
  • 10 篇 tao yang
  • 9 篇 feng c.f.
  • 9 篇 wang h.

语言

  • 844 篇 英文
  • 44 篇 其他
  • 18 篇 中文
检索条件"机构=Key Lab of Network Science and Technology"
906 条 记 录,以下是61-70 订阅
排序:
A multi-factor integrated fault diagnosis method for distributed applications
A multi-factor integrated fault diagnosis method for distrib...
收藏 引用
2nd International Conference on Information science and Engineering, ICISE2010
作者: Li, Wei Li, Guangye Yin, Yin Key Lab. of Beijing Network Technology School of Computer Science and Technology Beihang University Beijing China
Fault management is a key research part in the field of distributed applications management. Fault Management based on active probing is divided into two phases: fault detection and fault diagnosis, considering probe ... 详细信息
来源: 评论
Sparse word embeddings using l1 regularized online learning  25
Sparse word embeddings using l1 regularized online learning
收藏 引用
25th International Joint Conference on Artificial Intelligence, IJCAI 2016
作者: Sun, Fei Guo, Jiafeng Lan, Yanyan Xu, Jun Xueqi, Cheng CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
Recently, Word2Vec tool has attracted a lot of interest for its promising performances in a variety of natural language processing (NLP) tasks. However, a critical issue is that the dense word representations learned ... 详细信息
来源: 评论
A NEW THRESHOLD AUTHENTICATED ENCRYPTION SCHEME USING labOR-DIVISION SIGNATURE
收藏 引用
Journal of Systems science & Complexity 2010年 第6期23卷 1183-1194页
作者: Zuowen TAN School of Information Technology Jiangxi University of Finance and Economics Nanchang 330032 China Key Lab of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 China.
This paper shows several security weaknesses of a threshold authenticated encryption scheme. A new threshold authenticated encryption scheme using labor-division signature is proposed without redundancy added to messa... 详细信息
来源: 评论
Improved quantum "Ping-pong" protocol based on GHZ state and classical XOR operation
收藏 引用
science China(Physics,Mechanics & Astronomy) 2011年 第9期54卷 1612-1618页
作者: LI Jian JIN HaiFei JING Bo State Key Lab of Network and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Department of Computer Science Beijing Institute of Applied Meteorology Beijing 100029 China
In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostrrm and Felbinger [Bostrom K, et al. Phys Rev Lett, 200... 详细信息
来源: 评论
Face Recognition Using Dense SIFT Feature Alignment
收藏 引用
Chinese Journal of Electronics 2016年 第6期25卷 1034-1039页
作者: ZHOU Quan Shafiq ur Rehman ZHOU Yu WEI Xin WANG Lei ZHENG Baoyu Key Lab of Ministry of Education for Broad Band Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Department of Applied Physics and Electronics Ume University School of Computer Science Beijing University of Posts and Telecommunications
This paper addresses face recognition problem in a more challenging scenario where the training and test samples are both subject to the visual variations of poses, expressions and misalignments. We employ dense Scale... 详细信息
来源: 评论
Secure fusion of encrypted remote sensing images based on Brovey
收藏 引用
science China(Information sciences) 2021年 第2期64卷 243-245页
作者: Junzhi YANG Guohua CHENG Meng SHEN School of Information and Electronics Beijing Institute of Technology School of Computer Science Beijing Institute of Technology Key Lab of Information Network Security of Ministry of Public Security (The Third Research Institute of Ministry of Public Security)
Dear editor,In the field of image fusion, panchromatic images captured by the Satellite Pour l'Observation de la Terre(SPOT) [1]have high spatial resolutions, whereas their spectral resolutions are relatively low.... 详细信息
来源: 评论
An ensemble method for job recommender systems  10
An ensemble method for job recommender systems
收藏 引用
10th ACM Conference on Recommender Systems Challenge, RecSys Challenge 2016
作者: Zhang, Chenrui Cheng, Xueqi CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China
In this paper, we present an ensemble method for job recommendation to ACM RecSys Challenge 2016. Given a user, the goal of a job recommendation system is to predict those job postings that are likely to be relevant t... 详细信息
来源: 评论
A fast traffic classification method based on SDN network
A fast traffic classification method based on SDN network
收藏 引用
作者: Li, Wei Li, Guojun Yu, Xiufen Key Lab of Beijing Network Technology School of Computer Science and Engineering Beihang University Beijing China
With the development of mobile Internet, the functionality and portability of mobile device have changed greatly. Many users gradually adapt to using a variety of applications on mobile devices. Mobile applications ar... 详细信息
来源: 评论
Dynamic-K recommendation with personalized decision boundary  23rd
Dynamic-K recommendation with personalized decision boundary
收藏 引用
23rd China conference on Information Retrieval, CCIR 2017
作者: Gao, Yan Guo, Jiafeng Lan, Yanyan Liao, Huaming CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China
In this paper, we investigate the recommendation task in the most common scenario with implicit feedback (e.g., clicks, purchases). State-of-the-art methods in this direction usually cast the problem as to learn a per... 详细信息
来源: 评论
M-DRL: Deep Reinforcement Learning Based Coflow Traffic Scheduler with MLFQ Threshold Adaption  17th
M-DRL: Deep Reinforcement Learning Based Coflow Traffic Sche...
收藏 引用
17th IFIP WG 10.3 International Conference on network and Parallel Computing, NPC 2020
作者: Chen, Tianba Li, Wei Sun, YuKang Li, Yunchun Beijing Key Lab of Network Technology School of Computer Science and Engineering Beihang University Beijing China
The coflow scheduling in data-parallel clusters can improve application-level communication performance. The existing coflow scheduling method without prior knowledge usually uses Multi-Level Feedback Queue (MLFQ) wit... 详细信息
来源: 评论