咨询与建议

限定检索结果

文献类型

  • 104 篇 会议
  • 67 篇 期刊文献

馆藏范围

  • 171 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 124 篇 工学
    • 101 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 35 篇 信息与通信工程
    • 14 篇 控制科学与工程
    • 10 篇 机械工程
    • 8 篇 电气工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 6 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 光学工程
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
  • 57 篇 理学
    • 41 篇 数学
    • 12 篇 物理学
    • 7 篇 生物学
    • 6 篇 统计学(可授理学、...
  • 38 篇 管理学
    • 22 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
  • 8 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 3 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
    • 3 篇 作物学

主题

  • 9 篇 cryptography
  • 8 篇 privacy
  • 6 篇 semantics
  • 6 篇 training
  • 5 篇 wireless sensor ...
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 computational mo...
  • 4 篇 security
  • 4 篇 accuracy
  • 4 篇 adaptation model...
  • 3 篇 image segmentati...
  • 3 篇 optimization
  • 3 篇 authentication
  • 3 篇 real-time system...
  • 3 篇 blockchain
  • 3 篇 protocols
  • 3 篇 malware
  • 3 篇 federated learni...
  • 3 篇 cloud computing

机构

  • 8 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 beijing key lab....
  • 8 篇 guangxi collabor...
  • 6 篇 school of comput...
  • 5 篇 shanghai key lab...
  • 5 篇 nanjing fenghuo ...
  • 4 篇 school of comput...
  • 4 篇 ministry of edu....
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 4 篇 key lab. of comp...
  • 4 篇 school of comput...
  • 4 篇 key lab of compu...
  • 4 篇 college of infor...
  • 4 篇 purple mountain ...
  • 4 篇 key laboratory o...
  • 4 篇 key lab. of comp...
  • 4 篇 guangxi key lab ...
  • 4 篇 jiangsu high tec...

作者

  • 11 篇 wang yun
  • 9 篇 li hui
  • 8 篇 chunhe xia
  • 8 篇 tianbo wang
  • 8 篇 he jieyue
  • 7 篇 yun wang
  • 6 篇 chen chen
  • 6 篇 zhang min-ling
  • 5 篇 mi jiacong
  • 5 篇 feng yu
  • 5 篇 liu yongshan
  • 5 篇 zhang yu
  • 4 篇 fan kai
  • 4 篇 jinbin tu
  • 4 篇 xin geng
  • 4 篇 tu jinbin
  • 4 篇 ma wenping
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 yu zhang

语言

  • 149 篇 英文
  • 12 篇 中文
  • 10 篇 其他
检索条件"机构=Key Lab. of Computer Network and Information Integration"
171 条 记 录,以下是1-10 订阅
排序:
Benchmarking Temporal Reasoning and Alignment Across Chinese Dynasties
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Zhenglin Wu, Jialong Li, Pengfei Jiang, Yong Zhou, Deyu School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China Tongyi Lab Alibaba Group China
Temporal reasoning is fundamental to human cognition and is crucial for various real-world applications. While recent advances in Large Language Models have demonstrated promising capabilities in temporal reasoning, e... 详细信息
来源: 评论
lab.l distribution learning for scene text detection
收藏 引用
Frontiers of computer Science 2023年 第6期17卷 5-12页
作者: Haoyu MA Ningning LU Junjun MEI Tao GUAN Yu ZHANG Xin GENG School of Computer Science and Engineering and the Key Lab of Computer Network and Information Integration(Ministry of Education)Southeast UniversityNanjing 211189China ZTE Corporation Nanjing 210012China
Recently,segmentation-based scene text detection has drawn a wide research interest due to its flexibility in describing scene text instance of arbitrary shapes such as curved ***,existing methods usually need complex... 详细信息
来源: 评论
A genetic algorithm for multiple mobile data collectors' path planning in WSNs
A genetic algorithm for multiple mobile data collectors' pat...
收藏 引用
2012 International Conference on information Technology and Software Engineering, ITSE 2012
作者: Shen, Zhuowei Cao, Min Key Lab. of Computer Network and Information Integration School of Computer and Engineering Southeast University Nanjing China
In mobile data collector (MDC)-based wireless sensor networks, we need to design paths for MDCs for better data collection. In this paper, we use predictable mobility pattern and apply a heuristic algorithm to design ... 详细信息
来源: 评论
DRL-Based Optimization for AoI and Energy Consumption in C-V2X Enabled IoV
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green Communications and networking 2025年
作者: Zhang, Zheng Wu, Qiong Fan, Pingyi Cheng, Nan Chen, Wen Letaief, Khaled B. Jiangnan University School of Internet of Things Engineering Wuxi214122 China Tsinghua University Beijing National Research Center for Information Science and Technology Department of Electronic Engineering State Key laboratory of Space Network and Communications Tsinghua University Beijing100084 China Xidian University State Key Lab. of ISN School of Telecom-munications Engineering Xi'an710071 China Shanghai Jiao Tong University Department of Electronic Engineering Shanghai200240 China Department of Electrical and Computer Engineer-ing Hong Kong
To address communication latency issues, the Third Generation Partnership Project (3GPP) has defined Cellular-Vehicle to Everything (C-V2X) technology, which includes Vehicle-to-Vehicle (V2V) communication for direct ... 详细信息
来源: 评论
Non-blocking message total ordering protocol
收藏 引用
Science in China(Series F) 2008年 第12期51卷 1919-1934页
作者: WANG Yun & WANG JunLing School of computer Science & Engineering, Southeast University key lab.of computer network & information integration, MOE, Nanjing 210096, China 1. School of Computer Science & Engineering Southeast University Key Lab of Computer Network & Information Integration MOE Nanjing 210096 China
Message total ordering is a critical part in active replication in order to maintain consistency among members in a fault tolerant group. The paper proposes a non-blocking message total ordering protocol (NBTOP) for... 详细信息
来源: 评论
KGAPG: Knowledge-Aware Neural Group Representation Learning for Attentive Prescription Generation of Traditional Chinese Medicine
KGAPG: Knowledge-Aware Neural Group Representation Learning ...
收藏 引用
2021 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2021
作者: Li, Shuchen Wang, Wei He, Jieyue MOE Southeast University Key Lab of Computer Network Information Integration Nanjing China
Prescriptions play an essential role in the process of Traditional Chinese Medicine (TCM) diagnosis and treatment. Prescription generation is to generate a set of herbs to treat the symptoms of a patient by analyzing ... 详细信息
来源: 评论
Calibration Bottleneck: Over-compressed Representations are Less Calibratable  41
Calibration Bottleneck: Over-compressed Representations are ...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Wang, Deng-Bao Zhang, Min-Ling School of Computer Science and Engineering Southeast University Nanjing China Key Lab. of Computer Network and Information Integration Southeast University MOE China
Although deep neural networks have achieved remarkable success, they often exhibit a significant deficiency in reliable uncertainty calibration. This paper focus on model calibratability, which assesses how amenable a... 详细信息
来源: 评论
A feedback-based timeout packets dropping strategy in real-time wireless sensor networks
收藏 引用
2nd World Congress on computer Science and information Engineering, CSIE 2011
作者: Shen, Zhuowei Xu, Peng Xu, Xiaoxi Key Lab. of Computer Network and Information Integration Ministry of Education School of Computer Sci. and Eng. Southeast University Nanjing China
Resource limited real-time wireless sensor network is a new type of application of sensor network. In this kind of networks, there are numerous invalid real-time packets, which have already expired or are destined to ... 详细信息
来源: 评论
A distributed topology control algorithm for k-connected dominating set in wireless sensor networks
A distributed topology control algorithm for k-connected dom...
收藏 引用
2007 2nd International Conference on Pervasive Computing and Applications, ICPCA'07
作者: Yun, Wang Kai, Li Qiang, Xu Lab. of Computer Network and Information Integration Southeast University Ministry of Education Nanjing 210096 China
Potential applications have fostered the rapid development of wireless sensor network. Power control technology contributes as a fundamental part in fault tolerant topology control, through which simplified reliably c... 详细信息
来源: 评论
A novel secure routing system in overlay environment
收藏 引用
4th International Conference on Grid and Cooperative Computing - GCC 2005
作者: Su, Han Wang, Yun Department of Computer Science and Engineering Lab. of Computer Network and Information Integration Southeast University Nanjing 210096 China
Routers are effective building blocks for Internet. It is almost impossible to modify router software only for applications. How to satisfy applications' specific requirements of communication is a big problem. No... 详细信息
来源: 评论