咨询与建议

限定检索结果

文献类型

  • 104 篇 会议
  • 67 篇 期刊文献

馆藏范围

  • 171 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 124 篇 工学
    • 101 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 35 篇 信息与通信工程
    • 14 篇 控制科学与工程
    • 10 篇 机械工程
    • 8 篇 电气工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 6 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 光学工程
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
  • 57 篇 理学
    • 41 篇 数学
    • 12 篇 物理学
    • 7 篇 生物学
    • 6 篇 统计学(可授理学、...
  • 38 篇 管理学
    • 22 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
  • 8 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 3 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
    • 3 篇 作物学

主题

  • 9 篇 cryptography
  • 8 篇 privacy
  • 6 篇 semantics
  • 6 篇 training
  • 5 篇 wireless sensor ...
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 computational mo...
  • 4 篇 security
  • 4 篇 accuracy
  • 4 篇 adaptation model...
  • 3 篇 image segmentati...
  • 3 篇 optimization
  • 3 篇 authentication
  • 3 篇 real-time system...
  • 3 篇 blockchain
  • 3 篇 protocols
  • 3 篇 malware
  • 3 篇 federated learni...
  • 3 篇 cloud computing

机构

  • 8 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 beijing key lab....
  • 8 篇 guangxi collabor...
  • 6 篇 school of comput...
  • 5 篇 shanghai key lab...
  • 5 篇 nanjing fenghuo ...
  • 4 篇 school of comput...
  • 4 篇 ministry of edu....
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 4 篇 key lab. of comp...
  • 4 篇 school of comput...
  • 4 篇 key lab of compu...
  • 4 篇 college of infor...
  • 4 篇 purple mountain ...
  • 4 篇 key laboratory o...
  • 4 篇 key lab. of comp...
  • 4 篇 guangxi key lab ...
  • 4 篇 jiangsu high tec...

作者

  • 11 篇 wang yun
  • 9 篇 li hui
  • 8 篇 chunhe xia
  • 8 篇 tianbo wang
  • 8 篇 he jieyue
  • 7 篇 yun wang
  • 6 篇 chen chen
  • 6 篇 zhang min-ling
  • 5 篇 mi jiacong
  • 5 篇 feng yu
  • 5 篇 liu yongshan
  • 5 篇 zhang yu
  • 4 篇 fan kai
  • 4 篇 jinbin tu
  • 4 篇 xin geng
  • 4 篇 tu jinbin
  • 4 篇 ma wenping
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 yu zhang

语言

  • 149 篇 英文
  • 12 篇 中文
  • 10 篇 其他
检索条件"机构=Key Lab. of Computer Network and Information Integration"
171 条 记 录,以下是111-120 订阅
排序:
Research on network malicious code dendritic cell immune algorithm based on fuzzy weighted support vector machine
Research on network malicious code dendritic cell immune alg...
收藏 引用
6th China Conference of Wireless Sensor networks, CWSN 2012
作者: Li, Peng Wang, Ruchuan Zhou, Yanting Dai, Qiuyu College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China
According to the significant impact on the accuracy rate of detection of current immune algorithms brought by incorrect classification of signal, it proposes network malicious code dendritic cell immune algorithm base... 详细信息
来源: 评论
A feedback-based timeout packets dropping strategy in real-time wireless sensor networks
收藏 引用
2nd World Congress on computer Science and information Engineering, CSIE 2011
作者: Shen, Zhuowei Xu, Peng Xu, Xiaoxi Key Lab. of Computer Network and Information Integration Ministry of Education School of Computer Sci. and Eng. Southeast University Nanjing China
Resource limited real-time wireless sensor network is a new type of application of sensor network. In this kind of networks, there are numerous invalid real-time packets, which have already expired or are destined to ... 详细信息
来源: 评论
PASS: An adaptive multi-copy routing scheme for intermittently connected mobile Ad Hoc networks
收藏 引用
Journal of Convergence information Technology 2012年 第14期7卷 315-323页
作者: Xu, Jia Wang, Ru Chuan Sun, Li Juan College of Computer Nanjing University of Posts and Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing China Key Laboratory for Computer Network and Information Integration Southeast University Ministry of Education Nanjing China State Key Lab. for Novel Software Technology Nanjing University Nanjing China
Intermittently Connected Mobile Ad Hoc networks (ICMANs) are mobile networks in which complete source-to-destination paths do not exist most of the time. This paper proposed a Predictable Adaptive Seed Spray routing (... 详细信息
来源: 评论
Delay constraint adaptive routing based on seed spray in opportunistic networks
收藏 引用
Journal of Computational information Systems 2012年 第12期8卷 5137-5148页
作者: Xu, Jia Wang, Ruchuan Sun, Lijuan College of Computer Nanjing University of Posts and Telecommunications Nanjing 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technol. Min. of Edu. Jiangsu Prov. Nanjing University of Posts and Telecommunications Nanjing 210003 China Key Laboratory for Computer Network and Information Integration Ministry of Education Southeast University Nanjing 211189 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China
Opportunistic networks are sparse wireless networks which have no complete path from the source to the destination most of the time. Many applications require the support of delay constrained routing mechanism which c... 详细信息
来源: 评论
Robust evidence detection of copy-rotate-move forgery in image based on singular value decomposition
Robust evidence detection of copy-rotate-move forgery in ima...
收藏 引用
14th International Conference on information and Communications Security, ICICS 2012
作者: Yong, Liu Meishan, Huang Bogang, Lin College of Mathematics and Computer Science Fuzhou University Fuzhou 350108 China Key Lab. of Information Security of Network Systems Fuzhou 350108 China
Region Copy-Move forgery, in which a part of the image is copied and then pasted to another part of the same image. Some important goals and sensitive objects can be hidden imperceptibly;this forgery is at the rather ... 详细信息
来源: 评论
A fault-tolerant multicast tree approach based on the family hierarchy tunnel
A fault-tolerant multicast tree approach based on the family...
收藏 引用
16th International Conference on Mechatronics Technology, ICMT 2012
作者: Zhou, Yan-Ling Shen, Yu-Feng Key Lab. of Network and Intelligent Information Processing Department of Computer Science and Technology University Hefei Anhui China Computer Science and Technology Anhui Sanlian University Hefei Anhui China
Fault-tolerant recovery in Multicast communication is an important issue. An ideal multicast fault-tolerant approach can save network resources, reduce the delay and cost, realize quick recovery. In this paper, we pro... 详细信息
来源: 评论
Efficient (t, n) secret sharing scheme against cheating
收藏 引用
Journal of Computational information Systems 2012年 第9期8卷 3815-3821页
作者: Liu, Yanxiao Zhang, Yuqing Hu, Yupu Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian University China National Computer Network Intrusion Protection Center GUCAS China
A (t, n) secret sharing (SS) scheme can be divided into two protocols: share generation protocol and secret reconstruction protocol. In share generation protocol, a mutually trusted dealer selects a secret and distrib... 详细信息
来源: 评论
QoS-based data aggregation technology in wireless sensor networks
QoS-based data aggregation technology in wireless sensor net...
收藏 引用
2011 WASE Global Conference on Science Engineering, GCSE 2011
作者: Chen, Zhengyu Yang, Geng Li, Guohua Xu, Jian Key Lab. of Broadband Wireless Communication and Sensor Network Technology Ministry of Education College of Computer Science and Technology Nanjing University of Post and Telecommunications Nanjing 210046 China School of Information Technology Jinling Institute of Technology Nanjing 211169 China
The main goal of data-aggregation algorithms in wireless sensor networks (WSNs) is to gather and aggregate data in an energy efficient manner so that network lifetime is enhanced. In this article, we focus on QoS-base... 详细信息
来源: 评论
Filter-Based information Selection Mechanism in Publish/Subscribe Middleware
Filter-Based Information Selection Mechanism in Publish/Subs...
收藏 引用
2012 3rd International Conference on information Technology for Manufacturing Systems(ITMS 2012)
作者: Jigang Xiao Yunqing Chen Zhuowei Shen Systems Engineering Research Institute China State Shipbuilding Corporation Key Lab of Computer Network and Information Integration MOE School of Computer Science and Engineering Southeast University
Publish/Subscribe middleware is getting more and more attentions for its feature of loose *** some scenarios,Subscribersof a topic need not all the information belonging to that topic, but only those of interest. To f... 详细信息
来源: 评论
An efficient two-stage level set segmentation framework for overlapping plant leaf image
An efficient two-stage level set segmentation framework for ...
收藏 引用
8th International Conference on Intelligent Computing Technology, ICIC 2012
作者: Wang, Xiao-Feng Min, Hai Key Lab. of Network and Intelligent Information Processing Department of Computer Science and Technology Hefei University Hefei Anhui 230022 China Intelligent Computing Lab. Hefei Institute of Intelligent Machines Chinese Academy of Sciences P.O.Box 1130 Hefei Anhui 230031 China Department of Automation University of Science and Technology of China Hefei Anhui 230027 China
In this paper, an efficient two-stage segmentation framework was proposed to address the plant leaf image with overlapping phenomenon, which is built based on the leaf approximate symmetry and level set evolution theo... 详细信息
来源: 评论