咨询与建议

限定检索结果

文献类型

  • 104 篇 会议
  • 67 篇 期刊文献

馆藏范围

  • 171 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 124 篇 工学
    • 101 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 35 篇 信息与通信工程
    • 14 篇 控制科学与工程
    • 10 篇 机械工程
    • 8 篇 电气工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 6 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 光学工程
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
  • 57 篇 理学
    • 41 篇 数学
    • 12 篇 物理学
    • 7 篇 生物学
    • 6 篇 统计学(可授理学、...
  • 38 篇 管理学
    • 22 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
  • 8 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 3 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
    • 3 篇 作物学

主题

  • 9 篇 cryptography
  • 8 篇 privacy
  • 6 篇 semantics
  • 6 篇 training
  • 5 篇 wireless sensor ...
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 computational mo...
  • 4 篇 security
  • 4 篇 accuracy
  • 4 篇 adaptation model...
  • 3 篇 image segmentati...
  • 3 篇 optimization
  • 3 篇 authentication
  • 3 篇 real-time system...
  • 3 篇 blockchain
  • 3 篇 protocols
  • 3 篇 malware
  • 3 篇 federated learni...
  • 3 篇 cloud computing

机构

  • 8 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 beijing key lab....
  • 8 篇 guangxi collabor...
  • 6 篇 school of comput...
  • 5 篇 shanghai key lab...
  • 5 篇 nanjing fenghuo ...
  • 4 篇 school of comput...
  • 4 篇 ministry of edu....
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 4 篇 key lab. of comp...
  • 4 篇 school of comput...
  • 4 篇 key lab of compu...
  • 4 篇 college of infor...
  • 4 篇 purple mountain ...
  • 4 篇 key laboratory o...
  • 4 篇 key lab. of comp...
  • 4 篇 guangxi key lab ...
  • 4 篇 jiangsu high tec...

作者

  • 11 篇 wang yun
  • 9 篇 li hui
  • 8 篇 chunhe xia
  • 8 篇 tianbo wang
  • 8 篇 he jieyue
  • 7 篇 yun wang
  • 6 篇 chen chen
  • 6 篇 zhang min-ling
  • 5 篇 mi jiacong
  • 5 篇 feng yu
  • 5 篇 liu yongshan
  • 5 篇 zhang yu
  • 4 篇 fan kai
  • 4 篇 jinbin tu
  • 4 篇 xin geng
  • 4 篇 tu jinbin
  • 4 篇 ma wenping
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 yu zhang

语言

  • 149 篇 英文
  • 12 篇 中文
  • 10 篇 其他
检索条件"机构=Key Lab. of Computer Network and Information Integration"
171 条 记 录,以下是21-30 订阅
排序:
Distance estimation by constructing the virtual ruler in anisotropic sensor networks
Distance estimation by constructing the virtual ruler in ani...
收藏 引用
IEEE INFOCOM 2010
作者: Wang, Yun Li, Kai Wu, Jie School of Computer Science and Engineering Southeast University Key Lab. of Computer Network and Information Integration Nanjing 210096 China Department of Computer and Information Sciences Temple University Philadelphia PA 119122 United States
Distance estimation is fundamental for many functionalities of wireless sensor networks and has been studied intensively in recent years. A critical challenge in distance estimation is handling anisotropic problems in... 详细信息
来源: 评论
A Meta Meeting Mountain based opportunistic message forwarding strategy
A Meta Meeting Mountain based opportunistic message forwardi...
收藏 引用
作者: Tu, Jinbin Wang, Yun Liu, Yichuan Li, Qing School of Computer Science and Engineering Southeast University Nanjing China Key Lab of Computer Network and Information Integration MOE Nanjing China
The opportunistic network is a type of ad hoc network that relies on the chance encounters between nodes to transmit messages. It also uses store-and-carry-forward techniques for data transfer between nodes. Developin... 详细信息
来源: 评论
Funny words detection via Contrastive Representations and Pre-trained Language Model  2
Funny words detection via Contrastive Representations and Pr...
收藏 引用
2nd International Seminar on Artificial Intelligence, networking and information Technology, AINIT 2021
作者: Du, Yiming Tian, Zelin Key Lab of Computer Network and Information Integration Nanjing China University of British Columbia Dept. Computer Science Vancouver Canada
Funniness detection of news headlines is a challenging task in computational linguistics. However, most existing works on funniness detection mainly tackle the scenario by simply judging whether a sentence is humorous... 详细信息
来源: 评论
D-TDMA: An approach of dynamic TDMA scheduling for target tracking in wireless sensor networks
D-TDMA: An approach of dynamic TDMA scheduling for target tr...
收藏 引用
2010 IEEE/ACM International Conference on Green Computing and Communications, GreenCom 2010, 2010 IEEE/ACM International Conference on Cyber, Physical and Social Computing, CPSCom 2010
作者: Wang, Yun Shi, Peizhong Li, Kai Chen, Zhikui Department of Computer Science and Engineering Southeast University Key Lab. of Computer Network and Information Integration Nanjing 210096 China School of Software Technology Dalian University of Technology Dalian 116024 China
In the application of target tracking based on dynamic convey tree-based collab.ration (DCTC) in wireless sensor networks, collisions and interferences among nodes pose a challenge for data aggregation. In this paper,... 详细信息
来源: 评论
A link analysis for passive UHF RFID system in LOS indoor environment
A link analysis for passive UHF RFID system in LOS indoor en...
收藏 引用
2008 International Conference on Wireless Communications, networking and Mobile Computing, WiCOM 2008
作者: Hong, Gang Wang Chang, Xing Petitioner Chang, Hua Zhu Ministry of Education Key Lab. Computer Network and Information Security Xidian University Xi'an China
A link analysis model for passive UHF RFID system in LOS indoor environment is developed and demonstrated. Using this model, the power received by tag and the read performance are investigated. The multipath fading an... 详细信息
来源: 评论
Temporally or spatially dispersed joint RFID estimation using snapshots of variable lengths  15
Temporally or spatially dispersed joint RFID estimation usin...
收藏 引用
16th ACM International Symposium on Mobile Ad Hoc networking and Computing, MobiHoc 2015
作者: Xiao, Qingjun Chen, Min Chen, Shigang Zhou, Yian Key Lab of Computer Network and Information Integration Southeast University Ministry of Education China Department of Computer and Information Science and Engineering University of Florida GainesvilleFL United States
Radio-frequency identification (RFID) technology has been widely used in applications such as inventory control, object tracking, supply chain management. An important research is to estimate the number of tags in a c... 详细信息
来源: 评论
Person video alignment with human pose registration
收藏 引用
Frontiers of computer Science 2023年 第4期17卷 229-231页
作者: Yu ZHANG Zihua WANG Jingyang ZHOU Siya MI School of Computer Science and Engineering and the Key Lab of Computer Network and Information Integration(Ministry of Education)Southeast UniversityNanjing 211189China School of Cyber Science and Engineering Southeast UniversityNanjing 211189China Purple Mountain Laboratories Nanjing 211111China
1 Introduction and main *** alignment,especially human action alignment,is a challenging *** purpose is to develop an algorithm to match the same process so that videos can be *** the progress that has been made in im... 详细信息
来源: 评论
Hyper-compact virtual estimators for big network data based on register sharing
Hyper-compact virtual estimators for big network data based ...
收藏 引用
ACM SIGMETRICS International Conference on Measurement and Modeling of computer Systems, SIGMETRICS 2015
作者: Xiao, Qingjun Chen, Shigang Chen, Min Ling, Yibei Department of Computer and Information Science and Engineering University of Florida GainesvilleFL United States Key Lab. of Computer Network and Information Integration Southeast University Ministry of Education China Telcordia Technologies and Applied Research Ericsson United States
Cardinality estimation over big network data consisting of numerous flows is a fundamental problem with many practical applications. Traditionally the research on this problem focused on using a small amount of memory... 详细信息
来源: 评论
Web service selection with quantitative and qualitative user preferences
Web service selection with quantitative and qualitative user...
收藏 引用
2011 IEEE/WIC/ACM International Conference on Web Intelligence, WI 2011
作者: Wang, Hongbing Liu, Weihong Key Lab of Computer Network and Information Integration School of Computer Science and Engineering Southeast University 211189 China School of Computer Science Anhui Unversity of Technology 243002 China
Most existing approaches of Web service selection with user preferences are either quantitative or qualitative. However, using a qualitative or quantitative approach alone cannot handle all the non-functional properti... 详细信息
来源: 评论
Logistic boosting regression for lab.l distribution learning?
Logistic boosting regression for label distribution learning...
收藏 引用
2016 IEEE Conference on computer Vision and Pattern Recognition, CVPR 2016
作者: Xing, Chao Geng, Xin Xue, Hui Key Lab of Computer Network and Information Integration Ministry of Education School of Computer Science and Engineering Southeast University Nanjing211189 China
lab.l Distribution Learning (LDL) is a general learning framework which includes both single lab.l and multi-lab.l learning as its special cases. One of the main assumptions made in traditional LDL algorithms is the d... 详细信息
来源: 评论