咨询与建议

限定检索结果

文献类型

  • 104 篇 会议
  • 67 篇 期刊文献

馆藏范围

  • 171 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 124 篇 工学
    • 101 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 35 篇 信息与通信工程
    • 14 篇 控制科学与工程
    • 10 篇 机械工程
    • 8 篇 电气工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 6 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 光学工程
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
  • 57 篇 理学
    • 41 篇 数学
    • 12 篇 物理学
    • 7 篇 生物学
    • 6 篇 统计学(可授理学、...
  • 38 篇 管理学
    • 22 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
  • 8 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 3 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
    • 3 篇 作物学

主题

  • 9 篇 cryptography
  • 8 篇 privacy
  • 6 篇 semantics
  • 6 篇 training
  • 5 篇 wireless sensor ...
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 computational mo...
  • 4 篇 security
  • 4 篇 accuracy
  • 4 篇 adaptation model...
  • 3 篇 image segmentati...
  • 3 篇 optimization
  • 3 篇 authentication
  • 3 篇 real-time system...
  • 3 篇 blockchain
  • 3 篇 protocols
  • 3 篇 malware
  • 3 篇 federated learni...
  • 3 篇 cloud computing

机构

  • 8 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 beijing key lab....
  • 8 篇 guangxi collabor...
  • 6 篇 school of comput...
  • 5 篇 shanghai key lab...
  • 5 篇 nanjing fenghuo ...
  • 4 篇 school of comput...
  • 4 篇 ministry of edu....
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 4 篇 key lab. of comp...
  • 4 篇 school of comput...
  • 4 篇 key lab of compu...
  • 4 篇 college of infor...
  • 4 篇 purple mountain ...
  • 4 篇 key laboratory o...
  • 4 篇 key lab. of comp...
  • 4 篇 guangxi key lab ...
  • 4 篇 jiangsu high tec...

作者

  • 11 篇 wang yun
  • 9 篇 li hui
  • 8 篇 chunhe xia
  • 8 篇 tianbo wang
  • 8 篇 he jieyue
  • 7 篇 yun wang
  • 6 篇 chen chen
  • 6 篇 zhang min-ling
  • 5 篇 mi jiacong
  • 5 篇 feng yu
  • 5 篇 liu yongshan
  • 5 篇 zhang yu
  • 4 篇 fan kai
  • 4 篇 jinbin tu
  • 4 篇 xin geng
  • 4 篇 tu jinbin
  • 4 篇 ma wenping
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 yu zhang

语言

  • 149 篇 英文
  • 12 篇 中文
  • 10 篇 其他
检索条件"机构=Key Lab. of Computer Network and Information Integration"
171 条 记 录,以下是31-40 订阅
排序:
PASS: An adaptive multi-copy routing scheme for intermittently connected mobile Ad Hoc networks
收藏 引用
Journal of Convergence information Technology 2012年 第14期7卷 315-323页
作者: Xu, Jia Wang, Ru Chuan Sun, Li Juan College of Computer Nanjing University of Posts and Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing China Key Laboratory for Computer Network and Information Integration Southeast University Ministry of Education Nanjing China State Key Lab. for Novel Software Technology Nanjing University Nanjing China
Intermittently Connected Mobile Ad Hoc networks (ICMANs) are mobile networks in which complete source-to-destination paths do not exist most of the time. This paper proposed a Predictable Adaptive Seed Spray routing (... 详细信息
来源: 评论
Delay constraint adaptive routing based on seed spray in opportunistic networks
收藏 引用
Journal of Computational information Systems 2012年 第12期8卷 5137-5148页
作者: Xu, Jia Wang, Ruchuan Sun, Lijuan College of Computer Nanjing University of Posts and Telecommunications Nanjing 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technol. Min. of Edu. Jiangsu Prov. Nanjing University of Posts and Telecommunications Nanjing 210003 China Key Laboratory for Computer Network and Information Integration Ministry of Education Southeast University Nanjing 211189 China State Key Lab. for Novel Software Technology Nanjing University Nanjing 210093 China
Opportunistic networks are sparse wireless networks which have no complete path from the source to the destination most of the time. Many applications require the support of delay constrained routing mechanism which c... 详细信息
来源: 评论
Full rate and full diversity STBC in decode-and-forward relay systems
Full rate and full diversity STBC in decode-and-forward rela...
收藏 引用
2010 International Conference on Communications and Intelligence information Security, ICCIIS 2010
作者: Wang, Yong Li, Hui Ministry of Education Key Lab. of Computer Network and Information Security School of Telecommunications Engineering Xidian University Xi'an China
Diversity techniques are very effective tools to increase signal reception quality in Rayleigh fading channels. A novel space-time block coding method for cooperative relay networks is proposed which guarantees full d... 详细信息
来源: 评论
Weakly supervised temporal action localization with proxy metric modeling
收藏 引用
Frontiers of computer Science 2023年 第2期17卷 63-72页
作者: Hongsheng XU Zihan CHEN Yu ZHANG Xin GENG Siya MI Zhihong YANG NARI Group Corporation(State Grid Electric Power Research Institute) Nanjing 211106China School of Computer Science and Engineering and the Key Lab of Computer Network and Information Integration(Ministry of Education)Southeast UniversityNanjing 211189China School of Cyber Science and Engineering Southeast UniversityNanjing 211189China Purple Mountain Laboratories Nanjing 211111China
Temporal localization is crucial for action video *** the manual annotations are expensive and time-consuming in videos,temporal localization with weak video-level lab.ls is challenging but *** this paper,we propose a... 详细信息
来源: 评论
Mamba-Sea: A Mamba-based Framework with Global-to-Local Sequence Augmentation for Generalizable Medical Image Segmentation
arXiv
收藏 引用
arXiv 2025年
作者: Cheng, Zihan Guo, Jintao Zhang, Jian Qi, Lei Zhou, Luping Shi, Yinghuan Gao, Yang Shanghai Jiao Tong University School of Medicine Shanghai200025 China National Institute of Healthcare Data Science Nanjing University Jiangsu Nanjing210093 China State Key Laboratory for Novel Software Technology the National Institute of Healthcare Data Science Nanjing University Jiangsu Nanjing210093 China School of Computer Science and Engineering Key Lab of Computer Network and Information Integration Southeast University Jiangsu Nanjing211189 China School of Electrical and Information Engineering The University of Sydney SydneyNSW2006 Australia
To segment medical images with distribution shifts, domain generalization (DG) has emerged as a promising setting to train models on source domains that can generalize to unseen target domains. Existing DG methods are... 详细信息
来源: 评论
On cross-correlation properties of Boolean functions
On cross-correlation properties of Boolean functions
收藏 引用
2009 4th International Conference on Communications and networking in China, CHINACOM 2009
作者: Zhou, Yu Xie, Min Xiao, Guozhen State Key Lab. Integrated Service Network Xidian University Shannxi Xi'an 710071 China Key Laboratory Computer Network and Information Security Xidian University Shannxi Xi'an 710071 China
To measure the correlation between two arbitrary Boolean functions, we propose the two new criteria called the sum-of-squares indicator and the absolute indicator of the cross-correlation. The two indicators generaliz... 详细信息
来源: 评论
Robust evidence detection of copy-rotate-move forgery in image based on singular value decomposition
Robust evidence detection of copy-rotate-move forgery in ima...
收藏 引用
14th International Conference on information and Communications Security, ICICS 2012
作者: Yong, Liu Meishan, Huang Bogang, Lin College of Mathematics and Computer Science Fuzhou University Fuzhou 350108 China Key Lab. of Information Security of Network Systems Fuzhou 350108 China
Region Copy-Move forgery, in which a part of the image is copied and then pasted to another part of the same image. Some important goals and sensitive objects can be hidden imperceptibly;this forgery is at the rather ... 详细信息
来源: 评论
Effects of image lossy compression on palmprint verification performance
Effects of image lossy compression on palmprint verification...
收藏 引用
2010 IEEE International Conference on information Theory and information Security, ICITIS 2010
作者: Li, Hengjian Wang, Jizhi Wang, Yinglong Zhang, Jiashu Shandong Provincial Key Laboratory of computer Network Shandong Computer Science Center Jinan China Sichuan Province Key Lab. of Signal and Information Processing Southwest Jiaotong University Chengdu China
In this paper, we investigate the effects that the lossy image compression has on the performance competitive codes of palmprint verification algorithms. Effects of lossy compression on palmprint recognition performan... 详细信息
来源: 评论
An improved algorithm for Eleman Neural network by adding a modified error function
An improved algorithm for Eleman Neural Network by adding a ...
收藏 引用
4th International Symposium on Neural networks, ISNN 2007
作者: Zhang, Zhiqiang Tang, Zheng Tang, GuoFeng Vairappan, Catherine Wang, XuGang Xiong, RunQun Faculty of Engineering Toyama University Gofuku 3190 Toyama shi 930-8555 Japan Institute of Software Chinese Academy of Sciences Beijing 100080 China Key Lab. of Computer Network and Information Integration Southeast University Nanjing 210096 China
The Eleman Neural network has been widely used in various fields ranging from temporal version of the Exclusive-OR function to the discovery of syntactic categories in natural language date. However, one of the proble... 详细信息
来源: 评论
Twice-Imaging airborne camera system with distributed sensors  21
Twice-Imaging airborne camera system with distributed sensor...
收藏 引用
21st Congress of the International Society for Photogrammetry and Remote Sensing, ISPRS 2008
作者: Zhao, S.H. Yan, L. Duan, X.H. Wu, Y.K. Shen, T.T. Su, M.D. Beijing Key Lab. of Spatial Information Integration and its Application Peking University Beijing100871 China School of Electronics Engineering and Computer Science Peking University Beijing China
Digital airborne cameras play a significant role for aerial Photogrammetry development from analog to full-digital age. Because of the gap between digital sensor performance and Photogrammetry request, digital airborn... 详细信息
来源: 评论