咨询与建议

限定检索结果

文献类型

  • 104 篇 会议
  • 67 篇 期刊文献

馆藏范围

  • 171 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 124 篇 工学
    • 101 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 35 篇 信息与通信工程
    • 14 篇 控制科学与工程
    • 10 篇 机械工程
    • 8 篇 电气工程
    • 7 篇 电子科学与技术(可...
    • 7 篇 生物工程
    • 6 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 光学工程
    • 3 篇 仪器科学与技术
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
  • 57 篇 理学
    • 41 篇 数学
    • 12 篇 物理学
    • 7 篇 生物学
    • 6 篇 统计学(可授理学、...
  • 38 篇 管理学
    • 22 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 7 篇 工商管理
  • 8 篇 法学
    • 7 篇 社会学
  • 8 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
    • 3 篇 公共卫生与预防医...
    • 3 篇 药学(可授医学、理...
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 农学
    • 3 篇 作物学

主题

  • 9 篇 cryptography
  • 8 篇 privacy
  • 6 篇 semantics
  • 6 篇 training
  • 5 篇 wireless sensor ...
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 computational mo...
  • 4 篇 security
  • 4 篇 accuracy
  • 4 篇 adaptation model...
  • 3 篇 image segmentati...
  • 3 篇 optimization
  • 3 篇 authentication
  • 3 篇 real-time system...
  • 3 篇 blockchain
  • 3 篇 protocols
  • 3 篇 malware
  • 3 篇 federated learni...
  • 3 篇 cloud computing

机构

  • 8 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 beijing key lab....
  • 8 篇 guangxi collabor...
  • 6 篇 school of comput...
  • 5 篇 shanghai key lab...
  • 5 篇 nanjing fenghuo ...
  • 4 篇 school of comput...
  • 4 篇 ministry of edu....
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 4 篇 key lab. of comp...
  • 4 篇 school of comput...
  • 4 篇 key lab of compu...
  • 4 篇 college of infor...
  • 4 篇 purple mountain ...
  • 4 篇 key laboratory o...
  • 4 篇 key lab. of comp...
  • 4 篇 guangxi key lab ...
  • 4 篇 jiangsu high tec...

作者

  • 11 篇 wang yun
  • 9 篇 li hui
  • 8 篇 chunhe xia
  • 8 篇 tianbo wang
  • 8 篇 he jieyue
  • 7 篇 yun wang
  • 6 篇 chen chen
  • 6 篇 zhang min-ling
  • 5 篇 mi jiacong
  • 5 篇 feng yu
  • 5 篇 liu yongshan
  • 5 篇 zhang yu
  • 4 篇 fan kai
  • 4 篇 jinbin tu
  • 4 篇 xin geng
  • 4 篇 tu jinbin
  • 4 篇 ma wenping
  • 4 篇 wang yue
  • 4 篇 hu yupu
  • 4 篇 yu zhang

语言

  • 149 篇 英文
  • 12 篇 中文
  • 10 篇 其他
检索条件"机构=Key Lab. of Computer Network and Information Integration"
171 条 记 录,以下是81-90 订阅
排序:
Combining opportunistic routing with dynamic source routing for wireless mesh networks
Combining opportunistic routing with dynamic source routing ...
收藏 引用
Institution of Engineering and Technology International Communication Conference on Wireless Mobile and Computing
作者: Shen, Qiang Fang, Xuming Kim, Sunmyeng He, Rong Provincial Key Lab. of Information Coding and Transmission Southwest Jiaotong University Chengdu 610031 China High Performance Network Lab. Institute of Acoustics Chinese Academy of Sciences Beijing 100190 China School of Computer and Software Engineering Kumoh National Institute of Technology Gyeongbuk 730701 Korea Republic of
Routing in wireless mesh networks presents a great challenge due to unreliable wireless links and collisions. Recently, a new routing method, opportunistic routing (OR), is proposed to deal with them by exploiting bro... 详细信息
来源: 评论
Exploiting Conjugate lab.l information for Multi-Instance Partial-lab.l Learning
arXiv
收藏 引用
arXiv 2024年
作者: Tang, Wei Zhang, Weijia Zhang, Min-Ling School of Computer Science and Engineering Southeast University Nanjing210096 China Key Lab. of Computer Network and Information Integration Southeast University MoE China School of Information and Physical Sciences The University of Newcastle NSW2308 Australia
Multi-instance partial-lab.l learning (MIPL) addresses scenarios where each training sample is represented as a multi-instance bag associated with a candidate lab.l set containing one true lab.l and several false posi...
来源: 评论
Disentangled high quality salient object detection
arXiv
收藏 引用
arXiv 2021年
作者: Tang, Lv Li, Bo Ding, Shouhong Song, Mofei Youtu Lab Tencent Shanghai China School of Computer Science and Engineering Key Lab of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
Aiming at discovering and locating most distinctive objects from visual scenes, salient object detection (SOD) plays an essential role in various computer vision systems. Coming to the era of high resolution, SOD meth... 详细信息
来源: 评论
An improved identity-based group signature scheme
An improved identity-based group signature scheme
收藏 引用
2009 International Conference on Computational Intelligence and Security, CIS 2009
作者: Tan, Zuowen School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 Jiangxi Province China Key Lab. of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou 350007 Fujian Province China
In a group signature scheme, a group member signs messages anonymously on behalf of the group. However, in the case of a dispute, the actual group signer's identity can be revealed by a designated entity. In this ... 详细信息
来源: 评论
Multiple influence maximization in social networks  10
Multiple influence maximization in social networks
收藏 引用
10th International Conference on Ubiquitous information Management and Communication, IMCOM 2016
作者: Sun, Honglin Gao, Xiaofeng Chen, Guihai Gu, Jian Wang, Yongjian Shanghai Key Lab. of Scalable Computing and Systems Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Key Laboratory of Information Network Security of Ministry of Public Security Third Research Institute of Ministry of Public Security Shanghai China
Influence Maximization, a technique of social analysis to help marketers select a small group of users to promote their products with the goal of maximizing their influence spread, has been studied for a long time. Ho... 详细信息
来源: 评论
pService: Towards similarity search on peer-to-peer web services discovery
pService: Towards similarity search on peer-to-peer web serv...
收藏 引用
1st International Conference on Advances in P2P Systems, AP2PS 2009
作者: Zhou, Gang Yu, Jianjun National Digital Switching System Engineering and Technological Research Center 450002 France State Key Lab. of Software Development Environment Beihang University 100191 China Computer Network Information Center Chinese Academy of Sciences 100190 China
We present the design of pService system for P2P Web services discovery supporting similarity earch with its locality-preserving feature based on modified Skip Graph. In pService, the most important property (e.g. ser... 详细信息
来源: 评论
Study of secret sharing schemes based on quantum theory
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第11 A期30卷 127-132+139页
作者: Zhu, Zhen-Chao Zhang, Yu-Qing Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 China National Computer Network Intrusion Protection Center GUCAS Beijing 100043 China
Quantum secret sharing (QSS) which is based on the laws of quantum mechanics, instead of mathematical assumptions can share the information unconditionally securely, according to the form of sharing information, quant... 详细信息
来源: 评论
Mining Latent Classes for Few-shot Segmentation
Mining Latent Classes for Few-shot Segmentation
收藏 引用
International Conference on computer Vision (ICCV)
作者: Lihe Yang Wei Zhuo Lei Qi Yinghuan Shi Yang Gao State Key Laboratory for Novel Software Technology Nanjing University Tencent Key Lab of Computer Network and Information Integration (Ministry of Education) Southeast University
Few-shot segmentation (FSS) aims to segment unseen classes given only a few annotated samples. Existing methods suffer the problem of feature undermining, i.e., potential novel classes are treated as background during... 详细信息
来源: 评论
Efficient (t, n) secret sharing scheme against cheating
收藏 引用
Journal of Computational information Systems 2012年 第9期8卷 3815-3821页
作者: Liu, Yanxiao Zhang, Yuqing Hu, Yupu Key Lab. of Computer Networks and Information Security of Ministry of Education Xidian University China National Computer Network Intrusion Protection Center GUCAS China
A (t, n) secret sharing (SS) scheme can be divided into two protocols: share generation protocol and secret reconstruction protocol. In share generation protocol, a mutually trusted dealer selects a secret and distrib... 详细信息
来源: 评论
Funny words detection via Contrastive Representations and Pre-trained Language Model
Funny words detection via Contrastive Representations and Pr...
收藏 引用
Artificial Intelligence, networking and information Technology (AINIT), International Seminar on
作者: Yiming Du Zelin Tian Key Lab of Computer Network and Information Integration School of Computer Science and Engineering- Southeast University (SEU) Nanjing China University of British Columbia Vancouver Canada
Funniness detection of news headlines is a challenging task in computational linguistics. However, most existing works on funniness detection mainly tackle the scenario by simply judging whether a sentence is humorous... 详细信息
来源: 评论