咨询与建议

限定检索结果

文献类型

  • 1,893 篇 会议
  • 1,598 篇 期刊文献

馆藏范围

  • 3,491 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,306 篇 工学
    • 1,682 篇 计算机科学与技术...
    • 1,305 篇 软件工程
    • 606 篇 信息与通信工程
    • 298 篇 电气工程
    • 247 篇 电子科学与技术(可...
    • 231 篇 控制科学与工程
    • 222 篇 生物工程
    • 154 篇 机械工程
    • 129 篇 网络空间安全
    • 111 篇 仪器科学与技术
    • 108 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 76 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,076 篇 理学
    • 630 篇 数学
    • 247 篇 生物学
    • 231 篇 物理学
    • 195 篇 统计学(可授理学、...
    • 94 篇 化学
    • 90 篇 系统科学
  • 670 篇 管理学
    • 386 篇 管理科学与工程(可...
    • 308 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 106 篇 法学
    • 72 篇 社会学
  • 83 篇 医学
    • 67 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 39 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 152 篇 feature extracti...
  • 128 篇 semantics
  • 121 篇 accuracy
  • 92 篇 computational mo...
  • 87 篇 training
  • 84 篇 federated learni...
  • 71 篇 data models
  • 62 篇 deep learning
  • 54 篇 robustness
  • 53 篇 data mining
  • 51 篇 protocols
  • 50 篇 adaptation model...
  • 49 篇 privacy
  • 48 篇 transformers
  • 48 篇 optimization
  • 47 篇 neural networks
  • 47 篇 visualization
  • 47 篇 clustering algor...
  • 46 篇 security
  • 46 篇 cryptography

机构

  • 265 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 168 篇 school of comput...
  • 85 篇 key laboratory o...
  • 67 篇 college of compu...
  • 66 篇 computer network...
  • 64 篇 shandong provinc...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 49 篇 beijing key labo...
  • 45 篇 school of cyber ...
  • 45 篇 institute of inf...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 39 篇 key laboratory o...
  • 38 篇 fujian provincia...
  • 38 篇 university of ch...

作者

  • 47 篇 zhao yao
  • 40 篇 ren jiadong
  • 37 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 xiaoming wu
  • 26 篇 guo wenzhong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 xiangzhi liu
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang

语言

  • 2,955 篇 英文
  • 419 篇 其他
  • 142 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3491 条 记 录,以下是2781-2790 订阅
排序:
Robust energy-efficient power loading for MIMO system under imperfect CSI
Robust energy-efficient power loading for MIMO system under ...
收藏 引用
作者: Rui, Yun Deng, Lei Wang, Qian Li, Jing Qian, Guoming Li, Mingqi Wang, Yingguan Shanghai Advanced Research Institute National Mobile Communications Research Laboratory Southeast University 201210 China Department of Information Engineering Chinese University of Hong Kong Hong Kong999077 Hong Kong School of Computer Science Wuhan University 430072 China State Key Laboratory of Integrated Service Networks Xidian University 710075 China College of Electronic Science and Engineering in NUPT 210003 China Shanghai Advanced Research Institute Chinese Academic of Science 201210 China Key Lab of Wireless Sensor Network and Communications Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences 201210 China
In this paper, we will investigate the energy efficient power loading problem in multipleinput multiple-output singular value decomposition (MIMO-SVD) architecture. Most existing power loading schemes are developed on... 详细信息
来源: 评论
RNA secondary structure prediction based on density-based clustering
收藏 引用
ICIC Express Letters 2015年 第7期9卷 1965-1970页
作者: Wang, Changwu Wang, Xiuqin Wang, Baowen Liu, Wenyuan Wei, Zhenzhen Li, Yongqiang School of Information Science and Engineering Yanshan University No. 438 Hebei Ave Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University No. 438 Hebei Ave Qinhuangdao China Department of Information The First Hospital of Qinhuangdao No. 258 Hebei Ave Qinhuangdao China
The ribonucleic acid (RNA) secondary structure prediction has designed to characterize the ensemble of structures, instead of only computing the minimum free energy structure. Clustering methods are brought to aid in ... 详细信息
来源: 评论
Phase detection based range estimation with a dual-band robust Chinese remainder theorem
收藏 引用
Science China(information Sciences) 2014年 第2期57卷 18-26页
作者: YANG Bin WANG WenJie XIA XiangGen YIN QinYe Ministry of Education (MOE) Key Laboratory for Intelligent Networks and Network Security School of Electronics and Information EngineeringXi’an Jiaotong University Department of Electrical and Computer Engineering University of Delaware
Range estimation with multifrequency phases is a common practice in localization *** challenge of this method is the phase *** Chinese remainder theorem(CRT)based phase unwrapping algorithms have been proposed to solv... 详细信息
来源: 评论
Tracking multiple-person using sparse stereo information
International Journal of Signal Processing, Image Processing...
收藏 引用
International Journal of Signal Processing, Image Processing and Pattern Recognition 2015年 第9期8卷 101-120页
作者: Hu, Keli Gu, Yuzhang Shen, Shigen Zhang, Cheng Zhan, Yunlong Department of Computer Science and Engineering Shaoxing University Shaoxing Zhejiang China Key Laboratory of Wireless Sensor Network & Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Shanghai China
In this study, we address the problem of multi-person detection and tracking in challenging scenes using sparse stereo information. In each frame, only a sparse set of object feature points are extracted. All these fe... 详细信息
来源: 评论
Make your webpage carry abundant secret information unawarely
Make your webpage carry abundant secret information unawarel...
收藏 引用
15th IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 11th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2013
作者: Guo, Xiaojun Cheng, Guang Zhu, Chengang Zhou, Aiping Pan, Wubin Truong, Dinhtu School of Computer Science and Engineering Southeast University Nanjing 210096 China School of Information Engineering Tibet Nationalities Institute Xianyang 712082 China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing 210096 China
How to embed more secret message into web page with keeping good imperceptibility simultaneously is a trade-off problem for information hiding schemes. This paper presents a novel web page information hiding method ba... 详细信息
来源: 评论
Inference rules based on XML functional dependency and XML multi-valued dependency
Inference rules based on XML functional dependency and XML m...
收藏 引用
2014 International Conference on Future information Engineering and Manufacturing Science(FIEMS 2014)
作者: Zhongping Zhang Shanshan Shi The School of Information Science and Engineering Yanshan University The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province
There not only exists the relation of the functional dependency and multi-valued dependency in XML data constraint,but also exists the relation of data dependency obtained only from a certain existing relationship ins... 详细信息
来源: 评论
Inuence maximization algorithm based on genetic algorithm
收藏 引用
Journal of Computational information Systems 2014年 第21期10卷 9255-9262页
作者: Guo, Jingfeng Liu, Yuanying Shen, Jiali Wei, Zhenzhen Lv, Jiaguo College of Information Science and Engineering Yanshan University Qinhuangda China College of Information Technology Hebei University of Economics and Business Shijiazhuang China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
The inuence maximization problem is defined as providing a given initial integer k, mining top-k inuential nodes from a social network such that the spread of inuence in the network is maximized. Some existing studies... 详细信息
来源: 评论
Real-time simulation of foam and sprays based on the Weber number
收藏 引用
Journal of Computational information Systems 2014年 第7期10卷 2829-2836页
作者: Zhang, Lihui Zhang, Chao Li, Ying Lv, Mengya Tang, Yong The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province The College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China Department of Information Engineering Environmental Management College of China Qinhuangdao 066004 China
In this paper, we propose a method based on the Weber number to uniformly model and simulate the foam and sprays generated by the fluid motion. We use the SPH to construct the fluid and calculate the Weber number of e... 详细信息
来源: 评论
The research of the recommendation algorithm in online learning
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous Engineering 2015年 第4期10卷 71-80页
作者: Yu, Ruiguo Cai, Zhiyong Du, Xiuping He, Muwen Wang, Zan Yang, Binlan Chang, Peng School of Computer Science and Technology Tianjin University Tianjin China Tianjin Key Laboratory of Cognitive Computing and Application Tianjin China School of Education Tianjin University Tianjin China School of Computer and Software Tianjin University Tianjin China Information and Network Center Tianjin University Tianjin China
Recommendation algorithm is a kind of method in information filtering and has been widely applied on Internet. Collaborative filtering is widely used in the recommendation systems and has turned out to be successful. ... 详细信息
来源: 评论
Webshell detection techniques in web applications  5
Webshell detection techniques in web applications
收藏 引用
5th International Conference on Computing Communication and networking Technologies, ICCCNT 2014
作者: Dinh Tu, Truong Guang, Cheng Xiaojun, Guo Wubin, Pan School of Computer Science and Engineering Southeast University Nanjing210096 China Department of Information Technology Tuyhoa Industrial College Phuyen620900 Viet Nam Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
With widely adoption of online services, malicious web sites have become a malignant tumor of the Internet. Through system vulnerabilities, attackers can upload malicious files (which are also called webshells) to web... 详细信息
来源: 评论