咨询与建议

限定检索结果

文献类型

  • 1,893 篇 会议
  • 1,591 篇 期刊文献

馆藏范围

  • 3,484 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,304 篇 工学
    • 1,682 篇 计算机科学与技术...
    • 1,305 篇 软件工程
    • 606 篇 信息与通信工程
    • 298 篇 电气工程
    • 247 篇 电子科学与技术(可...
    • 231 篇 控制科学与工程
    • 222 篇 生物工程
    • 154 篇 机械工程
    • 129 篇 网络空间安全
    • 111 篇 仪器科学与技术
    • 106 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 76 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,076 篇 理学
    • 630 篇 数学
    • 247 篇 生物学
    • 231 篇 物理学
    • 195 篇 统计学(可授理学、...
    • 94 篇 化学
    • 90 篇 系统科学
  • 670 篇 管理学
    • 386 篇 管理科学与工程(可...
    • 308 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 106 篇 法学
    • 72 篇 社会学
  • 83 篇 医学
    • 67 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 39 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 152 篇 feature extracti...
  • 128 篇 semantics
  • 121 篇 accuracy
  • 92 篇 computational mo...
  • 87 篇 training
  • 84 篇 federated learni...
  • 71 篇 data models
  • 62 篇 deep learning
  • 54 篇 robustness
  • 53 篇 data mining
  • 51 篇 protocols
  • 50 篇 adaptation model...
  • 49 篇 privacy
  • 48 篇 transformers
  • 48 篇 optimization
  • 47 篇 neural networks
  • 47 篇 visualization
  • 47 篇 clustering algor...
  • 47 篇 cryptography
  • 46 篇 security

机构

  • 262 篇 key laboratory o...
  • 205 篇 shandong provinc...
  • 168 篇 school of comput...
  • 85 篇 key laboratory o...
  • 67 篇 college of compu...
  • 66 篇 computer network...
  • 65 篇 shandong provinc...
  • 59 篇 college of infor...
  • 59 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong enginee...
  • 49 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 45 篇 school of cyber ...
  • 44 篇 institute of inf...
  • 41 篇 the key laborato...
  • 40 篇 school of comput...
  • 39 篇 key laboratory o...
  • 38 篇 fujian provincia...
  • 38 篇 university of ch...

作者

  • 46 篇 zhao yao
  • 40 篇 ren jiadong
  • 37 篇 zhou deyu
  • 30 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 xiaoming wu
  • 26 篇 guo wenzhong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 xiangzhi liu
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang

语言

  • 2,948 篇 英文
  • 419 篇 其他
  • 142 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3484 条 记 录,以下是2791-2800 订阅
排序:
An Effective Differential Fault Analysis on the Serpent Cryptosystem in the Internet of Things
收藏 引用
China Communications 2014年 第6期11卷 129-139页
作者: LI Wei TAO Zhi GU Dawu SUN Li QU Bo LIU Zhiqiang LIU Ya School of Computer Science and Technology Donghua University Department of Computer Science and Engineering Shanghai Jiao Tong University State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Network Architectures and Services Delft University of Technology Mekelweg 4 2628 CD Delft The Netherlands ESAT/COSIC and IBBT Katholieke Universiteit Leuven Department of Computer Science and Engineering University of Shanghai for Science and Technology
Due to the strong attacking ability, fast speed, simple implementation and other characteristics, differential fault analysis has become an important method to evaluate the security of cryptosystem in the Internet of ... 详细信息
来源: 评论
Bit rate buffer control and optimization of embedded video encoder
收藏 引用
Open Cybernetics and Systemics Journal 2014年 第1期8卷 1009-1014页
作者: Chunlian, Yao Wen, Liu Hongli, Wu Dianhui, Mao Li, Liu School of computer and information engineering Beijing Technology and Business University Beijing China The Key Laboratory of Advanced Information Science and Network Technology of Beijing Beijing Jiaotong University Beijing China Institute of advanced information technology of Beijing Beijing China
To satisfy various requirement of embedded video encoder, an embedded video coding system based on TMS320C64xx DSP is designed in this paper. TMS320C64xx DSP (Digital signal processor) is the core of the coding hardwa... 详细信息
来源: 评论
A rate control algorithm for low delay video coding
收藏 引用
Open Cybernetics and Systemics Journal 2014年 8卷 773-778页
作者: Chunlian, Yao Dong, Jiang Xinnan, Guan Hongli, Wu Qian, Cao School of Computer and Information Engineering Beijing Technology and Business University Beijing China The Key Laboratory of Advanced Information Science and Network Technology of Beijing Beijing Jiaotong University Beijing China Institute of Advanced Information Technology of Beijing Beijing China
For the standard definition video, the inherent delay produced by the existing coding standards is above 260ms. The delay is too big to apply in real-time video processing system. In order to reduce codec system delay... 详细信息
来源: 评论
Angle historgam model of directional relationship in 3D based on Double-projection and Rounded-subdivision
收藏 引用
Journal of information and Computational Science 2014年 第18期11卷 6471-6478页
作者: Kong, Dehan Liu, Yongshan Ma, Junlei Department of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao China Data Industry Research Lab Qinhuangdao China
The formal model of spatial directional relations is one of the most important parts in spatial relation research. The most of models are based on Minimum Bounding Rectangle (MBR), and they are not compliant with the ... 详细信息
来源: 评论
PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Scheme
PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Sch...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Xu Yang Joseph K. Liu Wei Wu Man Ho Au Willy Susilo Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University China and State Key Laboratory of Cryptology Beijing China Faculty of Information Technology Monash University Australia Department of Computing Hong Kong Polytechnic University Hong Kong School of Computer Science and Software Engineering University of Wollongong Australia
Electric Vehicle (EV) infrastructure is relatively new in many countries. Due to the recency of an EV infrastructure, it is important to carry out a series of testing programs. Furthermore, authenticity for collection... 详细信息
来源: 评论
Point cloud coarse registration based on 3DSIFT keypoint detection
收藏 引用
Journal of Computational information Systems 2014年 第23期10卷 10121-10128页
作者: Gu, Xiaoying Liu, Yongshan Department of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of HeBei Province Yanshan University Qinhuangdao China Data Industry Research Lab Qinhuangdao China
Since the SIFT feature point extraction algorithm with scale changes, rotation transformation invariance, is widely used in image registration. In this paper, the SIFT algorithm is applied to three-dimensional point c... 详细信息
来源: 评论
A new proxy re-encryption scheme for protecting critical information systems
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2015年 第6期6卷 699-711页
作者: Wang, Xu An Ma, Jianfeng Yang, Xiaoyuan School of Telecommunications Engineering Xidian University Xi’an People’s Republic of China School of Computer Science and Technology Xidian University Xi’an People’s Republic of China Key Laboratory of Information and Network Security Engineering University of Chinese Armed Police Force Xi’an People’s Republic of China
The risks of critical systems involved in key-recovery, key-escrow have barely taken to be seriously treated by the researchers. And the failures of even the best cryptographic techniques are often caused by the inher...
来源: 评论
Availability-Aware Virtual network Embedding for Multi-tier Applications in Cloud networks
Availability-Aware Virtual Network Embedding for Multi-tier ...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Meng Shen Xu Ke Fuliang Li Fan Li Liehuang Zhu Lei Guan Ministry of Education Key Laboratory of Computer Network and Information Integration (Southeast University) P. R. China Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications School of Computer Science Beijing Institute of Technology P. R. China Tsinghua University Beijing Beijing CN College of Information Science and Engineering Northeastern University P. R. China DNSLAB China Internet Network Iniormation Center Beijing P. R. China School of Management & Economics Beijing Institute of Technology P. R. China
There is a growing trend for service providers (SPs) to migrate their multi-tier applications from local clusters to public cloud networks. In the cloud environment, it is a great concern of SPs to improve the availab... 详细信息
来源: 评论
Risk Management Using Big Real Time Data
Risk Management Using Big Real Time Data
收藏 引用
IEEE International Conference on Cloud Computing Technology and Science (CloudCom)
作者: Jie Cheng Chunming Rong Huijuan Ye Xianghan Zheng Department of Electrical Engineering and Computer Science Risk Management Using Big Real Time Data Department of Computer Science and Electronic Engineering University of Stavanger Stavanger Norway College of Mathematics and Computer Science Fuzhou University Fuzhou China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou China
Adding to societal changes today, are the miscellaneous big data produced in different fields. Coupled with these data is the appearance of risk management. Admittedly, to predict future trend by using these data is c... 详细信息
来源: 评论
Learning from Combination of Data Chunks for Multi-class Imbalanced Data
Learning from Combination of Data Chunks for Multi-class Imb...
收藏 引用
International Joint Conference on Neural networks
作者: Xu-Ying Liu Qian-Qian Li Key Laboratory of Computer Network and Information Integration MOE School of Computer Science and Engineering Southeast University
Class-imbalance is very common in real-world applications. Previous studies focused on binary-class imbalance problem, whereas multi-class imbalance problem is more general and more challenging. Under-sampling is an e... 详细信息
来源: 评论