咨询与建议

限定检索结果

文献类型

  • 1,852 篇 会议
  • 1,603 篇 期刊文献

馆藏范围

  • 3,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,318 篇 工学
    • 1,697 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 617 篇 信息与通信工程
    • 302 篇 电气工程
    • 248 篇 电子科学与技术(可...
    • 236 篇 控制科学与工程
    • 221 篇 生物工程
    • 153 篇 机械工程
    • 131 篇 网络空间安全
    • 111 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 76 篇 交通运输工程
    • 61 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,084 篇 理学
    • 638 篇 数学
    • 246 篇 生物学
    • 231 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 92 篇 化学
    • 91 篇 系统科学
  • 677 篇 管理学
    • 391 篇 管理科学与工程(可...
    • 312 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 107 篇 法学
    • 72 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 39 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 data models
  • 63 篇 deep learning
  • 61 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 security
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 172 篇 school of comput...
  • 83 篇 key laboratory o...
  • 67 篇 computer network...
  • 67 篇 college of compu...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 39 篇 fujian provincia...
  • 38 篇 university of ch...
  • 36 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 17 篇 liu ximeng
  • 16 篇 zhenrong zhang

语言

  • 3,073 篇 英文
  • 253 篇 其他
  • 146 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3455 条 记 录,以下是2801-2810 订阅
排序:
Clock Synchronization in Mobile Ad Hoc networks Based on an Iterative Approximate Byzantine Consensus Protocol
Clock Synchronization in Mobile Ad Hoc Networks Based on an ...
收藏 引用
International Conference on Advanced information networking and Applications (AINA)
作者: Chuanyou Li Yun Wang Michel Hurfin Ministry of Education Key Lab of Computer Network & Information Integration Nanjing China Inria Rennes France
We consider the clock synchronization problem in wireless mobile ad hoc networks in the presence of Byzantine nodes. The communication topology is dynamic: nodes move randomly within a geographical area. We propose a ... 详细信息
来源: 评论
CIRM: A candidate item reduce method on mapreduce for meteorological big data application
收藏 引用
Energy Education Science and Technology Part A: Energy Science and Research 2014年 第6期32卷 6209-6220页
作者: Xue, Shengjun Huang, Junsheng Xu, Xiaolong Zhang, Jie Jing, Lu Nanjing University of Information Science and Technology School of Computer and Software Nanjing China Nanjing University of Information Science and Technology Jiangsu Engineering Center of Network Monitoring Nanjing China Nanjing University State Key Laboratory for Novel Software Technology Nanjing China Nanjing University Department of Computer Science and Technology Nanjing China Shanghai Meteorological Information and Technical Support Centre Shanghai China Computer Science Department Oklahoma State University StillwaterOK United States
With the increase of the number of meteorological stations, the meteorological data is growing rapidly. Association analysis algorithm is widely applied to the analysis of meteorological data. The traditional associat... 详细信息
来源: 评论
Design and implementation of controlling pc wirelessly by android mobile based on C/S mode
International Journal of Control and Automation
收藏 引用
International Journal of Control and Automation 2014年 第7期7卷 157-166页
作者: Ma, Li Zhou, Yu Liao, Kuo Liu, Shen Qiao, Jie Han, Zhenyu Wang, Jin Nanjing University of Information Science and Technology Network Monitoring Center of Jiangsu Province Nanjing 210044 China Nanjing University of Information Science and Technology College of Computer and Software Nanjing 210044 China Nanjing University of Information Science and Technology Key Laboratory of Meteorological Disasters of Ministry of Education Nanjing 210044 China Ningde Meteorological Bureau Ningde 352100 China
In order to adapt to the development of the mobile Internet, intelligent small mobile terminal will be the future trend of development. This paper describes the implementation of data communication between the Android... 详细信息
来源: 评论
A study of agricultural meteorological monitoring system based on wireless sensor networks
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous Engineering 2014年 第7期9卷 15-26页
作者: Ma, Li Yan, Jingzhou Yan, Shuangshuang Wang, Baowei Liao, Kuo Wang, Jin Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China Key Laboratory of Meteorological Disaster of Ministry of Education Nanjing University of Information Science and Technology Nanjing 210044 China Ningde Meteorological Bureau Ningde 352100 China
In order to keep the sustainable development of agricultural industry, monitoring the four basic essential elements' changes, which are temperature, humidity, light intensity, carbon dioxide, and applying the corr... 详细信息
来源: 评论
A three-dimension localization algorithm forwireless sensor network mobile nodes based on double-layers BP neural network
A three-dimension localization algorithm forwireless sensor ...
收藏 引用
9th International Symposium on Linear Drives for Industry Applications, LDIA 2013
作者: Yuming, Mao Yinglong, Wang College of Information Science and Engineering Shandong University of Science and Technology Qingdao China College of Information Science and Electrical Engineering Shandong Jiaotong University Jinan China Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center Jinan China
The paper presents a three-dimensional localization algorithm for wireless sensor network (WSN) mobile nodes based on double-layers BP neural network. The main contribution of the paper is that using the trained doubl... 详细信息
来源: 评论
Design of information disclosure platform in engineering based on reliability model
Design of information disclosure platform in engineering bas...
收藏 引用
4th International Conference on Materials Science and information Technology, MSIT 2014
作者: Meng, Qing Feng Feng, Zheng Qian Li, Zhao Hao, Sheng G. Shandong Computer Science Center Shan Dong E-cloud Information Technology Co. Ltd Jinan 250000 China Department of Shandong Provincial Key Laboratory of computer Network Shandong Computer Science Center Jinan 250000 China
This paper presents a public information platform based on reliability coefficient for information disclosure process in construction field. In this platform, we constructed a model of enterprise reliability coefficie... 详细信息
来源: 评论
Decision Tree Algorithm Optimization Research Based on MapReduce
Decision Tree Algorithm Optimization Research Based on MapRe...
收藏 引用
2015 6th IEEE International Conference on Software Engineering and Service Science(ICSESS 2015)
作者: Fangfang Yuan Fusheng Lian Xingjian Xu Zhaohua Ji College of Computer and Information Engineering Inner Mongolia Normal University Xing An Vocational & Technical College CAS Key Laboratory of Genome Sciences and Informatio n Beijing Institute of Genomics Chinese Academy of Sciences University of Chinese Academy of Sciences College of Environment and Energy Engineering Beijing University of Technology College of Network Technology Inner Mongolia Normal University
With the advent of the computer science, the data volume that needed to be processed under many practical situations increases dramatically, challenging many traditional machine learning techniques. Bearing this in mi... 详细信息
来源: 评论
Defense Technology of Wormhole Attacks Based on Node Connectivity
Defense Technology of Wormhole Attacks Based on Node Connect...
收藏 引用
IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity)
作者: Jiu-hu Zheng Huan-yan Qian Lei Wang School of Information Technology Jiangsu Institute of Commerce Nanjing Jiangsu China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing Jiangsu China National Mobile Communications esearch Laboratory Southeast University Nanjing Jiangsu China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing Jiangsu China
After wormhole attacks the routing mechanism of wireless sensor network (WSN) is damaged, then the hop count and distance between nodes cannot be well matched, so that the WSN becomes the anisotropic sensor network, r... 详细信息
来源: 评论
A new combination prediction model for short-term wind farm output power based on meteorological data collected by WSN
International Journal of Control and Automation
收藏 引用
International Journal of Control and Automation 2014年 第1期7卷 171-180页
作者: Ma, Li Li, Bo Yang, Zhen Bin Du, Jie Wang, Jin Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China Key Laboratory of Meteorological Disaster of Ministry of Education Nanjing University of Information Science and Technology Nanjing 210044 China CMA Public Meteorological Service Centre Beijing 100081 China
The prediction of wind farm output power is considered as an effective way to increase the wind power capacity and improve the safety and economy of power system. It is one of the hot research topics on wind power. Th... 详细信息
来源: 评论
One forward-secure signature scheme using bilinear maps and its applications
One forward-secure signature scheme using bilinear maps and ...
收藏 引用
作者: Yu, Jia Kong, Fanyu Cheng, Xiangguo Hao, Rong Li, Guowen College of Information Engineering Qingdao University 266071 Qingdao China Shandong Provincial Key Laboratory of Computer Network 250014 Jinan China Institute of Network Security Shandong University 250100 Jinan China Key Lab of Cryptographic Technology and Information Security Ministry of Education Jinan 250100 China School of Computer Science and Technology Shandong Jianzhu University 250100 Jinan China
Forward-secure signatures are proposed to deal with the key exposure problem. Compared to regular signatures, forward-secure signatures have a special update algorithm that can evolve the new private key in each time ... 详细信息
来源: 评论