咨询与建议

限定检索结果

文献类型

  • 1,893 篇 会议
  • 1,598 篇 期刊文献

馆藏范围

  • 3,491 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,306 篇 工学
    • 1,682 篇 计算机科学与技术...
    • 1,305 篇 软件工程
    • 606 篇 信息与通信工程
    • 298 篇 电气工程
    • 247 篇 电子科学与技术(可...
    • 231 篇 控制科学与工程
    • 222 篇 生物工程
    • 154 篇 机械工程
    • 129 篇 网络空间安全
    • 111 篇 仪器科学与技术
    • 108 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 76 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,076 篇 理学
    • 630 篇 数学
    • 247 篇 生物学
    • 231 篇 物理学
    • 195 篇 统计学(可授理学、...
    • 94 篇 化学
    • 90 篇 系统科学
  • 670 篇 管理学
    • 386 篇 管理科学与工程(可...
    • 308 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 106 篇 法学
    • 72 篇 社会学
  • 83 篇 医学
    • 67 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 39 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 152 篇 feature extracti...
  • 128 篇 semantics
  • 121 篇 accuracy
  • 92 篇 computational mo...
  • 87 篇 training
  • 84 篇 federated learni...
  • 71 篇 data models
  • 62 篇 deep learning
  • 54 篇 robustness
  • 53 篇 data mining
  • 51 篇 protocols
  • 50 篇 adaptation model...
  • 49 篇 privacy
  • 48 篇 transformers
  • 48 篇 optimization
  • 47 篇 neural networks
  • 47 篇 visualization
  • 47 篇 clustering algor...
  • 46 篇 security
  • 46 篇 cryptography

机构

  • 265 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 168 篇 school of comput...
  • 85 篇 key laboratory o...
  • 67 篇 college of compu...
  • 66 篇 computer network...
  • 64 篇 shandong provinc...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 49 篇 beijing key labo...
  • 45 篇 school of cyber ...
  • 45 篇 institute of inf...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 39 篇 key laboratory o...
  • 38 篇 fujian provincia...
  • 38 篇 university of ch...

作者

  • 47 篇 zhao yao
  • 40 篇 ren jiadong
  • 37 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 xiaoming wu
  • 26 篇 guo wenzhong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 xiangzhi liu
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang

语言

  • 2,955 篇 英文
  • 419 篇 其他
  • 142 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3491 条 记 录,以下是2851-2860 订阅
排序:
A three-dimension localization algorithm forwireless sensor network mobile nodes based on double-layers BP neural network
A three-dimension localization algorithm forwireless sensor ...
收藏 引用
9th International Symposium on Linear Drives for Industry Applications, LDIA 2013
作者: Yuming, Mao Yinglong, Wang College of Information Science and Engineering Shandong University of Science and Technology Qingdao China College of Information Science and Electrical Engineering Shandong Jiaotong University Jinan China Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center Jinan China
The paper presents a three-dimensional localization algorithm for wireless sensor network (WSN) mobile nodes based on double-layers BP neural network. The main contribution of the paper is that using the trained doubl... 详细信息
来源: 评论
Design of information disclosure platform in engineering based on reliability model
Design of information disclosure platform in engineering bas...
收藏 引用
4th International Conference on Materials Science and information Technology, MSIT 2014
作者: Meng, Qing Feng Feng, Zheng Qian Li, Zhao Hao, Sheng G. Shandong Computer Science Center Shan Dong E-cloud Information Technology Co. Ltd Jinan 250000 China Department of Shandong Provincial Key Laboratory of computer Network Shandong Computer Science Center Jinan 250000 China
This paper presents a public information platform based on reliability coefficient for information disclosure process in construction field. In this platform, we constructed a model of enterprise reliability coefficie... 详细信息
来源: 评论
Defense Technology of Wormhole Attacks Based on Node Connectivity
Defense Technology of Wormhole Attacks Based on Node Connect...
收藏 引用
IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity)
作者: Jiu-hu Zheng Huan-yan Qian Lei Wang School of Information Technology Jiangsu Institute of Commerce Nanjing Jiangsu China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing Jiangsu China National Mobile Communications esearch Laboratory Southeast University Nanjing Jiangsu China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing Jiangsu China
After wormhole attacks the routing mechanism of wireless sensor network (WSN) is damaged, then the hop count and distance between nodes cannot be well matched, so that the WSN becomes the anisotropic sensor network, r... 详细信息
来源: 评论
Decision Tree Algorithm Optimization Research Based on MapReduce
Decision Tree Algorithm Optimization Research Based on MapRe...
收藏 引用
2015 6th IEEE International Conference on Software Engineering and Service Science(ICSESS 2015)
作者: Fangfang Yuan Fusheng Lian Xingjian Xu Zhaohua Ji College of Computer and Information Engineering Inner Mongolia Normal University Xing An Vocational & Technical College CAS Key Laboratory of Genome Sciences and Informatio n Beijing Institute of Genomics Chinese Academy of Sciences University of Chinese Academy of Sciences College of Environment and Energy Engineering Beijing University of Technology College of Network Technology Inner Mongolia Normal University
With the advent of the computer science, the data volume that needed to be processed under many practical situations increases dramatically, challenging many traditional machine learning techniques. Bearing this in mi... 详细信息
来源: 评论
A new combination prediction model for short-term wind farm output power based on meteorological data collected by WSN
International Journal of Control and Automation
收藏 引用
International Journal of Control and Automation 2014年 第1期7卷 171-180页
作者: Ma, Li Li, Bo Yang, Zhen Bin Du, Jie Wang, Jin Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China Key Laboratory of Meteorological Disaster of Ministry of Education Nanjing University of Information Science and Technology Nanjing 210044 China CMA Public Meteorological Service Centre Beijing 100081 China
The prediction of wind farm output power is considered as an effective way to increase the wind power capacity and improve the safety and economy of power system. It is one of the hot research topics on wind power. Th... 详细信息
来源: 评论
One forward-secure signature scheme using bilinear maps and its applications
One forward-secure signature scheme using bilinear maps and ...
收藏 引用
作者: Yu, Jia Kong, Fanyu Cheng, Xiangguo Hao, Rong Li, Guowen College of Information Engineering Qingdao University 266071 Qingdao China Shandong Provincial Key Laboratory of Computer Network 250014 Jinan China Institute of Network Security Shandong University 250100 Jinan China Key Lab of Cryptographic Technology and Information Security Ministry of Education Jinan 250100 China School of Computer Science and Technology Shandong Jianzhu University 250100 Jinan China
Forward-secure signatures are proposed to deal with the key exposure problem. Compared to regular signatures, forward-secure signatures have a special update algorithm that can evolve the new private key in each time ... 详细信息
来源: 评论
MT-NCOR: A practical optimization method for network coded opportunistic routing in WMN
MT-NCOR: A practical optimization method for network coded o...
收藏 引用
International Conference on computer Communications and networks (ICCCN)
作者: Xiang Lan Sanfeng Zhang School of Software Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration in Southeast University Ministry of Education Southeast University Nanjing China
network coded opportunistic routing (NCOR) is a potential communication paradigm in wireless multi-hop networks (WMN) with lossy links. It leverages the multipath diversity of wireless networks and applies network cod... 详细信息
来源: 评论
Design and implementation of the network electronic identity management system
Design and implementation of the network electronic identity...
收藏 引用
3rd International Conference on Manufacturing Engineering and Process, ICMEP 2014
作者: Ni, Li Shun Chen, Bing The 3rd research institute of ministry of public security Key laboratory of information network security Ministry of Public Security Shanghai China Dept. of computer engineering Tongji University Shanghai China
This paper presents a quickly locate the query methods in the face of huge amounts of data. The method by analyzing the data relationship, split the database, the formation of cross-database quickly Hash positioning t... 详细信息
来源: 评论
A Retrievable Data Perturbation Method Used in Privacy-Preserving in Cloud Computing
收藏 引用
China Communications 2014年 第8期11卷 73-84页
作者: YANG Pan School of Electronics and Information Engineering Xi'an Jiaotong University Xi'an 710049 China Shaanxi Province Key Laboratory of Computer Network Xi' an Jiaotong University Xi'an 710049 China
With the increasing popularity of cloud computing,privacy has become one of the key problem in cloud *** data is outsourced to the cloud,for data owners,they need to ensure the security of their privacy;for cloud serv... 详细信息
来源: 评论
An improved DV-Hop positioning algorithm for wireless sensor network
An improved DV-Hop positioning algorithm for wireless sensor...
收藏 引用
IEEE International Conference on Progress in Informatics and Computing (PIC)
作者: Jiuhu Zheng Huanyan Qian Lie Wang School of Information Technology Jiangsu Institute of Commerce Nanjing Jiangsu China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing Jiangsu China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing Nanjing Jiangsu China National Mobile Communications esearch Laboratory Southeast University Nanjing Jiangsu China Ministry of Education Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications) Nanjing Jiangsu China
In the view of the DV-Hop positioning algorithm which relies on the distance vector and beacon nodes, several aspects are improved: the average hop distance and hop count are corrected; a method to detect the abnormal... 详细信息
来源: 评论