咨询与建议

限定检索结果

文献类型

  • 1,852 篇 会议
  • 1,603 篇 期刊文献

馆藏范围

  • 3,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,318 篇 工学
    • 1,697 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 617 篇 信息与通信工程
    • 302 篇 电气工程
    • 248 篇 电子科学与技术(可...
    • 236 篇 控制科学与工程
    • 221 篇 生物工程
    • 153 篇 机械工程
    • 131 篇 网络空间安全
    • 111 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 76 篇 交通运输工程
    • 61 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,084 篇 理学
    • 638 篇 数学
    • 246 篇 生物学
    • 231 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 92 篇 化学
    • 91 篇 系统科学
  • 677 篇 管理学
    • 391 篇 管理科学与工程(可...
    • 312 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 107 篇 法学
    • 72 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 39 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 data models
  • 63 篇 deep learning
  • 61 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 security
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 172 篇 school of comput...
  • 83 篇 key laboratory o...
  • 67 篇 computer network...
  • 67 篇 college of compu...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 39 篇 fujian provincia...
  • 38 篇 university of ch...
  • 36 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 17 篇 liu ximeng
  • 16 篇 zhenrong zhang

语言

  • 3,073 篇 英文
  • 253 篇 其他
  • 146 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3455 条 记 录,以下是2981-2990 订阅
排序:
A novel classification algorithm to noise data
A novel classification algorithm to noise data
收藏 引用
3rd International Conference on Swarm Intelligence, ICSI 2012
作者: Li, Hong Zong, Yu Wang, Kunlun Wu, Buxiao Key Laboratory of Network and Intelligent Information Processing Department of Computer Science and Technology Hefei University 230001 China Department of Information and Engineering West Anhui University 237012 China
It is a significant challenge to discover knowledge from noise data. Most of previous works have focused on the data cleansing and the correction for the benefit of the subsequent mining process. When the training dat... 详细信息
来源: 评论
An optimal stopping strategy for opportunistic broadcast channel access
An optimal stopping strategy for opportunistic broadcast cha...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Shun Cai Sanfeng Zhang Yongqiang Dong Guoxin Wu School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education South East University Nanjing China
Opportunistic routing with network coding (NCOR) has recently emerged as a promising unicast paradigm in lossy wireless multihop networks. By combining the multi-user diversity advantage of the broadcast links and the... 详细信息
来源: 评论
Estimation Packet Loss Ratios for the Two Segments of End-to-End Path on the Monitor
Estimation Packet Loss Ratios for the Two Segments of End-to...
收藏 引用
International Conference on computer Science and Service System (CSSS)
作者: Guang Cheng Zhongyao Gao School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education China
Packet loss may cause the degradation of network and application performance. This paper proposes a passive measurement method called LTS to estimate end-to-end path packet loss ratio for the two segments of the path ... 详细信息
来源: 评论
A memory and variable neighborhood structure based complete local search for the no-wait job shop problem
A memory and variable neighborhood structure based complete ...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Minmin Li Jie Zhu Xiaoping Li Key Laboratory of Computer Network and Information Integration of Ministry of Education School of Computer Science and Engineering South East University Nanjing China
In this paper, an effective metaheuristic is developed for the no-wait job shop problem with the objective of makespam minimization, which is strongly NP-hard. The problem is usually decomposed into a sequencing sub-p...
来源: 评论
Estimating the number of active flows from sampled packets
Estimating the number of active flows from sampled packets
收藏 引用
IEEE Symposium on network Operations and Management
作者: Guang Cheng School of Computer Science and Engineering South East University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education China
A flow is active during a measurement period if it sends at least one packet. It is essential to control resource consumption in network monitoring by traffic sampling, so most high-end routers provide sampling networ... 详细信息
来源: 评论
Extending interface automata with Z notation
Extending interface automata with Z notation
收藏 引用
4th IPM International Conference on Fundamentals of Software Engineering, FSEN 2011
作者: Cao, Zining Wang, Hui National Key Laboratory of Science and Technology on Avionics System Integration Shanghai 200233 China Department of Computer Science and Technology Nanjing University of Aero. and Astro. Nanjing 210016 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China
In this paper, we propose a specification approach combining interface automata and Z language. This approach can be used to describe behavioural properties and data properties of software components. We also study th... 详细信息
来源: 评论
Security Analysis of an Electronic Commerce Protocol Using Casper/FDR2
收藏 引用
Wuhan University Journal of Natural Sciences 2012年 第6期17卷 499-503页
作者: CHANG Yinlong HU Huaping Department of Mathematics and Computer Science/Key Laboratory of Information Security of Network System Fuzhou UniversityFuzhou 350108FujianChina School of Computer Science National University of Defense TechnologyChangsha 410073HunanChina
Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure *** article extends model checking method with Casper/FDR2 to model an... 详细信息
来源: 评论
Efficient and random oracle-free conditionally anonymous ring signature
Efficient and random oracle-free conditionally anonymous rin...
收藏 引用
6th International Conference on Provable Security, ProvSec 2012
作者: Zeng, Shengke Qin, Zhiguang Lu, Qing Li, Qinyi School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Network and Data Security Key Laboratory of Sichuan Province China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security China
Compared to conventional ring signature schemes, conditionally anonymous ring signatures allow to revoke the anonymity of actual signer without the group manager's help if necessary. When the actual signer intends... 详细信息
来源: 评论
An improved clustering algorithm based on intersecting circle structure
An improved clustering algorithm based on intersecting circl...
收藏 引用
2012 IEEE 16th International Conference on computer Supported Cooperative Work in Design, CSCWD 2012
作者: Yang, Ze-Jun Wang, Ying-Long Zhao, Fu-Meng Huang, Tai-Bo Shandong Province Key Network Laboratory Shandong Computer Science Center Jinan 250014 China School of Information Science and Engineering Shandong Normal University Jinan 250014 China
A good clustering algorithm can provide the basis for forming a good network topology and target location, improve routing efficiency and greatly reduce energy consumption. For the lack of GAF algorithm, an improved a... 详细信息
来源: 评论
Intrusion-resilient identity-based signature: Security definition and construction
Intrusion-resilient identity-based signature: Security defin...
收藏 引用
作者: Yu, Jia Kong, Fanyu Cheng, Xiangguo Hao, Rong Fan, Jianxi College of Information Engineering Qingdao University 266071 Qingdao China Shandong Provincial Key Laboratory of Computer Network 250014 Jinan China Institute of Network Security Shandong University 250100 Jinan China School of Computer Science and Technology Soochow University 215006 Suzhou China
Traditional identity-based signatures depend on the assumption that secret keys are absolutely secure. Once a secret key is exposed, all signatures associated with this secret key have to be reissued. Therefore, limit... 详细信息
来源: 评论