咨询与建议

限定检索结果

文献类型

  • 1,856 篇 会议
  • 1,616 篇 期刊文献

馆藏范围

  • 3,472 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,334 篇 工学
    • 1,713 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 623 篇 信息与通信工程
    • 305 篇 电气工程
    • 254 篇 电子科学与技术(可...
    • 249 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 133 篇 网络空间安全
    • 110 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 78 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,085 篇 理学
    • 641 篇 数学
    • 245 篇 生物学
    • 230 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 92 篇 化学
    • 92 篇 系统科学
  • 679 篇 管理学
    • 392 篇 管理科学与工程(可...
    • 314 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 10 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 deep learning
  • 65 篇 data models
  • 64 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 security
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 174 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 38 篇 university of ch...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 33 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang

语言

  • 3,074 篇 英文
  • 266 篇 其他
  • 149 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3472 条 记 录,以下是3001-3010 订阅
排序:
A memory and variable neighborhood structure based complete local search for the no-wait job shop problem
A memory and variable neighborhood structure based complete ...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Minmin Li Jie Zhu Xiaoping Li Key Laboratory of Computer Network and Information Integration of Ministry of Education School of Computer Science and Engineering South East University Nanjing China
In this paper, an effective metaheuristic is developed for the no-wait job shop problem with the objective of makespam minimization, which is strongly NP-hard. The problem is usually decomposed into a sequencing sub-p...
来源: 评论
Estimating the number of active flows from sampled packets
Estimating the number of active flows from sampled packets
收藏 引用
IEEE Symposium on network Operations and Management
作者: Guang Cheng School of Computer Science and Engineering South East University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education China
A flow is active during a measurement period if it sends at least one packet. It is essential to control resource consumption in network monitoring by traffic sampling, so most high-end routers provide sampling networ... 详细信息
来源: 评论
Extending interface automata with Z notation
Extending interface automata with Z notation
收藏 引用
4th IPM International Conference on Fundamentals of Software Engineering, FSEN 2011
作者: Cao, Zining Wang, Hui National Key Laboratory of Science and Technology on Avionics System Integration Shanghai 200233 China Department of Computer Science and Technology Nanjing University of Aero. and Astro. Nanjing 210016 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China
In this paper, we propose a specification approach combining interface automata and Z language. This approach can be used to describe behavioural properties and data properties of software components. We also study th... 详细信息
来源: 评论
Security Analysis of an Electronic Commerce Protocol Using Casper/FDR2
收藏 引用
Wuhan University Journal of Natural Sciences 2012年 第6期17卷 499-503页
作者: CHANG Yinlong HU Huaping Department of Mathematics and Computer Science/Key Laboratory of Information Security of Network System Fuzhou UniversityFuzhou 350108FujianChina School of Computer Science National University of Defense TechnologyChangsha 410073HunanChina
Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure *** article extends model checking method with Casper/FDR2 to model an... 详细信息
来源: 评论
Efficient and random oracle-free conditionally anonymous ring signature
Efficient and random oracle-free conditionally anonymous rin...
收藏 引用
6th International Conference on Provable Security, ProvSec 2012
作者: Zeng, Shengke Qin, Zhiguang Lu, Qing Li, Qinyi School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Network and Data Security Key Laboratory of Sichuan Province China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security China
Compared to conventional ring signature schemes, conditionally anonymous ring signatures allow to revoke the anonymity of actual signer without the group manager's help if necessary. When the actual signer intends... 详细信息
来源: 评论
An improved clustering algorithm based on intersecting circle structure
An improved clustering algorithm based on intersecting circl...
收藏 引用
2012 IEEE 16th International Conference on computer Supported Cooperative Work in Design, CSCWD 2012
作者: Yang, Ze-Jun Wang, Ying-Long Zhao, Fu-Meng Huang, Tai-Bo Shandong Province Key Network Laboratory Shandong Computer Science Center Jinan 250014 China School of Information Science and Engineering Shandong Normal University Jinan 250014 China
A good clustering algorithm can provide the basis for forming a good network topology and target location, improve routing efficiency and greatly reduce energy consumption. For the lack of GAF algorithm, an improved a... 详细信息
来源: 评论
Intrusion-resilient identity-based signature: Security definition and construction
Intrusion-resilient identity-based signature: Security defin...
收藏 引用
作者: Yu, Jia Kong, Fanyu Cheng, Xiangguo Hao, Rong Fan, Jianxi College of Information Engineering Qingdao University 266071 Qingdao China Shandong Provincial Key Laboratory of Computer Network 250014 Jinan China Institute of Network Security Shandong University 250100 Jinan China School of Computer Science and Technology Soochow University 215006 Suzhou China
Traditional identity-based signatures depend on the assumption that secret keys are absolutely secure. Once a secret key is exposed, all signatures associated with this secret key have to be reissued. Therefore, limit... 详细信息
来源: 评论
MOVE: A mobile personalized virtual computing environment
MOVE: A mobile personalized virtual computing environment
收藏 引用
作者: Bai, Yuebin Ju, Yanwen Beijing Key Laboratory of Network Technology School of Computer Science and Engineering Beihang University Beijing 100191 China Sci. and Technol. on Information Transmission and Dissemination in Communication Networks Laboratory Shijiazhuang 050081 China
In today's business and daily life, computers and networks are playing an increasingly important role both in the office and at home. It is desirable to individuals that any machines outside the workplace provide ... 详细信息
来源: 评论
A simultaneous members enrollment and revocation protocol for secret sharing schemes
A simultaneous members enrollment and revocation protocol fo...
收藏 引用
Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2012
作者: Yu, Jia Wang, Shuguang Zhao, Huawei Shu, Minglei Lv, Jialiang Guo, Qiang Shandong Provincial Key Laboratory of Computer Network Jinan 250014 China College of Information Engineering Qingdao University Qingdao 266071 China Shandong Institute of Standardization Jinan 250014 China School of Computer and Information Engineering Shandong University of Finance Jinan 250014 China
Secret sharing schemes have very wide applications in modern electronic society. In a secret sharing scheme, the shared secret is divided into multiple shares and only more than certain number of shares can reconstruc... 详细信息
来源: 评论
A new video watermark algorithm based on the property of the video
收藏 引用
2012 2nd International Conference on Materials Science and information Technology, MSIT 2012
作者: Yang, Chengzhong Liao, Lufang Zheng, Xiaoshi Zhao, Yanling Liu, Guangqi Guizhou University of Nationalities Guiyang China Shandong Computer Science Center Shandong Provincial Key Laboratory of Computer network technology Jinan China School of Information Science and Technology Shandong Institute of Light Industry SDILI Jinan China
The algorithm applied to video watermark based on the property of the video is rare recently. This article brings the video property and HVS into the video watermark,gives an new algorithm, improve the capability of t... 详细信息
来源: 评论