咨询与建议

限定检索结果

文献类型

  • 1,856 篇 会议
  • 1,616 篇 期刊文献

馆藏范围

  • 3,472 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,334 篇 工学
    • 1,713 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 623 篇 信息与通信工程
    • 305 篇 电气工程
    • 254 篇 电子科学与技术(可...
    • 249 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 133 篇 网络空间安全
    • 110 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 78 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,085 篇 理学
    • 641 篇 数学
    • 245 篇 生物学
    • 230 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 92 篇 化学
    • 92 篇 系统科学
  • 679 篇 管理学
    • 392 篇 管理科学与工程(可...
    • 314 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 10 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 deep learning
  • 65 篇 data models
  • 64 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 security
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 174 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 38 篇 university of ch...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 33 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang

语言

  • 3,074 篇 英文
  • 266 篇 其他
  • 149 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3472 条 记 录,以下是3021-3030 订阅
排序:
Forward secure threshold signature scheme in the standard model
收藏 引用
International Journal of computers and Applications 2012年 第2期34卷 98-104页
作者: Hao, Rong Yu, Jia Li, Jing Song, Zhiling College of Information Engineering Qingdao University 266071 Qingdao China Shandong Provincial Key Laboratory of Computer Network 250014 Jinan China
There is an inherit weakness in regular digital signatures. If private key is exposed, all signatures will be insecure no matter whether they were generated before key exposure or not. Forward secure signatures and fo... 详细信息
来源: 评论
An energy-efficient routing algorithm of zigbee network
收藏 引用
Journal of Computational information Systems 2012年 第23期8卷 9873-9879页
作者: Liu, Yongshan Chen, Wei Shang, Xuehui Lv, Yongteng Han, Yuanyuan Liu, Chang College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China
As regard to the case of extending the lifetime of zigbee network, the defination of node's boundary is proposed. First, all the information for node's boundary is stored when zigbee network is built. Then, th... 详细信息
来源: 评论
Evolutionary cryptography theory based generating method for a secure Koblitz elliptic curve and its improvement by a hidden Markov models
收藏 引用
Science China(information Sciences) 2012年 第4期55卷 911-920页
作者: WANG Chao 1,ZHANG HuanGuo 2,3 & LIU LiLi 4 1 key Lab of Specialty Fiber Optics and Optical Access network,Ministry of Education,Shanghai University,Shanghai 200072,China 2 computer School of Wuhan University,Wuhan 430072,China 3 key laboratory of Aerospace information Security and Trusted Computing Ministry of Education,Wuhan 430072,China 4 Huawei Technologies CO.LTD.,Shanghai 201206,China 1. Key Lab of Specialty Fiber Optics and Optical Access Network Ministry of Education Shanghai University Shanghai 200072 China2. Computer School of Wuhan University Wuhan 430072 China3. Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan 430072 China4. Huawei Technologies CO. LTD. Shanghai 201206 China
Considering potential attacks from cloud-computing and quantum-computing,it is becoming nec-essary to provide higher security elliptic *** hidden Markov models are introduced for designing the trace-vector computation... 详细信息
来源: 评论
BPSS:BUFFERING- AND PREDICTION- BASED SLEEP SCHEME FOR WIRELESS SENSOR networkS
BPSS:BUFFERING- AND PREDICTION- BASED SLEEP SCHEME FOR WIREL...
收藏 引用
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems
作者: Yijun Zhu Yanjun Li Yihua Zhu School of Computer Science and Technology Zhejiang University of Technology Zhejiang Provincial Key Laboratory of Information Network Technology
Energy saving is a critical concern in wireless sensor networks (WSNs). Usually, duty cycle is applied to reduce the energy expended by radio transceiver of nodes. In this paper, a Buffering- and Prediction- based Sle... 详细信息
来源: 评论
Virtual grid-based clustering of uncertain data on vulnerability database
收藏 引用
Journal of Convergence information Technology 2012年 第20期7卷 429-438页
作者: Dong, Jun Cao, Mengmeng Huang, Guoyan Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China
Most existing vulnerability taxonomy classifies vulnerabilities by their idiosyncrasies, weaknesses, flaws and faults et al. The disadvantage of the taxonomy is that the classification standard is not unified and ther... 详细信息
来源: 评论
A high dimensional data clustering algorithm based on hypergraph
收藏 引用
Journal of Computational information Systems 2012年 第23期8卷 9839-9846页
作者: Liu, Yongshan Chen, Wei Shang, Xuehui Lv, Yongteng Han, Yuanyuan Liu, Chang College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China
High dimensional data clustering is an important issue for data mining. Firstly, the records in the dataset are mapped to the vertices of hypergraph, the hyperedges of hypergraph are composed of the vertices which hav... 详细信息
来源: 评论
Fourth Normal Form and Free Redundancy for XML Document Based on Path Expression
Fourth Normal Form and Free Redundancy for XML Document Base...
收藏 引用
International Conference on computer Science and network Technology
作者: Zhongping Zhang Zhixiao Liu College of Information Science and Engineering The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University College of Information Science and Engineering Yanshan University
With eXtensible Markup Language (XML) becoming more and more popular, to avoid the redundancy, XML schema design has become an important issue. So the normalization of XML is a hotspot in research field. Similar to re... 详细信息
来源: 评论
A clustering algorithm for heterogeneous objects based on information dissimilarity
收藏 引用
Journal of Convergence information Technology 2012年 第22期7卷 93-100页
作者: Chen, Ziyang Wang, Xuefeng Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao City 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City 066004 China
Due to the introduction of weight of attributes, most of existing dissimilarity measures can not accurately reflect the difference between two heterogeneous objects, and then clustering quality was decreased. In this ... 详细信息
来源: 评论
High capacity steganographic method based upon quantization error of JPEG
High capacity steganographic method based upon quantization ...
收藏 引用
2012 2nd International Conference on computer Application and System Modeling, ICCASM 2012
作者: Dong, Xiuze Liu, Shu Zhang, Ru Niu, Xinxin Wang, Lifeng Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 China Electronic and Information Engineering Department Beijing Electronic Science and Technology Institute Beijing 100070 China Key Laboratory of Information Network Security Ministry of Public Security Shanghai 201204 China Computer Science and Technology Department Beijing Electronic Science and Technology Institute Beijing 100070 China
Quantizing Error during the process of JPEG compression is analyzed, and a new information hiding algorithm is proposed based on Quantizing Error of JPEG image. Experimental results show that the proposed algorithm ca... 详细信息
来源: 评论
An algorithm based on temporary table for mining top-k closed frequent patterns in data streams
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2012年 第20期6卷 582-589页
作者: Wang, Peilong Yang, Xuan Zhang, Yuanyuan Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao City 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City 066004 China
In this paper, we present an algorithm TKBT(top-k closed frequent mining based on TKTT) to mine top-k closed frequent itemsets in data streams efficiently. First according to the consecutive and changeable characteris... 详细信息
来源: 评论