咨询与建议

限定检索结果

文献类型

  • 1,852 篇 会议
  • 1,603 篇 期刊文献

馆藏范围

  • 3,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,318 篇 工学
    • 1,697 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 617 篇 信息与通信工程
    • 302 篇 电气工程
    • 248 篇 电子科学与技术(可...
    • 236 篇 控制科学与工程
    • 221 篇 生物工程
    • 153 篇 机械工程
    • 131 篇 网络空间安全
    • 111 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 76 篇 交通运输工程
    • 61 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,084 篇 理学
    • 638 篇 数学
    • 246 篇 生物学
    • 231 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 92 篇 化学
    • 91 篇 系统科学
  • 677 篇 管理学
    • 391 篇 管理科学与工程(可...
    • 312 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 107 篇 法学
    • 72 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 39 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 data models
  • 63 篇 deep learning
  • 61 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 security
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 172 篇 school of comput...
  • 83 篇 key laboratory o...
  • 67 篇 computer network...
  • 67 篇 college of compu...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 39 篇 fujian provincia...
  • 38 篇 university of ch...
  • 36 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 17 篇 liu ximeng
  • 16 篇 zhenrong zhang

语言

  • 3,073 篇 英文
  • 253 篇 其他
  • 146 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3455 条 记 录,以下是3031-3040 订阅
排序:
Process Calculus with Data Structure and its Model Checking Algorithm
收藏 引用
Physics Procedia 2012年 33卷 782-789页
作者: Qing Zheng Zi-Ning Cao Department of Computer Science and Technology Nanjing University of Aero. & Astro. Nanjing 210016 P.R. China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 P.R. China National Key Laboratory of Science and Technology on Avionics System Integration Shanghai 200233 P.R. China
Model checking is one of the most important technology for automatically verification. So this paper generally proposed a method of combining CCS and Z language, to perform model checking. It combines the advantage of... 详细信息
来源: 评论
Differentiated priority queue management in event-driven wireless sensor networks
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2012年 第SUPPL.期23卷 120-125页
作者: Yang, Qi Dong, Yong-Qiang School of Computer Science and Engineering Southeast University Nanjing 211189 China Key Laboratory of Computer Network and Information Integration of Ministry of Education Southeast University Nanjing 211189 China
In event-driven wireless sensor networks, many redundant packets flow from monitored sites through the network and to the sink, resulting in a typical funnel effect which affects event reliability, negatively. Taking ... 详细信息
来源: 评论
A generic approach for providing revocation support in secret handshake
A generic approach for providing revocation support in secre...
收藏 引用
14th International Conference on information and Communications Security, ICICS 2012
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Ding, Xuhua Zhou, Jianying Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai China School of Information Systems Singapore Management University Singapore Singapore
Privacy protection and user revocation are essentially conflicting requirements in many cryptographic protocols. It is a particularly challenging problem to harmonize them in a secret handshake protocol that is geared... 详细信息
来源: 评论
DRTEMBB: Dynamic recommendation trust evaluation model based on bidding
收藏 引用
Journal of Multimedia 2012年 第4期7卷 279-288页
作者: Wang, Gang Gui, Xiao-lin Department of Electronics and Information Engineering Xi'an Jiaotong University Xi'an China Shanxi Province Key Laboratory of Computer Network Xi'an Jiaotong University Xi'an China School of Information Xi'an University of Finance and Economics Xi'an China
Fraud or cheating of malicious nodes were restrained by reducing the trust value of malicious nodes in the past trust model, but few recommendation nodes for cooperation cheating are punished, so it has had only limit... 详细信息
来源: 评论
An new anonymous authentication scheme for cloud computing
An new anonymous authentication scheme for cloud computing
收藏 引用
2012 7th International Conference on computer Science and Education, ICCSE 2012
作者: Zhang, Zhi-Hua Li, Jian-Jun Jiang, Wei Zhao, Yong Gong, Bei China Tobacco Zhejiang Iidustrial Co. Ltd. Hangzhou 310009 China College of Computer Science Beijing University of Technology Beijing 100124 China Key Laboratory of Information and Network Security 3rd Research Institute Ministry of Public Security Beijing 100124 China Beijing 100124 China
Cloud computing is a hot topic of current research, for anonymous authentication is required in many applications scenarios of e-business based on cloud computing, users do not want to expose their identity, users jus... 详细信息
来源: 评论
Semantics-Based Compliance An a lys is o f N e two rk S e cu rity Policy Hie ra rch ie s
收藏 引用
China Communications 2012年 第7期9卷 22-35页
作者: Yao Shan Xia Chunhe Hu Junshun Jiao Jian Li Xiaojian Beijing Key Laboratory of Network Technology Beihang University Beijing 100191 P. R. China Beijing Information Technology University Beijing 100192 P. R. China College of Computer Science and Information Technology Guangxi Normal University Guilin 541004 P. R. China
network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflect... 详细信息
来源: 评论
An improved clustering algorithm based on intersecting circle structure
An improved clustering algorithm based on intersecting circl...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Ze-Jun Yang Ying-long Wang Fu-Meng Zhao Tai-Bo Huang Shandong Province Key Network Laboratory Shandong Computer Science Center Jinan China School of Information Science & Engineering Shandong Normal University Jinan China
A good clustering algorithm can provide the basis for forming a good network topology and target location, improve routing efficiency and greatly reduce energy consumption. For the lack of GAF algorithm, an improved a... 详细信息
来源: 评论
Localization in 3D Sensor networks Using Stochastic Particle Swarm Optimization
Localization in 3D Sensor Networks Using Stochastic Particle...
收藏 引用
第六届中国可信计算与信息安全学术会议
作者: ZHANG Zhangxue CUI Huanqing Fujian Institute of Scientific and Technology Information Fuzhou 350003FujianChina Fujian Strait I Shandong Computer Science Center Shandong Provincial Key Laboratory of Computer NetworkJinan 250014
Localization is one of the key technologies in wireless sensor networks,and the existing PSO-based localization methods are based on standard PSO,which cannot guarantee the global *** the sensor network deployed in a ... 详细信息
来源: 评论
The information hiding based on the behavior of "information recording"
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2012年 第21期6卷 128-134页
作者: Li, Xin Zhang, Ru Niu, Xinxin National Computer network Emergency Response technical Team/Coordination Center of China Beijing China Information Security Center Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Information Network Security Ministry of Public Security Shanghai China Information Security Center Beijing University of Posts and Telecommunications Beijing China
While thinking of the different participants and their behaviors, the information hiding can be taken all over the whole transmissions. The process of the information was analyzed based on this. The analysis suggests ... 详细信息
来源: 评论
Wireless sensor network-enabled intravenous infusion monitoring
Wireless sensor network-enabled intravenous infusion monitor...
收藏 引用
作者: Zhang, Y. Zhang, S.F. Ji, Y. Wu, G.X. Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
Considering that intravenous in blood infusion, usually applied without a proper control of the progress and velocity under unreliable manual monitoring practice, is the most popular and frequent clinical activity thr... 详细信息
来源: 评论