咨询与建议

限定检索结果

文献类型

  • 1,852 篇 会议
  • 1,603 篇 期刊文献

馆藏范围

  • 3,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,318 篇 工学
    • 1,697 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 617 篇 信息与通信工程
    • 302 篇 电气工程
    • 248 篇 电子科学与技术(可...
    • 236 篇 控制科学与工程
    • 221 篇 生物工程
    • 153 篇 机械工程
    • 131 篇 网络空间安全
    • 111 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 76 篇 交通运输工程
    • 61 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,084 篇 理学
    • 638 篇 数学
    • 246 篇 生物学
    • 231 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 92 篇 化学
    • 91 篇 系统科学
  • 677 篇 管理学
    • 391 篇 管理科学与工程(可...
    • 312 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 107 篇 法学
    • 72 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 39 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 data models
  • 63 篇 deep learning
  • 61 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 security
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 172 篇 school of comput...
  • 83 篇 key laboratory o...
  • 67 篇 computer network...
  • 67 篇 college of compu...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 39 篇 fujian provincia...
  • 38 篇 university of ch...
  • 36 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 17 篇 liu ximeng
  • 16 篇 zhenrong zhang

语言

  • 3,073 篇 英文
  • 253 篇 其他
  • 146 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3455 条 记 录,以下是3101-3110 订阅
排序:
Three-mobile-beacon assisted weighted centroid localization method in wireless sensor networks
Three-mobile-beacon assisted weighted centroid localization ...
收藏 引用
2011 IEEE 2nd International Conference on Software Engineering and Service Science, ICSESS 2011
作者: Cui, Huan-Qing Wang, Ying-Long Lv, Jia-Liang Mao, Yu-Ming College of Information Science and Engineering Shandong University of Science and Technology Qingdao China Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center Jinan China
Localization is one of the key technologies in wireless sensor networks, and the mobile beacon assisted localization method is promising to reduce the cost. The methods with only one beacon introduce collinearity prob... 详细信息
来源: 评论
A dynamic resource allocation algorithm for database-as-a-service
A dynamic resource allocation algorithm for database-as-a-se...
收藏 引用
2011 IEEE 9th International Conference on Web Services, ICWS 2011
作者: Zhu, Jie Gao, Bo Wang, Zhihu Reinwald, Berthold Guo, Changjie Li, Xiaoping Sun, Wei School of Computer Science and Engineering Southeast University 210096 Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education China IBM Research-China 100193 Beijing China IBM Almaden Research Center 650 Harry Road San Jose CA 95120 United States
In Database-as-a-Service (DBaaS), a large number of tenants share DBaaS resources (CPU, I/O and Memory). While the DBaaS provider runs DBaaS to "share" resources across the entire tenant population to maximi... 详细信息
来源: 评论
Knowledge discovery from noisy datasets
Knowledge discovery from noisy datasets
收藏 引用
2011 International Conference on Automation and Robotics, ICAR 2011
作者: Li, Hong Zong, Yu Chen, Enhong Key Laboratory of Network and Intelligent Information Processing Department of Computer Science and Technology Hefei University 230001 China School of Computer Science and Technology University of Science and Technology of China 230001 China
It is a significant challenges to deal with the noise data in data mining and knowledge discovery applications. Most of previous works on data cleansing and correction have been focused on addressing class noise or at... 详细信息
来源: 评论
A single Neuron Self-adaptive PID controller of Brushless DC Motor
A single Neuron Self-adaptive PID controller of Brushless DC...
收藏 引用
International Conference on Measuring Technology and Mechatronics Automation
作者: Wang, Maoli Guanghe, Cheng Kong, Xiangxin Shandong Provincial Key Laboratory of computer Network Shandong Computer Science Center Shandong 250014 China School of Electrical Information and Automation Qufu Normal University Rizhao Shandong 276826 China
This paper presents the Neuron Self-adaptive PID control of Brushless DC (BLDC) Motor. It is difficult to tune the parameters and get satisfied control characteristics by using normal PID controller. As the single neu... 详细信息
来源: 评论
A new digital video watermark algorithm based on the HVS
A new digital video watermark algorithm based on the HVS
收藏 引用
2011 International Conference on Internet Computing and information Services, ICICIS 2011
作者: Liao, Lufang Zheng, Xiaoshi Zhao, Yanling Liu, Guangqi Shandong Computer Science Center Shandong Provincial Key Laboratory of Computer Network Technology Jinan China School of Information Science and Technology Shandong Institute of Light Industry SDILI Jinan China
The algorithm applied to video watermark based on HVS is rare recently , but adaptively selecting the embedding position and the embedding strength according to the host(such as videos, images etc.) is necessary, whic... 详细信息
来源: 评论
Collaborative Approaches to Complementing Qualitative Preferences of Agents for Effective Service Selection
Collaborative Approaches to Complementing Qualitative Prefer...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Hongbing Wang Jie Zhang Yangyu Tang Shizhi Shao Key Laboratory of Computer Network and Information Integration School of Computer Science and Engineering South East University China School of Computer Engineering Nanyang Technological University Singapore
Incomplete preferences of agents may render service selection ineffective. We address this problem by proposing a set of collaborative approaches to complementing agents' incomplete preferences in a qualitative wa... 详细信息
来源: 评论
Detecting DDoS Attack With Hilbert-Huang Transformation
收藏 引用
China Communications 2011年 第2期8卷 126-133页
作者: 郑康锋 王秀娟 杨义先 郭世泽 Key Laboratory of Network and Information Attack & Defense Technology of MOE Beijing University of Posts and Telecommunications College of Computer Sciences Beijing University of Technology
DDoS detection has been the research focus in the field of information security. Existing detecting methods such as Hurst parameter method and Markov model must ensure that the network traffic signal f(t) is a station... 详细信息
来源: 评论
不确定图最可靠最大流算法研究
不确定图最可靠最大流算法研究
收藏 引用
第29届中国数据库学术会议
作者: CAI Wei 蔡伟 ZHANG Bai-Li 张柏礼 LV Jian-Hua 吕建华 School of Computer Science and Engineering Southeast University Nanjing 210096 东南大学计算机科学与工程学院 南京 210096 Key Laboratory of Computer Network and Information Integration of Ministry of Education Southeast U 东南大学计算机网络和信息集成教育部重点实验室 南京 210096
文中首先基于可能世界模型提出了不确定图的最可靠最大流问题和可靠性计算模型,这对于构建可靠性网络、可靠传输路径选择以及系统薄弱环节分析等一系列实际问题具有重要意义;然后基于简单路径组合思想提出了一种求解最可靠最大流的算法S... 详细信息
来源: 评论
Nonlinearity Profile Test for an S-Box
Nonlinearity Profile Test for an S-Box
收藏 引用
2011 International Conference on Future Wireless networks and information Systems(ICFWI 2011)
作者: Sheng Gao Wenping Ma Jiwei Zhu Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University
A new security test for substitution boxes(S-boxes),the nonlinearity profile test,is presented,together with its results over the S-boxes of DES and *** test can be used to measure the global nonlinearity for an S-box... 详细信息
来源: 评论
Research on fault-electromagnetic attack on block cipher
收藏 引用
Journal of Convergence information Technology 2011年 第11期6卷 409-417页
作者: Sun, Chunhui Li, Hui Yang, Yang Chen, Jie Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China
It is one of the important factors in iterative block ciphers design that proper rounds are used to resist differential analysis, linear analysis and many other kinds of attack. Block ciphers usually adopt loop codes ... 详细信息
来源: 评论