咨询与建议

限定检索结果

文献类型

  • 1,856 篇 会议
  • 1,616 篇 期刊文献

馆藏范围

  • 3,472 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,334 篇 工学
    • 1,713 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 623 篇 信息与通信工程
    • 305 篇 电气工程
    • 254 篇 电子科学与技术(可...
    • 249 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 133 篇 网络空间安全
    • 110 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 78 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,085 篇 理学
    • 641 篇 数学
    • 245 篇 生物学
    • 230 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 92 篇 化学
    • 92 篇 系统科学
  • 679 篇 管理学
    • 392 篇 管理科学与工程(可...
    • 314 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 10 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 deep learning
  • 65 篇 data models
  • 64 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 security
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 174 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 38 篇 university of ch...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 33 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang

语言

  • 3,074 篇 英文
  • 266 篇 其他
  • 149 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3472 条 记 录,以下是3121-3130 订阅
排序:
A single Neuron Self-adaptive PID controller of Brushless DC Motor
A single Neuron Self-adaptive PID controller of Brushless DC...
收藏 引用
International Conference on Measuring Technology and Mechatronics Automation
作者: Wang, Maoli Guanghe, Cheng Kong, Xiangxin Shandong Provincial Key Laboratory of computer Network Shandong Computer Science Center Shandong 250014 China School of Electrical Information and Automation Qufu Normal University Rizhao Shandong 276826 China
This paper presents the Neuron Self-adaptive PID control of Brushless DC (BLDC) Motor. It is difficult to tune the parameters and get satisfied control characteristics by using normal PID controller. As the single neu... 详细信息
来源: 评论
A new digital video watermark algorithm based on the HVS
A new digital video watermark algorithm based on the HVS
收藏 引用
2011 International Conference on Internet Computing and information Services, ICICIS 2011
作者: Liao, Lufang Zheng, Xiaoshi Zhao, Yanling Liu, Guangqi Shandong Computer Science Center Shandong Provincial Key Laboratory of Computer Network Technology Jinan China School of Information Science and Technology Shandong Institute of Light Industry SDILI Jinan China
The algorithm applied to video watermark based on HVS is rare recently , but adaptively selecting the embedding position and the embedding strength according to the host(such as videos, images etc.) is necessary, whic... 详细信息
来源: 评论
Collaborative Approaches to Complementing Qualitative Preferences of Agents for Effective Service Selection
Collaborative Approaches to Complementing Qualitative Prefer...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Hongbing Wang Jie Zhang Yangyu Tang Shizhi Shao Key Laboratory of Computer Network and Information Integration School of Computer Science and Engineering South East University China School of Computer Engineering Nanyang Technological University Singapore
Incomplete preferences of agents may render service selection ineffective. We address this problem by proposing a set of collaborative approaches to complementing agents' incomplete preferences in a qualitative wa... 详细信息
来源: 评论
Detecting DDoS Attack With Hilbert-Huang Transformation
收藏 引用
China Communications 2011年 第2期8卷 126-133页
作者: 郑康锋 王秀娟 杨义先 郭世泽 Key Laboratory of Network and Information Attack & Defense Technology of MOE Beijing University of Posts and Telecommunications College of Computer Sciences Beijing University of Technology
DDoS detection has been the research focus in the field of information security. Existing detecting methods such as Hurst parameter method and Markov model must ensure that the network traffic signal f(t) is a station... 详细信息
来源: 评论
不确定图最可靠最大流算法研究
不确定图最可靠最大流算法研究
收藏 引用
第29届中国数据库学术会议
作者: CAI Wei 蔡伟 ZHANG Bai-Li 张柏礼 LV Jian-Hua 吕建华 School of Computer Science and Engineering Southeast University Nanjing 210096 东南大学计算机科学与工程学院 南京 210096 Key Laboratory of Computer Network and Information Integration of Ministry of Education Southeast U 东南大学计算机网络和信息集成教育部重点实验室 南京 210096
文中首先基于可能世界模型提出了不确定图的最可靠最大流问题和可靠性计算模型,这对于构建可靠性网络、可靠传输路径选择以及系统薄弱环节分析等一系列实际问题具有重要意义;然后基于简单路径组合思想提出了一种求解最可靠最大流的算法S... 详细信息
来源: 评论
Nonlinearity Profile Test for an S-Box
Nonlinearity Profile Test for an S-Box
收藏 引用
2011 International Conference on Future Wireless networks and information Systems(ICFWI 2011)
作者: Sheng Gao Wenping Ma Jiwei Zhu Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University
A new security test for substitution boxes(S-boxes),the nonlinearity profile test,is presented,together with its results over the S-boxes of DES and *** test can be used to measure the global nonlinearity for an S-box... 详细信息
来源: 评论
Research on fault-electromagnetic attack on block cipher
收藏 引用
Journal of Convergence information Technology 2011年 第11期6卷 409-417页
作者: Sun, Chunhui Li, Hui Yang, Yang Chen, Jie Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China
It is one of the important factors in iterative block ciphers design that proper rounds are used to resist differential analysis, linear analysis and many other kinds of attack. Block ciphers usually adopt loop codes ... 详细信息
来源: 评论
The construction of fuzzy concept lattices based on (θ, σ)-fuzzy rough approximation operators
The construction of fuzzy concept lattices based on (θ, σ)...
收藏 引用
作者: Yao, Yanqing Mi, Jusheng Li, Zhoujun Xie, Bin State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing 100191 China College of Mathematics and Information Science Hebei Normal University Shijiazhuang Hebei 050016 China Beijing Key Laboratory of Network Technology Beihang University Beijing China
Formal concept analysis and rough set analysis are two complementary approaches for analyzing data. This paper studies approaches to constructing fuzzy concept lattices based on generalized fuzzy rough approximation o... 详细信息
来源: 评论
A Public Cryptosystem from R-LWE
A Public Cryptosystem from R-LWE
收藏 引用
2011 IEEE 3rd International Conference on Communication Software and networks(2011第三届通信软件与网络国际会议 ICCSN2011)
作者: Ping Wei Liqiang Wu Xiaoyuan Yang Bin Hao Key Laboratory of Network & Information Security of APF Engineering College of APF Xi'an 710086 Ch Key Laboratory of Network & Information Security of APF Engineering College of APF Xi'an 710086Chi Key Laboratory of Computer Network & Information Security of the Ministry of Education Xidian Unive Key Laboratory of Network & Information Security of APF Engineering College of APF Xi'an 710086 C
Recently Vadim Lyubashevsky etc. built LWE problem on ring and proposed a public cryptosystem based on RLWE, which, to a certain extent, solved the defect of large public key of this kind, but it didn't offer p... 详细信息
来源: 评论
Comparative genomics revealed a novel DNA-binding regulatory protein involved in homologous recombination in bacteria
Comparative genomics revealed a novel DNA-binding regulatory...
收藏 引用
5th IEEE International Conference on Systems Biology, ISB 2011
作者: Gao, Yang Zhang, Yan Computer Network Information Center Peking Union Medical College Chinese Academy of Medical Sciences Beijing 100005 China Key Laboratory of Systems Biology Shanghai Institutes for Biological Sciences Chinese Academy of Sciences Shanghai 200031 China
Homologous recombination is a fundamental cellular process that is most widely used by cells to rearrange genes and accurately repair DNA double-strand breaks. It may result in the formation of a critical intermediate... 详细信息
来源: 评论