咨询与建议

限定检索结果

文献类型

  • 1,856 篇 会议
  • 1,616 篇 期刊文献

馆藏范围

  • 3,472 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,334 篇 工学
    • 1,713 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 623 篇 信息与通信工程
    • 305 篇 电气工程
    • 254 篇 电子科学与技术(可...
    • 249 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 133 篇 网络空间安全
    • 110 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 78 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,085 篇 理学
    • 641 篇 数学
    • 245 篇 生物学
    • 230 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 92 篇 化学
    • 92 篇 系统科学
  • 679 篇 管理学
    • 392 篇 管理科学与工程(可...
    • 314 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 10 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 deep learning
  • 65 篇 data models
  • 64 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 security
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 174 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 38 篇 university of ch...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 33 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang

语言

  • 3,074 篇 英文
  • 266 篇 其他
  • 149 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3472 条 记 录,以下是3131-3140 订阅
排序:
Reasonable routing in delay/disruption tolerant networks
收藏 引用
Frontiers of Materials Science 2011年 第3期5卷 327-334页
作者: Haizheng YU Jianfeng MA Hong BIAN College of Mathematics and System Sciences Xinjiang University Urumqi 830046 China Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China School of Mathematical Sciences Xinjiang Normal University Urumqi 830054 China
Delay/disruption tolerant networking (DTN) is an approach to networking where intermittent connectivity exists: it is often afforded by a store and forward technique. Depending on the capability of intermediary nod... 详细信息
来源: 评论
A clustering scheme in application layer multicast
A clustering scheme in application layer multicast
收藏 引用
作者: Zhang, Xinchang Li, Xiaodong Luo, Wanming Yan, Baoping Shandong Key Laboratory of Computer Networks Shandong Computer Science Center No. 19 Keyuan Road Lixia Distric Jinan 250014 China Computer Network Information Center Chinese Academy of Sciences 4 South 4th Street Zhongguancun Beijing 100049 China
In application layer multicast (ALM), member hosts lack direct knowledge of underlying network topology, which brings some performance penalty. This paper investigates an effective way to rapidly obtain some related t... 详细信息
来源: 评论
Koblitz Elliptic Curves Generating Based on Evolutionary Cryptography Theory and Verifying Parameters Recommended by NIST
收藏 引用
China Communications 2011年 第4期8卷 41-49页
作者: 王潮 张焕国 刘礼黎 Key Lab of Specialty Fiber Optics and Optical Access Network Ministry of Education Shanghai University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education Computer School Wuhan University Huawei Technologies Co. Ltd
Elliptic curve cryptography is one of the most important public-key *** Koblitz Curve is a special kind of elliptic curve in ECC and its security mainly depends on the base *** on Evolutionary Cryptography theory,whic... 详细信息
来源: 评论
Based on Ajax technology's online time functional analysis and implementation
Based on Ajax technology's online time functional analysis a...
收藏 引用
2011 International Conference on computer Science and Service System, CSSS 2011
作者: Xia, Lei Zhang, Shujun School of Computer and Information Technology Beijing Jiaotong University Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing China
With the continuous development of Internet technology and Page Content's Diversity form, Traditional page model Shows its drawbacks. Ajax technology can transfer important information between client and Server-si... 详细信息
来源: 评论
Strong security enabled certificateless aggregate signatures applicable to mobile computation
Strong security enabled certificateless aggregate signatures...
收藏 引用
3rd IEEE International Conference on Intelligent networking and CollaborativeSystems, INCoS 2011
作者: Hu, Xiong Wu, Qianhong Chen, Zhong Key Laboratory of Network and Software Security Assurance of the Ministry of Education School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan University Ministry of Education China Universitat Rovira i Virgili Department of Computer Engineering and Mathematics UNESCO Av. Països Catalans 26 E-43007 Tarragona Spain
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that ... 详细信息
来源: 评论
On quasi-orthogonal space-time block codes for dual-polarized MIMO channels
On quasi-orthogonal space-time block codes for dual-polarize...
收藏 引用
2011 International Conference on Wireless Communications and Signal Processing, WCSP 2011
作者: Li, Yabo Huang, Zhike Wang, Haiquan Xia, Xiang-Gen Department of Information Science and Electrical Engineering Zhejiang Provincial Key Laboratory of Information Network Technology Zhejiang University Hangzhou Zhejiang China College of Communications Engineering Hangzhou Dianzi University Hangzhou Zhejiang China Department of Electrical and Computer Engineering University of Delaware Newark DE 19716 United States
As a space and cost-efficient antenna configuration, dual-polarized antennas are widely deployed in real field MIMO wireless communication systems. The Quasi-Orthogonal Space-Time Code (QOSTBC), due to its advantages ... 详细信息
来源: 评论
Runtime-based boot components re-measurement scheme for trusted platform
Runtime-based boot components re-measurement scheme for trus...
收藏 引用
作者: Weiping, Peng Yajian, Zhou Cong, Wang Yixian, Yang Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China School of Computer Science and Technology Henan Polytechnic University Jiaozuo Henan 454001 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China
Integrity measurement is just one of the most important features in a trusted computing platform to provide evidence of platform configuration and behavior. Each set of software instructions (binary code) is measured ... 详细信息
来源: 评论
Research on privacy-preserving keyword retrieval technology in cloud storage
收藏 引用
Tongxin Xuebao/Journal on Communications 2011年 第9 A期32卷 59-63+69页
作者: Huang, Ru-Wei Gui, Xiao-Lin Yu, Si Zhuang, Wei Department of Electronics and Information Engineering Xi'an Jiaotong University Xi'an 710049 China Shaanxi Province Key Laboratory of Computer Network Xi'an Jiaotong University Xi'an 710049 China School of Computer Electronics and Information Guangxi University Nanning 530004 China
Cloud storage provides scalable storage resources which are available everywhere. Privacy has become the key problem of cloud storage. Encryption is a well established technology for protecting sensitive data. But it ... 详细信息
来源: 评论
Optimal transmission power allocation for two-way relay channel using analog network coding
Optimal transmission power allocation for two-way relay chan...
收藏 引用
International Conference on Consumer Electronics, Communications and networks
作者: Yuan, Quan Zhou, Yajian Zhao, Mingfeng Yang, Yixian Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Considering a system model of three nodes two-way relay channel with analog network coding, this paper discusses the optimal transmission power allocation problem to maximize the system achievable sum-rate. We propose... 详细信息
来源: 评论
A Dynamic Resource Allocation Algorithm for Database-as-a-Service
A Dynamic Resource Allocation Algorithm for Database-as-a-Se...
收藏 引用
IEEE International Conference on Web Services (ICWS)
作者: Jie Zhu Bo Gao Zhihu Wang Berthold Reinwald Changjie Guo Xiaoping Li Wei Sun School of Computer Science & Engineering South-East University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education China IBM Research China Beijing China IBM Almaden Research Center San Jose CA USA
In Database-as-a-Service (DBaaS), a large number of tenants share DBaaS resources (CPU, I/O and Memory). While the DBaaS provider runs DBaaS to "share" resources across the entire tenant population to maximi... 详细信息
来源: 评论