咨询与建议

限定检索结果

文献类型

  • 1,856 篇 会议
  • 1,616 篇 期刊文献

馆藏范围

  • 3,472 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,334 篇 工学
    • 1,713 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 623 篇 信息与通信工程
    • 305 篇 电气工程
    • 254 篇 电子科学与技术(可...
    • 249 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 133 篇 网络空间安全
    • 110 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 78 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,085 篇 理学
    • 641 篇 数学
    • 245 篇 生物学
    • 230 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 92 篇 化学
    • 92 篇 系统科学
  • 679 篇 管理学
    • 392 篇 管理科学与工程(可...
    • 314 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 10 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 deep learning
  • 65 篇 data models
  • 64 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 security
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 174 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 38 篇 university of ch...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 33 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang

语言

  • 3,074 篇 英文
  • 266 篇 其他
  • 149 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3472 条 记 录,以下是3141-3150 订阅
排序:
Constructions of two-output Bent functions
收藏 引用
Journal of Computational information Systems 2011年 第12期7卷 4178-4184页
作者: Zhang, Fengrong Hu, Yupu Zhao, Yongbin Xie, Min Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China School of Information Science and Technology Shijiazhuang Tiedao University Shijiazhuang 050043 China
Bent functions, which have the highest nonlinearity, play an important role in coding theory, sequence design and cryptography. On the basis of a given 2n-variable Maiorana-McFarland (M-M) Bent function and the 2n ... 详细信息
来源: 评论
A self-adaptive differential evolution algorithm for binary CSPs
A self-adaptive differential evolution algorithm for binary ...
收藏 引用
作者: Fu, Hongjie Ouyang, Dantong Xu, Jiaming Key Laboratory of Symbolic Computation and Knowledge Engineering Jilin University Ministry of Education Changchun 130012 China College of Computer Science and Technology Jilin Teachers Institute of Engineering and Technology Changchun 130052 China China Internet Network Information Center Beijing 100000 China
A novel self-adaptive differential evolution (SADE) algorithm is proposed in this paper. SADE adjusts the mutation rate F and the crossover rate CR adaptively, taking account of the different distribution of populatio... 详细信息
来源: 评论
A novel effective ICI self-cancellation method
A novel effective ICI self-cancellation method
收藏 引用
54th Annual IEEE Global Telecommunications Conference: "Energizing Global Communications", GLOBECOM 2011
作者: Wen, Miao-Wen Cheng, Xiang Wei, Xing Ai, Bo Jiao, Bing-Li School of Electronics Engineering and Computer Science Peking University Beijing 100871 China State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing 100044 China Key Laboratory of Wireless Sensor Network and Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences 865 Changning Road Shanghai 200050 China School of Information and Electronics Beijing Institute of Technology Beijing 100081 China
Orthogonal Frequency Division Multiplexing (OFDM) systems may suffer from both carrier frequency offset (CFO) and in-phase/quadrature-phase (I/Q) imbalance at the receiver front end. In this paper, a novel type of int... 详细信息
来源: 评论
Updatable key Management Scheme with Intrusion Tolerance for Unattended Wireless Sensor network
Updatable Key Management Scheme with Intrusion Tolerance for...
收藏 引用
2011 IEEE Global Telecommunications Conference - GLOBECOM 2011
作者: Liang-min Wang Tao Jiang Xiao-yan Zhu Department of Computer Science Jiangsu University Zhenjiang China Key Laboratory of Computer Network and Information Security of Education Ministry Xidian University Xi'an China
An Unattended Wireless Sensor network (UWSN) collects the sensing data by using mobile sinks (MSs). It differs from the traditional multi-hop wireless sensor networks in which unbalanced traffic makes the sensors clos... 详细信息
来源: 评论
A New Digital Video Watermark Algorithm Based on the HVS
A New Digital Video Watermark Algorithm Based on the HVS
收藏 引用
2011 International Conference on Internet Computing and information Services (ICICIS 2011)
作者: Lufang Liao Xiaoshi Zheng Yanling Zhao Guangqi Liu Lufang Liao Shandong Computer Science Center Shandong Provincial Key Laboratory of Computer network technology School of Information Science and Technology Shandong Institute of Light IndustrySDILI
The algorithm applied to video watermark based on HVS is rare recently, but adaptively selecting the embedding position and the embedding strength according to the host(such as videos, images etc.) is necessary,which ... 详细信息
来源: 评论
Knowledge Discovery from Noisy Datasets
Knowledge Discovery from Noisy Datasets
收藏 引用
The International Conference on Automation and Robotics(ICAR 2011)
作者: Hong Li Yu Zong Enhong Chen Key Laboratory of Network and Intelligent Information Processing Department of Computer Science and Technology Hefei University School of Computer Science and Technology University of Science and Technology of China
It is a significant challenges to deal with the noise data in data mining and knowledge discovery applications. Most of previous works on data cleansing and correction have been focused on addressing class noise or at... 详细信息
来源: 评论
A Block Gathering Based on Mobile Web Page Segmentation Algorithm
A Block Gathering Based on Mobile Web Page Segmentation Algo...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Libing Wu Yalin Ke Yanxiang He Nan Liu School of Computer Science Wuhan University Wuhan China Key Laboratory of Information Network Security Ministry of Public Security Shanghai China
Compared to html page, the mobile web page has different features. The mobile web page is arranged through some important tags such as ;N ;, which are called Gathering Node in this paper. Based on these Gathering Node... 详细信息
来源: 评论
L-WMxD: Lexical based Webmail XSS Discoverer
L-WMxD: Lexical based Webmail XSS Discoverer
收藏 引用
IEEE Conference on computer Communications Workshops, INFOCOM Wksps
作者: Zhushou Tang Haojin Zhu Zhenfu Cao Shuai Zhao Department of Computer Science and Engineering Shanghai Jiaotong University China Key Laboratory of Information Network Security Ministry of Public Security China
XSS (Cross-Site Scripting) is a major security threat for web applications. Due to lack of source code of web application, fuzz technique has become a popular approach to discover XSS in web application except Webmail... 详细信息
来源: 评论
Parallel map matching algorithm based on multi-core and MPI
Parallel map matching algorithm based on multi-core and MPI
收藏 引用
International Conference on Remote Sensing, Environment and Transportation Engineering (RSETE)
作者: Xiaogang Han Yuefeng Liu Lei Yan Yiwei Gao Beijing Key Laboratory of Spatial Information Integration and Its Applications Peking University Beijing China Research Institute China United Network Communications Group Company Limited Beijing China
For the requirements of large-scale real-time vehicle GPS data map matching in application, this paper proposes a parallel algorithm for road matching based on multi-core and MPI(Massage Passing Interface). Several ba... 详细信息
来源: 评论
A Privacy Preserving Handover Authentication Scheme for EAP-Based Wireless networks
A Privacy Preserving Handover Authentication Scheme for EAP-...
收藏 引用
2011 IEEE Global Telecommunications Conference - GLOBECOM 2011
作者: Qi Jing Yuqing Zhang Anmin Fu Xuefeng Liu Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China National Computer Network Intrusion Protection Center GUCAS Beijing China
Extensible Authentication Protocol (EAP) is a framework which aims to provide a flexible authentication for wireless networks. Due to the involvement of an EAP server and several round trips between a mobile node (MN)... 详细信息
来源: 评论