咨询与建议

限定检索结果

文献类型

  • 1,856 篇 会议
  • 1,616 篇 期刊文献

馆藏范围

  • 3,472 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,334 篇 工学
    • 1,713 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 623 篇 信息与通信工程
    • 305 篇 电气工程
    • 254 篇 电子科学与技术(可...
    • 249 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 133 篇 网络空间安全
    • 110 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 78 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,085 篇 理学
    • 641 篇 数学
    • 245 篇 生物学
    • 230 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 92 篇 化学
    • 92 篇 系统科学
  • 679 篇 管理学
    • 392 篇 管理科学与工程(可...
    • 314 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 10 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 deep learning
  • 65 篇 data models
  • 64 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 security
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 174 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 38 篇 university of ch...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 33 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang

语言

  • 3,074 篇 英文
  • 266 篇 其他
  • 149 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3472 条 记 录,以下是3161-3170 订阅
排序:
A primary traffic aware opportunistic spectrum sensing for cognitive radio networks
A primary traffic aware opportunistic spectrum sensing for c...
收藏 引用
IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)
作者: Fan Zhang Wei Wang Zhaoyang Zhang Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong China Department of Information Science and Electronic Engineering Zhejiang Provincial Key Laboratory of Information Network Technology University of Zhejiang Hangzhou China Key Laboratory of Information Coding and Transmission Southwest Jiaotong University Chengdu China
Spectrum sensing is adopted to detect the presence of primary users in cognitive radio networks. Considering the sensing overhead, it is not always a good choice that the secondary user senses the channel all the time... 详细信息
来源: 评论
eHCBAC: Flexible Column Based Access Control for Electronic Healthcare Systems
eHCBAC: Flexible Column Based Access Control for Electronic ...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Mei Liu Ge Fu Jiwu Jing State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences China National Computer Network Emergency Response Technical Team Coordination Center of China China
An electronic healthcare (e-Health) system is a database system that collects patients' medical data from participating organizations such as hospitals, clinics and insurance companies, and facilitates services fo... 详细信息
来源: 评论
RETRACTED ARTICLE: An approach to evaluate the effects of virtual topology on in-band crosstalk attack propagation in transparent optical networks
收藏 引用
Photonic network Communications 2012年 第2期24卷 166-166页
作者: Xiao, Yonghua Peng, Yunfeng Sun, Zeyu Zhao, Changming Long, Keping Key Laboratory of Optical Fiber Sensing and Communications Education Ministry of China University of Electronic Science and Technology of China Chengdu China Institute of Advanced Network Technology and New Services (ANTS) School of Computer and Communication Engineering (CCE) University of Science and Technology Beijing (USTB) Beijing China College of Communication and Information Engineering Chongqing University of Posts and Telecommunications Chongqing China
来源: 评论
Threshold-based message copies control in delay tolerant networks
收藏 引用
Journal of networks 2011年 第1期6卷 96-103页
作者: Yu, Haizheng Bian, Hong College of Mathematics and System Sciences Xinjiang University Urumqi China Key Laboratory of Computer Network and Information Security Xidian University Xi'an China School of Mathematical Sciences Xinjiang Normal University Urumqi Xinjiang China
Delay Tolerant networks (DTN) generally lack end-to-end connectivity and multiple message copies routing protocols are often used to improve the efficiency that messages are delivered successfully, but network load is... 详细信息
来源: 评论
Research of routing techniques on delay tolerant networks
收藏 引用
Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology 2011年 第SUPPL. 1期35卷 215-222页
作者: Xu, Jia Wang, Ru-Chuan Sun, Li-Juan Xiao, Fu Computer Institute Nanjing University of Posts and Telecommunications Nanjing 210003 China Key Laboratory for Computer Network and Information Integration of Ministry of Education Southeast University Nanjing 211189 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China
Delay tolerant networks(DTNs) can interconnect highly heterogeneous networks among extreme environments even between nodes without end-to-end path. As a new evolution of Mobile Ad hoc network(MANET)and wireless sensor... 详细信息
来源: 评论
Runtime-Based Boot Components Re-measurement Scheme for Trusted Platform
Runtime-Based Boot Components Re-measurement Scheme for Trus...
收藏 引用
2011 International Conference on Informatics,Cybernetics,and computer Engineering(ICCE 2011)
作者: Peng Weiping Zhou Yajian Wang Cong Yang Yixian Key Laboratory of Network and Information Attack & Defence Technology of MOE Beijing University of Posts and Telecommunications School of Computer Science and Technology Henan Polytechnic University Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications
Integrity measurement is just one of the most important features in a trusted computing platform to provide evidence of platform configuration and behavior. Each set of software instructions(binary code) is measured a... 详细信息
来源: 评论
An anonymity and authentication mechanism for internet of things
收藏 引用
Journal of Convergence information Technology 2011年 第3期6卷 98-105页
作者: Wang, Xiaoliang Sun, Xingming Yang, Hengfu Shah, Saeed Arif College of Information Engineering Xiangtan University Xiangtan 411105 China Department of Computer Science and Technology Nanjing University of Information Science and Technology Nanjin 210044 China Department of Information Science and Engineering Hunan First Normal University Changsha 410205 China Hunan Provincial Key Laboratory of Network and Information Security Hunan University Changsha 410082 China
Authentication has received increasing attention in the literatures of Internet of Things. At the same time, numerous concerns have been raised about the issue of anonymity due to users' awareness of their privacy... 详细信息
来源: 评论
SWP2P: P2P anonymous trace system based on superposition watermarking
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2011年 第8期5卷 116-126页
作者: Wang, Xiaoliang Sun, Xingming Yang, Hengfu Shah, Saeed Arif College of Information Engineering Xiangtan University Xiangtan 411105 China Department of Computer Science and Technology Nanjing University of Information Science and Technology Nanjin 210044 China Department of Information Science and Engineering Hunan First Normal University Changsha 410205 China Hunan Provincial Key Laboratory of Network and Information Security Hunan University Changsha 410082 China
A lot of attention has been paid to anonymity due to the users' privacy protection. While peer-topeer (P2P) networks need anonymity capacity, the authority also requires partner traceability to prevent anonymous a... 详细信息
来源: 评论
Genetic Algorithm-Based Power Management in Cloud Platform
Genetic Algorithm-Based Power Management in Cloud Platform
收藏 引用
International Conference on Internet Technology and Applications (iTAP)
作者: Zili Xiong Zhang Zhang Huafeng Kong Deqing Zou School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Key Laboratory of Information Network Security Ministry of Public Security Third Research Institute of Ministry of Public Security Shanghai China
Cloud computing is a novel computing pattern, and it can provide underlying hardware resource for cloud users on demand. Virtualization is the key technology of cloud computing, and it provides the technical support f... 详细信息
来源: 评论
Conflict-Free Transmission Schedule Based on network Coding in Wireless networks
Conflict-Free Transmission Schedule Based on Network Coding ...
收藏 引用
WRI International Conference on Communications and Mobile Computing, CMC
作者: Jing Wang Xiangyang Liu Xinmei Wang School of Information Engineering Chang'an University Xi'an China Computer Network Teaching Office Xian Communications College Xi'an China State Key Laboratory of Integrated Service Networks Xidian University Xi'an China
In wireless networks, the cross-layer design of joint medium access control and network coding can avoid destructive interferences among concurrent transmissions. Wireless network codes in conjunction with conflict-fr... 详细信息
来源: 评论