咨询与建议

限定检索结果

文献类型

  • 1,856 篇 会议
  • 1,616 篇 期刊文献

馆藏范围

  • 3,472 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,334 篇 工学
    • 1,713 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 623 篇 信息与通信工程
    • 305 篇 电气工程
    • 254 篇 电子科学与技术(可...
    • 249 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 133 篇 网络空间安全
    • 110 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 78 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,085 篇 理学
    • 641 篇 数学
    • 245 篇 生物学
    • 230 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 92 篇 化学
    • 92 篇 系统科学
  • 679 篇 管理学
    • 392 篇 管理科学与工程(可...
    • 314 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 10 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 deep learning
  • 65 篇 data models
  • 64 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 security
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 174 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 38 篇 university of ch...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 33 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang

语言

  • 3,074 篇 英文
  • 266 篇 其他
  • 149 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3472 条 记 录,以下是3181-3190 订阅
排序:
Large scale plane wave pseudopotential density functional theory calculations on GPU clusters
Large scale plane wave pseudopotential density functional th...
收藏 引用
2011 International Conference for High Performance Computing, networking, Storage and Analysis, SC11
作者: Wang, Long Jia, Weile Chi, Xuebin Wu, Yue Gao, Weiguo Wang, Lin-Wang Supercomputing Center of Computer Network Information Center Chinese Academy of Sciences No. 4 South 4th Street ZhongGuanCun Beijing China School of Mathematical Sciences Fudan University 220 Handan Road Shanghai 200433 China MOE Key Laboratory of Computational Physical Sciences School of Mathematical Sciences Fudan University 220 Handan Road Shanghai 200433 China Lawrence Berkeley National Laboratory Material Science Division Mail stop 50F One Cyclotron Road Berkeley CA 94720 United States
In this work, we present our implementation of the density functional theory (DFT) plane wave pseudopotential (PWP) calculations on GPU clusters. This GPU version is developed based on a CPU DFT-PWP code: PEtot, which... 详细信息
来源: 评论
Based on Ajax technology's online time functional analysis and implementation
Based on Ajax technology's online time functional analysis a...
收藏 引用
International Conference on computer Science and Service System (CSSS)
作者: Lei Xia Shujun Zhang School of computer and information technology Beijing key laboratory of advanced information science and network technology Beijing Jiaotong University Beijing China
With the continuous development of Internet technology and Page Content's Diversity form, Traditional page model Shows its drawbacks. Ajax technology can transfer important information between client and Server-si... 详细信息
来源: 评论
The Evolutionary Dynamics of Apomixis in Ferns: A Case Study from Polystichoid Ferns
收藏 引用
Journal of Botany 2012年 第1期2012卷
作者: Hong-Mei Liu Robert J. Dyer Zhi-You Guo Zhen Meng Jian-Hui Li Harald Schneider Key Laboratory of Southern Subtropical Plant Diversity Fairylake Botanical Garden Shenzhen & Chinese Academy of Sciences Shenzhen 518004 China Department of Life Sciences Natural History Museum London SW7 5BD UK Research Group in Biodiversity Genomics and Environmental Sciences Imperial College London Silwood Park Campus Ascot Berkshire SL5 7PY UK Department of Biological Sciences Qiannan Normal College for Nationalities Duyun 558000 China Computer Network Information Center Chinese Academy of Sciences Beijing 100190 *** State Key Laboratory of Systematic and Evolutionary Botany Institute of Botany Chinese Academy of Sciences Beijing 100093 ***
The disparate distribution of apomixis between the major plant lineages is arguably one of the most paradoxical phenomena in plant evolution. Ferns are particularly interesting for addressing this issue because apomix...
来源: 评论
A key management scheme for multicast based on layer 2 control
A key management scheme for multicast based on layer 2 contr...
收藏 引用
10th IEEE International Conference on computer and information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, 10th IEEE Int. Conf. Scalable Computing and Communications, ScalCom-2010
作者: Cao, Zheng Yin, Pengpeng Lu, Zhengjun School of Computer Science and Engineering Southeast University Nanjing 210096 China Key Laboratory of Computer Network Technology Jiangsu Province Nanjing 210096 China Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing 210096 China
This paper presents a key management scheme for multicast based on layer 2 control, which includes multicast authentication, secure multicast forwarding tree management, key distribution when users are initialized and... 详细信息
来源: 评论
Multi-User Private keyword Search for Cloud Computing
Multi-User Private Keyword Search for Cloud Computing
收藏 引用
IEEE International Conference on Cloud Computing Technology and Science (CloudCom)
作者: Yanjiang Yang Haibing Lu Jian Weng Institute for Infocomm Research Singapore Department of Operations Management and Information Systems The Leavey School of Business Santa Clara University USA State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China Department of Computer Science and Emergency Technology Research Center of Risk Department of Computer Science and Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论
A robust and secure overlay storage scheme based on erasure coding
A robust and secure overlay storage scheme based on erasure ...
收藏 引用
5th International Conference on Pervasive Computing and Applications, ICPCA10
作者: Li, Chuanyou Wang, Yun School of Computer Science and Engineering Southeast University Key Lab of Computer Network and Information Integration Nanjing 210096 China
Recently, in classical P2P overlay networks, with applying replication technique, a single peer is replaced by a cluster of peers in order to tolerant Byzantine failures. In this paper, a novel robust and secure schem... 详细信息
来源: 评论
SOA-based method for cooperative tasks distribution in large-scale optimization environments
SOA-based method for cooperative tasks distribution in large...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Cui, Qiuxiang Zhu, Xia Zhang, Yi Li, Xiaoping School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
In this paper, operators are encapsulated by services in algorithms for large-scale optimization problems and the services are deployed in distributed systems. Response time is an important factor for the performance ... 详细信息
来源: 评论
Digital image hiding arithmetic based on hermite chaotic neural networks
收藏 引用
ICIC Express Letters, Part B: Applications 2011年 第1期2卷 165-170页
作者: Zou, Ajin Luo, Yixiang Xie, Dongqing Peng, Lingxi Information College Guangdong Ocean University No. 40 East Jiefang Road Xiashan District Zhanjiang 524088 China School of Computer Science Educational Software Guangzhou University No. 230 Wai Huan Xi Road Guangzhou 510006 China Network and Data Security Key Laboratory of Sichuan Province Chengdu 611731 China
An image hidden information algorithm inspired by chaotic neural networks, referred as DiaHao, is presented. The secret information of digital image is XOR en- crypted by chaotic stream cipher sequence that is generat... 详细信息
来源: 评论
Large scale plane wave pseudopotential density functional theory calculations on GPU clusters
Large scale plane wave pseudopotential density functional th...
收藏 引用
Supercomputing Conference
作者: Long Wang Yue Wu Weile Jia Weiguo Gao Xuebin Chi Lin-Wang Wang Supercomputing Center of Computer Network Information Center Chinese Academy of Sciences Beijing China School of Mathematical Sciences Fudan University Shanghai China MOE Key Laboratory of Computational Physical Sciences School of Mathematical Sciences Fudan University Shanghai China Material Science Division Lawrence Berkeley National Laboratory Berkeley CA USA
In this work, we present our implementation of the density functional theory (DFT) plane wave pseudopotential (PWP) calculations on GPU clusters. This GPU version is developed based on a CPU DFT-PWP code: PEtot, which... 详细信息
来源: 评论
A load adaptive IEEE 802.11e EDCA backoff scheme with enhanced service differentiation
A load adaptive IEEE 802.11e EDCA backoff scheme with enhanc...
收藏 引用
2010 IEEE 12th International Conference on Communication Technology, ICCT'2010
作者: Dong, Yongqiang Wang, Yun Xia, Qin School of Computer Science and Engineering Southeast University Nanjing 210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing 210096 China
In view of the disadvantages of IEEE 802.11e EDCA in QoS guarantee and collision avoidance, an enhanced EDCA scheme called SD-AEDCA is presented which dynamically adjusts two EDCA parameters, namely contention window ... 详细信息
来源: 评论