咨询与建议

限定检索结果

文献类型

  • 1,856 篇 会议
  • 1,616 篇 期刊文献

馆藏范围

  • 3,472 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,334 篇 工学
    • 1,713 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 623 篇 信息与通信工程
    • 305 篇 电气工程
    • 254 篇 电子科学与技术(可...
    • 249 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 133 篇 网络空间安全
    • 110 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 78 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,085 篇 理学
    • 641 篇 数学
    • 245 篇 生物学
    • 230 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 92 篇 化学
    • 92 篇 系统科学
  • 679 篇 管理学
    • 392 篇 管理科学与工程(可...
    • 314 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 10 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 deep learning
  • 65 篇 data models
  • 64 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 security
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 174 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 38 篇 university of ch...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 33 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang

语言

  • 3,074 篇 英文
  • 266 篇 其他
  • 149 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3472 条 记 录,以下是3191-3200 订阅
排序:
Recursive constructions and counting of orthomorphic permutations
收藏 引用
Tongxin Xuebao/Journal on Communications 2011年 第11 A期32卷 204-208页
作者: Zhang, Feng-Rong Hu, Yu-Pu Ma, Hua Xie, Min Gao, Jun-Tao Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China School of Science Xidian University Xi'an 710071 China State Key Laboratory of Information Security Graduate University of Chinese Acad. of Sci. Beijing 100049 China
The properties and known constructions of orthomorphic permutations were investigated. On this basis, a new recursive method to construct an n-variable orthomorphic permutations from two (n-2)-variable ones is present... 详细信息
来源: 评论
Quantum broadcast communication with authentication
收藏 引用
Chinese Physics B 2010年 第7期19卷 63-67页
作者: 杨宇光 王叶红 温巧燕 College of Computer Science and Technology Beijing University of Technology State Key Laboratory of Information Security (Graduate University of Chinese Academy of Sciences) State Key Laboratory of Integrated Services Network Xidian University State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications
Two simple quantum broadcast communication schemes are proposed. A central party can broadcast his secret message to all the legitimate receivers simultaneously. Compared with the three schemes proposed recently (Wan... 详细信息
来源: 评论
Fair Non-Repudiation for Web Services Transactions
收藏 引用
Wuhan University Journal of Natural Sciences 2010年 第5期15卷 385-392页
作者: SU Ruidan,FU Shaofeng,ZHOU Lihua key laboratory of computer network and information Security of the Ministry of Education,Xidian University,Xi’an 710071,Shaanxi,China Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi’an Shaanxi China
To safeguard the interests of transacting parties,non-repudiation mechanisms need to assure fairness and *** non-repudiation service currently implemented usually does not consider the requirement of fairness and the ... 详细信息
来源: 评论
An effective heuristic for on-line tenant placement problem in SaaS
An effective heuristic for on-line tenant placement problem ...
收藏 引用
2010 IEEE 8th International Conference on Web Services, ICWS 2010
作者: Zhang, Yi Wang, Zhihu Gao, Bo Guo, Changjie Sun, Wei Li, Xiaoping School of Computer Science and Engineering Southeast University 210096 Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education China IBM Research-China 100096 Beijing China
As one of the key characteristics of Software as a Service (SaaS), multi-tenancy aims to support massive customers by sharing application instances and databases. To achieve the high economies of scale, one of the mos... 详细信息
来源: 评论
Scalable Arbitrated Quantum Signature of Classical Messages with Multi-Signers
收藏 引用
Communications in Theoretical Physics 2010年 第7期54卷 84-88页
作者: 杨宇光 王园 腾义伟 柴海平 温巧燕 College of Computer Science and Technology Beijing University of Technology State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences State Key Laboratory of Integrated Services Network Xidian University State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications
Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collabo... 详细信息
来源: 评论
Video steganography using motion vector and linear block codes
Video steganography using motion vector and linear block cod...
收藏 引用
2010 IEEE International Conference on Software Engineering and Service Sciences, ICSESS 2010
作者: Pan, Feng Xiang, Li Yang, Xiao-Yuan Guo, Yao Key Laboratory of Network and Information Security of APF Engineering College of the Armed Police Force Xi'an China Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China
A novel video steganography scheme based on motion vectors and linear block codes has been proposed in this paper. Our method embed secret messages in the motion vectors of cover media during the process of H.264 comp... 详细信息
来源: 评论
Distance estimation by constructing the virtual ruler in anisotropic sensor networks
Distance estimation by constructing the virtual ruler in ani...
收藏 引用
IEEE INFOCOM 2010
作者: Wang, Yun Li, Kai Wu, Jie School of Computer Science and Engineering Southeast University Key Lab. of Computer Network and Information Integration Nanjing 210096 China Department of Computer and Information Sciences Temple University Philadelphia PA 119122 United States
Distance estimation is fundamental for many functionalities of wireless sensor networks and has been studied intensively in recent years. A critical challenge in distance estimation is handling anisotropic problems in... 详细信息
来源: 评论
Animating 2D moving deformable objects based on complex barycentric coordinates
收藏 引用
Journal of information and Computational Science 2011年 第9期8卷 1533-1540页
作者: Deng, Zhengjie Li, Zheng Liang, Yun Su, Zhuo School of Information Science and Technology Sun Yat-sen University Guangzhou 510006 China Shenzhen Key Laboratory of Digital Living Network and Content Service Shenzhen Guangdong 518057 China Research Institute of Sun Yat-sen University in Shenzhen Shenzhen Guangdong 518057 China Faculty of Computer Guangdong University of Technology Guangzhou 510006 China College of Informatics South China Agricultural University Guangzhou 510642 China
In 2D animation processes, many simulated the movement and the deformation of a moving deformable object simultaneously. The binding of the movement and the deformation increased the complexity and restricted user'... 详细信息
来源: 评论
A cooperative method for supervised learning in Spiking neural networks
A cooperative method for supervised learning in Spiking neur...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Hong, Shen Ning, Liu Xiaoping, Li Qian, Wang School of Computer Science and Engineering Southeast University Nanjing China School of Golden Audit Nanjing Audit University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
In Spiking neural networks, information is encoded in separate spike times. The traditional gradient descent based learning algorithm (SpikeProp) trends to be trapped in local optima and cannot converge if the negativ... 详细信息
来源: 评论
Achieving fair non-repudiation for web services transaction
Achieving fair non-repudiation for web services transaction
收藏 引用
2010 2nd International Conference on Education Technology and computer, ICETC 2010
作者: Su, Rui-Dan Fu, Shao-Feng Zhou, Li-Hua Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University 710071 Xian Shaanxi China
For safeguarding the interests of web services transaction parties, non-repudiation mechanism need assure fairness and timeliness. The non-repudiation service implemented currently mostly does not consider the require... 详细信息
来源: 评论