咨询与建议

限定检索结果

文献类型

  • 1,837 篇 会议
  • 1,571 篇 期刊文献

馆藏范围

  • 3,408 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,283 篇 工学
    • 1,671 篇 计算机科学与技术...
    • 1,305 篇 软件工程
    • 612 篇 信息与通信工程
    • 297 篇 电气工程
    • 249 篇 电子科学与技术(可...
    • 230 篇 控制科学与工程
    • 222 篇 生物工程
    • 154 篇 机械工程
    • 129 篇 网络空间安全
    • 110 篇 仪器科学与技术
    • 109 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 59 篇 安全科学与工程
    • 54 篇 建筑学
  • 1,073 篇 理学
    • 634 篇 数学
    • 244 篇 生物学
    • 228 篇 物理学
    • 196 篇 统计学(可授理学、...
    • 91 篇 化学
    • 91 篇 系统科学
  • 672 篇 管理学
    • 389 篇 管理科学与工程(可...
    • 310 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 83 篇 医学
    • 68 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 23 篇 军事学
  • 11 篇 文学
  • 10 篇 教育学
  • 9 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 95 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 data models
  • 64 篇 deep learning
  • 62 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 security
  • 43 篇 robustness
  • 42 篇 adaptation model...
  • 41 篇 optimization
  • 41 篇 predictive model...

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 166 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 64 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 university of ch...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...

作者

  • 46 篇 zhao yao
  • 41 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 liu ximeng
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,089 篇 英文
  • 187 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3408 条 记 录,以下是3231-3240 订阅
排序:
The Short Share Secret Sharing Agreement with Matrix Factorization
The Short Share Secret Sharing Agreement with Matrix Factori...
收藏 引用
International Conference on information Engineering and computer Science (ICIECS)
作者: XiaoYuan Yang Zhen Liu Key Laboratory of computer Network & Information Security of Engineering Institute of the Armed Police Xi'an Shanxi China
To make up the limitation of traditional secret sharing schemes that the length of secret can not be extremely great, we use the theory of Jordan matrix factorization and combine with the formulary of Lagrange putting... 详细信息
来源: 评论
The Security Matrix Factorization Agreement with Two Parties
The Security Matrix Factorization Agreement with Two Parties
收藏 引用
International Conference on Computational Intelligence and Security
作者: XiaoYan Yang Zhen Liu Key Laboratory of computer Network & Information Security of Engineering Institute of the Armed Police Xi'an Shanxi China
In the confidential computing issues of scientific computing, the confidential computing of matrix factorization is still no fruit home and abroad. This paper using Data perturbation assumption and Oblivious Transfer ... 详细信息
来源: 评论
Access model of web users based on multi-chains hidden Markov models
Access model of web users based on multi-chains hidden Marko...
收藏 引用
作者: Zheng, Kangfeng Yang, Yixian Wang, Xiujuan Guo, Shize Key Laboratory of Network and Information Attack and Defence Technology MOE Beijing University of Posts and Telecommunications Beijing China College of Computer Sciences Beijing University of Technology Beijing China No. 54 Research Institute of the General Staff PLA Beijing China
How to distinguish abnormal access from normal ones is the key problem in Distribution Denial of service(DDoS) attack detection. This research aims at finding out the major difference between the abnormal access and t... 详细信息
来源: 评论
A static method for detection of information theft malware
A static method for detection of information theft malware
收藏 引用
2nd International Symposium on Electronic Commerce and Security, ISECS 2009
作者: Li, JiaJing Wei, Tao Zou, Wei Mao, Jian Key Laboratory of Network and Software Security Assurance Ministry of Education Peking University Beijing 100871 China Institute of Computer Science and Technology Peking University Beijing 100871 China Department of Electronic and Information Engineering BeiHang University Beijing 10083 China
Existing techniques based on behavior semantics for information theft malware detection have the main shortcomings of low path coverage and disability of finding hidden malicious behaviors. In this paper we propose a ... 详细信息
来源: 评论
Efficient Mining of Strong Negative Association Rules in Multi-Database
Efficient Mining of Strong Negative Association Rules in Mul...
收藏 引用
International Conference on Computational Intelligence and Software Engineering (CiSE)
作者: Hong Li Xuegang Hu Key Laboratory of Network and Intelligent Information Processing Department of Computer Science and Tchnology Hefei University Hefei China School of Computer & Information Hefei University of technology Hefei China
Strong negative association rules can reveal irrelevances hidden between frequent itemsets. Existing research has made significant efforts in discovering both positive and negative association rules from single databa... 详细信息
来源: 评论
A novel mining Method of Global Negative Association Rules in Multi-Database
A novel mining Method of Global Negative Association Rules i...
收藏 引用
IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS)
作者: Hong Li Yijun Shen Xuegang Hu Key Laboratory of Network and Intelligent Information Processing Department of Computer Science and Technology Hefei University of Technology Hefei  China School of Computer & Information Hefei University of technology Hefei  China
Mining negative association rules in multi-database has attracted more and more attention. Most existing research focuses on unifying all negative rules discovered from different single databases into a single view. T... 详细信息
来源: 评论
Improvement of MODIS 8-day LAI/FPAR product with temporal filters to generate high quality time-series product
Improvement of MODIS 8-day LAI/FPAR product with temporal fi...
收藏 引用
2009 Joint Urban Remote Sensing Event
作者: Huifang, Zhang Runhe, Shi Honglin, Zhong Peiqing, Qu Juan, Sun Wenpeng, Lin Su, Li Key Lab. of Geographic Information Science Ministry of Education East China Normal University Shanghai China Key Laboratory of Ecosystem Network Observation and Modeling IGSNRR CAS Beijing China Key Lab. of Urban Ecology and Environment Restoration Shanghai Normal University Shanghai China Computer College Beijing Technology and Business University Beijing China
Numerous studies have reported that the timeseries terrestrial parameters such as the Normalized Difference Vegetation Index (NDVI), Leaf Area of Index (LAI), Fraction of Absorbed Photosynthetic Active Radiation (FPAR... 详细信息
来源: 评论
A New Routing Scheme Based on Greedy Tree in Delay Tolerant networks
A New Routing Scheme Based on Greedy Tree in Delay Tolerant ...
收藏 引用
IEEE International Symposium on computer network and Multimedia Technology, CNMT
作者: Haizheng Yu Jianfeng Ma Hong Bian Key Laboratory of Computer Network and Information Security Xidian University Xi'an China School of Maths-physics and Information Sciences Xinjiang Normal University Urumqi China
Delay tolerant networking (DTN) is a new store-and-forward architecture and protocol suite for the networks which is intermittent connectivity. Depending on the nodes ability of store and forward, the messages are del... 详细信息
来源: 评论
An efficient mesh simplification algorithm
An efficient mesh simplification algorithm
收藏 引用
作者: Wang, Hailing Yin, Guisheng Zhang, Jing Wang, Decai Wang, Jian National Defence Key Laboratory of Autonomous Underwater Vehicle Technology Harbin Engineering University Harbin Heilongjiang 150001 China College of Computer Science and Technology Harbin Engineering University Harbin Heilongjiang 150001 China Network and Information Center Harbin Engineering University Harbin Heilongjiang 150001 China
This paper presents a new mesh simplification algorithm based on edge collapse, it combines surface curvature and quadric error metric, the position of a new vertex for edge collapse depends on multiple-weighted appro... 详细信息
来源: 评论
Generating the semantic containers for the query interfaces of deep web
Generating the semantic containers for the query interfaces ...
收藏 引用
International Conference on Management and Service Science, MASS 2009
作者: Hao, Liang Wanli, Zuo Jian, Chen Yunge, Mao College of Computer Science and Technology Jilin University Changchun 130012 China Department of Information Changchun Taxation College Changchun 130117 China Key Laboratory of Symbol Computation Knowledge Engineering of the Ministry of Education Changchun 130012 China Network Center of Changchun Taxation College Changchun 130117 China
With the myriad emergence of the online Web Database, the Web is divided into a two layers information platform which is composed of Surface Web and Deep Web. The huge information hidden in the Deep Web is higher in t... 详细信息
来源: 评论