咨询与建议

限定检索结果

文献类型

  • 1,837 篇 会议
  • 1,571 篇 期刊文献

馆藏范围

  • 3,408 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,283 篇 工学
    • 1,671 篇 计算机科学与技术...
    • 1,305 篇 软件工程
    • 612 篇 信息与通信工程
    • 297 篇 电气工程
    • 249 篇 电子科学与技术(可...
    • 230 篇 控制科学与工程
    • 222 篇 生物工程
    • 154 篇 机械工程
    • 129 篇 网络空间安全
    • 110 篇 仪器科学与技术
    • 109 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 59 篇 安全科学与工程
    • 54 篇 建筑学
  • 1,073 篇 理学
    • 634 篇 数学
    • 244 篇 生物学
    • 228 篇 物理学
    • 196 篇 统计学(可授理学、...
    • 91 篇 化学
    • 91 篇 系统科学
  • 672 篇 管理学
    • 389 篇 管理科学与工程(可...
    • 310 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 83 篇 医学
    • 68 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 23 篇 军事学
  • 11 篇 文学
  • 10 篇 教育学
  • 9 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 95 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 data models
  • 64 篇 deep learning
  • 62 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 security
  • 43 篇 robustness
  • 42 篇 adaptation model...
  • 41 篇 optimization
  • 41 篇 predictive model...

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 166 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 64 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 university of ch...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...

作者

  • 46 篇 zhao yao
  • 41 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 liu ximeng
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,089 篇 英文
  • 187 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3408 条 记 录,以下是3251-3260 订阅
排序:
An Improved Identity-Based Group Signature Scheme
An Improved Identity-Based Group Signature Scheme
收藏 引用
International Conference on Computational Intelligence and Security
作者: Zuowen Tan Key Laboratory of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou Fujian China School of Information Technology Jiangxi University of Finance and Economics Nanchang Jiangxi China
In a group signature scheme, a group member signs messages anonymously on behalf of the group. However, in the case of a dispute, the actual group signer's identity can be revealed by a designated entity. In this ... 详细信息
来源: 评论
pService: Towards Similarity Search on Peer-to-Peer Web Services Discovery
pService: Towards Similarity Search on Peer-to-Peer Web Serv...
收藏 引用
International Conference on Advances in P2P Systems (AP2PS)
作者: Gang Zhou Jianjun Yu National Digital Switching System Engineering and Technological Research and Development Center China State Key Laboratory of Software Development Environment Beihang University China Computer Network Information Center Chinese Academy and Sciences China
We present the design of pService system for P2P Web services discovery supporting similarity search with its locality-preserving feature based on modified Skip Graph. In pService, the most important property (e.g. se... 详细信息
来源: 评论
Support Vector Machine for Suppressing Error Method
Support Vector Machine for Suppressing Error Method
收藏 引用
International Conference on information Science and Engineering (ICISE)
作者: Shuxia Lu Pu Shi Ming Chen Key Laboratory of Machine Learning and Computational Intelligence College of Mathematics and Computer Science Hebei University Baoding China Baoding Pascali Cable TV Integrated Information Network Company Limited Baoding China College of Mathematics and Computer Science Hebei University Baoding China
Support Vector Machine (SVM) is sensitive to noises and outliers. For reducing the effect of noises and outliers, we propose a novel SVM for suppressing error function. The error function is limited to the interval of... 详细信息
来源: 评论
A method for constructing simplified kernel model based on kernel-MSE
A method for constructing simplified kernel model based on k...
收藏 引用
Pacific-Asia Workshop on Computational Intelligence and Industrial Application, PACIIA
作者: Qi Zhu Yong Xu JinRong Cui ChangFeng Chen JingHua Wang XiangQian Wu YingNan Zhao Key Laboratory of Network Oriented Intelligent Computation Shenzhen Graduate School Harbin Institute of Technology Shenzhen China Department of Computer Science and Technology Harbin Institute of Technology Harbin China Department of Computer Science and Technology Nanjing University of Information Science and Technology Nanjing China
In this paper, we derive an efficient nonlinear feature extraction method from naive Kernel Minimum Squared Error (KMSE) method. The most contribution of the derived method is its feature extraction procedure that is ... 详细信息
来源: 评论
Access Model of Web Users Based on Multi-chains Hidden Markov Models
Access Model of Web Users Based on Multi-chains Hidden Marko...
收藏 引用
International Conference on Internet Computing in Science and Engineering (ICICSE)
作者: Kangfeng Zheng Yixian Yang Xiujuan Wang Shize Guo Key Laboratory of network and information attack & defence technology of MOE Beijing University of Posts and Telecommunications Beijing China College of Computer Sciences Beijing University of Technology Beijing China Research Institute of the General Staff of the PLA Beijing China
How to distinguish abnormal access from normal ones is the key problem in Distribution Denial of service(DDoS) attack detection. This research aims at finding out the major difference between the abnormal access and t... 详细信息
来源: 评论
Fuzzy analytic hierarchy process-based utilities evaluation and adoption for DRM security policies
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第1 A期30卷 126-131页
作者: Zhang, Zhi-Yong Ye, Chuan-Qi Fan, Ke-Feng Zhang, Li-Li Niu, Dan-Mei Electronics Information Engineering College Henan University of Science and Technology Luoyang 471003 China Ministry of Education Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China Information Security Center for the State Key Laboratory of Network and Exchange Beijing Post and Telecom University Beijing 100158 China
The utility evaluation of DRM security policies based on fuzzy analytic hierarchy process (FAHP) and their game-theoretic adoptions were proposed from a novel perspective of the different level security and utilities&... 详细信息
来源: 评论
A Pedestrian Navigation System Using Navigation Sentence Based on XML
A Pedestrian Navigation System Using Navigation Sentence Bas...
收藏 引用
International Conference on information Management, Innovation Management and Industrial Engineering, ICIII
作者: Zheng Pan Lei Yan Adam C. Winstanley A. Stewart Fotheringham Jianghua Zheng Beijing Key Laboratory of Spatial Information Integration & Its Applications Institute of RS&GIS Peking University Beijing China National Centre for Geocomputation Maynooth Co. National University of Ireland Kildare Ireland Department of Computer Science Maynooth Co. National University of Ireland Kildare Ireland
Pedestrian navigation system has been widely used in many fields. In order to offer navigation information intelligible for pedestrian, we provide navigation sentences to users, which can be easily displayed on cellul... 详细信息
来源: 评论
Combining opportunistic routing with dynamic source routing for wireless mesh networks
Combining opportunistic routing with dynamic source routing ...
收藏 引用
IET International Communication Conference on Wireless Mobile and Computing (CCWMC 2009)
作者: Qiang Shen Xuming Fang Sunmyeng Kim Rong He High Performance Network Lab Institute of Acoustics Chinese Academy and Sciences Beijing China Provincial Key Laboratory of Information Coding and Transmission Southwest Jiaotong University Chengdu China School of Computer and Software Engineering Kumoh National Institute of Technology Gyeongbuk South Korea
Routing in wireless mesh networks presents a great challenge due to unreliable wireless links and collisions. Recently, a new routing method, opportunistic routing (OR), is proposed to deal with them by exploiting bro...
来源: 评论
Non-blocking message total ordering protocol
收藏 引用
Science in China(Series F) 2008年 第12期51卷 1919-1934页
作者: WANG Yun & WANG JunLing School of computer Science & Engineering, Southeast University key Lab of computer network & information integration, MOE, Nanjing 210096, China 1. School of Computer Science & Engineering Southeast University Key Lab of Computer Network & Information Integration MOE Nanjing 210096 China
Message total ordering is a critical part in active replication in order to maintain consistency among members in a fault tolerant group. The paper proposes a non-blocking message total ordering protocol (NBTOP) for... 详细信息
来源: 评论
Security and trust in digital rights management: A survey
收藏 引用
International Journal of network Security 2009年 第3期9卷 247-263页
作者: Zhang, Zhiyong Pei, Qingqi Ma, Jianfeng Yang, Lin Ministry Of Education Key Laboratory of Computer Network and Information Security Xidian University Taibai South Road No.2 Xi'an Shannxi 710071 China Electronic Information Engineering College Henan University of Science and Technology Xiyuan Road No.48 Luoyang Henan 471003 China The Research Institute China Electronic Equipment and Systems Engineering Corporation Dacheng Road 13 Beijing 100141 China
A successful transaction of digital contents is primarily dependent on security policies, trust relationships and benefit equilibriums among various participants in a DRM (Digital Rights Management)-enabling contents ... 详细信息
来源: 评论