咨询与建议

限定检索结果

文献类型

  • 1,837 篇 会议
  • 1,582 篇 期刊文献

馆藏范围

  • 3,419 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,295 篇 工学
    • 1,682 篇 计算机科学与技术...
    • 1,313 篇 软件工程
    • 613 篇 信息与通信工程
    • 305 篇 电气工程
    • 249 篇 电子科学与技术(可...
    • 230 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 129 篇 网络空间安全
    • 110 篇 仪器科学与技术
    • 109 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 59 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,073 篇 理学
    • 635 篇 数学
    • 244 篇 生物学
    • 228 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 91 篇 化学
  • 673 篇 管理学
    • 389 篇 管理科学与工程(可...
    • 311 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 107 篇 法学
    • 71 篇 社会学
  • 83 篇 医学
    • 68 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 23 篇 军事学
  • 11 篇 文学
  • 10 篇 教育学
  • 9 篇 艺术学

主题

  • 140 篇 feature extracti...
  • 123 篇 semantics
  • 95 篇 accuracy
  • 79 篇 computational mo...
  • 78 篇 training
  • 65 篇 data models
  • 64 篇 deep learning
  • 62 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 visualization
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 privacy
  • 43 篇 security
  • 43 篇 robustness
  • 42 篇 adaptation model...
  • 41 篇 optimization
  • 41 篇 predictive model...

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 166 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 63 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 university of ch...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...

作者

  • 46 篇 zhao yao
  • 41 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,097 篇 英文
  • 190 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3419 条 记 录,以下是3331-3340 订阅
排序:
An improved algorithm for Eleman Neural network by adding a modified error function
An improved algorithm for Eleman Neural Network by adding a ...
收藏 引用
4th International Symposium on Neural networks, ISNN 2007
作者: Zhang, Zhiqiang Tang, Zheng Tang, GuoFeng Vairappan, Catherine Wang, XuGang Xiong, RunQun Faculty of Engineering Toyama University Gofuku 3190 Toyama shi 930-8555 Japan Institute of Software Chinese Academy of Sciences Beijing 100080 China Key Lab. of Computer Network and Information Integration Southeast University Nanjing 210096 China
The Eleman Neural network has been widely used in various fields ranging from temporal version of the Exclusive-OR function to the discovery of syntactic categories in natural language date. However, one of the proble... 详细信息
来源: 评论
Cost Optimization Method for Workflows with Deadline Constraints in Grids
Cost Optimization Method for Workflows with Deadline Constra...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yingchun Yuan Xiaoping Li Qian Wang Xia Zhu School of Computer Science and Engineering South-East University Nanjing China Faculty of Information Science Agricultural University of Hebei Baoding China Key Laboratory of Computer Network and Information Integration Ministry of Education South-East University Nanjing China School of Computer Science and Engineering Southeast University Nanjing 210096 P.R. China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education Nanjing 210096 P.R. China. qwang@*** Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education Nanjing 210096 P.R. China
Cost optimization for workflow applications with deadline constraints is fundamental and intractable in grids. In this paper, early tree is introduced to find an early feasible schedule for a workflow application. Acc... 详细信息
来源: 评论
MULTI-AGENT BASED FRAMEWORK FOR DYNAMIC SCHEDULING SYSTEM
MULTI-AGENT BASED FRAMEWORK FOR DYNAMIC SCHEDULING SYSTEM
收藏 引用
2007 International Conference on Machine Learning and Cybernetics(IEEE第六届机器学习与控制论国际会议)
作者: XIAO-DONG ZHANG QIAN WANG XIAO-PING LI School of Computer Science &Engineering Southeast University 210096 Nanjing P.R .China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education
Communication burden and security are important for agent-based scheduling architectures in uncertain and dynamic scheduling environments, which have not yet been fully solved in traditional *** this paper, a multi-ag... 详细信息
来源: 评论
Short group signature with IND-CCA2 full-anonymity
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2007年 第10期30卷 1865-1871页
作者: Zhang, Yue-Yu Chen, Jie Su, Wan-Li Wang, Yu-Min Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China
In CRYPTO 2004, a short group signature is proposed by Boneh, Boyen and Shacham, which is based on strong Diffie-Hellman (SDH) assumption and Decision Linear assumption. Thereafter it is denoted BBS. Only chosen plain... 详细信息
来源: 评论
Rights management scheme for DRM in authorized domain based on PMI
收藏 引用
Tongxin Xuebao/Journal on Communications 2007年 第SUPPL.期28卷 107-111页
作者: Gao, Ming-Ding Pei, Qing-Qi Zeng, Xing-Wen Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China
The DRM technologies and the concept of authorized domain were introduced. The requirements of rights management for DRM in Authorized domain were analyzed from the examples of application scene. A rights management s... 详细信息
来源: 评论
Research on Usage Control Model with Delegation Characteristics Based on OM-AM Methodology
Research on Usage Control Model with Delegation Characterist...
收藏 引用
IFIP International Conference on network and Parallel Computing Workshops (NPC Workshops)
作者: Zhiyong Zhang Lin Yang Qingqi Pei Jianfeng Ma Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an China Electron. Information Engineering Coll. Henan University of Science and Technology Luoyang China The Research Institute Renesas Technology Corporation Beijing China
UCON ABC is a basic framework of next generation access control policy Usage Control that is composed of Authorization-oBlige-Condition components, but so far it lacks of important delegation characteristic. The pape... 详细信息
来源: 评论
Comprehensive arctic atmosphere observing system and observed results for "system performance demonstration"
收藏 引用
Journal of the National Institute of information and Communications Technology 2007年 第1-2期54卷 5-16页
作者: Murayama, Yasuhiro Ishii, Mamoru Kubota, Minoru Mori, Hirotaka Mizutani, Kohei Ochiai, Satoshi Kasai, Yasuko Kawamura, Seiji Tanaka, Yoshimasa Masuko, Harunobu Iguchi, Toshio Kumagai, Hiroshi Kikuchi, Takashi Sato, Kaoru Collins, Richard L. Watkins, Brenton J. Conde, Mark Bristow, William B. Smith, Roger W. Strategic Planning Office Strategic Planning Department Space Environment Group Applied Electromagnetic Research Center National Institute of Information and Communications Technology Key Technology Research Supporting Group Key Technology Research Promotion Environment Sensing and Network Group Applied Electromagnetic Research Center Transdisciplinary Research Integration Center Research Organization of Information and Systems Applied Electromagnetic Research Center Solar-Terrestrial Environment Laboratory Nagoya University School of Science University of Tokyo University of Alaska Fairbanks University of Alaska Fairbanks Geophysical Institute University of Alaska
The "middle atmosphere", defined as the atmospheric layer at altitudes from approximately 10 to 100 km, has been stressed as a region important in global environment and climate change studies;importance is ... 详细信息
来源: 评论
A structured P2P system with match path and probability balance tree
A structured P2P system with match path and probability bala...
收藏 引用
First International Multi- Symposiums on computer and Computational Sciences, IMSCCS'06
作者: Xu, L.B. Wu, G.X. You, F.Q. Key Laboratory of Computer Network and Information Integration Southeast University Nanjing 210096 China
Excellent P2P network infrastructure should support scalability and efficient search simultaneity. The intelligent routing mechanisms have flexible query expression but hold low scalability and recall rate. Contrastiv... 详细信息
来源: 评论
Design and Analysis of a Multiscale Active Queue Management Scheme
收藏 引用
Journal of computer Science & Technology 2006年 第6期21卷 1022-1030页
作者: 纪其进 董永强 School of Computer Science and Engineering Southeast University Nanjing 210096 P.R. China Key Laboratory of Computer Network and Information Integration of Ministry of Education Southeast University Nanjing 210096 P.R China
Since Internet is dominated by TCP-based applications, active queue management (AQM) is considered as an effective way for congestion control. However, most AQM schemes suffer obvious performance degradation with dy... 详细信息
来源: 评论
Some Issues on computer networks:Architecture and key Technologies
收藏 引用
Journal of computer Science & Technology 2006年 第5期21卷 708-722页
作者: 顾冠群 罗军舟 School of Computer Science and Engineering Southeast UniversityNanjing 210096P.R.China Key Laboratory of Computer Network and Information Integration(Sout-heast University) Ministry of Education Nanjing 210096P.R.China
The evolution of computer networks has experienced several major steps, and research focus of each step has been kept changing and evolving, from ARPANET to OSI/RM, then HSN (high speed network) and HPN (high perfo... 详细信息
来源: 评论