咨询与建议

限定检索结果

文献类型

  • 1,837 篇 会议
  • 1,582 篇 期刊文献

馆藏范围

  • 3,419 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,295 篇 工学
    • 1,682 篇 计算机科学与技术...
    • 1,313 篇 软件工程
    • 613 篇 信息与通信工程
    • 305 篇 电气工程
    • 249 篇 电子科学与技术(可...
    • 230 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 129 篇 网络空间安全
    • 110 篇 仪器科学与技术
    • 109 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 59 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,073 篇 理学
    • 635 篇 数学
    • 244 篇 生物学
    • 228 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 91 篇 化学
  • 673 篇 管理学
    • 389 篇 管理科学与工程(可...
    • 311 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 107 篇 法学
    • 71 篇 社会学
  • 83 篇 医学
    • 68 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 23 篇 军事学
  • 11 篇 文学
  • 10 篇 教育学
  • 9 篇 艺术学

主题

  • 140 篇 feature extracti...
  • 123 篇 semantics
  • 95 篇 accuracy
  • 79 篇 computational mo...
  • 78 篇 training
  • 65 篇 data models
  • 64 篇 deep learning
  • 62 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 visualization
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 privacy
  • 43 篇 security
  • 43 篇 robustness
  • 42 篇 adaptation model...
  • 41 篇 optimization
  • 41 篇 predictive model...

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 166 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 63 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 university of ch...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...

作者

  • 46 篇 zhao yao
  • 41 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,097 篇 英文
  • 190 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3419 条 记 录,以下是3391-3400 订阅
排序:
A new approach for early detection of Internet worms based on connection degree
A new approach for early detection of Internet worms based o...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Chen Bo Bin-Xing Fang Xiao-Chun Yun National Computer Information Content Security Key Laboratory Harbin Institute of Technology Harbin China National Computer Network and Information System Security Administration Center Beijing China
In recent years, Internet-scale worm incidents occurred many times. People wonder at the speediness of the worm spread and the severe damage to the Internet. So people began to find methods to detect worms as quickly ... 详细信息
来源: 评论
An enhanced application-level multicast protocol: a QoS perspective
An enhanced application-level multicast protocol: a QoS pers...
收藏 引用
International Symposium on Parallel Architectures, Algorithms and networks (ISPAN)
作者: Zi Chu Yin-yin Yang Key Laboratory of Computer Network and Information Integration Ministry of Education South-East University Nanjing China Southeast University Nanjing Jiangsu CN Dept. of Comput. Sci. & Eng. Southeast Univ. Nanjing China
Ubicast, an enhanced application-level multicast protocol, is presented in this paper. It is built upon Pastry, a robust and self-organizing peer-to-peer substrate overlay, and leverages its merits of reliable applica... 详细信息
来源: 评论
Dynamic routing based on real-time traffic information in LBS
Dynamic routing based on real-time traffic information in LB...
收藏 引用
MIPPR 2005: Geospatial information, Data Mining, and Applications
作者: Zheng, Nianbo Li, Qingquan Song, Ying Research Center of Spatial Information and Network Communication Wuhan University 129 Luoyu Road Wuhan 430079 China State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing Wuhan University 129 Luoyu Road Wuhan 430079 China Deparment of Computer and Electronics Science Hubei University of Economics 1 Yanghu Road Wuhan 430205 China
Location based services (LBS) are capturing global spotlights increasingly, in which users tend to pick up navigation service as their favorites. This paper examines the dynamic routing problems based on real-time tra... 详细信息
来源: 评论
A Mathematical Approach to Disaster Recovery Planning
A Mathematical Approach to Disaster Recovery Planning
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Kun Wang Zhonghai Yin Feng Yuan Lihua Zhou Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China National Info Security Engineering and Technology Research Center Beijing China
It is crucial for highly security-critical information systems to accurately control the disaster recovery activities. Using optimization theory, we present a disaster recovery planning mathematical model. The model u... 详细信息
来源: 评论
Study of Secure Complicated information System Architecture Model
Study of Secure Complicated Information System Architecture ...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Kun Wang Ruidan Su Zengxin Li Zhen Cai Lihua Zhou Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China National Info Security Engineering and Technology Research Center Beijing China
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ... 详细信息
来源: 评论
A Disaster Recovery System Model in an E-government System
A Disaster Recovery System Model in an E-government System
收藏 引用
IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)
作者: Kun Wang Lihua Zhou Zhen Cai Zengxin Li Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China National Info Security Engineering and Technology Research Center Beijing China
We present a Robust Disaster Recovery System Model (RDRSM) for highly security-critical systems to realize continuous service. Through strengthening safe communication ability, RDRSM guarantees secure and reliable com... 详细信息
来源: 评论
Routing algorithm in heterogeneous overlay multicast networks
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2005年 第6期16卷 1112-1119页
作者: Wu, Jia-Gao Ye, Xiao-Guo Jiang, Ai-Quan Department of Computer Science and Engineering Southeast University Nanjing 210096 China Laboratory of Computer Network and Information Integration Southeast University Nanjing 210096 China
Due to the difficulties in deployment of IP multicast, the overlay multicast networks (OMN) are being increasingly recognized as a viable alternative to construct a general multicast service infrastructure. To settle ... 详细信息
来源: 评论
Method for building survivable network systems
收藏 引用
Tien Tzu Hsueh Pao/Acta Electronica Sinica 2005年 第SUPPL.期33卷 2336-2341页
作者: Wang, Chao Ma, Jian-Feng Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China
Survivable network systems have the ability to provide continuous and dependable services in the presence of attacks, failures, or accidents. In this paper, we present a method for building survivable network systems.... 详细信息
来源: 评论
AN IMPROVED BICLUSTERING ALGORITHM AND ITS APPLICATION TO GENE EXPRESSION SPECTRUM ANALYSIS
收藏 引用
Genomics, Proteomics & Bioinformatics 2005年 第3期3卷 189-193页
作者: Hua Qu Liu-Pu Wang Yan-Chun Liang Chun-Guo Wu College of Software Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Jilin University Changchun 130012 China Guangzhou Institute of China Telecom Guangzhou 510630 China College of Computer Science and Technology Key Laboratory of Symbol Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China Key Laboratory of Information Science and Engineering of the Ministry of Railway/Key Laboratory of Advanced Information Science and Network Technology of Beijing Beijing Jiaotong University Beijing 100044 China.
Cheng and Church algorithm is an important approach in biclustering algorithms. In this paper, the process of the extended space in the second stage of Cheng and Church algorithm is improved and the selections of two ... 详细信息
来源: 评论
Authenticated public-key encryption based on elliptic curve
Authenticated public-key encryption based on elliptic curve
收藏 引用
International Conference on Embedded Software and Systems
作者: Yiliang Han Xiaoyuan Yang Yupu Hu Key Laboratory of Network and Information Security A.P.FDepartment of Electronic Technology Engineering College of A. P. F Xi'an China College of Computer Science Xidian University Xi'an China
An efficient scheme so called authenticated public key encryption that performs signature and encryption simultaneously is designed. The scheme is the first scheme that based on the standardized signature algorithm EC... 详细信息
来源: 评论