咨询与建议

限定检索结果

文献类型

  • 1,914 篇 会议
  • 1,628 篇 期刊文献

馆藏范围

  • 3,542 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,353 篇 工学
    • 1,720 篇 计算机科学与技术...
    • 1,327 篇 软件工程
    • 628 篇 信息与通信工程
    • 336 篇 电气工程
    • 258 篇 电子科学与技术(可...
    • 251 篇 控制科学与工程
    • 223 篇 生物工程
    • 158 篇 机械工程
    • 145 篇 网络空间安全
    • 114 篇 仪器科学与技术
    • 112 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 83 篇 交通运输工程
    • 77 篇 动力工程及工程热...
    • 67 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,088 篇 理学
    • 636 篇 数学
    • 249 篇 生物学
    • 237 篇 物理学
    • 196 篇 统计学(可授理学、...
    • 97 篇 化学
    • 90 篇 系统科学
  • 686 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 312 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 106 篇 法学
    • 72 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 39 篇 农学
  • 24 篇 军事学
  • 12 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 154 篇 feature extracti...
  • 128 篇 semantics
  • 124 篇 accuracy
  • 92 篇 computational mo...
  • 88 篇 training
  • 86 篇 federated learni...
  • 73 篇 data models
  • 64 篇 deep learning
  • 56 篇 robustness
  • 53 篇 data mining
  • 52 篇 protocols
  • 51 篇 privacy
  • 50 篇 optimization
  • 50 篇 adaptation model...
  • 49 篇 clustering algor...
  • 48 篇 transformers
  • 47 篇 neural networks
  • 47 篇 visualization
  • 47 篇 cryptography
  • 46 篇 security

机构

  • 272 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 169 篇 school of comput...
  • 85 篇 key laboratory o...
  • 68 篇 computer network...
  • 68 篇 shandong provinc...
  • 67 篇 college of compu...
  • 59 篇 college of infor...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 49 篇 beijing key labo...
  • 47 篇 school of cyber ...
  • 45 篇 institute of inf...
  • 42 篇 the key laborato...
  • 41 篇 school of comput...
  • 40 篇 shandong provinc...
  • 39 篇 key laboratory o...
  • 38 篇 fujian provincia...

作者

  • 46 篇 zhao yao
  • 40 篇 ren jiadong
  • 37 篇 zhou deyu
  • 31 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 xiaoming wu
  • 25 篇 guo wenzhong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 xiangzhi liu
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 18 篇 xiaoping li
  • 18 篇 wei zhang
  • 18 篇 liu ximeng
  • 17 篇 di xiaoqiang

语言

  • 2,875 篇 英文
  • 548 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory for Computer Network and Information Integration"
3542 条 记 录,以下是3431-3440 订阅
排序:
Universal provable security authentication protocol for multi-domain
收藏 引用
Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and information Science of Wuhan University 2008年 第10期33卷 1051-1054页
作者: Zhu, Hui Li, Hui Yang, Jiaxi Wang, Yumin Key Laboratory of Computer Network and Information Security Xidian University 2 South Taibai Road Xi'an 710071 China
The problems of existing authentication frameworks are analyzed, and a universal authentication protocol is proposed for the multi-domain. Moreover, entity authentication for cross-domain is supported in the protocol.... 详细信息
来源: 评论
Maximizing Universal Streaming Rate in Peer-to-Peer Streaming networks
Maximizing Universal Streaming Rate in Peer-to-Peer Streamin...
收藏 引用
International Conference on Grid and Cooperative Computing (GCC)
作者: Jiagao Wu Jun Tao Zhiqiang Zou Institute of Computer Technology College of Computer Nanjing University of Posts and Telecommunications Nanjing China Key Laboratory of Computer Network and Information Integration of Ministry of Education South-East University Nanjing China
Although a large number of different proposals have emerged in recent years, a fundamental problem of P2P streaming networks concerned about is to establish an optimal routing structure with achieving certain optimiza... 详细信息
来源: 评论
Real-time feature selection in traffic classification
收藏 引用
Journal of China Universities of Posts and Telecommunications 2008年 第SUPPL.期15卷 68-72页
作者: ZHAO, Jing-jing HUANG, Xiao-hong SUN, Qiong MA, Yan Information Network Center Beijing University of Posts and Telecommunications Beijing 100876 China School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing 100876 China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing 100876 China
Classification of network traffic using port-based or payload-based analysis is becoming increasingly difficult since many P2P applications are using port hopping and encryption to avoid detection. As a result, the at... 详细信息
来源: 评论
A NEW HYBRID GENETIC ALGORITHM FOR THE BI-CRITERIA NO-WAIT FLOWSHOP SCHEDULING PROBLEM WITH MAKESPAN AND TOTAL FLOW TIME MINIMIZATION
A NEW HYBRID GENETIC ALGORITHM FOR THE BI-CRITERIA NO-WAIT F...
收藏 引用
2008 International Conference on Machine Learning and Cybernetics(2008机器学习与控制论国际会议)
作者: YOU-GEN LIU XIA ZHU XIAO-PING LI School of Computer Science and Engineering Southeast University Nanjing P.R.China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing P.R.China
Multi-objective flowshop scheduling problems have gained wide attention both in practical and academic fields. In this paper, a hybrid multi-objective genetic algorithm is proposed to solve multi-objective no-wait flo... 详细信息
来源: 评论
Fast Access Control Algorithm in Wireless network
Fast Access Control Algorithm in Wireless Network
收藏 引用
International Conference on Grid and Pervasive Computing Workshops, GPC
作者: Kun Wang Zhixin Ma Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China
This paper presents an access control algorithm which bases on artificial neural network (ANN). It uses selected roles as input vectors. Then, considering role inheritance, the matching roles that may mutual exclude a... 详细信息
来源: 评论
OBJECTIVE INCREMENT BASED HYBRID GA FOR NO-WAIT FLOWSHOPS
OBJECTIVE INCREMENT BASED HYBRID GA FOR NO-WAIT FLOWSHOPS
收藏 引用
2008 International Conference on Machine Learning and Cybernetics(2008机器学习与控制论国际会议)
作者: XIA ZHU XIAOPING LI QIAN WANG School of Computer Science and Engineering Southeast University Nanjing P.R.China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing P.R.China
No-wait flowshops with flowtime minimization are typical NP-Complete combinatorial optimization problems, widely existing in practical manufacturing systems. Different from traditional methods by which objective of a ... 详细信息
来源: 评论
Fair Exchange Signature Schemes
Fair Exchange Signature Schemes
收藏 引用
International Conference on Advanced information networking and Applications Workshops (AINAW)
作者: Jingwei Liu Rong Sun Wenping Ma Ying Li Xinmei Wang Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an China
In this paper we propose an efficient Fair Exchange Signature Scheme(FESS) that allows two players to exchange digital signatures in a fair way. It may be considered as an interesting extension of concurrent signature... 详细信息
来源: 评论
A Benefits-centric Multi-participant Trust Architecture for DRM-Enabling Digital Contents Value Chain Ecosystem
A Benefits-centric Multi-participant Trust Architecture for ...
收藏 引用
International Seminar on Business and information Management, ISBIM
作者: Zhiyong Zhang Qingqi Pei Jianfeng Ma Lin Yang Ministry of Education Key Laboratory of Computer Network & Information Security Xidian University Xi'an China
A multi-participant trust relationship is essential to implement a successful business transaction in DRM (digital rights management)-enabling digital contents industry. The simple adoption of several increasingly enh... 详细信息
来源: 评论
Storage requirements for key distribution in sensor networks
Storage requirements for key distribution in sensor networks
收藏 引用
2nd International Conference on Sensor Technologies and Applications, SENSORCOMM 2008
作者: Liu, Zhihong Jianfeng, Ma Huang, Qiping Moon, SangJae Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University China School of Communication Engineering Xidian University China Mobile Network Security Technology Research Center Kyungpook National University Korea Republic of
Sensor networks are resource-constrained, which makes developing efficient key distribution scheme a challenging problem. In general, many key distribution techniques are designed to address the trade-off between limi... 详细信息
来源: 评论
A pairwise key establishment scheme for heterogeneous sensor networks
A pairwise key establishment scheme for heterogeneous sensor...
收藏 引用
9th ACM International Symposium on Mobile Ad Hoc networking and Computing, MobiHoc'08 - 1st ACM International Workshop on Heterogeneous Sensor and Actor networks, HeterSanet 2008
作者: Liu, Zhihong Ma, Jianfeng Huang, Qiping Moon, SangJae Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China School of Communication Engineering Xidian University Xi'an China Mobile Network Security Technology Research Center Kyungpook National University Korea Republic of
Motivated by a key agreement scheme proposed by Leighton and Micali (LM-KDS), we present a key establishment mechanism for heterogeneous sensor networks which combines random key pre-distribution schemes and LM-KDS. U... 详细信息
来源: 评论