咨询与建议

限定检索结果

文献类型

  • 1,812 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,202 篇 工学
    • 1,555 篇 计算机科学与技术...
    • 1,247 篇 软件工程
    • 573 篇 信息与通信工程
    • 294 篇 电气工程
    • 234 篇 电子科学与技术(可...
    • 230 篇 控制科学与工程
    • 193 篇 生物工程
    • 159 篇 机械工程
    • 133 篇 网络空间安全
    • 111 篇 仪器科学与技术
    • 105 篇 光学工程
    • 98 篇 生物医学工程(可授...
    • 76 篇 化学工程与技术
    • 76 篇 核科学与技术
    • 70 篇 动力工程及工程热...
    • 67 篇 交通运输工程
    • 65 篇 安全科学与工程
  • 1,108 篇 理学
    • 532 篇 数学
    • 377 篇 物理学
    • 212 篇 生物学
    • 165 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 81 篇 化学
  • 580 篇 管理学
    • 359 篇 管理科学与工程(可...
    • 252 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 91 篇 法学
    • 48 篇 法学
  • 76 篇 医学
    • 61 篇 临床医学
    • 49 篇 基础医学(可授医学...
  • 50 篇 经济学
    • 50 篇 应用经济学
  • 27 篇 军事学
  • 25 篇 农学
  • 15 篇 教育学
  • 13 篇 文学
  • 9 篇 艺术学

主题

  • 141 篇 feature extracti...
  • 123 篇 semantics
  • 106 篇 hadron colliders
  • 103 篇 accuracy
  • 97 篇 computational mo...
  • 90 篇 training
  • 83 篇 deep learning
  • 70 篇 data models
  • 63 篇 federated learni...
  • 52 篇 neural networks
  • 51 篇 security
  • 49 篇 privacy
  • 45 篇 adaptation model...
  • 44 篇 optimization
  • 43 篇 predictive model...
  • 42 篇 protocols
  • 42 篇 robustness
  • 41 篇 cloud computing
  • 40 篇 blockchain
  • 40 篇 cryptography

机构

  • 193 篇 shandong provinc...
  • 176 篇 key laboratory o...
  • 151 篇 centro brasileir...
  • 151 篇 yerevan physics ...
  • 150 篇 national and kap...
  • 150 篇 istanbul technic...
  • 149 篇 university of sp...
  • 149 篇 academy of scien...
  • 148 篇 universidad iber...
  • 148 篇 indian institute...
  • 147 篇 charles universi...
  • 147 篇 department of ph...
  • 146 篇 brunel universit...
  • 146 篇 university of de...
  • 144 篇 rwth aachen univ...
  • 142 篇 imperial college...
  • 139 篇 università di to...
  • 139 篇 zhejiang univers...
  • 139 篇 indian institute...
  • 136 篇 infn sezione di ...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,139 篇 英文
  • 157 篇 其他
  • 103 篇 中文
检索条件"机构=Key Laboratory of Computer Network Technology"
3391 条 记 录,以下是3181-3190 订阅
排序:
GLP: A group link prediction algorithm in DTMNs
GLP: A group link prediction algorithm in DTMNs
收藏 引用
International Conference on Educational and Information technology (ICEIT)
作者: Wu, Junying Xia, Chunhe Lv, Liangshuang Wang, Haiquan Beijing Key Laboratory of Network Technology School of Computer Science and Engineering Beihang University Beijing China College of Software Beihang University Beijing China
In DTNs, links are rare. Making full use of every link shows great importance to routing protocols. Link Prediction (LP) can predict future links between two nodes. Plenty of algorithms for link prediction have been p... 详细信息
来源: 评论
Group key management using proxy re-encryption for dynamic networks
Group key management using proxy re-encryption for dynamic n...
收藏 引用
2nd International Workshop on Education technology and computer Science, ETCS 2010
作者: Zhang, Minqing Wu, Xuguang Han, Yiliang Yang, Xiaoyuan Key Laboratory of Network and Information Security of APF Engineering College of APF China Department of Computer Science and Technology Xi'an Jiaotong University Xi'an China
Decentralized group key management mechanisms offer beneficial solutions to enhance the scalability and reliability of a secure multicast framework by dividing the whole group into subgroups. However, many of the prev... 详细信息
来源: 评论
Attribute-Based Signature with Policy-and-Endorsement Mechanism
收藏 引用
Journal of computer Science & technology 2010年 第6期25卷 1293-1304页
作者: 王怀习 朱岩 冯荣权 Stephen S.Yau LMAM School of Mathematical SciencesPeking University Electronic Engineering Institute Institute of Computer Science and Technology Peking University Key Laboratory of Network and Software Security Assurance (Peking University) Ministry of Education Information Assurance Center and School of Computing Informatics and Decision Systems Engineering Arizona State University
In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based *** signature provides a policy-and-endorsement ***... 详细信息
来源: 评论
Currency recognition modeling research based on bp neural network improved by gene algorithm
Currency recognition modeling research based on bp neural ne...
收藏 引用
2010 International Conference on computer Modeling and Simulation, ICCMS 2010
作者: Cao, Bu-Qing Liu, Jian-Xun School of Computer Science and Engineering Key Laboratory of Knowledge Management and Network-based Manufacture Hunan University of Science and Technology Xiangtan China State Key Laboratory of Software Engineering Wuhan University Wuhan China School of Computer Wuhan University Wuhan China
Both Artificial Neural networks and Gene Algorithm are a method that people imitates biological treatment pattern and gains the intelligence out of it in order to handle complicated problems. Based on uncertain networ... 详细信息
来源: 评论
A novel term weighting scheme with distributional coefficient for text categorization with support vector machine
A novel term weighting scheme with distributional coefficien...
收藏 引用
2010 IEEE Youth Conference on Information, Computing and Telecommunications, YC-ICT 2010
作者: Ping, Yuan Zhou, Ya-Jian Yang, Yi-Xian Peng, Wei-Ping Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China Department of Computer Science and Technology Xuchang University Xuchang 461000 China
In text categorization, vectorizing a document by probability distribution is an effective dimension reduction way to save training time. However, the data sets that share many common keywords between categories affec... 详细信息
来源: 评论
Applying multiple residual error gray forecast to restrain endpoints effect in HHT of network traffic
Applying multiple residual error gray forecast to restrain e...
收藏 引用
International Conference on Pervasive Computing, Signal Processing and Applications
作者: Zheng, Kangfeng Wang, Xiujuan Yang, Yixian Guo, Shize Key Laboratory of Network and Information Attack and Defense Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China College of Computer Sciences Beijing University of Technology Beijing 100124 China
Studying the features of network traffic is a necessary method in many applications such as managing and monitoring the network, detecting network attack etc. Due to the non-stationary and random characteristics of th... 详细信息
来源: 评论
Optimization of probabilistic neural networks based on center neighbor
Optimization of probabilistic neural networks based on cente...
收藏 引用
International Conference on E-Business and E-Government
作者: Liu, Lianzhong Li, Chunfang Qian, Lipu Key Laboratory of Beijing Network Technology School of Computer Science and Engineering Beihang University Beijing China Network Center Heibei Institute of Physical Education Beihang University Beijing China Network Center Heibei Institute of Physical Education Shijiazhuang China
Probabilistic Neural networks (PNN) learn quickly from examples in one pass and asymptotically achieve the Bayes-optimal decision boundaries. The major disadvantage of PNN is that it requires one node or neuron for ea... 详细信息
来源: 评论
An executable business model for generic web applications
An executable business model for generic web applications
收藏 引用
2010 International Conference on computer Information Systems and Industrial Management Applications, CISIM 2010
作者: Chen, Zhenxiang Ma, Kun Abraham, Ajith Yang, Bo Sun, Runyuan Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan China School of Computer Science and Technology Shandong University Jinan China Scientific Network for Innovation and Research Excellence United States
In this paper, a novel platform-specific executable business model called xBM is proposed to sufficiently represent the business logic process. The metamodel of xBM have been analysed, formalised and illustrated. Trad... 详细信息
来源: 评论
Reverse extraction of early-age hydration kinetic equation from observed data of Portland cement
收藏 引用
Science China(Technological Sciences) 2010年 第6期53卷 1540-1553页
作者: WANG Lin1,YANG Bo2,ZHAO XiuYang1,2,CHEN YueHui2 & CHANG Jun3 1 School of computer Science and technology,Shandong University,Jinan 250101,China 2 Provincial key laboratory for network-based Intelligent Computing,University of Jinan,Jinan 250022,China 3 School of Material Science and Engineering,University of Jinan,Jinan 250022,China 1. School of Computer Science and Technology Shandong University Jinan 250101 China2. Provincial Key Laboratory for Network-based Intelligent Computing University of Jinan Jinan 250022 China3. School of Material Science and Engineering University of Jinan Jinan 250022 China
The early-age hydration of Portland cement paste has an important impact on the formation of microstructure and development of ***,manual derivation of hydration kinetic equation is very difficult because there are mu... 详细信息
来源: 评论
TLDV: Tree-Like Locator Distance Vector routing protocol for MANETs
TLDV: Tree-Like Locator Distance Vector routing protocol for...
收藏 引用
2010 International Conference on Educational and Information technology, ICEIT 2010
作者: Wang, Haiquan Mi, Le Xia, Chunhe Lv, Liangshuang Chen, Meng State Key Laboratory of Virtual Reality Technology and System Beihang University Beijing China Beijing Key Laboratory of Network Technology Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China School of Software Beihang University Beijing China
Most routing protocols in MANETs don't scale well in networks with large numbers of nodes where the scalability of the routing protocols plays a vital role. And it is well known that these routing protocols usuall... 详细信息
来源: 评论