咨询与建议

限定检索结果

文献类型

  • 1,812 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,202 篇 工学
    • 1,555 篇 计算机科学与技术...
    • 1,247 篇 软件工程
    • 573 篇 信息与通信工程
    • 294 篇 电气工程
    • 234 篇 电子科学与技术(可...
    • 230 篇 控制科学与工程
    • 193 篇 生物工程
    • 159 篇 机械工程
    • 133 篇 网络空间安全
    • 111 篇 仪器科学与技术
    • 105 篇 光学工程
    • 98 篇 生物医学工程(可授...
    • 76 篇 化学工程与技术
    • 76 篇 核科学与技术
    • 70 篇 动力工程及工程热...
    • 67 篇 交通运输工程
    • 65 篇 安全科学与工程
  • 1,108 篇 理学
    • 532 篇 数学
    • 377 篇 物理学
    • 212 篇 生物学
    • 165 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 81 篇 化学
  • 580 篇 管理学
    • 359 篇 管理科学与工程(可...
    • 252 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 91 篇 法学
    • 48 篇 法学
  • 76 篇 医学
    • 61 篇 临床医学
    • 49 篇 基础医学(可授医学...
  • 50 篇 经济学
    • 50 篇 应用经济学
  • 27 篇 军事学
  • 25 篇 农学
  • 15 篇 教育学
  • 13 篇 文学
  • 9 篇 艺术学

主题

  • 141 篇 feature extracti...
  • 123 篇 semantics
  • 106 篇 hadron colliders
  • 103 篇 accuracy
  • 97 篇 computational mo...
  • 90 篇 training
  • 83 篇 deep learning
  • 70 篇 data models
  • 63 篇 federated learni...
  • 52 篇 neural networks
  • 51 篇 security
  • 49 篇 privacy
  • 45 篇 adaptation model...
  • 44 篇 optimization
  • 43 篇 predictive model...
  • 42 篇 protocols
  • 42 篇 robustness
  • 41 篇 cloud computing
  • 40 篇 blockchain
  • 40 篇 cryptography

机构

  • 193 篇 shandong provinc...
  • 176 篇 key laboratory o...
  • 151 篇 centro brasileir...
  • 151 篇 yerevan physics ...
  • 150 篇 national and kap...
  • 150 篇 istanbul technic...
  • 149 篇 university of sp...
  • 149 篇 academy of scien...
  • 148 篇 universidad iber...
  • 148 篇 indian institute...
  • 147 篇 charles universi...
  • 147 篇 department of ph...
  • 146 篇 brunel universit...
  • 146 篇 university of de...
  • 144 篇 rwth aachen univ...
  • 142 篇 imperial college...
  • 139 篇 università di to...
  • 139 篇 zhejiang univers...
  • 139 篇 indian institute...
  • 136 篇 infn sezione di ...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,139 篇 英文
  • 157 篇 其他
  • 103 篇 中文
检索条件"机构=Key Laboratory of Computer Network Technology"
3391 条 记 录,以下是3201-3210 订阅
排序:
A fault diagnosis method based on decision tree for wireless mesh network
A fault diagnosis method based on decision tree for wireless...
收藏 引用
International Conference on Communication technology (ICCT)
作者: Wei Li Min Li Ruiting Fan Lanjun Li Beijing Key Laboratory of Network Technology School of Computer Science and Technology Beihang University Beijing China
Fault diagnosis for wireless mesh network is an active field in recent years, and also the decision tree algorithm is widely used in Data Mining field. How to apply machine learning algorithm in network fault diagnosi...
来源: 评论
A multi-factor integrated fault diagnosis method for distributed applications
A multi-factor integrated fault diagnosis method for distrib...
收藏 引用
International Conference on Information Science and Engineering (ICISE)
作者: Wei Li Guangye Li Yin Yin Key Laboratory of Beijing Network Technology School of Computer Science and Technology Beihang University Beijing China
Fault management is a key research part in the field of distributed applications management. Fault Management based on active probing is divided into two phases: fault detection and fault diagnosis, considering probe ... 详细信息
来源: 评论
A new hierarchical key AuthData management scheme for trusted platform
A new hierarchical key AuthData management scheme for truste...
收藏 引用
International Conference on Multimedia Information networking and Security
作者: Peng, Weiping Zhou, Yajian Wang, Cong Yang, Yixian Ping, Yuan Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing China School of Computer Science and Technology Henan Polytechnic University Jiaozuo Henan China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China
The purpose of TPM authorization mechanism is to authenticate the owner of a TPM or to authorize the use of an instance of a TPM capability. The TPM treats knowledge of the AuthData as complete proof of ownership of t... 详细信息
来源: 评论
Research on task-deployment for the distributed simulation of computer network attack and defense exercises
收藏 引用
Journal of Computational Information Systems 2010年 第4期6卷 1037-1050页
作者: Chen, Meng Jiao, Jian Yang, Yi Luo, Min Xia, Chunhe School of Computer Science and Engineering Beihang University Beijing 100191 China Key Laboratory of Beijing Network Technology China
To solve the problem of unreasonable tasks deployment which extends the whole simulating time and limits the simulating scale in Distributed Simulation of computer network Attack and Defense Exercises (DSCNADE), this ... 详细信息
来源: 评论
The CMVAI-File: An Efficient Approximation-Based High-Dimensional Index Structure
The CMVAI-File: An Efficient Approximation-Based High-Dimens...
收藏 引用
International Conference on Multimedia Information networking and Security (MINES)
作者: Lihong Ye Yuan Hua Communication and Computer Network Key Laboratory of Guangdong South China University of Technology Guangzhou China
Similarity-Search based index structure is an important topic in many application areas, such as content-based multimedia information retrieval, data mining, cluster analysis, etc. In order to improve query performanc... 详细信息
来源: 评论
Achieving High Throughput by Transparent network Interface Virtualization on Multi-core Systems
Achieving High Throughput by Transparent Network Interface V...
收藏 引用
IEEE International Conference on Cloud Computing technology and Science (CloudCom)
作者: Huiyong Zhang Yuebin Bai Zhi Li Niandong Du Wentao Yang School of Computer Science Beijing Key Laboratory of Network Technology Beihang University Beijing China
Though with the rapid development, there remains a challenge on achieving high performance of I/O virtualization. The Para virtualized I/O driver domain model, used in Xen, provides several advantages including fault ... 详细信息
来源: 评论
Research of presence service testbed on cloud-computing environment
Research of presence service testbed on cloud-computing envi...
收藏 引用
2010 3rd IEEE International Conference on Broadband network and Multimedia technology, IC-BNMT2010
作者: Quan, Wei Wu, Jun Zhan, Xiaosu Huang, Xiaohong Ma, Yan Institute of Network Technology Beijing University of Posts and Telecommunications Beijing China School of Computer Science and Technology Beijing University of Posts and Telecommunications Beijing China Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing China
Presence service has become one of the key application services, which can be applied in many areas, such as buddy status, tele-working, ticket sale, the Internet of things, location-based service and so on. And cloud... 详细信息
来源: 评论
Dictionary based inverted index for music information retrieval
Dictionary based inverted index for music information retrie...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Xiao-Hong Yang Qing-Cai Chen Xiao-Long Wang Department of Computer Science and Technology Key Laboratory of Network Oriented Intelligent Computation Shenzhen Graduate School Harbin Institute of Technology Shenzhen China Department of Computer Science and Technology Key Laboratory of Network Oriented Intelligent Computation Harbin Institute of Technology Shenzhen China
With the rapid progress in data storage and communication technology, there has been an explosive growth of music information. As the traditional metadata-based search engine can not provide natural and intuitive way ... 详细信息
来源: 评论
Semantic similarity analysis model for CND policy and measure
Semantic similarity analysis model for CND policy and measur...
收藏 引用
International Conference on Educational and Information technology (ICEIT)
作者: Senshen Hao Jian Jiao Chunhe Xia Xiaojian Li Shan Yao State Key Laboratory of Virtual Reality Technology and System Beijing Key Laboratory of Network Technology School of Computer Science and Engineering Beihang University Beijing China
In order to effectively deal with large-scale attacks on computer networks, computer network Defense (CND) policy refinement based on descriptive language is wildly used. However, it's very difficult to figure out... 详细信息
来源: 评论
Descriptive model of peer-to-peer Botnet structures
Descriptive model of peer-to-peer Botnet structures
收藏 引用
International Conference on Educational and Information technology (ICEIT)
作者: Junfeng Duan Jian Jiao Chunhe Xia Shan Yao Xiaojian Li State Key Laboratory of Virtual Reality Technology and System Beijing Key Laboratory of Network Technology School of Computer Science and Engineering Beihang University Beijing China
Peer-to-peer (P2P) Botnets, which are more resilient and robust than centralized botnets, have emerged as the peer-to-peer technology evolves. Better understanding of this new phenomenon will help researchers develop ... 详细信息
来源: 评论