咨询与建议

限定检索结果

文献类型

  • 1,812 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,202 篇 工学
    • 1,555 篇 计算机科学与技术...
    • 1,247 篇 软件工程
    • 573 篇 信息与通信工程
    • 294 篇 电气工程
    • 234 篇 电子科学与技术(可...
    • 230 篇 控制科学与工程
    • 193 篇 生物工程
    • 159 篇 机械工程
    • 133 篇 网络空间安全
    • 111 篇 仪器科学与技术
    • 105 篇 光学工程
    • 98 篇 生物医学工程(可授...
    • 76 篇 化学工程与技术
    • 76 篇 核科学与技术
    • 70 篇 动力工程及工程热...
    • 67 篇 交通运输工程
    • 65 篇 安全科学与工程
  • 1,108 篇 理学
    • 532 篇 数学
    • 377 篇 物理学
    • 212 篇 生物学
    • 165 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 81 篇 化学
  • 580 篇 管理学
    • 359 篇 管理科学与工程(可...
    • 252 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 91 篇 法学
    • 48 篇 法学
  • 76 篇 医学
    • 61 篇 临床医学
    • 49 篇 基础医学(可授医学...
  • 50 篇 经济学
    • 50 篇 应用经济学
  • 27 篇 军事学
  • 25 篇 农学
  • 15 篇 教育学
  • 13 篇 文学
  • 9 篇 艺术学

主题

  • 141 篇 feature extracti...
  • 123 篇 semantics
  • 106 篇 hadron colliders
  • 103 篇 accuracy
  • 97 篇 computational mo...
  • 90 篇 training
  • 83 篇 deep learning
  • 70 篇 data models
  • 63 篇 federated learni...
  • 52 篇 neural networks
  • 51 篇 security
  • 49 篇 privacy
  • 45 篇 adaptation model...
  • 44 篇 optimization
  • 43 篇 predictive model...
  • 42 篇 protocols
  • 42 篇 robustness
  • 41 篇 cloud computing
  • 40 篇 blockchain
  • 40 篇 cryptography

机构

  • 193 篇 shandong provinc...
  • 176 篇 key laboratory o...
  • 151 篇 centro brasileir...
  • 151 篇 yerevan physics ...
  • 150 篇 national and kap...
  • 150 篇 istanbul technic...
  • 149 篇 university of sp...
  • 149 篇 academy of scien...
  • 148 篇 universidad iber...
  • 148 篇 indian institute...
  • 147 篇 charles universi...
  • 147 篇 department of ph...
  • 146 篇 brunel universit...
  • 146 篇 university of de...
  • 144 篇 rwth aachen univ...
  • 142 篇 imperial college...
  • 139 篇 università di to...
  • 139 篇 zhejiang univers...
  • 139 篇 indian institute...
  • 136 篇 infn sezione di ...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,139 篇 英文
  • 157 篇 其他
  • 103 篇 中文
检索条件"机构=Key Laboratory of Computer Network Technology"
3391 条 记 录,以下是3211-3220 订阅
排序:
A Trust Evaluation Model for Dynamic Authorization
A Trust Evaluation Model for Dynamic Authorization
收藏 引用
International Conference on Computational Intelligence and Software Engineering (CiSE)
作者: Chao Liu Lianzhong Liu Beijing Key Laboratory of Network Technology School of Computer Science and Engineering Beihang University Beijing China
The traditional access control model is not appropriate to do dynamic authorization when there are changes of trust value, organizational structure, attribute of the subject, time strategy, task or process and so on. ... 详细信息
来源: 评论
Performance Analysis of OFDMA System in Next Generation Wireless Communication networks
Performance Analysis of OFDMA System in Next Generation Wire...
收藏 引用
2010 3rd IEEE International Conference on computer Science and Information technology—ICCSIT 2010
作者: Henriques Marcelino Computer & Information School Si Chuan Network Communication Technology Key Laboratory Southwest Jiaotong University
Although many researchers have written about OFDMA transmission system,it needs more attention and analysis in next generation wireless *** paper is aimed at studying the performance analysis of OFDMA in WiMAX IEEE 80... 详细信息
来源: 评论
A Compliance Policy Model for Security Audit
A Compliance Policy Model for Security Audit
收藏 引用
2010 IEEE International Conference on Information Theory and Information Security(2010 IEEE 国际信息论与信息安全会议)
作者: Lianzhong Liu Xiaoni Wang Dongliang Jiao School of Computer Science and Engineering Key Laboratory of Beijing Network Technology Beihang University Beijing China
Compliance is a critical enterprise management concern, compliance measures are often implemented using polices. This paper proposed a general compliance policy model for security audit after the definition and descri... 详细信息
来源: 评论
An adaptive multi-heuristic ant colony system for finding optimal elimination orderings in Bayesian networks
An adaptive multi-heuristic ant colony system for finding op...
收藏 引用
International Conference on Electrical Engineering Computing Science and Automatic Control
作者: Dong, Xuchu Zhang, Yonggang Cai, Dianbo Yu, Haihong Ye, Yuxin Department of Computer Science and Technology Jilin University China Key Laboratory of Symbol Computation and Knowledge Engineering Ministry of Education China Network Monitor Maintenance Centre of Jilin Branch China Telecom Corporation Limited Changchun Jilin China
To find an optimal elimination ordering for Bayesian networks, a multi-heuristic-based ant colony system named MHC-HS-ACS is proposed. MHC-HS-ACS uses a set of heuristics to guide the ants to search solutions. The heu... 详细信息
来源: 评论
Backward Cloud Based Elimination of Uncertainty in Security Assessment Parameters
Backward Cloud Based Elimination of Uncertainty in Security ...
收藏 引用
International Conference on Electrical and Control Engineering (ICECE)
作者: Bing Xia Xiangdong Li Qiusheng Zheng School of Computer Science Zhengzhou Key Laboratory of Computer Network Security Assessment Zhongyuan University of Technology Zhengzhou Zhengzhou China
The uncertainty in selection of security assessment parameters heavily affects the accuracy and credibility of the assessment results. The method of selection based on opinion of group experts lacks the ability of des... 详细信息
来源: 评论
Neural network modeling on evolution of hydration reaction for Portland cement
Neural network modeling on evolution of hydration reaction f...
收藏 引用
2010 IEEE 5th International Conference on Bio-Inspired Computing: Theories and Applications, BIC-TA 2010
作者: Wang, Lin Yang, Bo Chen, Yuehui Zhao, Xiuyang Chang, Jun Wang, Haiyang School of Computer Science and Technology Shandong University Jinan 250101 China Provincial Key Laboratory for Network Based Intelligent Computing University of Jinan Jinan 250022 China School of Material Science and Engineering University of Jinan Jinan 250022 China
The hydration reaction of Portland cement paste has an important impact on the formation of microstructure and development of strength. However, simulating the evolution of hydration reaction is very difficult because... 详细信息
来源: 评论
A Behavior-based Dynamic Trust Model of Virtual Organization
A Behavior-based Dynamic Trust Model of Virtual Organization
收藏 引用
Third International Symposium on Information Science and Engineering(第三届信息科学与工程国际会议 ISISE 2010)
作者: Cui Zhenzhen Tang Wenzhong Beijing Key Laboratory of Network Technology School of Computer Science and Engineering Beihang University Beijing 100191 China
Virtual organization is a kind of advanced dynamic organizational model which can adapt the competitive market According to new demands that Virtual organization puts forwards on Trust Model and the lack of current re... 详细信息
来源: 评论
Performance analysis of OFDMA system in next generation wireless communication networks
Performance analysis of OFDMA system in next generation wire...
收藏 引用
International Conference on computer Science and Information technology (CSIT)
作者: Henriques Marcelino Zeng Hua-shen Guan Yanbin Computer & Information School Si Chuan Network Communication Technology Key Laboratory Southwest Jiaotong University Chengdu China
Although many researchers have written about OFDMA transmission system, it needs more attention and analysis in next generation wireless networks. This paper is aimed at studying the performance analysis of OFDMA in W... 详细信息
来源: 评论
Reduction method of regression testing requirements based on relation mode
Reduction method of regression testing requirements based on...
收藏 引用
International Conference on Computational Intelligence and Software Engineering
作者: Chen, Jing Wang, Lu Bai, Zhiquan Xu, Yongjie Software Testing Center Shandong Provincial Key Laboratory of Computer Network Jinan China Software Development Center Shandong Zhengfangrenhe Information Technology Co. Ltd. Jinan China School of Information Science and Engineering Shandong University Jinan China
The variations in testing requirements often result in the problem of numerous test cases and low efficiency in regression testing. To solve this problem, a reduction method of testing requirements is proposed based o... 详细信息
来源: 评论
Learning to Rank Relational Objects Based on the Listwise Approach
Learning to Rank Relational Objects Based on the Listwise Ap...
收藏 引用
第六届全国信息检索学术会议
作者: 肖敏 丁宇新 高翔 Key Laboratory of Network Oriented Intelligent Computation.Department of Computer Sciences and Technology Harbin Institute of Technology Shenzhen Graduate SchoolChina
Learning to rank is a new statistical learning technology for sorting certain *** existing approaches to this problem only considered the content of the objects when building a ranking model,the relationship between o... 详细信息
来源: 评论