咨询与建议

限定检索结果

文献类型

  • 1,806 篇 会议
  • 1,567 篇 期刊文献

馆藏范围

  • 3,373 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,197 篇 工学
    • 1,552 篇 计算机科学与技术...
    • 1,250 篇 软件工程
    • 573 篇 信息与通信工程
    • 290 篇 电气工程
    • 234 篇 电子科学与技术(可...
    • 232 篇 控制科学与工程
    • 193 篇 生物工程
    • 159 篇 机械工程
    • 133 篇 网络空间安全
    • 111 篇 仪器科学与技术
    • 104 篇 光学工程
    • 98 篇 生物医学工程(可授...
    • 76 篇 化学工程与技术
    • 76 篇 核科学与技术
    • 70 篇 动力工程及工程热...
    • 67 篇 交通运输工程
    • 65 篇 安全科学与工程
  • 1,108 篇 理学
    • 533 篇 数学
    • 376 篇 物理学
    • 212 篇 生物学
    • 165 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 81 篇 化学
  • 582 篇 管理学
    • 361 篇 管理科学与工程(可...
    • 252 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 91 篇 法学
    • 48 篇 法学
  • 76 篇 医学
    • 61 篇 临床医学
    • 50 篇 基础医学(可授医学...
  • 50 篇 经济学
    • 50 篇 应用经济学
  • 27 篇 军事学
  • 25 篇 农学
  • 15 篇 教育学
  • 13 篇 文学
  • 9 篇 艺术学

主题

  • 141 篇 feature extracti...
  • 122 篇 semantics
  • 106 篇 hadron colliders
  • 103 篇 accuracy
  • 95 篇 computational mo...
  • 88 篇 training
  • 83 篇 deep learning
  • 70 篇 data models
  • 62 篇 federated learni...
  • 52 篇 neural networks
  • 51 篇 security
  • 49 篇 privacy
  • 45 篇 adaptation model...
  • 43 篇 optimization
  • 43 篇 predictive model...
  • 42 篇 robustness
  • 41 篇 protocols
  • 41 篇 cloud computing
  • 40 篇 blockchain
  • 40 篇 cryptography

机构

  • 192 篇 shandong provinc...
  • 174 篇 key laboratory o...
  • 151 篇 centro brasileir...
  • 151 篇 yerevan physics ...
  • 150 篇 national and kap...
  • 150 篇 istanbul technic...
  • 149 篇 university of sp...
  • 149 篇 academy of scien...
  • 148 篇 universidad iber...
  • 148 篇 indian institute...
  • 147 篇 charles universi...
  • 147 篇 department of ph...
  • 146 篇 brunel universit...
  • 146 篇 university of de...
  • 144 篇 rwth aachen univ...
  • 142 篇 imperial college...
  • 139 篇 università di to...
  • 139 篇 zhejiang univers...
  • 139 篇 indian institute...
  • 136 篇 infn sezione di ...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,120 篇 英文
  • 158 篇 其他
  • 103 篇 中文
检索条件"机构=Key Laboratory of Computer Network Technology"
3373 条 记 录,以下是3271-3280 订阅
排序:
Research on Trusted Federated Identity Management and Its Application
Research on Trusted Federated Identity Management and Its Ap...
收藏 引用
International Workshop on Education technology and computer Science, ETCS
作者: Lianzhong Liu Junxiu Gao Key Laboratory of Beijing Network Technology School of Computer Science and Engineering Beijing Aeronautics and Astronautics University Beijing China
It is hard to judge whether one subject is to be trusted where federation identity management only focuses on identity trust achieved by credentials the subject hold. So we propose a behavior trust-based federation id... 详细信息
来源: 评论
A Method of Query over Encrypted Data in Database
A Method of Query over Encrypted Data in Database
收藏 引用
International Conference on computer Engineering and technology, ICCET
作者: Lianzhong Liu Jingfen Gai Key Laboratory of Beijing Network Technology School of Computer Science and Engineering Beijing Aeronautics and Astronautics University Beijing China
The encryption mechanism is an effective way to protect the sensitive data in database from various attacks. When the data is encrypted, the query performance degrades greatly. How to query encrypted data efficiently ... 详细信息
来源: 评论
A novel mining Method of Global Negative Association Rules in Multi-Database
A novel mining Method of Global Negative Association Rules i...
收藏 引用
IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS)
作者: Hong Li Yijun Shen Xuegang Hu Key Laboratory of Network and Intelligent Information Processing Department of Computer Science and Technology Hefei University of Technology Hefei  China School of Computer & Information Hefei University of technology Hefei  China
Mining negative association rules in multi-database has attracted more and more attention. Most existing research focuses on unifying all negative rules discovered from different single databases into a single view. T... 详细信息
来源: 评论
The Performance Optimization of CLIPS
The Performance Optimization of CLIPS
收藏 引用
2009 Ninth International Conference on Hybrid Intelligent Systems(第九届混合智能系统国际会议 HIS 2009)
作者: Yuxin Ding Qing Wang Jiahua Huang Key Laboratory of Network Oriented Intelligent Computation Department of Computer Science and Technology Harbin Institute of Technology Shenzhen Graduate School Shenzhen China
CLIPS is an expert system tool which provides a complete environment for the construction of rule and/or object based expert systems. Because of its portability, extensibility, capabilities, and low-cost, CLIPS has re... 详细信息
来源: 评论
Improvement of MODIS 8-day LAI/FPAR product with temporal filters to generate high quality time-series product
Improvement of MODIS 8-day LAI/FPAR product with temporal fi...
收藏 引用
2009 Joint Urban Remote Sensing Event
作者: Huifang, Zhang Runhe, Shi Honglin, Zhong Peiqing, Qu Juan, Sun Wenpeng, Lin Su, Li Key Lab. of Geographic Information Science Ministry of Education East China Normal University Shanghai China Key Laboratory of Ecosystem Network Observation and Modeling IGSNRR CAS Beijing China Key Lab. of Urban Ecology and Environment Restoration Shanghai Normal University Shanghai China Computer College Beijing Technology and Business University Beijing China
Numerous studies have reported that the timeseries terrestrial parameters such as the Normalized Difference Vegetation Index (NDVI), Leaf Area of Index (LAI), Fraction of Absorbed Photosynthetic Active Radiation (FPAR... 详细信息
来源: 评论
An Algorithm for Evaluating Credibility of CNO Intelligence Information Using Bayesian Estimation
An Algorithm for Evaluating Credibility of CNO Intelligence ...
收藏 引用
International Conference on Information Science and Engineering (ICISE)
作者: Chunhe Xia Yunyun Sun Shan Yao Songmei Zhang Xiaojian Li Key Laboratory of Beijing Network Technology Beihang University Beijing China College of Computer Science & Information Technology Guangxi Normal University Guilin China
Intelligence activity is one of the most important activities during computer network Operation (CNO) command and decision-making process. Specially, evaluation of Intelligence Information credibility is the basic ele... 详细信息
来源: 评论
Generating the semantic containers for the query interfaces of deep web
Generating the semantic containers for the query interfaces ...
收藏 引用
International Conference on Management and Service Science, MASS 2009
作者: Hao, Liang Wanli, Zuo Jian, Chen Yunge, Mao College of Computer Science and Technology Jilin University Changchun 130012 China Department of Information Changchun Taxation College Changchun 130117 China Key Laboratory of Symbol Computation Knowledge Engineering of the Ministry of Education Changchun 130012 China Network Center of Changchun Taxation College Changchun 130117 China
With the myriad emergence of the online Web Database, the Web is divided into a two layers information platform which is composed of Surface Web and Deep Web. The huge information hidden in the Deep Web is higher in t... 详细信息
来源: 评论
Efficient Mining of Strong Negative Association Rules in Multi-Database
Efficient Mining of Strong Negative Association Rules in Mul...
收藏 引用
International Conference on Computational Intelligence and Software Engineering (CiSE)
作者: Hong Li Xuegang Hu Key Laboratory of Network and Intelligent Information Processing Department of Computer Science and Tchnology Hefei University Hefei China School of Computer & Information Hefei University of technology Hefei China
Strong negative association rules can reveal irrelevances hidden between frequent itemsets. Existing research has made significant efforts in discovering both positive and negative association rules from single databa... 详细信息
来源: 评论
A Road Segmentation and Road Type Identification Approach Based on New-Type Histogram Calculation
A Road Segmentation and Road Type Identification Approach Ba...
收藏 引用
Congress on Image and Signal Processing, CISP
作者: Li Zhang Er-yong Wu School of Computer Science Hangzhou Dianzi University Hangzhou China Zhejiang Provincial Key Laboratory of Information Network Technology University of Zhejiang Hangzhou China
By analyzing the characteristics of off-road images, a new and computationally efficient algorithm of road segmentation and road type identification for autonomous land vehicle (ALV) navigation system based on the pro... 详细信息
来源: 评论
Monocular vision SLAM for large scale outdoor environment
Monocular vision SLAM for large scale outdoor environment
收藏 引用
IEEE International Conference on Mechatronics and Automation
作者: Eryong Wu Wenhui Zhou Guojun Dai Qicong Wang Zhejiang Provincial Key Laboratory of Information Network Technology University of Zhejiang Hangzhou China Department of Computer Science & Technology Hangzhou Dianzi University Hangzhou China Department of Computer Science Xiamen University Xiamen China
We present an algorithm which can realize the monocular vision simultaneous localization and mapping(SLAM) for mobile robot in the large scale outdoor environment. Unused traditional mechanic odometer sensor informati... 详细信息
来源: 评论