咨询与建议

限定检索结果

文献类型

  • 1,806 篇 会议
  • 1,563 篇 期刊文献

馆藏范围

  • 3,369 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,193 篇 工学
    • 1,549 篇 计算机科学与技术...
    • 1,250 篇 软件工程
    • 573 篇 信息与通信工程
    • 290 篇 电气工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 控制科学与工程
    • 193 篇 生物工程
    • 159 篇 机械工程
    • 133 篇 网络空间安全
    • 111 篇 仪器科学与技术
    • 104 篇 光学工程
    • 98 篇 生物医学工程(可授...
    • 76 篇 化学工程与技术
    • 76 篇 核科学与技术
    • 70 篇 动力工程及工程热...
    • 67 篇 交通运输工程
    • 65 篇 安全科学与工程
  • 1,108 篇 理学
    • 533 篇 数学
    • 376 篇 物理学
    • 212 篇 生物学
    • 165 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 81 篇 化学
  • 582 篇 管理学
    • 361 篇 管理科学与工程(可...
    • 252 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 91 篇 法学
    • 48 篇 法学
  • 76 篇 医学
    • 61 篇 临床医学
    • 50 篇 基础医学(可授医学...
  • 50 篇 经济学
    • 50 篇 应用经济学
  • 27 篇 军事学
  • 25 篇 农学
  • 15 篇 教育学
  • 13 篇 文学
  • 9 篇 艺术学

主题

  • 141 篇 feature extracti...
  • 122 篇 semantics
  • 106 篇 hadron colliders
  • 103 篇 accuracy
  • 95 篇 computational mo...
  • 88 篇 training
  • 82 篇 deep learning
  • 70 篇 data models
  • 61 篇 federated learni...
  • 52 篇 neural networks
  • 51 篇 security
  • 49 篇 privacy
  • 45 篇 adaptation model...
  • 43 篇 optimization
  • 43 篇 predictive model...
  • 41 篇 protocols
  • 41 篇 cloud computing
  • 41 篇 robustness
  • 40 篇 blockchain
  • 40 篇 cryptography

机构

  • 192 篇 shandong provinc...
  • 174 篇 key laboratory o...
  • 151 篇 centro brasileir...
  • 151 篇 yerevan physics ...
  • 150 篇 national and kap...
  • 150 篇 istanbul technic...
  • 149 篇 university of sp...
  • 149 篇 academy of scien...
  • 148 篇 universidad iber...
  • 148 篇 indian institute...
  • 147 篇 charles universi...
  • 147 篇 department of ph...
  • 146 篇 brunel universit...
  • 146 篇 university of de...
  • 144 篇 rwth aachen univ...
  • 142 篇 imperial college...
  • 139 篇 università di to...
  • 139 篇 zhejiang univers...
  • 139 篇 indian institute...
  • 136 篇 infn sezione di ...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,116 篇 英文
  • 158 篇 其他
  • 103 篇 中文
检索条件"机构=Key Laboratory of Computer Network Technology"
3369 条 记 录,以下是3281-3290 订阅
排序:
A Dynamic Probability Fault Localization Algorithm Using Digraph
A Dynamic Probability Fault Localization Algorithm Using Dig...
收藏 引用
International Conference on Natural Computation (ICNC)
作者: Chunfang Li Lianzhong Liu Xiaojie Pang School of Automation Beijing Aeronautics and Astronautics University Beijing China School of Computer BUAA Key Laboratory of Beijing Network Technology Beijing China Network Center Hebei Institute of Physical Education Shijiazhuang China
Analyzed here is a probability learning fault localization algorithm based on directed graph and set-covering. The digraph is constituted as following: get the deployment graph of managed business from the topography ... 详细信息
来源: 评论
A method for constructing simplified kernel model based on kernel-MSE
A method for constructing simplified kernel model based on k...
收藏 引用
Pacific-Asia Workshop on Computational Intelligence and Industrial Application, PACIIA
作者: Qi Zhu Yong Xu JinRong Cui ChangFeng Chen JingHua Wang XiangQian Wu YingNan Zhao Key Laboratory of Network Oriented Intelligent Computation Shenzhen Graduate School Harbin Institute of Technology Shenzhen China Department of Computer Science and Technology Harbin Institute of Technology Harbin China Department of Computer Science and Technology Nanjing University of Information Science and Technology Nanjing China
In this paper, we derive an efficient nonlinear feature extraction method from naive Kernel Minimum Squared Error (KMSE) method. The most contribution of the derived method is its feature extraction procedure that is ... 详细信息
来源: 评论
A Model Analyzing Method for OWL-S Services Composition Based on High Level Petri Net
A Model Analyzing Method for OWL-S Services Composition Base...
收藏 引用
International Symposium on Knowledge Acquisition and Modeling, KAM
作者: Shaoran Dong Zengzhi Li State key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Institute of Computer System Architecture and Network Xi''an Jiaotong University Xi'an China
To analyze model of Web services composition, firstly analyze and abstract dataflow and control construct in OWL-S process to build high level Petri net model, then describe Petri net in Poses++ language, at last simu... 详细信息
来源: 评论
A large family of prime-phase sequences with low correlation
A large family of prime-phase sequences with low correlation
收藏 引用
International Workshop on Signal Design and Its Applications in Communications (IWSDA)
作者: Ni-Gang Sun Chang-Lu Lin Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou Fujian China Department of Computer Science and Engineering East China University of Science and Technology Shanghai China
A large family of p-phase highest coordinate sequences, where p is an odd prime, is constructed by using the highest coordinate of the generalized Kerdock codes over the ring Z pl , for l ges 3. Utilizing the local We... 详细信息
来源: 评论
Particle Swarm Algorithm for the Quality of Service-Oriented Web Services Selection
Particle Swarm Algorithm for the Quality of Service-Oriented...
收藏 引用
International Symposium on Knowledge Acquisition and Modeling, KAM
作者: Hong Xia Zengzhi Li State key Laboratory of Networking and Switch Technology Beijing University of Posts and Telecommunications Beijing China Institute of Computer System Architecture and Network Xi''an Jiaotong University Xi'an Shaanxi China
Existing Web services composition technology, lack of services selecting. A particle swarm optimization algorithm based on the multi-objective optimization strategies was provided to address quality of services to cho... 详细信息
来源: 评论
Verification Web Services Composition Based on OWL-S
Verification Web Services Composition Based on OWL-S
收藏 引用
International Symposium on Knowledge Acquisition and Modeling, KAM
作者: Hong Xia Zengzhi Li State key Laboratory of Networking and Switch Technology Beijing University of Posts and Telecommunications Beijing China Institute of Computer System Architecture and Network Xi''an Jiaotong University Xi'an Shaanxi China
In order to ensure the correctness and reliability of Web services composition based on OWL-S, verify the interaction protocol of Web services. It is provided that three lay architecture. Composition service based on ... 详细信息
来源: 评论
A DYNAMIC FAULT LOCALIZATION ALGORITHM USING DIGRAPH
A DYNAMIC FAULT LOCALIZATION ALGORITHM USING DIGRAPH
收藏 引用
2009 International Conference on Machine Learning and Cybernetics(2009机器学习与控制论国际会议)
作者: CHUN-FANG LI LIAN-ZHONG LIU XIAO-JIE PANG School of Automation Beijing University of Aeronautics and Astronautics (BUAA) Beijing 100191 Chi Key Laboratory of Beijing Network Technology School of computer BUAA Beijing 100191 China Network Center Hebei Institute of Physical Education Shijiazhuang 050041 China
Analyzed here is a dynamic learning fault localization algorithm based on directed graph fault propagation model and feedback control. Input and output of the algorithm are named as fault and hypothesis respectively. ... 详细信息
来源: 评论
An Improved Identity-Based Group Signature Scheme
An Improved Identity-Based Group Signature Scheme
收藏 引用
International Conference on Computational Intelligence and Security
作者: Zuowen Tan Key Laboratory of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou Fujian China School of Information Technology Jiangxi University of Finance and Economics Nanchang Jiangxi China
In a group signature scheme, a group member signs messages anonymously on behalf of the group. However, in the case of a dispute, the actual group signer's identity can be revealed by a designated entity. In this ... 详细信息
来源: 评论
Access Model of Web Users Based on Multi-chains Hidden Markov Models
Access Model of Web Users Based on Multi-chains Hidden Marko...
收藏 引用
International Conference on Internet Computing in Science and Engineering (ICICSE)
作者: Kangfeng Zheng Yixian Yang Xiujuan Wang Shize Guo Key Laboratory of network and information attack & defence technology of MOE Beijing University of Posts and Telecommunications Beijing China College of Computer Sciences Beijing University of Technology Beijing China Research Institute of the General Staff of the PLA Beijing China
How to distinguish abnormal access from normal ones is the key problem in Distribution Denial of service(DDoS) attack detection. This research aims at finding out the major difference between the abnormal access and t... 详细信息
来源: 评论
A Role and Task-Based Workflow Dynamic Authorization Modeling and Enforcement Mechanism
A Role and Task-Based Workflow Dynamic Authorization Modelin...
收藏 引用
International Conference on Information Science and Engineering (ICISE)
作者: Xiangrong Zu Lianzhong Liu Yan Bai Computer Science & Technology Department North China electric power university Beijing China Key Laboratory of Beijing network technology School of computer Science & engineering Beihang University Beijing China Automation Science & engineering Department North China electric power university Beijing China
Current workflow products can support more complex modeling of business processes, workflow engine mechanism is well researched, but the link between organizational elements and process activities is less well underst... 详细信息
来源: 评论