咨询与建议

限定检索结果

文献类型

  • 1,812 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,202 篇 工学
    • 1,555 篇 计算机科学与技术...
    • 1,247 篇 软件工程
    • 573 篇 信息与通信工程
    • 294 篇 电气工程
    • 234 篇 电子科学与技术(可...
    • 230 篇 控制科学与工程
    • 193 篇 生物工程
    • 159 篇 机械工程
    • 133 篇 网络空间安全
    • 111 篇 仪器科学与技术
    • 105 篇 光学工程
    • 98 篇 生物医学工程(可授...
    • 76 篇 化学工程与技术
    • 76 篇 核科学与技术
    • 70 篇 动力工程及工程热...
    • 67 篇 交通运输工程
    • 65 篇 安全科学与工程
  • 1,108 篇 理学
    • 532 篇 数学
    • 377 篇 物理学
    • 212 篇 生物学
    • 165 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 81 篇 化学
  • 580 篇 管理学
    • 359 篇 管理科学与工程(可...
    • 252 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 91 篇 法学
    • 48 篇 法学
  • 76 篇 医学
    • 61 篇 临床医学
    • 49 篇 基础医学(可授医学...
  • 50 篇 经济学
    • 50 篇 应用经济学
  • 27 篇 军事学
  • 25 篇 农学
  • 15 篇 教育学
  • 13 篇 文学
  • 9 篇 艺术学

主题

  • 141 篇 feature extracti...
  • 123 篇 semantics
  • 106 篇 hadron colliders
  • 103 篇 accuracy
  • 97 篇 computational mo...
  • 90 篇 training
  • 83 篇 deep learning
  • 70 篇 data models
  • 63 篇 federated learni...
  • 52 篇 neural networks
  • 51 篇 security
  • 49 篇 privacy
  • 45 篇 adaptation model...
  • 44 篇 optimization
  • 43 篇 predictive model...
  • 42 篇 protocols
  • 42 篇 robustness
  • 41 篇 cloud computing
  • 40 篇 blockchain
  • 40 篇 cryptography

机构

  • 193 篇 shandong provinc...
  • 176 篇 key laboratory o...
  • 151 篇 centro brasileir...
  • 151 篇 yerevan physics ...
  • 150 篇 national and kap...
  • 150 篇 istanbul technic...
  • 149 篇 university of sp...
  • 149 篇 academy of scien...
  • 148 篇 universidad iber...
  • 148 篇 indian institute...
  • 147 篇 charles universi...
  • 147 篇 department of ph...
  • 146 篇 brunel universit...
  • 146 篇 university of de...
  • 144 篇 rwth aachen univ...
  • 142 篇 imperial college...
  • 139 篇 università di to...
  • 139 篇 zhejiang univers...
  • 139 篇 indian institute...
  • 136 篇 infn sezione di ...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,139 篇 英文
  • 157 篇 其他
  • 103 篇 中文
检索条件"机构=Key Laboratory of Computer Network Technology"
3391 条 记 录,以下是3371-3380 订阅
排序:
A new approach for early detection of Internet worms based on connection degree
A new approach for early detection of Internet worms based o...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Chen Bo Bin-Xing Fang Xiao-Chun Yun National Computer Information Content Security Key Laboratory Harbin Institute of Technology Harbin China National Computer Network and Information System Security Administration Center Beijing China
In recent years, Internet-scale worm incidents occurred many times. People wonder at the speediness of the worm spread and the severe damage to the Internet. So people began to find methods to detect worms as quickly ... 详细信息
来源: 评论
Document indexing in text categorization
Document indexing in text categorization
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Qi-Rui Zhang Ling Zhang Shou-Bin Dong Jing-Hua Tan Guangdong Key Laboratory of Computer Network South China University of Technology Guangzhou China China Telecom-Guangzhou Research and Development Center Guangzhou China
Aiming at the characteristic of text categorization, this paper proposes an improved method of computing term weights, tfidfie, based on the traditional tfidf function that is generally used in most classifiers. In co... 详细信息
来源: 评论
Study of Multi media Streams Dynamic Rate Control Based on Fuzzy Adaptive PID
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2005年 第4期12卷 75-79页
作者: SUN Yan-fei ZHANG Shun-yi SHI Jin WANG Jiang-tao Jiangsu Province Engineering Research Center of Telecommunication dr Network Technology Nanjing University of Posts and TelecommunicationsNanjing 210003 P.y. China State Key Laboratory of Novel Software Technology Nanjing University Nanjing 210093 P. R. China Department of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing 210003 P. R. China
A Multimedia streams dynamic rate control algorithm based on Fuzzy adaptive PID (MFPID) has been proposed to implement multimedia streams' end sending rate on-line self-regulating and smoothing, and to track system... 详细信息
来源: 评论
Study of Secure Complicated Information System Architecture Model
Study of Secure Complicated Information System Architecture ...
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Kun Wang Ruidan Su Zengxin Li Zhen Cai Lihua Zhou Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China National Info Security Engineering and Technology Research Center Beijing China
Complicated information system (CIS) contains many inhomogeneous applications which require security, interoperability, extensibility. The paper presents a secure CIS architecture model to conduct the construction or ... 详细信息
来源: 评论
A Mathematical Approach to Disaster Recovery Planning
A Mathematical Approach to Disaster Recovery Planning
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Kun Wang Zhonghai Yin Feng Yuan Lihua Zhou Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China National Info Security Engineering and Technology Research Center Beijing China
It is crucial for highly security-critical information systems to accurately control the disaster recovery activities. Using optimization theory, we present a disaster recovery planning mathematical model. The model u... 详细信息
来源: 评论
A Disaster Recovery System Model in an E-government System
A Disaster Recovery System Model in an E-government System
收藏 引用
IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)
作者: Kun Wang Lihua Zhou Zhen Cai Zengxin Li Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China National Info Security Engineering and Technology Research Center Beijing China
We present a Robust Disaster Recovery System Model (RDRSM) for highly security-critical systems to realize continuous service. Through strengthening safe communication ability, RDRSM guarantees secure and reliable com... 详细信息
来源: 评论
AN IMPROVED BICLUSTERING ALGORITHM AND ITS APPLICATION TO GENE EXPRESSION SPECTRUM ANALYSIS
收藏 引用
Genomics, Proteomics & Bioinformatics 2005年 第3期3卷 189-193页
作者: Hua Qu Liu-Pu Wang Yan-Chun Liang Chun-Guo Wu College of Software Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Jilin University Changchun 130012 China Guangzhou Institute of China Telecom Guangzhou 510630 China College of Computer Science and Technology Key Laboratory of Symbol Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China Key Laboratory of Information Science and Engineering of the Ministry of Railway/Key Laboratory of Advanced Information Science and Network Technology of Beijing Beijing Jiaotong University Beijing 100044 China.
Cheng and Church algorithm is an important approach in biclustering algorithms. In this paper, the process of the extended space in the second stage of Cheng and Church algorithm is improved and the selections of two ... 详细信息
来源: 评论
Authenticated public-key encryption based on elliptic curve
Authenticated public-key encryption based on elliptic curve
收藏 引用
International Conference on Embedded Software and Systems
作者: Yiliang Han Xiaoyuan Yang Yupu Hu Key Laboratory of Network and Information Security A.P.FDepartment of Electronic Technology Engineering College of A. P. F Xi'an China College of Computer Science Xidian University Xi'an China
An efficient scheme so called authenticated public key encryption that performs signature and encryption simultaneously is designed. The scheme is the first scheme that based on the standardized signature algorithm EC... 详细信息
来源: 评论
Incident response management system based on alert life circle
收藏 引用
Dalian Ligong Daxue Xuebao/Journal of Dalian University of technology 2005年 第SUPPL.期45卷 S157-S160页
作者: Gong, Jian Li, Jie Computer Network Technology Key Laboratory of Jiangsu Nanjing 210096 China Dept. of Computer Science and Engineering Southeast University Nanjing 210096 China
Based on the existing security incident response working scheme, a novel incident response management model is proposed, based on the concept of alert life circle. An implementation structure of this new model is also... 详细信息
来源: 评论
Multicast access control based on SIP
收藏 引用
Dalian Ligong Daxue Xuebao/Journal of Dalian University of technology 2005年 第SUPPL.期45卷 S214-S218页
作者: Cao, Zheng Wang, Jian Jiangsu Province Key Laboratory of Network Technology Nanjing 210096 China Department of Computer Science and Engineering Southeast University Nanjing 210096 China
Deployment of multicast service requires multicast security. Access control is one of the most important parts of multicast security. A way of access control based on session initiation protocol (SIP) is proposed. By ... 详细信息
来源: 评论