咨询与建议

限定检索结果

文献类型

  • 1,812 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,391 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,202 篇 工学
    • 1,555 篇 计算机科学与技术...
    • 1,247 篇 软件工程
    • 573 篇 信息与通信工程
    • 294 篇 电气工程
    • 234 篇 电子科学与技术(可...
    • 230 篇 控制科学与工程
    • 193 篇 生物工程
    • 159 篇 机械工程
    • 133 篇 网络空间安全
    • 111 篇 仪器科学与技术
    • 105 篇 光学工程
    • 98 篇 生物医学工程(可授...
    • 76 篇 化学工程与技术
    • 76 篇 核科学与技术
    • 70 篇 动力工程及工程热...
    • 67 篇 交通运输工程
    • 65 篇 安全科学与工程
  • 1,108 篇 理学
    • 532 篇 数学
    • 377 篇 物理学
    • 212 篇 生物学
    • 165 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 81 篇 化学
  • 580 篇 管理学
    • 359 篇 管理科学与工程(可...
    • 252 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 91 篇 法学
    • 48 篇 法学
  • 76 篇 医学
    • 61 篇 临床医学
    • 49 篇 基础医学(可授医学...
  • 50 篇 经济学
    • 50 篇 应用经济学
  • 27 篇 军事学
  • 25 篇 农学
  • 15 篇 教育学
  • 13 篇 文学
  • 9 篇 艺术学

主题

  • 141 篇 feature extracti...
  • 123 篇 semantics
  • 106 篇 hadron colliders
  • 103 篇 accuracy
  • 97 篇 computational mo...
  • 90 篇 training
  • 83 篇 deep learning
  • 70 篇 data models
  • 63 篇 federated learni...
  • 52 篇 neural networks
  • 51 篇 security
  • 49 篇 privacy
  • 45 篇 adaptation model...
  • 44 篇 optimization
  • 43 篇 predictive model...
  • 42 篇 protocols
  • 42 篇 robustness
  • 41 篇 cloud computing
  • 40 篇 blockchain
  • 40 篇 cryptography

机构

  • 193 篇 shandong provinc...
  • 176 篇 key laboratory o...
  • 151 篇 centro brasileir...
  • 151 篇 yerevan physics ...
  • 150 篇 national and kap...
  • 150 篇 istanbul technic...
  • 149 篇 university of sp...
  • 149 篇 academy of scien...
  • 148 篇 universidad iber...
  • 148 篇 indian institute...
  • 147 篇 charles universi...
  • 147 篇 department of ph...
  • 146 篇 brunel universit...
  • 146 篇 university of de...
  • 144 篇 rwth aachen univ...
  • 142 篇 imperial college...
  • 139 篇 università di to...
  • 139 篇 zhejiang univers...
  • 139 篇 indian institute...
  • 136 篇 infn sezione di ...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,139 篇 英文
  • 157 篇 其他
  • 103 篇 中文
检索条件"机构=Key Laboratory of Computer Network Technology"
3391 条 记 录,以下是3381-3390 订阅
排序:
Clock error model for single point two-channel linked network probe system
收藏 引用
Dalian Ligong Daxue Xuebao/Journal of Dalian University of technology 2005年 第SUPPL.期45卷 S55-S58页
作者: Gong, Jian Xu, Jia-Ling Jiangsu Province Key Laboratory of Computer Network Technology Nanjing 210096 China East China Regional Network Center of CERNET Nanjing 210096 China Computer Science and Engineering Dept. Southeast University Nanjing 210096 China
network measurement technology has been one of the hot topics of nowadays Internet technology research. Clock error is the main and direct source of errors in network measurement. Traditionally, the research works on ... 详细信息
来源: 评论
Multicast encryption method based on RSA and key management model
收藏 引用
Dalian Ligong Daxue Xuebao/Journal of Dalian University of technology 2005年 第SUPPL.期45卷 S122-S125页
作者: Zhou, Jie Zhang, Jin-Huan Wang, Quan-Di School of Mathematical Sciences South China University of Technology Guangzhou 510640 China Guangdong Key Laboratory of Computer Network South China University of Technology Guangzhou 510640 China
The efficiency of re-keying is a main factor that influences the performance of secure multicast. In order to avoid re-keying of secure multicast, enhance the key management and raise the secure multicast efficiency, ... 详细信息
来源: 评论
Building grid monitoring system based on Globus Toolkit: Architecture and implementation
Lecture Notes in Computer Science (including subseries Lectu...
收藏 引用
Lecture Notes in computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2004年 3314卷 353-358页
作者: He, Kejing Dong, Shoubin Zhang, Ling Song, Binglin Guangdong Key Laboratory of Computer Network South China University of Technology Guangzhou 510641 China
Computational Grids, coupling geographically distributed resources, have emerged as a next generation computing platform for solving large-scale problems in scientific arena. Monitoring these Grid computing resources,... 详细信息
来源: 评论
A risk assessment approach for network information system
A risk assessment approach for network information system
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Yong-Zheng Zhang Bin-Xing Fang Xiao-Chun Yun National Computer Information Content Security Key Laboratory Harbin Institute of Technology Harbin Heilongjiang China Research Center of Computer Network and Information Security Technology Harbin Institute of Technology Harbin Heilongjiang China
Currently, risk assessment has been an effective technology of protecting network information system. In order to achieve more accurate result, a new assessment approach is presented in this paper. Our approach introd... 详细信息
来源: 评论
An architecture for intrusion detection using honey pot
An architecture for intrusion detection using honey pot
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Zhi-Hong Tian Bin-Xing Fang Xiao-Chun Yun National Computer Information Content Security Key Laboratory Harbin Institute of Technology Harbin Heilongjiang China National Computer Network and Information System Security Administration Center Beijing China
The most common shortcomings in the existing intrusion detection systems (IDSs) are information overload, unknown attacks, false positives and false negatives. We present the design of AAIDHP (an architecture for intr... 详细信息
来源: 评论
The precaution of the network virus and the quantitative analysis of the epidemic situation
The precaution of the network virus and the quantitative ana...
收藏 引用
International Conference on Machine Learning and Cybernetics (ICMLC)
作者: Bai-Ling Wang Bin-Xing Fang Xiao-Chun Yun National Computer Information Content Security Key Laboratory Harbin Institute of Technology Harbin Heilongjiang China National Computer Network and Information System Security Administration Center Beijing China
Comparing with the traditional host virus, the network virus has more attack ability and is more infectious in open network environment. So it is necessary to set a national virus precaution system to detect and contr... 详细信息
来源: 评论
A Systematic Literature Review of Robust Federated Learning: Issues, Solutions, and Future Research Directions
收藏 引用
ACM Computing Surveys 1000年
作者: Md Palash Uddin Yong Xiang Mahmudul Hasan Jun Bai Yao Zhao Longxiang Gao School of Information Technology Deakin University Burwood Australia Deakin University Burwood Australia Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Shandong Academy of Sciences Qilu University of Technology Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China
Federated Learning (FL) has emerged as a promising paradigm for training machine learning models across distributed devices while preserving their data privacy. However, the robustness of FL models against adversarial... 详细信息
来源: 评论
Edge-Adaptive Dynamic Scalable Convolution for Efficient Remote Mobile Pathology Analysis
收藏 引用
ACM Transactions on Autonomous and Adaptive Systems 1000年
作者: Peng Xiao Dajiang Chen Zhen Qin Mingsheng Cao Ruidong Chen Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China China School of Computer Science & Engineering University of Electronic Science and Technology of China China
With the emergence of edge computing, there’s a growing need for advanced technologies capable of real-time, efficient processing of complex data on edge devices, particularly in mobile health systems handling pathol... 详细信息
来源: 评论
S3 Agent: Unlocking the Power of VLLM for Zero-Shot Multi-modal Sarcasm Detection
收藏 引用
ACM Transactions on Multimedia Computing, Communications, and Applications 1000年
作者: Peng Wang Yongheng Zhang Hao Fei Qiguang Chen Yukai Wang Jiasheng Si Wenpeng Lu Min Li Libo Qin School of Computer Science and Engineering Central South University China National University of Singapore Singapore Harbin Institute of Technology China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology (Shandong Academy of Sciences) China
Multi-modal sarcasm detection involves determining whether a given multi-modal input conveys sarcastic intent by analyzing the underlying sentiment. Recently, vision large language models have shown remarkable success... 详细信息
来源: 评论
ChaseCharge: Charging Sensors by Chasing in Sensor-Cloud Systems
收藏 引用
ACM Transactions on Sensor networks 1000年
作者: Chi Lin Rui Guo Chaocan Xiang Yi Wang Qiang Lin School of Software Technology Dalian University of Technology Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province China The College of Computer Science Chongqing University Chongqing China The DUT-RU International School of Information Science and Engineering Dalian University of Technology Dalian China School of Maritime Economics and Management Dalian Maritime University Collaborative Innovation Center for Transport Studies Dalian Maritime University The party school of municipal Party committee of Dalian China
The recent breakthrough in wireless power transfer technology enables power to be delivered between transceivers, which is quite helpful for sensor-cloud systems. Traditional charging schemes are only suitable for sta... 详细信息
来源: 评论