咨询与建议

限定检索结果

文献类型

  • 1,893 篇 会议
  • 1,598 篇 期刊文献

馆藏范围

  • 3,491 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,306 篇 工学
    • 1,682 篇 计算机科学与技术...
    • 1,305 篇 软件工程
    • 606 篇 信息与通信工程
    • 298 篇 电气工程
    • 247 篇 电子科学与技术(可...
    • 231 篇 控制科学与工程
    • 222 篇 生物工程
    • 154 篇 机械工程
    • 129 篇 网络空间安全
    • 111 篇 仪器科学与技术
    • 108 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 76 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,076 篇 理学
    • 630 篇 数学
    • 247 篇 生物学
    • 231 篇 物理学
    • 195 篇 统计学(可授理学、...
    • 94 篇 化学
    • 90 篇 系统科学
  • 670 篇 管理学
    • 386 篇 管理科学与工程(可...
    • 308 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 106 篇 法学
    • 72 篇 社会学
  • 83 篇 医学
    • 67 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 39 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 152 篇 feature extracti...
  • 128 篇 semantics
  • 121 篇 accuracy
  • 92 篇 computational mo...
  • 87 篇 training
  • 84 篇 federated learni...
  • 71 篇 data models
  • 62 篇 deep learning
  • 54 篇 robustness
  • 53 篇 data mining
  • 51 篇 protocols
  • 50 篇 adaptation model...
  • 49 篇 privacy
  • 48 篇 transformers
  • 48 篇 optimization
  • 47 篇 neural networks
  • 47 篇 visualization
  • 47 篇 clustering algor...
  • 46 篇 security
  • 46 篇 cryptography

机构

  • 265 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 168 篇 school of comput...
  • 85 篇 key laboratory o...
  • 67 篇 college of compu...
  • 66 篇 computer network...
  • 64 篇 shandong provinc...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 49 篇 beijing key labo...
  • 45 篇 school of cyber ...
  • 45 篇 institute of inf...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 39 篇 key laboratory o...
  • 38 篇 fujian provincia...
  • 38 篇 university of ch...

作者

  • 47 篇 zhao yao
  • 40 篇 ren jiadong
  • 37 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 xiaoming wu
  • 26 篇 guo wenzhong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 xiangzhi liu
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang

语言

  • 2,955 篇 英文
  • 419 篇 其他
  • 142 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3491 条 记 录,以下是2641-2650 订阅
排序:
LSSLP – Local structure sensitive label propagation
收藏 引用
information Sciences 2016年 332卷 19-32页
作者: Zhenfeng Zhu Jian Cheng Yao Zhao Jieping Ye Institute of Information Science Beijing Jiaotong University Beijing 100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing 100044 China National Laboratory of Pattern Recognition Institute of Automation Chinese Academy of Sciences (CAS) 100190 China Department of Electrical Engineering and Computer Science University of Michigan Ann Arbor MI 48109-2218 USA
Label propagation is an approach to iteratively spread the prior state of label confidence associated with each of samples to its neighbors until achieving a global convergence state. Such process has been shown to ho...
来源: 评论
Leveraging Implicit Relative Labeling-Importance information for Effective Multi-label Learning
Leveraging Implicit Relative Labeling-Importance Information...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Yu-Kun Li Min-Ling Zhang Xin Geng Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education China
In multi-label learning, each training example is represented by a single instance while associated with multiple labels, and the task is to predict a set of relevant labels for the unseen instance. Existing approache... 详细信息
来源: 评论
Comparison of Various Neural network Language Models in Speech Recognition
Comparison of Various Neural Network Language Models in Spee...
收藏 引用
International Conference on information Science and Control Engineering (ICISCE)
作者: Lingyun Zuo Xin Wan Jian Liu IACAS Key Laboratory of Speech Acoustics and Content Beijing China XTIPC CAS Xinjiang Laboratory of Minority Speech and Language Information Processing Beijing China National Computer network Emergency Response technical Team Coordination Center Beijing China
In recent years, research on language modeling for speech recognition has increasingly focused on the application of neural networks. However, the performance of neural network language models strongly depends on thei... 详细信息
来源: 评论
An improved community discovery algorithm in weighted social networks
收藏 引用
ICIC Express Letters 2016年 第1期10卷 35-41页
作者: Guo, Jingfeng Liu, Miaomiao Liu, Linlin Chen, Xiao College of Information Science and Engineering Yanshan University No. 438 West Hebei Ave Qinhuangdao China College of Information Science and Engineering Northeast Petroleum University No. 199 Fazhan Road Daqing China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province No. 438 West Hebei Ave Qinhuangdao China
The algorithm AGMA (Automatic Graph Mining Algorithm) is improved and a novel community discovery algorithm, namely CRMA (Clustering Re-clustering Merging Algorithm) is proposed which can realize more reasonable commu... 详细信息
来源: 评论
Some classes of complete permutation polynomials over Fq
收藏 引用
Science China Mathematics 2015年 第10期58卷 2081-2094页
作者: WU GaoFei LI Nian HELLESETH Tor ZHANG YuQing State Key Laboratory of Integrated Service Networks Xidian University Information Security and National Computing Grid Laboratory Southwest Jiaotong University Department of Informatics University of Bergen National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences
By using a powerful criterion for permutation polynomials, we give several classes of complete permutation polynomials over finite fields. First, two classes of complete permutation monomials whose exponents are of Ni... 详细信息
来源: 评论
Skin panel design for a morphing mechanism
收藏 引用
ICIC Express Letters, Part B: Applications 2016年 第10期7卷 2161-2167页
作者: Zhao, Qiang Guo, Xliuan Xi, Fengfeng Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province College of Information Science and Engineering Yanshan University No. 438 Hebei Avenue Qinhuangdao066004 China Department of Aerospace Engineering Ryerson University TorontoONM5B 2K3 Canada
A segmentation method is proposed to aid rigid skin panel design for an existing modular morphing wing mechanism. The method divides the surface of the modular morphing mechanism into panels through geometry discretiz... 详细信息
来源: 评论
Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption
Trusted Boolean Search on Cloud Using Searchable Symmetric E...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Cong Zuo James Macindoe Siyin Yang Ron Steinfeld Joseph K. Liu School of Computer and Information Engineering Zhejiang Gongshang University Zhejiang P.R. China Faculty of Information Technology Clayton Campus Monash University Australia Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou Fujian China
A Searchable Symmetric Encryption (SSE) scheme allows a server to search a user's data without having to decrypt the data. This provides the user with a high degree of privacy and is particularly useful when data ... 详细信息
来源: 评论
A simulator for swarm AUVs acoustic communication networking  11
A simulator for swarm AUVs acoustic communication networking
收藏 引用
11th ACM International Conference on Underwater networks and Systems, WUWNet 2016
作者: Li, Guannan Liu, Jun Wang, Xue Xu, Hongli Cui, Jun-Hong Shenyang Institute of Automation CAS University of Chinese Academy of Sciences No. 114 Nanta Street Shenhe District Shenyang China College of Computer Science and Technology Jilin University State Key Laboratory of Robotics Key Laboratory of System Control and Information Processing Ministry of Education of China Changchun China Shenyang Institute of Automation CAS Northeast University No. 114 Nanta Street Shenhe District Shenyang China Shenyang Institute of Automation CAS No. 114 Nanta Street Shenhe District Shenyang China College of Computer Science and Technology Jilin University Changchun China Underwater Sensor Network Lab. University of Connecticut StorrsCT06269 United States
This paper presents a simulator for swarm operations designed to verify algorithms for a swarm of autonomous underwater robots (AUVs), specifically for constructing an underwater communication network with AUVs carryi... 详细信息
来源: 评论
Hyper-compact virtual estimators for big network data based on register sharing
Hyper-compact virtual estimators for big network data based ...
收藏 引用
ACM SIGMETRICS International Conference on Measurement and Modeling of computer Systems, SIGMETRICS 2015
作者: Xiao, Qingjun Chen, Shigang Chen, Min Ling, Yibei Department of Computer and Information Science and Engineering University of Florida GainesvilleFL United States Key Lab. of Computer Network and Information Integration Southeast University Ministry of Education China Telcordia Technologies and Applied Research Ericsson United States
Cardinality estimation over big network data consisting of numerous flows is a fundamental problem with many practical applications. Traditionally the research on this problem focused on using a small amount of memory... 详细信息
来源: 评论
A heuristic scheduling algorithm based on PSO in the cloud computing environment
收藏 引用
International Journal of Future Generation Communication and networking 2016年 第1期9卷 349-362页
作者: Xue, Shengjun Shi, Wenling Xu, Xiaolong School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
In the face of a large number of task requests submitted by users, the data center in the cloud need not only to finish these massive tasks but also to satisfy the user's service demand. How to dividethe resources... 详细信息
来源: 评论