咨询与建议

限定检索结果

文献类型

  • 1,893 篇 会议
  • 1,598 篇 期刊文献

馆藏范围

  • 3,491 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,306 篇 工学
    • 1,682 篇 计算机科学与技术...
    • 1,305 篇 软件工程
    • 606 篇 信息与通信工程
    • 298 篇 电气工程
    • 247 篇 电子科学与技术(可...
    • 231 篇 控制科学与工程
    • 222 篇 生物工程
    • 154 篇 机械工程
    • 129 篇 网络空间安全
    • 111 篇 仪器科学与技术
    • 108 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 76 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,076 篇 理学
    • 630 篇 数学
    • 247 篇 生物学
    • 231 篇 物理学
    • 195 篇 统计学(可授理学、...
    • 94 篇 化学
    • 90 篇 系统科学
  • 670 篇 管理学
    • 386 篇 管理科学与工程(可...
    • 308 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 106 篇 法学
    • 72 篇 社会学
  • 83 篇 医学
    • 67 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 39 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 152 篇 feature extracti...
  • 128 篇 semantics
  • 121 篇 accuracy
  • 92 篇 computational mo...
  • 87 篇 training
  • 84 篇 federated learni...
  • 71 篇 data models
  • 62 篇 deep learning
  • 54 篇 robustness
  • 53 篇 data mining
  • 51 篇 protocols
  • 50 篇 adaptation model...
  • 49 篇 privacy
  • 48 篇 transformers
  • 48 篇 optimization
  • 47 篇 neural networks
  • 47 篇 visualization
  • 47 篇 clustering algor...
  • 46 篇 security
  • 46 篇 cryptography

机构

  • 265 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 168 篇 school of comput...
  • 85 篇 key laboratory o...
  • 67 篇 college of compu...
  • 66 篇 computer network...
  • 64 篇 shandong provinc...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 49 篇 beijing key labo...
  • 45 篇 school of cyber ...
  • 45 篇 institute of inf...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 39 篇 key laboratory o...
  • 38 篇 fujian provincia...
  • 38 篇 university of ch...

作者

  • 47 篇 zhao yao
  • 40 篇 ren jiadong
  • 37 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 xiaoming wu
  • 26 篇 guo wenzhong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 xiangzhi liu
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang

语言

  • 2,955 篇 英文
  • 419 篇 其他
  • 142 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3491 条 记 录,以下是2651-2660 订阅
排序:
Convergence analysis and application of the central force optimization algorithm
收藏 引用
Science China(information Sciences) 2015年 第5期58卷 208-210页
作者: MENG Chao GONG Jing LIU SanMin SUN ZhiXin Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and TelecommunicationsMinistry of Education College of Mathematics & Physics Nanjing University of Posts and Telecommunications College of Computer and Information Anhui Polytechnic University
Dear editor,The Central Force Optimization(CFO)[1]is a new heuristic *** contrast with the stochastic algorithms such as Particle Swarm Optimization(PSO)[2],Ant Colony Optimization[3]and other such algorithms[4–6],CF... 详细信息
来源: 评论
Point cloud coarse matching method for similar objects
收藏 引用
ICIC Express Letters 2016年 第9期10卷 2283-2289页
作者: Zhao, Qiang Guo, Xijuan Zhang, Buying Bai, Xinyu Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University No. 438 Hebei Ave. Qinhuangdao066004 China College of Information Science and Engineering Yanshan University No. 438 Hebei Ave. Qinhuangdao066004 China Technical Center Shenyang Aircraft Corporation Shenyang110850 China
Point cloud matching is much more difficult when an initial estimate of the relative pose is not known. In order to reduce the effect of relative pose on matching operation and improve the computing speed, this articl... 详细信息
来源: 评论
Background modeling methods in video analysis: A review and comparative evaluation
收藏 引用
CAAI Transactions on Intelligence Technology 2016年 第1期1卷 43-60页
作者: Yong Xu Jixiang Dong Bob Zhang Daoyun Xu Bio-Computing Research Center Shenzhen Graduate School Harbin Institute of Technology 518055 Shenzhen China Shenzhen Key Laboratory of Network Oriented Intelligent Computation Shenzhen China Department of Computer and Information Science University of Macao Avenida da Universidade Taipa Macao China The College of Computer Science and Technology Guizhou University Guiyang 550025 Guizhou China
Foreground detection methods can be applied to efficiently distinguish foreground objects including moving or static objects from back- ground which is very important in the application of video analysis, especially v... 详细信息
来源: 评论
Design and Implementation of Library Books Search and Management System Using RFID Technology
Design and Implementation of Library Books Search and Manage...
收藏 引用
International Conference on Intelligent networking and Collaborative Systems (INCOS)
作者: Haiming Cheng Ling Huang He Xu Yifan Hu Xu An Wang School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks College of Internet of Things Nanjing University of Posts and Telecommunications Nanjing China Key Laboratory of Information and Network Security Engineering University of Chinese Armed Police Force Xi'an China
Radio Frequency Identification technology (RFID) is the key technology to realize the Internet of things. Currently, using RFID to locate objects indoor is a hot topic in the research on the application of RFID. In th... 详细信息
来源: 评论
Tensor object classification via multilinear discriminant analysis network
Tensor object classification via multilinear discriminant an...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal Processing
作者: Rui Zeng Jiasong Wu L. Senhadji Huazhong Shu LIST Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education Nanjing 210096 China
This paper proposes an multilinear discriminant analysis network (MLDANet) for the recognition of multidimensional objects, knows as tensor objects. The MLDANet is a variation of linear discriminant analysis network (... 详细信息
来源: 评论
The design and implementation of network attack and defense platform based on cloud desktop
收藏 引用
Journal of Physics: Conference Series 2017年 第1期887卷
作者: Zining Yan Yunhan Wang Shijiao Shao Boquan Li Embedded System Lab. College of Computer Science and Technology Harbin China Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Key Laboratory of Network Assessment of Technology Chinese Academy of Sciences Beijing China
This paper discusses the cloud desktop technology, virtualization technology and penetration testing technology used in the network attack and defense training platform, and introduces the design and implementation pr...
来源: 评论
Alternative multiplicative iterative method for projection matrix design in compressive images
International Journal of Signal Processing, Image Processing...
收藏 引用
International Journal of Signal Processing, Image Processing and Pattern Recognition 2016年 第9期9卷 357-368页
作者: Shujuan, Tian Xiaoping, Fan Jingxiong, Xie Zhetao, Li Youngjune, Choi Hiroo, Sekiya School of Information Science and Engineering Central South University Changsha410075 China The College of Information Engineering Xiangtan University Xiangtan411105 China Key Laboratory of Intelligent Computing & Information Ministry of Education Xiangtan University Xiangtan411105 China Department of Information and Computer Engineering Ajou University Suwon443749 Korea Republic of Graduate School of Advanced Integration Science Chiba University Chiba263-8522 Japan
Projection matrix plays an important role in compressive sensing (CS). Small mutual coherence between a projection matrix and a sparsijying matrix is considered to enhance reconstruction performance in CS. The equiang... 详细信息
来源: 评论
Mining critical nodes in software execution network based on complex network
收藏 引用
ICIC Express Letters, Part B: Applications 2016年 第9期7卷 1879-1884页
作者: Wang, Lei Dong, Jun Ren, Jiadong College of Information Science and Engineering Yanshan University No. 360 Hebei Ave Qinhuangdao066004 China E & A College Hebei Normal University of Science and Technology No. 360 Hebei Ave Qinhuangdao066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province No. 438 Hebei Ave Qinhuangdao066004 China
It is significant for measuring the importance of nodes accurately to improve software stability and robustness in software network. A software execution directed network takes function as a node and relationship of f... 详细信息
来源: 评论
Tensor object classification via multilinear discriminant analysis network  40
Tensor object classification via multilinear discriminant an...
收藏 引用
40th IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2015
作者: Zeng, Rui Wu, Jiasong Senhadji, Lotfi Shu, Huazhong LIST Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China INSERM U 1099 Rennes France Laboratoire Traitement du Signal et de l'Image Universit de Rennes 1 Rennes France France
This paper proposes an multilinear discriminant analysis network (MLDANet) for the recognition of multidimensional objects, knows as tensor objects. The MLDANet is a variation of linear discriminant analysis network (... 详细信息
来源: 评论
Multi-path SDN route selection subject to multi-constraints  3
Multi-path SDN route selection subject to multi-constraints
收藏 引用
3rd International Conference on Cyberspace Technology, CCT 2015
作者: Pan, Qingfeng Zheng, Xianghan College of Mathematics and Computer Science Fuzhou University Fuzhou350108 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou350108 China
Multi-constrained optimal routing problem and disjoint path selection are NP-hard problem. The conventional single-path and single constraint routing can not meet people's needs. The reliability of network data tr... 详细信息
来源: 评论