咨询与建议

限定检索结果

文献类型

  • 1,893 篇 会议
  • 1,598 篇 期刊文献

馆藏范围

  • 3,491 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,306 篇 工学
    • 1,682 篇 计算机科学与技术...
    • 1,305 篇 软件工程
    • 606 篇 信息与通信工程
    • 298 篇 电气工程
    • 247 篇 电子科学与技术(可...
    • 231 篇 控制科学与工程
    • 222 篇 生物工程
    • 154 篇 机械工程
    • 129 篇 网络空间安全
    • 111 篇 仪器科学与技术
    • 108 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 76 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,076 篇 理学
    • 630 篇 数学
    • 247 篇 生物学
    • 231 篇 物理学
    • 195 篇 统计学(可授理学、...
    • 94 篇 化学
    • 90 篇 系统科学
  • 670 篇 管理学
    • 386 篇 管理科学与工程(可...
    • 308 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 106 篇 法学
    • 72 篇 社会学
  • 83 篇 医学
    • 67 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 39 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 152 篇 feature extracti...
  • 128 篇 semantics
  • 121 篇 accuracy
  • 92 篇 computational mo...
  • 87 篇 training
  • 84 篇 federated learni...
  • 71 篇 data models
  • 62 篇 deep learning
  • 54 篇 robustness
  • 53 篇 data mining
  • 51 篇 protocols
  • 50 篇 adaptation model...
  • 49 篇 privacy
  • 48 篇 transformers
  • 48 篇 optimization
  • 47 篇 neural networks
  • 47 篇 visualization
  • 47 篇 clustering algor...
  • 46 篇 security
  • 46 篇 cryptography

机构

  • 265 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 168 篇 school of comput...
  • 85 篇 key laboratory o...
  • 67 篇 college of compu...
  • 66 篇 computer network...
  • 64 篇 shandong provinc...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 49 篇 beijing key labo...
  • 45 篇 school of cyber ...
  • 45 篇 institute of inf...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 39 篇 key laboratory o...
  • 38 篇 fujian provincia...
  • 38 篇 university of ch...

作者

  • 47 篇 zhao yao
  • 40 篇 ren jiadong
  • 37 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 xiaoming wu
  • 26 篇 guo wenzhong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 xiangzhi liu
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang

语言

  • 2,955 篇 英文
  • 419 篇 其他
  • 142 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3491 条 记 录,以下是2721-2730 订阅
排序:
Towards Constant-Time Cardinality Estimation for Large-Scale RFID Systems
Towards Constant-Time Cardinality Estimation for Large-Scale...
收藏 引用
International Conference on Parallel Processing (ICPP)
作者: Binbin Li Yuan He Wenyuan Liu School of Information Science and Engineering YanShan University China TNLIST Tsinghua University China The Key Laboratory for Computer Virtual Technology System Integration of HeBei Province China
Cardinality estimation is the process to survey the quantity of tags in a RFID system. Generally, the cardinality is estimated by exchanging information between reader(s) and tags. To ensure the time efficiency and ac... 详细信息
来源: 评论
A novel approach for mining important nodes in directed-weighted complex software network
收藏 引用
Journal of Computational information Systems 2015年 第8期11卷 3059-3071页
作者: Ren, Jiadong Wu, Hongfei Yin, Tengteng Bai, Lan Zhang, Bing College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China Hebei Institute of Foreign Languages Qinhuangdao China
If the software system is abstracted as a software network, its quality largely depends on the topology structure. A tiny fraction key function nodes play a critical role in improving the stability, reliability and ro... 详细信息
来源: 评论
An efficient approach to mine maximal continuous frequent patterns from software function call sequence
收藏 引用
Journal of Computational information Systems 2015年 第8期11卷 3073-3085页
作者: He, Haitao Yin, Tengteng Wu, Hongfei Bai, Lan Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China Hebei Institute of Foreign Languages Qinhuangdao China
Certain characteristics of software are often hidden in its structure and can only be discovered when the software is executed dynamically. So mining important patterns from dynamic call graph of software plays an imp... 详细信息
来源: 评论
key-insulated aggregate signature
收藏 引用
Frontiers of computer Science 2014年 第5期8卷 837-846页
作者: Huiyan ZHAO Jia YU Shaoxia DUAN Xiangguo CHENG Rong HAO College of Information Engineering Qingdao University Qingdao 266071 China Shandong Provincial Key Laboratory of Computer Network Jinan 250014 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China
In order to minimize the damage caused by key exposure in aggregate signatures, a key-insulated aggregate signature scheme is proposed in this paper. We give the def- inition and the security model of the key-insulate... 详细信息
来源: 评论
Design and Implementation of Mobile Telemedicine System Based on Body Area network
Design and Implementation of Mobile Telemedicine System Base...
收藏 引用
2015 International Conference on computer Science and information Engineering(CSIE 2015)
作者: Yun-xia ZHANG Ying-long WANG Ming-lei SHU Meng ZHAO School of Information Science and Engineering Shandong Normal University Shandong Key Laboratory of Computer Network Shandong Computer Science Center(National Super Computing Center in Jinan)
In order to realize remote consultation,remote diagnosis and remote education,and reduce the difficulty and expense for patients seeing a doctor in developing *** this paper,we proposed a mobile telemedicine system is... 详细信息
来源: 评论
Method of periodic dynamic pattern mining based on complex network
收藏 引用
Journal of Computational information Systems 2015年 第21期11卷 7849-7856页
作者: Wang, Lei Jiang, Liya Dong, Jun Huang, Guoyan Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China Hebei Normal University of Science and Technology Qinhuangdao China
Traditionally, analysis of dynamic network has been focused only on a single snapshot or integrated network obtained over a period of time. However, the temporal feature in dynamic network has been ignored. In this pa... 详细信息
来源: 评论
ICRA: An improved community detection algorithm on signed social networks
收藏 引用
Journal of Computational information Systems 2015年 第11期11卷 4091-4099页
作者: Hu, Xinzhuan Guo, Jingfeng Zhao, Yue Liu, Yuanying School of Economics and Management Yanshan University Qinhuangdao China College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
The study on signed social networks community detection has been paid more and more attention. Research shows that two-phase signed social networks community detection algorithm can not correctly divide the network. T... 详细信息
来源: 评论
Frequent jump pattern mining based on complex network
收藏 引用
Journal of Computational information Systems 2015年 第17期11卷 6451-6458页
作者: Wang, Lei Jiang, Liya Dong, Jun Huang, Guoyan Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China Hebei Normal University of Science and Technology Qinhuangdao China
Many researchers are devoted to find frequent pattern in static network. Due to these frequent patterns are usually defined as frequent existence patterns which satisfy given support threshold in network. However, the... 详细信息
来源: 评论
Statistical error analysis of HTL algorithm via LTO and RO stability hypothesis
收藏 引用
Journal of information and Computational Science 2014年 第16期11卷 5765-5773页
作者: Wu, Jianzhang Yu, Xiao Gao, Wei School of Computer Science and Engineer Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China School of Continuing Education Southeast University Nanjing China School of Information Yunnan Normal University Kunming China
There are abundant parameters to estimate if training and testing samples are drawn from the different probability distribution in supervised machine learning algorithm setting. Hypothesis transfer learning is a trick... 详细信息
来源: 评论
Physiological-Signal-Based key Negotiation Protocols for Body Sensor networks: A Survey
Physiological-Signal-Based Key Negotiation Protocols for Bod...
收藏 引用
International Symposium on Autonomous Decentralized Systems (ISADAS)
作者: Huawei Zhao Ruzhi Xu Minglei Shu Jiankun Hu Department of Internet Finance Shandong Prov Key Laboratory of Computer Network Shandong Computer Science Center Jinan China Shandong Prov Key Laboratory of Computer Network Shandong Computer Science Center Jinan China Department of Internet Finance Qilu University of Technology Jinan China School of Engineering and Information Technology UNSW Canberra Australia
Body sensor networks (BSNs) are deployed around the human body to measure and process physiological signals in real time, which have wide application prospects in intelligent healthcare. Physiological signals measured... 详细信息
来源: 评论