咨询与建议

限定检索结果

文献类型

  • 1,914 篇 会议
  • 1,628 篇 期刊文献

馆藏范围

  • 3,542 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,353 篇 工学
    • 1,720 篇 计算机科学与技术...
    • 1,327 篇 软件工程
    • 628 篇 信息与通信工程
    • 336 篇 电气工程
    • 258 篇 电子科学与技术(可...
    • 251 篇 控制科学与工程
    • 223 篇 生物工程
    • 158 篇 机械工程
    • 145 篇 网络空间安全
    • 114 篇 仪器科学与技术
    • 112 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 86 篇 化学工程与技术
    • 83 篇 交通运输工程
    • 77 篇 动力工程及工程热...
    • 67 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,088 篇 理学
    • 636 篇 数学
    • 249 篇 生物学
    • 237 篇 物理学
    • 196 篇 统计学(可授理学、...
    • 97 篇 化学
    • 90 篇 系统科学
  • 686 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 312 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 106 篇 法学
    • 72 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 39 篇 农学
  • 24 篇 军事学
  • 12 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 154 篇 feature extracti...
  • 128 篇 semantics
  • 124 篇 accuracy
  • 92 篇 computational mo...
  • 88 篇 training
  • 86 篇 federated learni...
  • 73 篇 data models
  • 64 篇 deep learning
  • 56 篇 robustness
  • 53 篇 data mining
  • 52 篇 protocols
  • 51 篇 privacy
  • 50 篇 optimization
  • 50 篇 adaptation model...
  • 49 篇 clustering algor...
  • 48 篇 transformers
  • 47 篇 neural networks
  • 47 篇 visualization
  • 47 篇 cryptography
  • 46 篇 security

机构

  • 272 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 169 篇 school of comput...
  • 85 篇 key laboratory o...
  • 68 篇 computer network...
  • 68 篇 shandong provinc...
  • 67 篇 college of compu...
  • 59 篇 college of infor...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 49 篇 beijing key labo...
  • 47 篇 school of cyber ...
  • 45 篇 institute of inf...
  • 42 篇 the key laborato...
  • 41 篇 school of comput...
  • 40 篇 shandong provinc...
  • 39 篇 key laboratory o...
  • 38 篇 fujian provincia...

作者

  • 46 篇 zhao yao
  • 40 篇 ren jiadong
  • 37 篇 zhou deyu
  • 31 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 xiaoming wu
  • 25 篇 guo wenzhong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 xiangzhi liu
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 18 篇 xiaoping li
  • 18 篇 wei zhang
  • 18 篇 liu ximeng
  • 17 篇 di xiaoqiang

语言

  • 2,875 篇 英文
  • 548 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3542 条 记 录,以下是2811-2820 订阅
排序:
Research on network Identity Management Systems Model
Research on Network Identity Management Systems Model
收藏 引用
2015 International Industrial Informatics and computer Engineering Conference(IIICEC 2015)
作者: CHEN Bing ZOU Xiang TAN Chengxiang The 3rd research institute of ministry of public security (key laboratory of information network security Ministry of Public Security) Dept.of computer engineering of Tongji University
With the rapid development of network,network identity management is becoming more and more *** identity in cyberspace associated in reality has been one significant and urgent task as online life becomes *** this pap... 详细信息
来源: 评论
Performance Analysis of DF Relaying with Optimum Combining in a Poisson Field of Interferers
Performance Analysis of DF Relaying with Optimum Combining i...
收藏 引用
IEEE International Conference on Communications
作者: Navod Suraweera Norman C. Beaulieu Department of Electrical and Computer Engineering University of Alberta School of Information and Communication Engineering and Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecomunications (BUPT)
The performance of optimum combining (OC) in decode-and forward (DF) relaying in the presence of a Poisson field of interferers is analyzed. An approximation for the outage probability of the OC receiver is derived by... 详细信息
来源: 评论
A Clustering-Based Similarity Measurement for Collaborative Filtering  2
A Clustering-Based Similarity Measurement for Collaborative ...
收藏 引用
2nd International Conference on Advanced Cloud and Big Data, CBD 2014
作者: Gu, Liang Yang, Peng Dong, Yongqiang School of Computer Science and Engineering Southeast University Nanjing211189 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing211189 China
Similarity measurement is a crucial process in collaborative filtering. User similarity is computed solely based on the numerical ratings of users. In this paper, we argue that the social information of users should b... 详细信息
来源: 评论
Gaussian Mixture Model Based Interest Prediction In Social networks
Gaussian Mixture Model Based Interest Prediction In Social N...
收藏 引用
IEEE International Conference on Cloud Computing Technology and Science (CloudCom)
作者: Dongyun An Xianghan Zheng Chunming Rong Tahar Kechadi ChongCheng Chen College of Mathematics and Computer Science Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou China Department of Electrical Engineering and Computer Science Stavanger Norway University College Dublin School of Computer Science and Informatics Ireland
In this paper, we investigate a typical clustering technology, namely, Gaussian mixture model (GMM)-based approach, for user interest prediction in social networks. The establishment of the model follows the following... 详细信息
来源: 评论
Self-adaptive anonymous communication scheme under SDN architecture
Self-adaptive anonymous communication scheme under SDN archi...
收藏 引用
IEEE International Conference on Performance, Computing and Communications (IPCCC)
作者: Tingting Zeng Meng Shen Mingzhong Wang Liehuang Zhu Fan Li Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications Beijing Institute of Technology P. R. China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education P. R. China Faculty of Arts and Business University of the Sunshine Coast Queensland Australia
Communication privacy and latency perceived by users have become great concerns for delay-sensitive Internet services. Existing anonymous communication systems either provide high anonymity at an expense of prolonged ... 详细信息
来源: 评论
Performance analysis of two-hop-relay cellular systems with queueing capability
Performance analysis of two-hop-relay cellular systems with ...
收藏 引用
2015 International Conference on information and Communications Technologies, ICT 2015
作者: Lu, Weifeng Gu, Mengmeng Yang, Luxi College of Computer Nanjing University of Posts and Telecommunications Nanjing210023 China School of Information Science and Engineering SouthEast University Nanjing210096 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu210023 China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu210023 China
In this paper, we present a two-hop-relay WCDMA cellular system with queueing capability, where a call can wait in the incoming buffer at the congested Base Transceiver Station (BTS) if no channel is immediately avail... 详细信息
来源: 评论
Real-time simulation of action-driven 3D subtle facial expressions
收藏 引用
Journal of Computational information Systems 2014年 第5期10卷 2137-2144页
作者: Tang, Yong Liang, Haiyan Guo, Dan Lv, Mengya Zhao, Jing College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China
While the large-scale deformations such as the Laplacian deformation method could not synthesize new expressional details, this paper proposes a method for simulating different subtle facial expressions based on the K... 详细信息
来源: 评论
Performance evaluation of an enhanced Ethernet energy saving mechanism in IEEE 802.3az
收藏 引用
Journal of information and Computational Science 2014年 第5期11卷 1605-1613页
作者: Zhi, Shengyang Jin, Shunfu Meng, Chao College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China
In order to reduce the energy consumption and improve the response performance, by introducing the strategies of sleep-delay, pre-awake and split timing to IEEE 802.3az, an enhanced Ethernet energy saving mechanism is... 详细信息
来源: 评论
A density grid-based uncertain data stream clustering algorithm
收藏 引用
Journal of Computational information Systems 2014年 第9期10卷 3619-3626页
作者: He, Haitao Zhao, Jintian The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China
The existing grid-based uncertain data stream clustering algorithms are fast but low-accuracy, and sensitive to user-specified threshold. In order to solve the above problems, a density grid-based uncertain data strea... 详细信息
来源: 评论
WCSPMPD-stream: Mining weighted closed sequential patterns with pattern decay over data streams
收藏 引用
Journal of Computational information Systems 2014年 第1期10卷 435-442页
作者: Zeng, Qiang Han, Gaowei Li, Weina Ren, Jiadong College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao 066004 China
Many of the previous incremental methods in data streams are deleting the old patterns and adding to the new patterns directly, which may delete useful patterns too early. Both different real data and the data occurri... 详细信息
来源: 评论