咨询与建议

限定检索结果

文献类型

  • 1,852 篇 会议
  • 1,603 篇 期刊文献

馆藏范围

  • 3,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,318 篇 工学
    • 1,697 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 617 篇 信息与通信工程
    • 302 篇 电气工程
    • 248 篇 电子科学与技术(可...
    • 236 篇 控制科学与工程
    • 221 篇 生物工程
    • 153 篇 机械工程
    • 131 篇 网络空间安全
    • 111 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 76 篇 交通运输工程
    • 61 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,084 篇 理学
    • 638 篇 数学
    • 246 篇 生物学
    • 231 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 92 篇 化学
    • 91 篇 系统科学
  • 677 篇 管理学
    • 391 篇 管理科学与工程(可...
    • 312 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 107 篇 法学
    • 72 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 39 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 data models
  • 63 篇 deep learning
  • 61 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 security
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 172 篇 school of comput...
  • 83 篇 key laboratory o...
  • 67 篇 computer network...
  • 67 篇 college of compu...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 39 篇 fujian provincia...
  • 38 篇 university of ch...
  • 36 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 17 篇 liu ximeng
  • 16 篇 zhenrong zhang

语言

  • 3,073 篇 英文
  • 253 篇 其他
  • 146 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3455 条 记 录,以下是2821-2830 订阅
排序:
26th Annual Computational Neuroscience Meeting (CNS*2017): Part 3 Antwerp, Belgium. 15-20 July 2017 Abstracts
收藏 引用
BMC NEUROSCIENCE 2017年 第SUPPL 1期18卷 95-176页
作者: [Anonymous] Department of Neuroscience Yale University New Haven CT 06520 USA Department Physiology & Pharmacology SUNY Downstate Brooklyn NY 11203 USA NYU School of Engineering 6 MetroTech Center Brooklyn NY 11201 USA Departament de Matemàtica Aplicada Universitat Politècnica de Catalunya Barcelona 08028 Spain Institut de Neurobiologie de la Méditerrannée (INMED) INSERM UMR901 Aix-Marseille Univ Marseille France Center of Neural Science New York University New York NY USA Aix-Marseille Univ INSERM INS Inst Neurosci Syst Marseille France Laboratoire de Physique Théorique et Modélisation CNRS UMR 8089 Université de Cergy-Pontoise 95300 Cergy-Pontoise Cedex France Department of Mathematics and Computer Science ENSAT Abdelmalek Essaadi’s University Tangier Morocco Laboratory of Natural Computation Department of Information and Electrical Engineering and Applied Mathematics University of Salerno 84084 Fisciano SA Italy Department of Medicine University of Salerno 84083 Lancusi SA Italy Dipartimento di Fisica Università degli Studi Aldo Moro Bari and INFN Sezione Di Bari Italy Data Analysis Department Ghent University Ghent Belgium Coma Science Group University of Liège Liège Belgium Cruces Hospital and Ikerbasque Research Center Bilbao Spain BIOtech Department of Industrial Engineering University of Trento and IRCS-PAT FBK 38010 Trento Italy Department of Data Analysis Ghent University Ghent 9000 Belgium The Wellcome Trust Centre for Neuroimaging University College London London WC1N 3BG UK Department of Electronic Engineering NED University of Engineering and Technology Karachi Pakistan Blue Brain Project École Polytechnique Fédérale de Lausanne Lausanne Switzerland Departement of Mathematics Swansea University Swansea Wales UK Laboratory for Topology and Neuroscience at the Brain Mind Institute École polytechnique fédérale de Lausanne Lausanne Switzerland Institute of Mathematics University of Aberdeen Aberdeen Scotland UK Department of Integrativ
来源: 评论
User Posting Behavior Analysis and Modeling in Microblog
User Posting Behavior Analysis and Modeling in Microblog
收藏 引用
International Conference on Intelligent information Hiding and Multimedia Signal Processing (IIHMSP)
作者: Yun Liu Weiguo Yuan Key Laboratory of Communication and Information Systems Beijing Jiaotong University Beijing China Computer Network Information Center Beijing Jiaotong University Beijing China
In this paper, we studied the statistical features of user posting behavior in microblog. The number of statuses exhibits a double power-law distribution and there is strong positive correlation between the number of ... 详细信息
来源: 评论
A Hierarchical Multi-label Propagation Algorithm for Overlapping Community Discovery in Social networks
A Hierarchical Multi-label Propagation Algorithm for Overlap...
收藏 引用
2014 11th Web information System and Application Conference(第十一届全国web信息系统及其应用学术会议)
作者: Song Shi Yuzhong Chen Mingyue Fang Wanhua Li Shining College of Mathematics and Computer Science Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University FuZhou China
Multi-label propagation algorithms (MLPAs) have nearly linear time complexity, but the accuracy and stability still need to be improved when applied to overlapping community *** from the idea that boundary nodes are m... 详细信息
来源: 评论
A forensics tool of Foxmail client
A forensics tool of Foxmail client
收藏 引用
International Conference on Systems and Informatics (ICSAI)
作者: Lili Xie Guolong Chen College of Mathematics and Computer Science Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
computer forensics is an important part of the computer crime investigation. So a Forensics system aimed to Foxmail data analysis and investigation is proposed in this paper. The system can index the email data based ... 详细信息
来源: 评论
Arranging the layout of alphanumeric buttons-the role of passwords  21
Arranging the layout of alphanumeric buttons-the role of pas...
收藏 引用
21st ACM Conference on computer and Communications Security, CCS 2014
作者: Li, Xiangxue Yu, Yu Li, Qiang Qian, Haifeng Zhou, Yuan Weng, Jian Department of Computer Science and Technology East China Normal University China State Key Laboratory of Integrated Services Networks Xidian University China School of Electronic Information and Electrical Engineering Shanghai Jiaotong University China Network Emergency Response Technical Team Coordination Center China Computer Science Department Jinan University China
A typical but trivial layout of alphanumeric buttons in the touchscreen setting is to arrange the 10 digits and 26 letters in a natural order. This arrangement does not take into account the frequencies of letters and... 详细信息
来源: 评论
A Provably secure Certificate based ring signature without pairing
收藏 引用
International Journal of network Security 2014年 第4期16卷 278-285页
作者: Qin, Zhiguang Xiong, Hu Li, Fagen School of Computer Science and Engineering University of Electronic Science and Technology of China No. 4 North Jianshe Road Chenghua District chengdu Sichuan 610054 China Key Lab of Network Security and Cryptology Fujian Normal University No. 8 Shangsan Road Cangshan District Fuzhou Fujian 350007 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences No. 19 Yuquan Road Shijingshan District Beijing 100190 China
In Eurocrypt 2003, Gentry introduced the notion of certificate-based encryption. The merit of certificate-based encryption lies in implicit certificate and no private key escrow. This feature is desirable especially f... 详细信息
来源: 评论
Research on a security method for domain name resolution on the client side
Research on a security method for domain name resolution on ...
收藏 引用
2014 International Conference on computer Science and Systems Engineering(CSSE2014)
作者: W.Zhang W.Wang X.C.Zhang H.L.Shi Shandong Provincial Key Laboratory of Computer Networks Shandong Computer Science Center(National Supercomputer Center in Jinan) DNSLAB China Internet Network Information Center
With the development of information technology, the domain name system(DNS) has become a very popular application. DNS forms the logical backbone of the World Wide Web, and the service which the DNS provides is used o... 详细信息
来源: 评论
Bottleneck Analysis for Data Acquisition in High-Speed network Traffic Monitoring
收藏 引用
China Communications 2014年 第1期11卷 110-118页
作者: JIANG Wei TIAN Zhihong CAI Chao GONG Bei College of Computer Science Beijing University of Technology Beijing 100124 China School of Computer National University of Defense Technology Changsha 410073 China Key Laboratory of Information and Network Security Ministry of Public Security Shanghai 201204 China School of Computer Science and Technology Harbin Institute of Technology Harbin 150001 China
The increasing network throughput challenges the current network traffic monitor systems to have compatible high-performance data *** design of packet processing systems is guided by the requirements of high packet pr... 详细信息
来源: 评论
Topic trend prediction based on wavelet transformation
Topic trend prediction based on wavelet transformation
收藏 引用
2014 11th Web information System and Application Conference(第十一届全国web信息系统及其应用学术会议)
作者: Mingyue Fang Yuzhong Chen Peng Gao Shuiyuan Zhao Songpan Zheng College of Mathematics and Computer Science Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou Fujian China
The research of topic trend prediction can be a good reference for maximizing the propagation effects of network advertisements as well as guiding and controlling the network *** paper proposes PTEP(the Prediction of ... 详细信息
来源: 评论
Quantitative Measurement of Coronary Artery Stenosis in CCTA Images Using a 2D Parametric Intensity Model
Quantitative Measurement of Coronary Artery Stenosis in CCTA...
收藏 引用
Annual International Conference of the IEEE Engineering in Medicine and Biology Society
作者: Guanyu YANG Xinglou ZHAO Lijun TANG Huzhong SHU Christine TOUMOULIN Lab of Image Science and Technology Key Laboratory of Computer Network and Information Integration (Southeast University) Dept. of Radiology the First Affiliated Hospital of Nanjing Medical University INSERM-U1099 LTSI Universite de Rennes 1
In this paper, we propose an approach based on 2D vessel model to segment the vessel lumen in three-dimensional coronary computed tomographic angiography (CCTA) images. The 2D parametric intensity model is introduced ... 详细信息
来源: 评论