咨询与建议

限定检索结果

文献类型

  • 1,852 篇 会议
  • 1,603 篇 期刊文献

馆藏范围

  • 3,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,318 篇 工学
    • 1,697 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 617 篇 信息与通信工程
    • 302 篇 电气工程
    • 248 篇 电子科学与技术(可...
    • 236 篇 控制科学与工程
    • 221 篇 生物工程
    • 153 篇 机械工程
    • 131 篇 网络空间安全
    • 111 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 76 篇 交通运输工程
    • 61 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,084 篇 理学
    • 638 篇 数学
    • 246 篇 生物学
    • 231 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 92 篇 化学
    • 91 篇 系统科学
  • 677 篇 管理学
    • 391 篇 管理科学与工程(可...
    • 312 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 107 篇 法学
    • 72 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 39 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 data models
  • 63 篇 deep learning
  • 61 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 security
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 172 篇 school of comput...
  • 83 篇 key laboratory o...
  • 67 篇 computer network...
  • 67 篇 college of compu...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 39 篇 fujian provincia...
  • 38 篇 university of ch...
  • 36 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 17 篇 liu ximeng
  • 16 篇 zhenrong zhang

语言

  • 3,073 篇 英文
  • 253 篇 其他
  • 146 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3455 条 记 录,以下是2871-2880 订阅
排序:
Package of the vector math library based on the sunway processor
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2014年 25卷 70-79页
作者: Xie, Qing-Chun Zhang, Yun-Quan Li, Yan Pang, Ren-Bo Wu, Zai-Long Lu, Yong-Quan Gao, Peng-Dong High Performance Computing Center Communication University of China Beijing100024 China Laboratory of Parallel Computing Institute of Software The Chinese Academy of Sciences Beijing100190 China State Key Laboratory of Computer Architecture Institute of Computing Technology The Chinese Academy of Sciences Beijing100190 China Department of Computer and Network National Marine Environmental Forecasting Center Beijing100081 China School of Information Sceience and Technology The Ocean University of China Qingdao266100 China
This paper first introduces the SIMD (single instruction multiple data) extension technology and presents three ways to use SIMD instructions. It is considered that calling the third party library, which is optimized ... 详细信息
来源: 评论
Action recognition of motion capture data
Action recognition of motion capture data
收藏 引用
Congress on Image and Signal Processing, CISP
作者: Na Lv Zhiquan Feng Lingqiang Ran Xiuyang Zhao Shandong Provincial Key Laboratory of Network based Intelligent Computing Jinan P.R. China Department of Information Science and Technology University of Jinan Jinan China School of Computer Science and Technology Shandong University Jinan China
With the advancement of motion capture technology, 3D skeleton data is easier to be obtained. 3D skeleton data has the advantage over traditional video data for the reason that it is less affected by illumination, com... 详细信息
来源: 评论
Public verifiable key encapsulation mechanism under factoring
Public verifiable key encapsulation mechanism under factorin...
收藏 引用
5th IEEE International Conference on Intelligent networking and Collaborative Systems, INCoS 2013
作者: Liu, Zhen Yang, Xiao Yuan Key Laboratory of computer Network and Information Security of Engineering Institute of the Armed Police Xi'an China
The cipher text consistency check that can be implemented publicly has practical significance, and it is always an interested studying aspect to construct cryptographic algorithm without pairings in the field of crypt... 详细信息
来源: 评论
Complex field network-coded cooperation based on multi-user detection in wireless networks
收藏 引用
Journal of Systems Engineering and Electronics 2013年 第2期24卷 215-221页
作者: Jing Wang Xiangyang Liu Kaikai Chi Xiangmo Zhao School of Information Engineering Chang'an University State Key Laboratory of Integrated Service Networks Xidian University Department of Network Management Xi'an Communication College College of Computer Science and Technology Zhejiang University of Technology
Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC... 详细信息
来源: 评论
Modeling and Global Conflict Analysis of Firewall Policy
收藏 引用
China Communications 2014年 第5期11卷 124-135页
作者: LIANG Xiaoyan XIA Chunhe JIAO Jian HU Junshun LI Xiaojian Beij ing Key Laboratory of Network Technology Beihang University Beijing 100191 R R. China Beijing Information Science & Technology University Beijing 100192 P. R. China Software Development Center of China Agricultural Bank Beijing 100073 P. R. China College of Computer Science and Information Technology Guangxi Normal University Guilin 541004 Guangxi Province P. R. China
The global view of firewall policy conflict is important for administrators to optimize the *** has been lack of appropriate firewall policy global conflict analysis,existing methods focus on local conflict *** resear... 详细信息
来源: 评论
AGC design in frequency modulation system for voice communication via underwater acoustic channel
收藏 引用
Sensors and Transducers 2013年 第5期152卷 116-121页
作者: Cheng, En Chen, Sheng-Li Li, Ye Ke, Fu-Yuan Yuan, Fei Key Lab of Underwater Acoustic Communication and Marine Information Tech of the Ministry of Edu Xiamen University Xiamen 361005 China Key Laboratory of Computer Network of Shandong Province Shandong Computer Science Center Jinan 250014 China
The FM modulation improves the anti-interference ability by sacrificing the bandwidth of the communication channel. In the underwater acoustic communication, as the bandwidth of the communication channel is very limit... 详细信息
来源: 评论
Joint source-channel coding for underwater image transmission
收藏 引用
Sensors and Transducers 2013年 第5期152卷 122-128页
作者: Chen, Hua-Bin Chen, Wei-Ling Li, Ye Cheng, En Yuan, Fei Key Lab of Underwater Acoustic Communication and Marine Information Tech of the Ministry of Edu Xiamen University Xiamen 361005 China Key Laboratory of Computer Network of Shandong Province Shandong Computer Science Center Jinan 250014 China
Underwater acoustic (UWA) channel is a complex time-, space- and frequency-variant channel. So to realize the high efficiency and real-time transmission of image with great data quantity, it will refer to both source ... 详细信息
来源: 评论
Voice conversion towards modeling dynamic characteristics using switching state space model
收藏 引用
Science China(information Sciences) 2013年 第12期56卷 237-251页
作者: XU Ning BAO JingYi LIU XiaoFeng JIANG AiMing TANG YiBing College of Computer and Information Engineering Hohai University Ministry of Education Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications School of Electronic Information and Electric Engineering of Changzhou Institute of Technology
In the literature of voice conversion(VC),the method based on statistical Gaussian mixture model(GMM)serves as a ***,one of the inherent drawbacks of GMM is well-known as discontinuity problem,which is caused by trans... 详细信息
来源: 评论
Cloud Computing in Electric Vehicles Charging Control and Dispatch Optimization
Cloud Computing in Electric Vehicles Charging Control and Di...
收藏 引用
2014 IEEE International Conference on Progress in Informatics and Computing
作者: Dan Wu Bo Liu Zhijian Chen Wenyan Xie Xiang Huang Shuwei Pei Bin Sheng Donghan Feng Information Center China Southern Power Grid Co. Ltd. Dept. of Computer Science and Engineering Shanghai JiaoTong University Network & Information Branch Guangdong Electric Power Design Institute The State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Dept. of Electrical Engineering Shanghai JiaoTong University
Charging of large-scale electric vehicles will have a significantimpact on the grid sothat their charging schedule needs tobe optimized. The traditional centralized scheduling method requires high performance in infor... 详细信息
来源: 评论
Mobile Anchor Assisted Localization in Wireless Sensor networks with Regular Polygon Path
Mobile Anchor Assisted Localization in Wireless Sensor Netwo...
收藏 引用
2013 IEEE 4th International Conference on Software Engineering and Service Science
作者: Huanqing Cui Chuan'ai Zhou Xiaojing Meng Rong Hua Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center College of Information Science and Engineering Shandong University of Science and Technology
Mobile anchor assisted localization methods for wireless sensor networks can decrease the cost while improving the accuracy,and the moving trajectory is an interesting and basic issue in this kind of *** paper propose... 详细信息
来源: 评论