咨询与建议

限定检索结果

文献类型

  • 1,852 篇 会议
  • 1,603 篇 期刊文献

馆藏范围

  • 3,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,318 篇 工学
    • 1,697 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 617 篇 信息与通信工程
    • 302 篇 电气工程
    • 248 篇 电子科学与技术(可...
    • 236 篇 控制科学与工程
    • 221 篇 生物工程
    • 153 篇 机械工程
    • 131 篇 网络空间安全
    • 111 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 76 篇 交通运输工程
    • 61 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,084 篇 理学
    • 638 篇 数学
    • 246 篇 生物学
    • 231 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 92 篇 化学
    • 91 篇 系统科学
  • 677 篇 管理学
    • 391 篇 管理科学与工程(可...
    • 312 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 107 篇 法学
    • 72 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 39 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 data models
  • 63 篇 deep learning
  • 61 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 security
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 172 篇 school of comput...
  • 83 篇 key laboratory o...
  • 67 篇 computer network...
  • 67 篇 college of compu...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 39 篇 fujian provincia...
  • 38 篇 university of ch...
  • 36 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 17 篇 liu ximeng
  • 16 篇 zhenrong zhang

语言

  • 3,073 篇 英文
  • 253 篇 其他
  • 146 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3455 条 记 录,以下是2901-2910 订阅
排序:
A heterogeneous-aware cooperative MIMO transmission scheme in WSN
Journal of Software
收藏 引用
Journal of Software 2013年 第3期8卷 639-644页
作者: Pei, Tingrui Xie, Da Li, Zhetao Tu, Dengbiao Choi, Youngjune College of Information Engineering Xiangtan University Xiangtan 411105 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Xiangtan 411105 China School of Computer National University of Defense Technology Changsha 410073 China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing 100029 China Department of Information and Computer Engineering Ajou University Suwon 443749 Korea Republic of
A heterogeneous-aware cooperative MIMO transmission scheme (HAMS) is proposed to optimize the network lifetime and save energy for energy heterogeneous wireless sensor networks (WSN). This scheme extends the tradition... 详细信息
来源: 评论
Weight selection and PSO based three-dimensional localization for wireless sensor networks
Weight selection and PSO based three-dimensional localizatio...
收藏 引用
2nd International Conference on Mechanical Engineering, Industrial Electronics and Informatization, MEIEI 2013
作者: Lv, Jia Liang Wang, Ying Long Cui, Huan Qing Wei, Nuo College of Information Science and Engineering Shandong University of Science and Technology 266590 China Shandong Computer Science Center 250014 China Shandong Provincial Key Laboratory of Computer Network 250014 China
Localization is one of the key technologies of wireless sensor networks, and the problem of localization is always formulated as an optimization problem. Particle swarm optimization (PSO) is easy to implement and requ... 详细信息
来源: 评论
Model for Software Behaviour Detection Based on Process Algebra and System Call
收藏 引用
China Communications 2013年 第11期10卷 24-36页
作者: 申利民 王涛 马川 College of Information Science and Engineering Yanshan University The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Hebei Normal University of Science and Technology
Behaviour detection models based on automata have been studied widely. By add- ing edge ε, the local automata are combined into global automata to describe and detect soft- ware behaviour. However, these methods in- ... 详细信息
来源: 评论
An efficient collision detection algorithm of convex polygons based on Minkowski sum
收藏 引用
ICIC Express Letters 2013年 第2期7卷 461-464页
作者: Geng, Qingjia Guo, Xijuan Zhang, Jianfei Zhang, Buying The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province College of Information Science and Engineering Yanshan University No. 438 Hebei Ave. Qinhuangdao 066004 China College of Computer Hebei Normal University of Science and Technology No. 360 West Hebei St. Qinhuangdao 066004 China
Collision detection is a hot research topic in the field of path planning of mobile robot, virtual assembly simulation, and so on. Fast and accurate collision detection has become one of the most key technologies of r... 详细信息
来源: 评论
Joint optimization toward effective and efficient image search
收藏 引用
IEEE Transactions on Cybernetics 2013年 第6期43卷 2216-2227页
作者: Wei, Shikui Xu, Dong Li, Xuelong Zhao, Yao Institute of Information Science Beijing Jiaotong University Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing 100044 China School of Computer Engineering Nanyang Technological University 639798 Singapore Singapore Center for OPTical IMagery Analysis and Learning State Key Laboratory of Transient Optics and Photonics Xi'An Institute of Optics and Precision Mechanics Xi'an 710119 China Institute of Information Science Beijing Jiaotong University Beijing 100044 China State Key Laboratory of Rail Traffic Control and Safety Beijing 100044 China
The bag-of-words (BoW) model has been known as an effective method for large-scale image search and indexing. Recent work shows that the performance of the model can be further improved by using the embedding method. ... 详细信息
来源: 评论
Efficient predicate encryption supporting construction of fine-grained searchable encryption
Efficient predicate encryption supporting construction of fi...
收藏 引用
5th IEEE International Conference on Intelligent networking and Collaborative Systems, INCoS 2013
作者: Zhang, Minqing Wang, Xu An Yang, Xiaoyuan Cai, Weiyi School of Computer Science Northwestern Polytechnical University Xi'an 710072 China Key Laboratory of Information and Network Security Engineering University of Chinese Armed Police Force China
Predicate Encryption (PE) is a new encryption paradigm which provides more sophisticated and flexible functionality. PE is sufficient for some new applications, such as fine-grained control over access to encrypted da... 详细信息
来源: 评论
Minkowski sum modeling of polyhedra based on VRML
收藏 引用
ICIC Express Letters 2013年 第2期7卷 455-460页
作者: Zhang, Jianfei Guo, Xijuan Geng, Qingjia Information Science and Engineering College Yanshan University No. 438 Hebei Ave. Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of HeBei Province No. 438 Hebei Ave. Qinhuangdao 066004 China Computer and Control Engineering College Qiqihar University No. 42 Wenhua Street Qiqihar 161006 China
On the basis of the introduction to basic methods of the geometry modeling based on virtual reality modeling language (VRML) and the concepts of Minkowski sum computation of polyhedra, we present a method of Minkowski... 详细信息
来源: 评论
Failure modes and stability of rock mass slope containing multi-weak interlayer
收藏 引用
Journal of Applied Sciences 2013年 第21期13卷 4371-4378页
作者: Liu, Jie-Qun Chen, Lu-Wang Liu, Jin-Long Department of Computer Science and Technology Key Laboratory of Network and Intelligent Information Processing Hefei University 230601 Hefei China School of Resource and Environmental Engineering Hefei University of Technology 230009 Hefei China Department of Civil Engineering Hefei University 230601 Hefei China
The phenomena of rock mass slope with multi-weak interlayer can be found in real engineering frequently. It is worthy to study the influence of multi-weak interlayer on failure of rock mass slope. Based on the shear s... 详细信息
来源: 评论
An Event-Driven Service-Oriented Architecture for the Internet of Things
An Event-Driven Service-Oriented Architecture for the Intern...
收藏 引用
IEEE Asia-Pacific Conference on Services Computing (APSCC)
作者: Lina Lan Fei Li Bai Wang Lei Zhang Ruisheng Shi School of Network Education Beijing University of Posts and Telecommunications Beijing China Information Systems Institute Vienna University of Technology Vienna Austria Beijing University of Posts and Telecommunications Beijing Beijing CN School of Computer Beijing University of Posts and Telecommunications Beijing China Education Ministry Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
IoT (Internet of Things) bridges the physical world and information space. IoT services are environment sensitive and event-driven. The new IoT service architecture should adapt to these features. This paper analyses ... 详细信息
来源: 评论
The Intelligent Terminal Design for Integrated Substation Auxiliary System
The Intelligent Terminal Design for Integrated Substation Au...
收藏 引用
2013 Spring International Conference on computer Science and Engineering(CSE-S)
作者: Enliang Pang Sanfeng Zhang Yi Ji College of Software Engineering Southeast University College of Computer Science & Engineering Southeast University Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education
The integrated substation auxiliary system is a project composed by software and hardware to help operators of a substation carry daily maintain works. The intelligent terminal is the key part of the system and it pro... 详细信息
来源: 评论