咨询与建议

限定检索结果

文献类型

  • 1,852 篇 会议
  • 1,603 篇 期刊文献

馆藏范围

  • 3,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,318 篇 工学
    • 1,697 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 617 篇 信息与通信工程
    • 302 篇 电气工程
    • 248 篇 电子科学与技术(可...
    • 236 篇 控制科学与工程
    • 221 篇 生物工程
    • 153 篇 机械工程
    • 131 篇 网络空间安全
    • 111 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 76 篇 交通运输工程
    • 61 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,084 篇 理学
    • 638 篇 数学
    • 246 篇 生物学
    • 231 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 92 篇 化学
    • 91 篇 系统科学
  • 677 篇 管理学
    • 391 篇 管理科学与工程(可...
    • 312 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 107 篇 法学
    • 72 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 39 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 data models
  • 63 篇 deep learning
  • 61 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 security
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 172 篇 school of comput...
  • 83 篇 key laboratory o...
  • 67 篇 computer network...
  • 67 篇 college of compu...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 39 篇 fujian provincia...
  • 38 篇 university of ch...
  • 36 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 17 篇 liu ximeng
  • 16 篇 zhenrong zhang

语言

  • 3,073 篇 英文
  • 253 篇 其他
  • 146 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3455 条 记 录,以下是2911-2920 订阅
排序:
AN IDENTITY-BASED key AGREEMENT SCHEME FOR LARGE SCALE SENSOR networkS
收藏 引用
Journal of Electronics(China) 2013年 第6期30卷 574-586页
作者: Yang Lijun Wu Meng Ding Chao College of Computer Science & Technology Nanjing University of Posts and Telecommunications College of Telecommunication & Information Engineering Nanjing University of Posts and Telecommunications Key Laboratory of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education
To solve the problems of high memory occupation, low connectivity and poor resiliency against node capture, which existing in the random key pre-distribution techniques while applying to the large scale Wireless Senso... 详细信息
来源: 评论
Iterative algorithms for no-wait flowshop problems with sequence-dependent setup times  25th
Iterative algorithms for no-wait flowshop problems with sequ...
收藏 引用
第25届中国控制与决策会议
作者: Xia Zhu Xiaoping Li Jatinder N.D.Gupta School of Computer Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University College of Business Administration University of Alabama in Huntsville
In this paper, the m-machine no-wait flowshop scheduling problem with sequence-dependent setup times is considered to minimize the makespan. According to the problem characteristics, the increment properties of some f... 详细信息
来源: 评论
HilAnchor:Location Privacy Protection in the Presence of Users' Preferences
收藏 引用
Journal of computer Science & Technology 2012年 第2期27卷 413-427页
作者: 倪巍伟 郑锦旺 崇志宏 School of Computer Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration in Southeast University Ministry of Education
Location privacy receives considerable attentions in emerging location based *** current practices however either ignore users' preferences or incompletely fulfill privacy *** this paper,we propose a privacy protecti... 详细信息
来源: 评论
The Intelligent Terminal Design for Integrated Substation Auxiliary System
收藏 引用
Journal of Software Engineering and Applications 2013年 第5期6卷 11-15页
作者: Enliang Pang Sanfeng Zhang Yi Ji College of Computer Science & Engineering Southeast University Nanjing China College of Software Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education Nanjing China
The integrated substation auxiliary system is a project composed by software and hardware to help operators of a substation carry daily maintain works. The intelligent terminal is the key part of the system and it pro... 详细信息
来源: 评论
DMAT: A new network and computer attack classification
收藏 引用
Journal of Engineering Science and Technology Review 2013年 第5期6卷 101-106页
作者: Jiang, Wei Tian, Zhi-Hong Cui, Xiang College of Computer Science Beijing University of Technology Beijing 100124 China School of Computer National University of Defense Technology Changsha 410073 China Key Laboratory of Information and Network Security Ministry of Public Security Shanghai 201204 China School of Computer Science and Technology Harbin Institute of Technology Haerbin 150001 China The Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China
With the rapid development of computer network and information technology, the Internet has been suffering from a variety of security attacks over the past few years. Attacks have become both numerous and complex, and... 详细信息
来源: 评论
A New Method of Finding All Justifications in OWL 2 EL
A New Method of Finding All Justifications in OWL 2 EL
收藏 引用
IEEE WIC ACM International Conference on Web Intelligence (WI)
作者: Zhangquan Zhou Guilin Qi Boontawee Suntisrivaraporn Key Laboratory of Computer Network and Information Integration of State Education Ministry Southeast University China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Thammasat University Bangkok TH
Finding justifications for an entailment in an OWL ontology is an important reasoning service in the development and maintenance of OWL ontologies. In this paper, we consider the problem of finding all the justificati... 详细信息
来源: 评论
Compressed sensing based on best wavelet packet basis for image processing
收藏 引用
Journal of computers (Finland) 2013年 第8期8卷 1947-1950页
作者: Li, Zhe Tao Xie, Jing Xiong Yu, Zu Guo Tu, Deng Biao Choi, Young June The College of Information Engineering Xiangtan University Hunan 411105 China School of Computer National University of Defense Technology Hunan 410073 China Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Hunan 411105 China School of Mathematics and Computational Science Xiangtan University Hunan 411105 China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing 100029 China Department of Information and Computer Engineering Ajou University Suwon 443749 Korea Republic of
In this paper, an algorithm named best wavelet packet tree decomposition (BWPTD) is proposed for image compression. In order to obtain better sparse representation of image, best wavelet packet basis is introduced to ... 详细信息
来源: 评论
Image Hiding Algorithm in Discrete Cosine Transform Domain Based on Grey Prediction and Grey Relational Analysis
收藏 引用
China Communications 2013年 第7期10卷 57-70页
作者: 黄海平 黄世超 陈九天 王汝传 College of Computer Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Laboratory of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education Nanjing University of Posts and Telecommunications Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University
Traditional information hiding algorithms cannot maintain a good balance of capacity,invisibility and *** this paper,a novel blind colour image information hiding algorithm based on grey prediction and grey relational... 详细信息
来源: 评论
Cryptanalysis of 2-layer nonlinear piece in hand method
Cryptanalysis of 2-layer nonlinear piece in hand method
收藏 引用
CD-ARES 2013 Workshops: 2nd International Workshop on Modern Cryptography and Security Engineering, MoCrySEn 2013 and 3rd International Workshop on Security and Cognitive Informatics for Homeland Defense, SeCIHD 2013
作者: Nie, Xuyun Petzoldt, Albrecht Buchmann, Johannes School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Technische Universität Darmstadt Department of Computer Science Hochschulstraße 10 64289 Darmstadt Germany State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Network and Data Security Key Laboratory of Sichuan Province China
Piece in Hand method is a security enhancement method for Multivariate Public key Cryptosystems (MPKCs). Since 2004, many types of this method have been proposed. In this paper, we consider the 2-layer nonlinear Piece... 详细信息
来源: 评论
A Logic Programming Approach to Aspect Extraction in Opinion Mining
A Logic Programming Approach to Aspect Extraction in Opinion...
收藏 引用
IEEE WIC ACM International Conference on Web Intelligence (WI)
作者: Qian Liu Zhiqiang Gao Bing Liu Yuanlin Zhang Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing China Department of Computer Science University of Illinois at Chicago Chicago IL Department of Computer Science Texas Tech University Lubbock Texas
Aspect extraction aims to extract fine-grained opinion targets from opinion texts. Recent work has shown that the syntactical approach performs well. In this paper, we show that Logic Programming, particularly Answer ... 详细信息
来源: 评论