咨询与建议

限定检索结果

文献类型

  • 1,852 篇 会议
  • 1,603 篇 期刊文献

馆藏范围

  • 3,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,318 篇 工学
    • 1,697 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 617 篇 信息与通信工程
    • 302 篇 电气工程
    • 248 篇 电子科学与技术(可...
    • 236 篇 控制科学与工程
    • 221 篇 生物工程
    • 153 篇 机械工程
    • 131 篇 网络空间安全
    • 111 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 76 篇 交通运输工程
    • 61 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,084 篇 理学
    • 638 篇 数学
    • 246 篇 生物学
    • 231 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 92 篇 化学
    • 91 篇 系统科学
  • 677 篇 管理学
    • 391 篇 管理科学与工程(可...
    • 312 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 107 篇 法学
    • 72 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 39 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 137 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 data models
  • 63 篇 deep learning
  • 61 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 security
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 172 篇 school of comput...
  • 83 篇 key laboratory o...
  • 67 篇 computer network...
  • 67 篇 college of compu...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 39 篇 fujian provincia...
  • 38 篇 university of ch...
  • 36 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 17 篇 liu ximeng
  • 16 篇 zhenrong zhang

语言

  • 3,073 篇 英文
  • 253 篇 其他
  • 146 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3455 条 记 录,以下是2921-2930 订阅
排序:
Rain scenes rendering algorithm combining metaball with mass-spring surface
收藏 引用
Jilin Daxue Xuebao (Gongxueban)/Journal of Jilin University (Engineering and Technology Edition) 2013年 第SUPPL.1期43卷 230-234页
作者: Lyu, Meng-Ya Zheng, Xuan Tang, Yong College of Information Science and Engineering Yanshan University Qinhuangdao 066004 China The Key Laboratory for Computer Virtual Technology and System Integration of HeBei Province Qinhuangdao 066004 China
To solve the problems such as unreal effects, incomplete details in the rain scene, an algorithm to simulate water surface after rain hitting by combining Meatball with mass-spring water surface was presented. First, ... 详细信息
来源: 评论
A big data based data storage systems for rock burst experiment
收藏 引用
International Journal of Wireless and Mobile Computing 2013年 第5期6卷 463-472页
作者: Zhang, Yu Bai, Yan-Ping Zhu, Dong-Feng Lv, Zhao-Yong Department of Computer Science Beijing University of Civil Engineering and Architecture Beijing China State Key Laboratory for GeoMechanics and Deep Underground Engineering China University of Mining and Technology Beijing China School of Management Capital Normal University Beijing China School of Computer Science and Technology Beijing Institute of Technology Beijing China Department of Computer Teaching and Network Information Beijing University of Civil Engineering and Architecture Beijing China
State key laboratory for GeoMechanics and Deep Underground Engineering, Deep-Lab for short, has been committed to the study of rock burst. Deep-Lab accumulated a large number of rock-burst data. With the deepening of ... 详细信息
来源: 评论
Design and implementation of the network electronic identity management system
收藏 引用
2nd International Conference on Opto-Electronics Engineering and Materials Research, OEMR 2013
作者: Zou, Xiang Chen, Bing The 3rd research institute of ministry of public security Key laboratory of information network security Ministry of Public Security Shanghai China Dept. of computer engineering Tongji University Shanghai China
With the prompt evolution of Internet, network identity management is getting more and more basilica. Personal network electronic identity associated in reality has been the significant and urgent task when online lif... 详细信息
来源: 评论
Accountable authority identity-based encryption with public traceability  1
收藏 引用
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013
作者: Lai, Junzuo Deng, Robert H. Zhao, Yunlei Weng, Jian School of Information Systems Singapore Management University Singapore Singapore Software School Fudan University China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security China
At Crypto'07, Goyal introduced the notion of accountable authority identity-based encryption (A-IBE) in order to mitigate the inherent key escrow problem in identity-based encryption, and proposed two concrete con... 详细信息
来源: 评论
On the spatial-Temporal Reachability of DTNs
On the spatial-Temporal Reachability of DTNs
收藏 引用
2nd CCF Internet Conference of China, ICoC 2013
作者: Zhang, Cheng Xia, Chunhe Wang, Haiquan Li, Xiaojian Beijing Key Laboratory of Network Technology Beihang University Beijing China State Key Laboratory of Virtual Reality Technology and Systems Beihang University Beijing China College of Software Beihang University Beijing China College of Computer Science and Information Technology Guangxi Normal University Guilin China
As traditional "Connectivity" concept from the Internet ignores the possibility of opportunistic contacts in DTNs, this paper brings time dimension into consideration, proposes Spatial-Temporal Path, Spatial... 详细信息
来源: 评论
A computer network defense policy refinement method
A computer network defense policy refinement method
收藏 引用
2nd CCF Internet Conference of China, ICoC 2013
作者: Wei, Zhao Lv, Yanli Xia, Chunhe Luo, Yang Wei, Qing Key Laboratory of Beijing Network Technology School of Computer Science and Engineering Beihang University Beijing China Information Center of Ministry of Science and Technology The Ministry of Science Technology of the People's Republic of China Beijing China
The existing methods of policy refinement in computer network defense (CND) can only support the refinement of access control policy, but not the policies of protection, detection, response, and recovery. To solve thi... 详细信息
来源: 评论
ENERGY EFFICIENT DISTRIBUTED STEGANOGRAPHY FOR SECURE COMMUNICATION IN WIRELESS MULTIMEDIA SENSOR networkS
收藏 引用
Journal of Electronics(China) 2013年 第1期30卷 9-16页
作者: Lin Qiaomin Wang Ruchuan Ye Ning Wang Zhongqin College of Computer Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications) Ministry of Education Department of Information Science Nanjing College for Population Management
A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, give... 详细信息
来源: 评论
Tableaux Algorithms for Expressive Possibilistic Description Logics
Tableaux Algorithms for Expressive Possibilistic Description...
收藏 引用
IEEE WIC ACM International Conference on Web Intelligence (WI)
作者: Jinfan Zhu Guilin Qi Boontawee Suntisrivaraporn Ecole des mines d'Albi-Carmaux France Key Laboratory of Computer Network and Information Integration of State Education Ministry Southeast University China School of Information and Communication Technology Griffith University Australia
Possibilistic Description Logics (DLs) extend description logics with possibilistic semantics to reason with inconsistent and uncertain knowledge. In possibilistic DLs, a crucial reasoning task is to compute the incon... 详细信息
来源: 评论
Performance analysis of optimal relay selective cooperation in railway network
Performance analysis of optimal relay selective cooperation ...
收藏 引用
5th IET International Conference on Wireless, Mobile and Multimedia networks, ICWMMN 2013
作者: You, Jia Zhong, Zhangdui Yang, Shan Liu, Yang Wang, Gongpu State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing China School of Computer and Information Technology Beijing Jiaotong University Beijing China Network Technology Research Institute China United Network Communications Co. Ltd. China
In the railway network, the fact that signal amplitude suffers loss resulted from signal traversing through the carriage which named by carriage pass loss, highly influences the reliability of the wireless communicati... 详细信息
来源: 评论
Frequent itemset mining over stream data: Overview
Frequent itemset mining over stream data: Overview
收藏 引用
IET International Conference on information and Communications Technologies, IETICT 2013
作者: Qu, Z.G. Niu, X.X. Deng, J. McArdle, C. Wang, X.J. Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China School of Electronic Engineering Dublin City University Dublin Ireland Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China
During the past decade, stream data mining has been attracting widespread attentions of the experts and the researchers all over the world and a large number of interesting research results have been achieved. Among t... 详细信息
来源: 评论