咨询与建议

限定检索结果

文献类型

  • 1,856 篇 会议
  • 1,616 篇 期刊文献

馆藏范围

  • 3,472 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,334 篇 工学
    • 1,713 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 623 篇 信息与通信工程
    • 305 篇 电气工程
    • 254 篇 电子科学与技术(可...
    • 249 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 133 篇 网络空间安全
    • 110 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 78 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,085 篇 理学
    • 641 篇 数学
    • 245 篇 生物学
    • 230 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 92 篇 化学
    • 92 篇 系统科学
  • 679 篇 管理学
    • 392 篇 管理科学与工程(可...
    • 314 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 10 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 deep learning
  • 65 篇 data models
  • 64 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 security
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 174 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 38 篇 university of ch...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 33 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang

语言

  • 3,074 篇 英文
  • 266 篇 其他
  • 149 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3472 条 记 录,以下是2971-2980 订阅
排序:
Estimation packet loss ratios for the two segments of end-to-end path on the monitor
Estimation packet loss ratios for the two segments of end-to...
收藏 引用
2012 International Conference on computer Science and Service System, CSSS 2012
作者: Cheng, Guang Gao, Zhongyao School of Computer Science and Engineering Southeast University Nanjing 210096 China Key Laboratory of Computer Network and Information Integration Ministry of Education China
Packet loss may cause the degradation of network and application performance. This paper proposes a passive measurement method called LTS to estimate end-to-end path packet loss ratio for the two segments of the path ... 详细信息
来源: 评论
Using Chou’s Pseudo Amino Acid Composition for Protein Remote Homology Detection
收藏 引用
Engineering(科研) 2013年 第10期5卷 149-153页
作者: Bin Liu Xiaolong Wang School of Computer Science and Technology Harbin Institute of Technology Shenzhen Graduate School Shenzhen Guangdong China Key Laboratory of Network Oriented Intelligent Computation Harbin Institute of Technology Shenzhen Graduate School Shenzhen Guangdong China Shanghai Key Laboratory of Intelligent Information Processing Shanghai China School of Computer Science and Technology Harbin Institute of Technology Shenzhen Graduate School Shenzhen Guangdong China Key Laboratory of Network Oriented Intelligent Computation Harbin Institute of Technology Shenzhen Graduate School Shenzhen Guangdong China
Protein remote homology detection is a key problem in bioinformatics. Currently, the discriminative methods, such as Support Vector Machine (SVM), can achieve the best performance. The most efficient approach to impro... 详细信息
来源: 评论
Research on network malicious code dendritic cell immune algorithm based on fuzzy weighted support vector machine
Research on network malicious code dendritic cell immune alg...
收藏 引用
6th China Conference of Wireless Sensor networks, CWSN 2012
作者: Li, Peng Wang, Ruchuan Zhou, Yanting Dai, Qiuyu College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China
According to the significant impact on the accuracy rate of detection of current immune algorithms brought by incorrect classification of signal, it proposes network malicious code dendritic cell immune algorithm base... 详细信息
来源: 评论
Performance analysis of optimal relay selective cooperation in railway network
Performance analysis of optimal relay selective cooperation ...
收藏 引用
5th IET International Conference on Wireless, Mobile and Multimedia networks (ICWMMN 2013)
作者: Jia You Zhangdui Zhong Shan Yang Yang Liu Gongpu Wang State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing China Network Technology Research Institute China United Network Communications Co. Ltd School of Computer and Information Technology Beijing Jiaotong University Beijing China
In the railway network, the fact that signal amplitude suffers loss resulted from signal traversing through the carriage which named by carriage pass loss, highly influences the reliability of the wireless communicati...
来源: 评论
Efficient iterated greedy algorithm to minimize makespan for the no-wait flowshop with sequence dependent setup times
Efficient iterated greedy algorithm to minimize makespan for...
收藏 引用
2012 IEEE 16th International Conference on computer Supported Cooperative Work in Design, CSCWD 2012
作者: Xu, Tao Zhu, Xia Li, Xiaoping School of Computer Science and Engineering Southeast University 211189 Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
In this paper, an efficient iterated greedy algorithm is proposed for the SDST (Sequence Dependent Setup Time) no-wait flowshop with makespan minimization, which is known to be NP-hard. By introducing effective operat... 详细信息
来源: 评论
An improved harmony search algorithm for blocking job shop to minimize makespan
An improved harmony search algorithm for blocking job shop t...
收藏 引用
2012 IEEE 16th International Conference on computer Supported Cooperative Work in Design, CSCWD 2012
作者: Hou, Peiying Wang, Dandan Li, Xiaoping School of Computer Science and Engineering Southeast University 211189 Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University 211189 Nanjing China
In this paper, Harmony Search is applied to the blocking job shop problem with makespan minimization. According to the characteristics of the considered problem, a decoding method is introduced to generate feasible so... 详细信息
来源: 评论
Research on short-term wind farm output power prediction model based on meteorological data collected by WSN
收藏 引用
International Journal of Hybrid information Technology 2013年 第5期6卷 219-226页
作者: Ma, Li Li, Bo Jie, Du Shen, Jian Wang, Jin Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China Key Laboratory of Meteorological Disaster of Ministry of Education Nanjing University of Information Science and Technology Nanjing 210044 China
The prediction of wind farm output power is considered as an effective way to increase the wind power capacity and improve the safety and economy of power system. It is one of the hot research topics on wind power. Th... 详细信息
来源: 评论
A feedback-based timeout packets dropping strategy in real-time wireless sensor networks
收藏 引用
2nd World Congress on computer Science and information Engineering, CSIE 2011
作者: Shen, Zhuowei Xu, Peng Xu, Xiaoxi Key Lab. of Computer Network and Information Integration Ministry of Education School of Computer Sci. and Eng. Southeast University Nanjing China
Resource limited real-time wireless sensor network is a new type of application of sensor network. In this kind of networks, there are numerous invalid real-time packets, which have already expired or are destined to ... 详细信息
来源: 评论
Overlapping community detection combining content and link
收藏 引用
Journal of Zhejiang University-Science C(computers and Electronics) 2012年 第11期13卷 828-839页
作者: Zhou-zhou HE Zhong-fei(Mark)ZHANG Philip S.YU Zhejiang Provincial Key Laboratory of Information Network Technology Department of Information Science and Electronic EngineeringZhejiang UniversityHangzhou 310027China Department of Computer Science University of Illinois at ChicagoIL 60607USA
In classic community detection, it is assumed that communities are exclusive, in the sense of either soft clustering or hard clustering. It has come to attention in the recent literature that many real-world problems ... 详细信息
来源: 评论
Semantic access control for cloud computing based on e-Healthcare
Semantic access control for cloud computing based on e-Healt...
收藏 引用
2012 IEEE 16th International Conference on computer Supported Cooperative Work in Design, CSCWD 2012
作者: Sun, Lili Wang, Hua Yong, Jianming Wu, Guoxin Centre for Systems Biology University of Southern Queensland Toowoomba Australia School of Information Systems University of Southern Queensland Toowoomba Australia School of Computer Science and Engineering Key Laboratory for Computer Network and Information Integration Southeast University China
With the increased development of cloud computing, access control policies have become an important issue in the security filed of cloud computing. Semantic web is the extension of current Web which aims at automation... 详细信息
来源: 评论