咨询与建议

限定检索结果

文献类型

  • 1,856 篇 会议
  • 1,616 篇 期刊文献

馆藏范围

  • 3,472 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,334 篇 工学
    • 1,713 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 623 篇 信息与通信工程
    • 305 篇 电气工程
    • 254 篇 电子科学与技术(可...
    • 249 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 133 篇 网络空间安全
    • 110 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 78 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,085 篇 理学
    • 641 篇 数学
    • 245 篇 生物学
    • 230 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 92 篇 化学
    • 92 篇 系统科学
  • 679 篇 管理学
    • 392 篇 管理科学与工程(可...
    • 314 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 10 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 deep learning
  • 65 篇 data models
  • 64 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 security
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 174 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 38 篇 university of ch...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 33 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang

语言

  • 3,074 篇 英文
  • 266 篇 其他
  • 149 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3472 条 记 录,以下是3011-3020 订阅
排序:
Improvement on masked S-box hardware implementation
Improvement on masked S-box hardware implementation
收藏 引用
2012 International Conference on Innovations in information Technology, IIT 2012
作者: Zeng, Juanli Wang, Yi Xu, Cheng Li, Renfa Embedded System and Network Laboratory Hunan University Changsha Hunan 410082 China Hunan Province Key Laboratory of Network and Information Security Hunan University Changsha Hunan 410082 China College of Information Science and Engineering Hunan University Changsha Hunan 410082 China Department of Electrical and Computer Engineering National University of Singapore Singapore 117576 Singapore
Masking in gate level could efficiently protect AES S-box out of power analysis attack. But there still exists a kind of attack, called glitch attack, to achieve the sensitive information from gate cell leakage. Some ... 详细信息
来源: 评论
A unified architecture for DPA-resistant PRESENT
A unified architecture for DPA-resistant PRESENT
收藏 引用
2012 International Conference on Innovations in information Technology, IIT 2012
作者: Zhao, Wei Wang, Yi Li, Renfa Embedded System and Network Laboratory Hunan University Changsha Hunan 410082 China Hunan Province Key Laboratory of Network and Information Security Hunan University Changsha Hunan 410082 China College of Information Science and Engineering Hunan University Changsha Hunan 410082 China Department of Electrical and Computer Engineering National University of Singapore Singapore 117576 Singapore
Recently, there is a new kinds of cryptographic algorithms are proposed to meet the requirements of "lightweight" applications. PRESENT is one of them, which is built based on 4-bit substitution transformati... 详细信息
来源: 评论
The method for constructing block sparse measurement matrix based on orthogonal vectors
The method for constructing block sparse measurement matrix ...
收藏 引用
13th Pacific-Rim Conference on Multimedia, PCM 2012
作者: Zhao, Ruizhen Qin, Zhou Tang, Jinhui Institute of Information Science Beijing Jiaotong University Beijing 100044 China Key Laboratory of Advanced Information Science and Network Technology of Beijing Beijing 100044 China School of Computer Science Nanjing University of Science and Technology Nanjing 210094 China
Compressive sensing is a new way of information processing which recover the original signal through acquiring much fewer measurements with a measurement matrix. The measurement matrix has an important effect in signa... 详细信息
来源: 评论
Application of SS-MVPN technology in mobile network
Application of SS-MVPN technology in mobile network
收藏 引用
2012 International Conference on Electrical Insulating Materials and Electrical Engineering, EIMEE 2012
作者: Hang, Qiangwei Chen, Bing Hou, Qiang Key Laboratory of Information Network Security Ministry of Public Securitythe 3rd research institute of ministry of public security Shanghai China Dept. of computer engineering of Tongji University Shanghai China
More and more people are using mobile equipments to access business resources from the organization's internal network, how to ensure the data security in the data transport process of mobile intelligent terminals... 详细信息
来源: 评论
Semantic access control for cloud computing based on e-Healthcare
Semantic access control for cloud computing based on e-Healt...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Lili Sun Hua Wang Jianming Yong Guoxin Wu Centre for Systems Biology University of Southern Queensland Toowoomba Australia School of Information Systems University of Southern Queensland Toowoomba Australia School of Computer Science and Engineering & Key Laboratory for Computer Network and Information Integration Southeast Univeristy
With the increased development of cloud computing, access control policies have become an important issue in the security filed of cloud computing. Semantic web is the extension of current Web which aims at automation... 详细信息
来源: 评论
BAsplice: Bi-direction alignment for detecting splice junctions
BAsplice: Bi-direction alignment for detecting splice juncti...
收藏 引用
2012 IEEE 6th International Conference on Systems Biology, ISB 2012
作者: Bu, Jingde Wu, Jiayan Chen, Meili Xiao, Jingfa Yu, Jun Chi, Xuebin Jin, Zhong Supercomputing Center Computer Network Information Center Chinese Academy of Sciences Beijing China CAS Key Laboratory of Genome Sciences and Information Beijing Institute of Genomics Chinese Academy of Sciences Beijing China Graduate University Chinese Academy of Sciences Beijing China
RNA-Seq is a revolutionary whole transcriptome shotgun sequencing technology performed by high-throughput sequencers, which provide more comprehensive information on differential expression of genes and benefit on nov... 详细信息
来源: 评论
Deadline partitioning for periodic messages transmission over Switched Ethernet with non-preemptive EDF
收藏 引用
Journal of Computational information Systems 2012年 第17期8卷 7171-7180页
作者: Tan, Ming Wei, Zhen Hefei University Key Laboratory of Network and Intelligent Information Processing Hefei China Hefei University of Technology School of Computer and Information Hefei China
When applying Switched Ethernet in real-time communications, the switch and the end-nodes schedule the real-time messages using Earliest Deadline First (EDF) algorithm. The problem we are facing is how to divide deadl... 详细信息
来源: 评论
Localization in 3D Sensor networks Using Stochastic Particle Swarm Optimization
收藏 引用
Wuhan University Journal of Natural Sciences 2012年 第6期17卷 544-548页
作者: ZHANG Zhangxue CUI Huanqing Fujian Institute of Scientific and Technology Information Fuzhou 350003FujianChina Fujian Strait Information Technology Co.Ltd.Fuzhou 350003 FujianChina Shandong Computer Science Center Shandong Provincial Key Laboratory of Computer NetworkJinan 250014ShandongChina College of Information Science and Engineering Shandong University of Science and TechnologyQingdao 266590ShandongChina
Localization is one of the key technologies in wireless sensor networks,and the existing PSO-based localization methods are based on standard PSO,which cannot guarantee the global *** the sensor network deployed in a ... 详细信息
来源: 评论
Filter-Based information Selection Mechanism in Publish/Subscribe Middleware
Filter-Based Information Selection Mechanism in Publish/Subs...
收藏 引用
2012 3rd International Conference on information Technology for Manufacturing Systems(ITMS 2012)
作者: Jigang Xiao Yunqing Chen Zhuowei Shen Systems Engineering Research Institute China State Shipbuilding Corporation Key Lab of Computer Network and Information Integration MOE School of Computer Science and Engineering Southeast University
Publish/Subscribe middleware is getting more and more attentions for its feature of loose *** some scenarios,Subscribersof a topic need not all the information belonging to that topic, but only those of interest. To f... 详细信息
来源: 评论
FACIAL EXPRESSION RECOGNITION VIA GABOR WAVELET AND STRUCTURED SPARSE REPRESENTATION
FACIAL EXPRESSION RECOGNITION VIA GABOR WAVELET AND STRUCTUR...
收藏 引用
The 3rd IEEE International Conference on network Infrastructure and Digital Content (2012年第三届IEEE网络基础设施与数字内容国际会议(IEEE IC-NIDC2012))
作者: Ting Chen Fei Su School of Computer Science School of Information and Communication Engineering Beijing Key Laboratory of Network System and Net
Automatically facial expression recognition (FER) has become more and more important today,making machine understand human's emotion by expression having various potential applications,especially in the field of h... 详细信息
来源: 评论