咨询与建议

限定检索结果

文献类型

  • 1,856 篇 会议
  • 1,616 篇 期刊文献

馆藏范围

  • 3,472 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,334 篇 工学
    • 1,713 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 623 篇 信息与通信工程
    • 305 篇 电气工程
    • 254 篇 电子科学与技术(可...
    • 249 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 133 篇 网络空间安全
    • 110 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 78 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,085 篇 理学
    • 641 篇 数学
    • 245 篇 生物学
    • 230 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 92 篇 化学
    • 92 篇 系统科学
  • 679 篇 管理学
    • 392 篇 管理科学与工程(可...
    • 314 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 10 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 deep learning
  • 65 篇 data models
  • 64 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 security
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 174 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 38 篇 university of ch...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 33 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang

语言

  • 3,074 篇 英文
  • 266 篇 其他
  • 149 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3472 条 记 录,以下是3041-3050 订阅
排序:
Path planning of mobile anchor in three-dimensional wireless sensor networks for localization
收藏 引用
Journal of information and Computational Science 2012年 第8期9卷 2203-2210页
作者: Cui, Huanqing Wang, Yinglong Lv, Jialiang College of Information Science and Engineering Shandong University of Science and Technology Qingdao 266590 China Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center Ji'nan 250014 China
Node-localization is one of the key technologies of wireless sensor networks, and mobile-anchor assisted localization method is a promising method of saving network cost. The path planning of mobile anchor is a basis ... 详细信息
来源: 评论
Analysis of modular inverse and improvement of extended euclid algorithm
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2012年 第7期6卷 225-233页
作者: Xin, Li Ru, Zhang Xinxin, Niu Junfeng, Xu Information Security Center Beijing University of Posts and Telecommunications China Information Security Center Beijing University of Posts and Telecommunications Key Laboratory of Information Network Security Ministry of Public Security China National Computer network Emergency Response technical Team/Coordination Center of China China
The properties of modular inverse were analyzed and gain to improve the extended Euclid algorithm. In the new scheme, even-reduction and remainder-attenuation were proposed which insured the remainder be attenuated to... 详细信息
来源: 评论
Effect evaluation of one-hop transmission distance vs performance in wireless sensor network
收藏 引用
Tongxin Xuebao/Journal on Communications 2012年 第SUPPL.1期33卷 255-261页
作者: Liu, Zhi-Jie Tao, Jun Chen, Wen-Qiang Key Laboratory of Computer Network and Information Integration of Ministry of China Nanjing 210096 China School of Computer Science and Engineering Southeast University Nanjing 210096 China
The research was on the influence of transmission distance respectively on energy consumption and transmission rate in wireless sensor network. The views of traditional work on this impact was not so precise, which wa... 详细信息
来源: 评论
Detection of selfish nodes based on credit mechanism in opportunistic networks
收藏 引用
Tongxin Xuebao/Journal on Communications 2012年 第SUPPL.2期33卷 217-221页
作者: Tang, Zuo-Yong Yuan, Yi-Jia Dong, Yong-Qiang Wu, Guo-Xin School of Computer Science and Engineering Southeast University Nanjing 211189 China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing 211189 China
The existence of selfish nodes seriously affects the routing performance of opportunistic networks (OppNet). To protect the OppNet against the nodes' selfish behavior, a credit-based selfish nodes detection mechan... 详细信息
来源: 评论
Security Analysis of an Electronic Commerce Protocol Using Casper/FDR2
Security Analysis of an Electronic Commerce Protocol Using C...
收藏 引用
第六届中国可信计算与信息安全学术会议
作者: CHANG Yinlong HU Huaping Department of Mathematics and Computer Science/Key Laboratory of Information Security of Network Sys School of Computer Science National University of Defense TechnologyChangsha 410073HunanChina
Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure *** article extends model checking method with Casper/FDR2 to model an... 详细信息
来源: 评论
Provably secure and effcient identity-based signature scheme based on cubic residues
收藏 引用
International Journal of network Security 2012年 第1期14卷 33-38页
作者: Wang, Zhiwei Wang, Licheng Zheng, Shihui Yang, Yixian Hu, Zhengming Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China College of Computer Nanjing University of Posts and Telecommunications China
Many identity based signature (IBS) schemes have been proposed so far. However, most of the schemes are based on bilinear pairings. Only a few IBS schemes are with-out pairings. Up to now, there still remains a challe... 详细信息
来源: 评论
Performance analysis of vector OFDM with linear MMSE receiver
Performance analysis of vector OFDM with linear MMSE receive...
收藏 引用
2012 1st IEEE International Conference on Communications in China, ICCC 2012
作者: Li, Yabo Ngebani, Ibo Xia, Xiang-Gen Høst-Madsen, Anders Department of Information Science and Electrical Engineering Zhejiang Provincial Key Laboratory of Information Network Technology Zhejiang University Hangzhou Zhejiang China Department of Electrical and Computer Engineering University of Delaware Newark DE 19716 United States Department of Electrical Engineering University of Hawaii at Manoa Honolulu HI 96822 United States Chonbuk National University Jeonju Korea Republic of
Vector OFDM (V-OFDM) for single transmit antenna systems is a general transmission scheme in which OFDM and Single-Carrier Frequency Domain Equalization (SC-FDE) can be considered as two extreme/special cases. Due to ... 详细信息
来源: 评论
Process Calculus with Data Structure and its Model Checking Algorithm
收藏 引用
Physics Procedia 2012年 33卷 782-789页
作者: Qing Zheng Zi-Ning Cao Department of Computer Science and Technology Nanjing University of Aero. & Astro. Nanjing 210016 P.R. China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 P.R. China National Key Laboratory of Science and Technology on Avionics System Integration Shanghai 200233 P.R. China
Model checking is one of the most important technology for automatically verification. So this paper generally proposed a method of combining CCS and Z language, to perform model checking. It combines the advantage of... 详细信息
来源: 评论
Differentiated priority queue management in event-driven wireless sensor networks
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2012年 第SUPPL.期23卷 120-125页
作者: Yang, Qi Dong, Yong-Qiang School of Computer Science and Engineering Southeast University Nanjing 211189 China Key Laboratory of Computer Network and Information Integration of Ministry of Education Southeast University Nanjing 211189 China
In event-driven wireless sensor networks, many redundant packets flow from monitored sites through the network and to the sink, resulting in a typical funnel effect which affects event reliability, negatively. Taking ... 详细信息
来源: 评论
A generic approach for providing revocation support in secret handshake
A generic approach for providing revocation support in secre...
收藏 引用
14th International Conference on information and Communications Security, ICICS 2012
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Ding, Xuhua Zhou, Jianying Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai China School of Information Systems Singapore Management University Singapore Singapore
Privacy protection and user revocation are essentially conflicting requirements in many cryptographic protocols. It is a particularly challenging problem to harmonize them in a secret handshake protocol that is geared... 详细信息
来源: 评论