咨询与建议

限定检索结果

文献类型

  • 1,856 篇 会议
  • 1,616 篇 期刊文献

馆藏范围

  • 3,472 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,334 篇 工学
    • 1,713 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 623 篇 信息与通信工程
    • 305 篇 电气工程
    • 254 篇 电子科学与技术(可...
    • 249 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 133 篇 网络空间安全
    • 110 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 78 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,085 篇 理学
    • 641 篇 数学
    • 245 篇 生物学
    • 230 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 92 篇 化学
    • 92 篇 系统科学
  • 679 篇 管理学
    • 392 篇 管理科学与工程(可...
    • 314 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 10 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 deep learning
  • 65 篇 data models
  • 64 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 security
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 174 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 38 篇 university of ch...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 33 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang

语言

  • 3,074 篇 英文
  • 266 篇 其他
  • 149 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3472 条 记 录,以下是3051-3060 订阅
排序:
DRTEMBB: Dynamic recommendation trust evaluation model based on bidding
收藏 引用
Journal of Multimedia 2012年 第4期7卷 279-288页
作者: Wang, Gang Gui, Xiao-lin Department of Electronics and Information Engineering Xi'an Jiaotong University Xi'an China Shanxi Province Key Laboratory of Computer Network Xi'an Jiaotong University Xi'an China School of Information Xi'an University of Finance and Economics Xi'an China
Fraud or cheating of malicious nodes were restrained by reducing the trust value of malicious nodes in the past trust model, but few recommendation nodes for cooperation cheating are punished, so it has had only limit... 详细信息
来源: 评论
An new anonymous authentication scheme for cloud computing
An new anonymous authentication scheme for cloud computing
收藏 引用
2012 7th International Conference on computer Science and Education, ICCSE 2012
作者: Zhang, Zhi-Hua Li, Jian-Jun Jiang, Wei Zhao, Yong Gong, Bei China Tobacco Zhejiang Iidustrial Co. Ltd. Hangzhou 310009 China College of Computer Science Beijing University of Technology Beijing 100124 China Key Laboratory of Information and Network Security 3rd Research Institute Ministry of Public Security Beijing 100124 China Beijing 100124 China
Cloud computing is a hot topic of current research, for anonymous authentication is required in many applications scenarios of e-business based on cloud computing, users do not want to expose their identity, users jus... 详细信息
来源: 评论
Semantics-Based Compliance An a lys is o f N e two rk S e cu rity Policy Hie ra rch ie s
收藏 引用
China Communications 2012年 第7期9卷 22-35页
作者: Yao Shan Xia Chunhe Hu Junshun Jiao Jian Li Xiaojian Beijing Key Laboratory of Network Technology Beihang University Beijing 100191 P. R. China Beijing Information Technology University Beijing 100192 P. R. China College of Computer Science and Information Technology Guangxi Normal University Guilin 541004 P. R. China
network security policy and the automated refinement of its hierarchies aims to simplify the administration of security services in complex network environments. The semantic gap between the policy hierarchies reflect... 详细信息
来源: 评论
An improved clustering algorithm based on intersecting circle structure
An improved clustering algorithm based on intersecting circl...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Ze-Jun Yang Ying-long Wang Fu-Meng Zhao Tai-Bo Huang Shandong Province Key Network Laboratory Shandong Computer Science Center Jinan China School of Information Science & Engineering Shandong Normal University Jinan China
A good clustering algorithm can provide the basis for forming a good network topology and target location, improve routing efficiency and greatly reduce energy consumption. For the lack of GAF algorithm, an improved a... 详细信息
来源: 评论
Localization in 3D Sensor networks Using Stochastic Particle Swarm Optimization
Localization in 3D Sensor Networks Using Stochastic Particle...
收藏 引用
第六届中国可信计算与信息安全学术会议
作者: ZHANG Zhangxue CUI Huanqing Fujian Institute of Scientific and Technology Information Fuzhou 350003FujianChina Fujian Strait I Shandong Computer Science Center Shandong Provincial Key Laboratory of Computer NetworkJinan 250014
Localization is one of the key technologies in wireless sensor networks,and the existing PSO-based localization methods are based on standard PSO,which cannot guarantee the global *** the sensor network deployed in a ... 详细信息
来源: 评论
The information hiding based on the behavior of "information recording"
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2012年 第21期6卷 128-134页
作者: Li, Xin Zhang, Ru Niu, Xinxin National Computer network Emergency Response technical Team/Coordination Center of China Beijing China Information Security Center Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Information Network Security Ministry of Public Security Shanghai China Information Security Center Beijing University of Posts and Telecommunications Beijing China
While thinking of the different participants and their behaviors, the information hiding can be taken all over the whole transmissions. The process of the information was analyzed based on this. The analysis suggests ... 详细信息
来源: 评论
Wireless sensor network-enabled intravenous infusion monitoring
Wireless sensor network-enabled intravenous infusion monitor...
收藏 引用
作者: Zhang, Y. Zhang, S.F. Ji, Y. Wu, G.X. Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
Considering that intravenous in blood infusion, usually applied without a proper control of the progress and velocity under unreliable manual monitoring practice, is the most popular and frequent clinical activity thr... 详细信息
来源: 评论
An algorithm based on bit vector decomposition and hash linklist for mining frequent patterns in data streams
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2012年 第22期6卷 570-579页
作者: Ren, Jiadong Zhang, Yuanyuan Yu, Shiying College of Information Science and Engineering Yanshan University Qinhuangdao Hebei 066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao City 066004 China Hebei Provincial S and T Management Information Center 159 Dongfeng Road Shijiazhuang 050021 China
Most of algorithms based on bit vector for mining frequent pattern always produce candidate itemsets and scan the same data repeatedly;this increases the running time and the space consumption. In this paper, an algor... 详细信息
来源: 评论
Inside Cover: A Joint Photoelectron Spectroscopy and Theoretical Study on the Electronic Structure of UCl5−and UCl5(Chem. Asian J. 10/2013)
收藏 引用
Chemistry – An Asian Journal 2013年 第10期8卷
作者: Jing Su Phuong Diem Dau Chao‐Fei Xu Dao‐Ling Huang Hong‐Tao Liu Fan Wei Lai‐Sheng Wang Jun Li Department of Chemistry & Key Laboratory of Organic Optoelectronics and Molecular Engineering of Ministry of Education Tsinghua University Beijing 100084 (China) Department of Chemistry Brown University Providence RI 02912 (USA) Supercomputing Center of the Computer Network Information Center Chinese Academy of Sciences Beijing 100190 (China) William R. Wiley Environmental Molecular Sciences Laboratory Pacific Northwest National Laboratory Richland WA 99352 (USA)
来源: 评论
Cryptanalysis of a fuzzy identity based encryption scheme in the standard model
收藏 引用
Informatica (Netherlands) 2012年 第2期23卷 299-314页
作者: Wang, Xu An Yang, Xiaoyuan Zhang, Minqing Yu, Yong Key Laboratory of Information and Network Security Engineering University of Chinese Armed Police Force Xi'an 710086 China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 China
Fuzzy identity based encryption (FIBE), proposed by Sahai and Waters, is a new kind of identity based encryption. It allows users with identity w can decrypt ciphertext for w' if and only if w is close enough to w... 详细信息
来源: 评论