咨询与建议

限定检索结果

文献类型

  • 1,856 篇 会议
  • 1,616 篇 期刊文献

馆藏范围

  • 3,472 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,334 篇 工学
    • 1,713 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 623 篇 信息与通信工程
    • 305 篇 电气工程
    • 254 篇 电子科学与技术(可...
    • 249 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 133 篇 网络空间安全
    • 110 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 78 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,085 篇 理学
    • 641 篇 数学
    • 245 篇 生物学
    • 230 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 92 篇 化学
    • 92 篇 系统科学
  • 679 篇 管理学
    • 392 篇 管理科学与工程(可...
    • 314 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 10 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 deep learning
  • 65 篇 data models
  • 64 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 security
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 174 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 38 篇 university of ch...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 33 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang

语言

  • 3,074 篇 英文
  • 266 篇 其他
  • 149 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3472 条 记 录,以下是3071-3080 订阅
排序:
Unlicensed Spectrum Usage Method for Cellular Communication Systems
Unlicensed Spectrum Usage Method for Cellular Communication ...
收藏 引用
International Conference on Wireless Communications, networking and Mobile Computing (WiCom)
作者: Ning Zhang Saisai Ma Jing Xu Bin Zhou Wei Zou Chinese Academy of Sciences Key Laboratory of Wireless Sensor Network & Communication Shanghai China College of Computer and Information Engineering Hohai University Nanjing China Renesas Mobile Corporation Shanghai China
Cellular systems operate on ISM band with the co-existence of wide-deployed WLAN is a promising solution to offload the crowded cellular band, where cellular device acting as virtual a WLAN station contends for WLAN c... 详细信息
来源: 评论
Identity-based proxy cryptosystems with revocability and hierarchical confidentialities
Identity-based proxy cryptosystems with revocability and hie...
收藏 引用
作者: Wang, Lihua Wang, Licheng Mambo, Masahiro Okamoto, Eiji Network Security Research Institute Koganei-shi 184-8795 Japan State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Faculty of Electrical and Computer Engineering Institute of Science and Engineering Kanazawa University Kanazawa-shi 920-1192 Japan School of Systems and Information Engineering University of Tsukuba Tsukuba-shi 305-8573 Japan
Proxy cryptosystems are classified into proxy decryption systems and proxy re-encryption systems on the basis of a proxy's role. In this paper, we propose an ID-based proxy cryptosystem with revocability and hiera... 详细信息
来源: 评论
RFID-based electronic identity security cloud platform in cyberspace
收藏 引用
Journal of networks 2012年 第7期7卷 1131-1138页
作者: Chen, Bing Tan, Chengxiang Jin, Bo Zou, Xiang Dai, Yuebo The 3rd research institute of ministry of public security Shanghai China Key laboratory of information network security Ministry of Public Security Shanghai China Dept. of computer science and engineering Tongji University Shanghai China
With the moving development of networks, especially Internet of Things, electronic identity administration in cyberspace is becoming more and more important. And personal identity management in cyberspace associated w... 详细信息
来源: 评论
The analysis to gamma oscillations induced in high dose DHPG and spike-gamma oscillation relationship
收藏 引用
International Journal of Advancements in Computing Technology 2012年 第20期4卷 553-560页
作者: Wen, Dong Lu, Chengbiao Key Laboratory for Computer Virtual Technology and System Integration of HeBei Province Yanshan University QinhuangdaoHebei 066004 China School of Information Science and Engineering Yanshan University QinhuangdaoHebei 066004 China Institue of Electrical Engineering Yanshan University Qinhuangdao Hebei 066004 China
Neuronal oscillations in the gamma frequency range and spikes have been reported in many cortical areas in the information processing, but the role of spikes play in cortical processing remains unclear. The aim of thi... 详细信息
来源: 评论
Semantic Similarity Analysis between High-Level Model Description Text and Low-Level Implementation Text for network Survivability
Semantic Similarity Analysis between High-Level Model Descri...
收藏 引用
IEEE WIC ACM International Conference on Web Intelligence (WI)
作者: Zhao Wei Chunhe Xia Qing Wei Shan Yao Yujian Zhou State Key Laboratory of Virtual Reality Technology and System Key Laboratory of Beijing Network Technology School of Computer Science and Engineering Beihang University Beijing China Information Center of Ministry of Science and Technology The Ministry of Science and Technology of the Peoples Republic of China Beijing China
The transformation from high-level model description to low-level implementation for network survivability may lead to semantic inconsistency problem, since the method of transformation is based on symbolic transforma...
来源: 评论
High Capacity Steganographic Method Based upon Quantization Error of JPEG
High Capacity Steganographic Method Based upon Quantization ...
收藏 引用
2012年计算机应用与系统建模国际会议
作者: Dong Xiuze Liu Shu Zhang Ru Niu Xinxin Wang Lifeng Information Security Center Beijing University of Posts and Telecommunications Electronic and Information Engineering Department Beijing Electronic Science and Technology Institute Key Laboratory of Information Network Security Ministry of Public Security Computer Science and Technology Department Beijing Electronic Science and Technology Institute
Quantizing Error during the process of JPEG compression is analyzed, and a new information hiding algorithm is proposed based on Quantizing Error of JPEG image. Experimental results show that the proposed algorithm ca... 详细信息
来源: 评论
Sentence alignment for web page text based on vector space model
Sentence alignment for web page text based on vector space m...
收藏 引用
International Conference on computer Science and information Processing (CSIP)
作者: GuanHong Zhang Odbal Department of Computer science and technology Key Laboratory of Network and Intelligent Information Processing Hefei University Hefei Anhui China Hefei Institutes of Physical Science Chinese Academy of Sciences Hefei Anhui China
There exist noisy, unparallel sentences in parallel web pages. Web page structure is subjected to some limitation for sentences alignment task for web page text. The most straightforward way of aligning sentences is u... 详细信息
来源: 评论
An efficient coverage control algorithm for three-dimensional underwater sensor networks
收藏 引用
Advances in information Sciences and Service Sciences 2012年 第10期4卷 393-399页
作者: Xiao, Fu Yang, Yang Sun, Li Wang, Ruchuan Nanjing University of Posts and Telecommunications Nanjing 210003 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210003 China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing 210003 China
Strategy of sensor nodes deployment is directly related to the cost and performance for underwater wireless sensor networks, which is largely determined the various service-quality improvement of wireless sensor netwo... 详细信息
来源: 评论
Overhead Power Line Detection from UAV Video Images
Overhead Power Line Detection from UAV Video Images
收藏 引用
International Conference on Mechatronics and Machine Vision in Practice
作者: Tang Wen YANG Hang YIN Qiu Qi RUAN Jian Da HAN Jun Tong QI Qing YONG Zi Tong WANG Zeng Qi SUN Beijing Key Laboratory of Advanced Information Science and Network Technology Institute of Information Science Beijing Jiaotong University Beijing 100044 China Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing 100044 China State Key Laboratory of Robotics Shenyang Institute of Automation CAS Shenyang 110016 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China
Currently, unmanned aerial vehicles (UAVs) are applied to routine inspection tasks of electric distribution networks. As an important information source, machine vision attracts much attention in the area of the UAV&#... 详细信息
来源: 评论
Alloy-based verification of Web service composition
收藏 引用
Tongxin Xuebao/Journal on Communications 2012年 第SUPPL.2期33卷 1-8页
作者: Cao, Jiu-Xin Wu, Jiang-Lin Wang, Guo-Jin Liu, Bo Yang, Peng-Wei Dong, Dan School of Computer Science and Engineering Southeast University Nanjing 210096 China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing 210096 China Huawei Technologies Co. Nanjing 210012 China
Service composition was the core problem of service computing, the validity and reliability of service composition had become the premise of service execution. A method was presented which utilizes the finite state ma... 详细信息
来源: 评论