咨询与建议

限定检索结果

文献类型

  • 1,856 篇 会议
  • 1,616 篇 期刊文献

馆藏范围

  • 3,472 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,334 篇 工学
    • 1,713 篇 计算机科学与技术...
    • 1,326 篇 软件工程
    • 623 篇 信息与通信工程
    • 305 篇 电气工程
    • 254 篇 电子科学与技术(可...
    • 249 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 133 篇 网络空间安全
    • 110 篇 光学工程
    • 110 篇 仪器科学与技术
    • 105 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 78 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,085 篇 理学
    • 641 篇 数学
    • 245 篇 生物学
    • 230 篇 物理学
    • 198 篇 统计学(可授理学、...
    • 92 篇 化学
    • 92 篇 系统科学
  • 679 篇 管理学
    • 392 篇 管理科学与工程(可...
    • 314 篇 图书情报与档案管...
    • 144 篇 工商管理
  • 106 篇 法学
    • 71 篇 社会学
  • 85 篇 医学
    • 69 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 24 篇 军事学
  • 11 篇 教育学
  • 11 篇 文学
  • 10 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 96 篇 accuracy
  • 79 篇 computational mo...
  • 77 篇 training
  • 65 篇 deep learning
  • 65 篇 data models
  • 64 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 neural networks
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 visualization
  • 44 篇 security
  • 43 篇 robustness
  • 42 篇 predictive model...
  • 42 篇 adaptation model...
  • 41 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 174 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 43 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 41 篇 school of comput...
  • 38 篇 university of ch...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 37 篇 zhou deyu
  • 33 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang

语言

  • 3,074 篇 英文
  • 266 篇 其他
  • 149 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3472 条 记 录,以下是3111-3120 订阅
排序:
Defense Against Objective Function Attacks in Cognitive Radio networks
收藏 引用
电子学报(英文版) 2011年 第1期20卷 138-142页
作者: PEI Qingqi LI Hongning MA Jianfeng FAN Kefeng Ministry of Education Key Laboratory of Computer Network and Information Security Xidian University Xi'an China Institute of China Electronic System Engineering Corporation Beijing China China Electronics Standardization Institute Beijing China
Cognitive radio (CR) is a technology for identifying opportunities using the "spectrum holes" for communication by cognition. Consequently, we can in- crease spectrum resource utilization rate with CR. How- ... 详细信息
来源: 评论
miRDeathDB: a database bridging microRNAs and the programmed cell death
miRDeathDB: a database bridging microRNAs and the programmed...
收藏 引用
第五届全国生物信息学与系统生物学学术大会
作者: Jianzhen Xu Yan-Hui Li College of Bioengineering Henan University of Technology Zhengzhou China 450001 Institute of Cardiovascular Sciences and Key Laboratory of Molecular Cardiovascular Sciences Ministry of Education Peking University Health Science Center 38 Xueyuan Road Haidian District Beijing China 100191 Scientific Data Center Computer Network Information Center Chinese Academy of SciencesBeijing China 100190
Background: MicroRNAs (miRNAs) are a class of small non-coding RNAs, which negatively regulate protein coding genes at the posttranscriptional *** tiny regulators have been associated to almost all known physiological... 详细信息
来源: 评论
Traffic classification based on port connection pattern
Traffic classification based on port connection pattern
收藏 引用
International Conference on computer Science and Service System (CSSS)
作者: Guang Cheng Song Wang School of Computer Science & Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Key Laboratory of Computer Network Technology of Jiangsu South-East University Nanjing China
While the traditional Web, Email and other Internet applications are still used large-scale, Internet applications, such as typical P2P resource sharing, streaming, games, instant messaging and other new applications ... 详细信息
来源: 评论
Message redundancy removal of multi-copy routing in delay tolerant MANET
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2011年 第1期18卷 42-48页
作者: YU Hai-zheng MA Jian-feng BIAN Hong Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China College of Mathematics and System Sciences Xinjiang University Urumqi 830046 China School of Mathematical Sciences Xinjiang Normal University Urumqi 830054 China
This article puts forward a new scheme to control message redundancy efficiently in delay tolerant mobile Ad-hoc networks (MANET). The class of networks generally lacks end-to-end connectivity. In order to improve t... 详细信息
来源: 评论
Performance Analysis for Intrusion Target Detection in Wireless Sensor networks
收藏 引用
电子学报(英文版) 2011年 第4期20卷 725-729页
作者: FAN Gaojuan WANG Ruchuan HUANG Haiping SUN Lijuan XIAO Fu College of Computer Nanjing University of Posts and Telecommunications Nanjing Chin School of Computer and Information Engineering Henan University Kaifeng China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Key Laboratory of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications) Ministry of Education of Jiangsu Province Nanjing China
Target detection and field surveillance are among the most prominent applications of wireless sensor networks. The quality of detection achieved by a sensor network can be quantified by evaluating the probability of d... 详细信息
来源: 评论
A two-stage composite heuristic for dual cycling quay crane scheduling problem
A two-stage composite heuristic for dual cycling quay crane ...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Dandan Wang Xiaoping Li Qian Wang School of Computer Science & Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
In this paper, hatch constrained quay crane scheduling problem is considered to minimize makespan with dual cycling, which can improve efficiency of operations and utilization of quay cranes. By analyzing precedence r... 详细信息
来源: 评论
L-WMxD: Lexical based Webmail XSS Discoverer
L-WMxD: Lexical based Webmail XSS Discoverer
收藏 引用
2011 IEEE Conference on computer Communications Workshops, INFOCOM WKSHPS 2011
作者: Tang, Zhushou Zhu, Haojin Cao, Zhenfu Zhao, Shuai Department of Computer Science and Engineering Shanghai Jiao Tong University China Key Laboratory of Information Network Security Ministry of Public Security China
XSS (Cross-Site Scripting) is a major security threat for web applications. Due to lack of source code of web application, fuzz technique has become a popular approach to discover XSS in web application except Webmail... 详细信息
来源: 评论
Three-mobile-beacon assisted weighted centroid localization method in wireless sensor networks
Three-mobile-beacon assisted weighted centroid localization ...
收藏 引用
2011 IEEE 2nd International Conference on Software Engineering and Service Science, ICSESS 2011
作者: Cui, Huan-Qing Wang, Ying-Long Lv, Jia-Liang Mao, Yu-Ming College of Information Science and Engineering Shandong University of Science and Technology Qingdao China Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center Jinan China
Localization is one of the key technologies in wireless sensor networks, and the mobile beacon assisted localization method is promising to reduce the cost. The methods with only one beacon introduce collinearity prob... 详细信息
来源: 评论
A dynamic resource allocation algorithm for database-as-a-service
A dynamic resource allocation algorithm for database-as-a-se...
收藏 引用
2011 IEEE 9th International Conference on Web Services, ICWS 2011
作者: Zhu, Jie Gao, Bo Wang, Zhihu Reinwald, Berthold Guo, Changjie Li, Xiaoping Sun, Wei School of Computer Science and Engineering Southeast University 210096 Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education China IBM Research-China 100193 Beijing China IBM Almaden Research Center 650 Harry Road San Jose CA 95120 United States
In Database-as-a-Service (DBaaS), a large number of tenants share DBaaS resources (CPU, I/O and Memory). While the DBaaS provider runs DBaaS to "share" resources across the entire tenant population to maximi... 详细信息
来源: 评论
Knowledge discovery from noisy datasets
Knowledge discovery from noisy datasets
收藏 引用
2011 International Conference on Automation and Robotics, ICAR 2011
作者: Li, Hong Zong, Yu Chen, Enhong Key Laboratory of Network and Intelligent Information Processing Department of Computer Science and Technology Hefei University 230001 China School of Computer Science and Technology University of Science and Technology of China 230001 China
It is a significant challenges to deal with the noise data in data mining and knowledge discovery applications. Most of previous works on data cleansing and correction have been focused on addressing class noise or at... 详细信息
来源: 评论