咨询与建议

限定检索结果

文献类型

  • 1,837 篇 会议
  • 1,582 篇 期刊文献

馆藏范围

  • 3,419 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,295 篇 工学
    • 1,682 篇 计算机科学与技术...
    • 1,313 篇 软件工程
    • 613 篇 信息与通信工程
    • 305 篇 电气工程
    • 249 篇 电子科学与技术(可...
    • 230 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 129 篇 网络空间安全
    • 110 篇 仪器科学与技术
    • 109 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 59 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,073 篇 理学
    • 635 篇 数学
    • 244 篇 生物学
    • 228 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 91 篇 化学
  • 673 篇 管理学
    • 389 篇 管理科学与工程(可...
    • 311 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 107 篇 法学
    • 71 篇 社会学
  • 83 篇 医学
    • 68 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 23 篇 军事学
  • 11 篇 文学
  • 10 篇 教育学
  • 9 篇 艺术学

主题

  • 140 篇 feature extracti...
  • 123 篇 semantics
  • 95 篇 accuracy
  • 79 篇 computational mo...
  • 78 篇 training
  • 65 篇 data models
  • 64 篇 deep learning
  • 62 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 visualization
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 privacy
  • 43 篇 security
  • 43 篇 robustness
  • 42 篇 adaptation model...
  • 41 篇 optimization
  • 41 篇 predictive model...

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 166 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 63 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 university of ch...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...

作者

  • 46 篇 zhao yao
  • 41 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,097 篇 英文
  • 190 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3419 条 记 录,以下是3161-3170 订阅
排序:
Attribute-Based Signature with Policy-and-Endorsement Mechanism
收藏 引用
Journal of computer Science & Technology 2010年 第6期25卷 1293-1304页
作者: 王怀习 朱岩 冯荣权 Stephen S.Yau LMAM School of Mathematical SciencesPeking University Electronic Engineering Institute Institute of Computer Science and Technology Peking University Key Laboratory of Network and Software Security Assurance (Peking University) Ministry of Education Information Assurance Center and School of Computing Informatics and Decision Systems Engineering Arizona State University
In this paper a new signature scheme,called Policy-Endorsing Attribute-Based Signature,is developed to correspond with the existing Ciphertext-Policy Attribute-Based *** signature provides a policy-and-endorsement ***... 详细信息
来源: 评论
Bisimulations for open processes in higher order π-calculus
Bisimulations for open processes in higher order π-calculus
收藏 引用
2010 4th International Symposium on Theoretical Aspects of Software Engineering, TASE 2010
作者: Cao, Zining Department of Computer Science and Technology Nanjing University of Aero. and Astro. Nanjing 210016 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China National Key Laboratory of Science and Technology on Avionics System Integration Shanghai 200233 China
In this paper, we propose open bisimulations for open processes in higher order π-calculus. The equivalence of open bisimulations and other bisimulations for open processes is proved. Furthermore, we present a symbol... 详细信息
来源: 评论
Temporal logics and model checking algorithms for ZIAs
Temporal logics and model checking algorithms for ZIAs
收藏 引用
2nd International Conference on Software Engineering and Data Mining, SEDM 2010
作者: Cao, Zining National Key Laboratory of Science and Technology on Avionics System Integration Shanghai 200233 China Department of Computer Science and Technology Nanjing University of Aero. and Astro. Nanjing 210016 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China
In this paper, we first propose a specification approach combining interface automata and Z language. This approach can be used to describe temporal properties and data properties of software components. A branching t... 详细信息
来源: 评论
A key Management Scheme for Multicast Based on Layer 2 Control
A Key Management Scheme for Multicast Based on Layer 2 Contr...
收藏 引用
International Conference on computer and information Technology (CIT)
作者: Cao Zheng Yin Pengpeng Lu Zhengjun School of Computer Science and Engineering South-East University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing China
This paper presents a key management scheme for multicast based on layer 2 control, which includes multicast authentication, secure multicast forwarding tree management, key distribution when users are initialized and... 详细信息
来源: 评论
Push-on-Demand: An enhancement to IEEE 802.11e EDCA for AP downlink access provisioning
收藏 引用
Dongbei Daxue Xuebao/Journal of Northeastern University 2010年 第SUPPL. 2期31卷 275-278+287页
作者: Dong, Yong-Qiang Xiang, Wu Wang, Yun School of Computer Science and Engineering Southeast University Nanjing 210096 China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing 210096 China Financial Bureau Information Center of Lishui Zhejiang Province Lishui 323000 China
In IEEE 802.11e EDCA wireless LANs, the capability of AP for channel access is equivalent to those of ordinary stations, which makes it hard to satisfy the throughput and delay requirements of AP downlink traffic unde... 详细信息
来源: 评论
Refinement checking for interface automata with Z notation
Refinement checking for interface automata with Z notation
收藏 引用
作者: Cao, Zining National Key Laboratory of Science and Technology on Avionics System Integration Shanghai 200233 China Department of Computer Science and Technology Nanjing University of Aero. and Astro. Nanjing 210016 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China
In this paper, we first introduce a specification approach combining interface automata and Z language, which is named ZIA. A refinement relation on ZIAs is proposed. We then give an algorithm for checking refinement ... 详细信息
来源: 评论
P2P-based application-layer multicast tree active update mechanism
P2P-based application-layer multicast tree active update mec...
收藏 引用
International Seminar on Future information Technology and Management Engineering, FITME
作者: Yang, Xianhe Shen, Jun Peng, Wei School of Computer Science and Engineering Southeast University Nanjing Jiangsu China Key Laboratory of Computer Network and Information Integration of Ministry of Education Southeast University Nanjing Jiangsu China
Currently most of the high-bandwidth internet applications use both P2P technology and application-layer multicast technology. Considering the loose coupling between the P2P technology and application-layer multicast ... 详细信息
来源: 评论
Applying multiple residual error gray forecast to restrain endpoints effect in HHT of network traffic
Applying multiple residual error gray forecast to restrain e...
收藏 引用
International Conference on Pervasive Computing, Signal Processing and Applications
作者: Zheng, Kangfeng Wang, Xiujuan Yang, Yixian Guo, Shize Key Laboratory of Network and Information Attack and Defense Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China College of Computer Sciences Beijing University of Technology Beijing 100124 China
Studying the features of network traffic is a necessary method in many applications such as managing and monitoring the network, detecting network attack etc. Due to the non-stationary and random characteristics of th... 详细信息
来源: 评论
A novel term weighting scheme with distributional coefficient for text categorization with support vector machine
A novel term weighting scheme with distributional coefficien...
收藏 引用
2010 IEEE Youth Conference on information, Computing and Telecommunications, YC-ICT 2010
作者: Ping, Yuan Zhou, Ya-Jian Yang, Yi-Xian Peng, Wei-Ping Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China Department of Computer Science and Technology Xuchang University Xuchang 461000 China
In text categorization, vectorizing a document by probability distribution is an effective dimension reduction way to save training time. However, the data sets that share many common keywords between categories affec... 详细信息
来源: 评论
Construction of Semi-Bent Functions with High Algebraic Degrees
收藏 引用
Wuhan University Journal of Natural Sciences 2010年 第6期15卷 476-478页
作者: HE Yefeng MA Wenping Key Laboratory of Computer Network and InformationSecurity of the Ministry of Education Xidian University Xi'an710071 Shaanxi China School of Telecommunications and Information Engineering Xi'an Institute of Posts and Telecommunications Xi'an 710121Shaanxi China
A class of semi-bent functions with an even number of variables is constructed by using the values of Kloosterman *** semi-bent functions are Boolean functions with four trace ***,it is shown that the algebraic degree... 详细信息
来源: 评论