咨询与建议

限定检索结果

文献类型

  • 1,837 篇 会议
  • 1,582 篇 期刊文献

馆藏范围

  • 3,419 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,295 篇 工学
    • 1,682 篇 计算机科学与技术...
    • 1,313 篇 软件工程
    • 613 篇 信息与通信工程
    • 305 篇 电气工程
    • 249 篇 电子科学与技术(可...
    • 230 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 129 篇 网络空间安全
    • 110 篇 仪器科学与技术
    • 109 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 59 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,073 篇 理学
    • 635 篇 数学
    • 244 篇 生物学
    • 228 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 91 篇 化学
  • 673 篇 管理学
    • 389 篇 管理科学与工程(可...
    • 311 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 107 篇 法学
    • 71 篇 社会学
  • 83 篇 医学
    • 68 篇 临床医学
    • 59 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 23 篇 军事学
  • 11 篇 文学
  • 10 篇 教育学
  • 9 篇 艺术学

主题

  • 140 篇 feature extracti...
  • 123 篇 semantics
  • 95 篇 accuracy
  • 79 篇 computational mo...
  • 78 篇 training
  • 65 篇 data models
  • 64 篇 deep learning
  • 62 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 visualization
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 privacy
  • 43 篇 security
  • 43 篇 robustness
  • 42 篇 adaptation model...
  • 41 篇 optimization
  • 41 篇 predictive model...

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 166 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 63 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 university of ch...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...

作者

  • 46 篇 zhao yao
  • 41 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 27 篇 yang yang
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 18 篇 xia chunhe
  • 17 篇 xiaoping li
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,097 篇 英文
  • 190 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3419 条 记 录,以下是3181-3190 订阅
排序:
Performance analysis of OFDMA system in next generation wireless communication networks
Performance analysis of OFDMA system in next generation wire...
收藏 引用
International Conference on computer Science and information Technology (CSIT)
作者: Henriques Marcelino Zeng Hua-shen Guan Yanbin Computer & Information School Si Chuan Network Communication Technology Key Laboratory Southwest Jiaotong University Chengdu China
Although many researchers have written about OFDMA transmission system, it needs more attention and analysis in next generation wireless networks. This paper is aimed at studying the performance analysis of OFDMA in W... 详细信息
来源: 评论
Schedulability analysis for real-time messages over switched Ethernet with EDF scheduling
Schedulability analysis for real-time messages over switched...
收藏 引用
International Conference on information Science and Engineering (ICISE)
作者: Ming Tan Zhen Wei Key Laboratory of Network and Intelligent Information Processing Hefei University Hefei China School of Computer and Information Hefei University of Technology Hefei China
To overcome the drawback that switched Ethernet can not meet the real-time requirements in industrial communications, an improved message transmission model in which switch and the end-nodes control the real-time traf... 详细信息
来源: 评论
Integrity Measurement Model Based on Trusted Virtual Platform
Integrity Measurement Model Based on Trusted Virtual Platfor...
收藏 引用
International Conference on Genetic and Evolutionary Computing (ICGEC)
作者: Gang Qiu Yulei Wang Lihua Zhou Ministry of Education Key Laboratory of Computer Network & Information Security Xidian University Xi'an China Network Information Center Nanyang Institute of Technology Nanyang China School of Computer Science and Technology Xidian University Xi'an China
A secure and trusted execution environment is a fundamental requirement for distributed network, so that the integrity of service provider platform should be verified prior to services' distribution in order to as... 详细信息
来源: 评论
Effects of Image Lossy Compression on Palmprint Verification Performance
Effects of Image Lossy Compression on Palmprint Verification...
收藏 引用
2010 IEEE International Conference on information Theory and information Security(2010 IEEE 国际信息论与信息安全会议)
作者: Jizhi Wang Hengjian Li Yinglong Wang Jiashu Zhang Shandong Provincial Key Laboratory of computer Network Shandong Computer Science Center Jinan China Sichuan Province Key Lab of Signal & Information Processing Southwest Jiaotong University Chengdu
In this paper, we investigate the effects that the lossy image compression has on the performance competitive codes of palmprint verification algorithms. Effects of lossy compression on palmprint recognition performan... 详细信息
来源: 评论
An Authenticated Dynamic key Management Scheme for Clustered Sensor networks
收藏 引用
China Communications 2010年 第4期7卷 7-17页
作者: ZHOU Yajian PAN Anwei LI Jiguo Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing 100876 China College of Computer & Information Engineering Hohai University Nanjing 210098 China
Secure sensor networks has received much attention in the last few years.A sensor network always works unattended possibly in a hostile environment such as a *** such environments,sensor networks are subject to node *... 详细信息
来源: 评论
News filtering and summarization on the Web
News filtering and summarization on the Web
收藏 引用
作者: Wu, Xindong Wu, Gong-Qing Xie, Fei Zhu, Zhu Hu, Xue-Gang Lu, Hao Li, Huiqian School of Computer Science and Information Engineering Hefei University of Technology China Zhejiang Taobao Network China Key Laboratory of Complex Systems and Intelligence Science Institute of Automation Chinese Academy of Sciences China Center for Social Computing and Parallel Systems Institute of Automation Chinese Academy of Sciences China
The news filtering and summarization (NFAS) system can automatically recognize Web news pages, retrieve each news page's title and news content, and extract key phrases. This extraction method substantially outper...
来源: 评论
Constructions of Maiorana-McFarland's Bent Functions of Prescribed Degree
Constructions of Maiorana-McFarland's Bent Functions of Pres...
收藏 引用
International Conference on Computational Intelligence and Security
作者: Feng-rong Zhang Yu-pu Hu Hua Ma Min Xie Key laboratory of computer network and information security Ministry of Education Xidian University Xi'an China School of science Xidian University Xi'an China
A Boolean function with an even number n = 2k of variables is called Bent if it is maximally nonlinear. A technique on constructing Maiorana-McFarland's Bent functions of arbitrary degree is described. Based on th... 详细信息
来源: 评论
Bundle transport model of satellite delay tolerant networks
Bundle transport model of satellite delay tolerant networks
收藏 引用
International Conference on Future computer and Communication, ICFCC
作者: Haizheng Yu Jianfeng Ma Hong Bian Key Laboratory of Computer Network and Information Security Xidian University Xi'an China School of Mathematical Sciences Xinjiang Normal University Urumqi China
The data is transmitted between a small satellite near earth and the ground stations. For transmitting reliably, the data is divided into many fragments, and these fragments are encapsulated as multiple bundles with t... 详细信息
来源: 评论
RETRACTED ARTICLE: Reliability-based CBM system design for feed water pump
RETRACTED ARTICLE: Reliability-based CBM system design for f...
收藏 引用
作者: Qin, Jinlei Niu, Yuguang Li, Zheng Information and Network Management Center North China Electric Power University Baoding China Key Laboratory of Condition Monitoring and Control for Power Plant Equipment Ministry of Education North China Electric Power University Beijing China Department of Computer Science and Technology North China Electric Power University Beijing China
The condition-based maintenance (CBM) technique has been widely used in the power plant in China. Feed water pump is one of the most important general requirements in the power plant. its reliability plays an importan... 详细信息
来源: 评论
Improving Efficiency of Security Schemes in Automated Trust Negotiation
Improving Efficiency of Security Schemes in Automated Trust ...
收藏 引用
International Workshop on Education Technology and computer Science, ETCS
作者: Bailing Liu Hongwei Lu Yizhu Zhao Feng Ge College of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Key Laboratory of Information Network Security Ministry of Public Security Shanghai China
Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. When... 详细信息
来源: 评论