咨询与建议

限定检索结果

文献类型

  • 1,828 篇 会议
  • 1,577 篇 期刊文献

馆藏范围

  • 3,405 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,295 篇 工学
    • 1,683 篇 计算机科学与技术...
    • 1,319 篇 软件工程
    • 616 篇 信息与通信工程
    • 304 篇 电气工程
    • 249 篇 电子科学与技术(可...
    • 236 篇 控制科学与工程
    • 223 篇 生物工程
    • 157 篇 机械工程
    • 130 篇 网络空间安全
    • 111 篇 仪器科学与技术
    • 107 篇 光学工程
    • 106 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 77 篇 交通运输工程
    • 60 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,080 篇 理学
    • 640 篇 数学
    • 246 篇 生物学
    • 229 篇 物理学
    • 199 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 89 篇 化学
  • 672 篇 管理学
    • 387 篇 管理科学与工程(可...
    • 313 篇 图书情报与档案管...
    • 140 篇 工商管理
  • 107 篇 法学
    • 71 篇 社会学
  • 87 篇 医学
    • 72 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 39 篇 农学
  • 23 篇 军事学
  • 12 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 138 篇 feature extracti...
  • 123 篇 semantics
  • 94 篇 accuracy
  • 78 篇 computational mo...
  • 77 篇 training
  • 64 篇 data models
  • 62 篇 deep learning
  • 60 篇 federated learni...
  • 49 篇 protocols
  • 49 篇 clustering algor...
  • 47 篇 data mining
  • 46 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 43 篇 privacy
  • 42 篇 robustness
  • 41 篇 optimization
  • 41 篇 predictive model...
  • 41 篇 security
  • 40 篇 wireless sensor ...

机构

  • 217 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 165 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 63 篇 computer network...
  • 61 篇 key laboratory o...
  • 59 篇 college of infor...
  • 56 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 44 篇 key laboratory o...
  • 43 篇 school of cyber ...
  • 42 篇 the key laborato...
  • 42 篇 institute of inf...
  • 39 篇 school of comput...
  • 37 篇 university of ch...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...

作者

  • 47 篇 zhao yao
  • 42 篇 ren jiadong
  • 36 篇 zhou deyu
  • 27 篇 zhang min-ling
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 24 篇 guo wenzhong
  • 22 篇 min-ling zhang
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 guo kun
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 zhang zhenrong
  • 19 篇 du bo
  • 17 篇 xiaoping li
  • 17 篇 liu ximeng
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan
  • 16 篇 xia chunhe

语言

  • 3,086 篇 英文
  • 188 篇 其他
  • 146 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3405 条 记 录,以下是311-320 订阅
排序:
Execution recovery in transactional composite service
Execution recovery in transactional composite service
收藏 引用
2013 IEEE 20th International Conference on Web Services, ICWS 2013
作者: Cao, Jiuxin Zhou, Tao Zhu, Gongrui Liu, Bo Luo, Junzhou School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration of MoE of China Southeast University Nanjing 211189 China
In the composite service which runs for a long time under the heterogeneous and loose-coupled circumstance, the failure of service tends to occur. The transaction and recovery mechanism is urgently needed in order to ... 详细信息
来源: 评论
Enhancing Security of FPGA-Based Embedded Systems with Combinational Logic Binding
收藏 引用
Journal of computer Science & Technology 2017年 第2期32卷 329-339页
作者: Ji-Liang Zhang Wei-Zheng Wang Xing-Wei Wang Zhi-Hua Xia Software College Northeastern University Shenyang 110169 China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education Nanjing 210096 China Department of Computer and Communication Engineering Changsha University of Science and Technology Changsha 410014 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China
With the increasing use of field-programmable gate arrays (FPGAs) in embedded systems and many embedded applications, the failure to protect FPGA-based embedded systems from cloning attacks has brought serious losse... 详细信息
来源: 评论
A Traffic Flow Prediction Based Task Offloading Method in Vehicular Edge Computing  18th
A Traffic Flow Prediction Based Task Offloading Method in V...
收藏 引用
18th CCF Conference on computer Supported Cooperative Work and Social Computing, ChineseCSCW 2023
作者: Xie, Liqiong Chen, Long Li, Xiaoping Wang, Shuang School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing211189 China
Vehicular Edge Computing (VEC) emerges as a promising paradigm by deploying computation and storage resources on edge servers located in close proximity to vehicles, such as roadside units or base stations. This proxi... 详细信息
来源: 评论
A Prediction-Based Fuzzy Method for Multi-objective Microservice Workflows Scheduling  18th
A Prediction-Based Fuzzy Method for Multi-objective Microse...
收藏 引用
18th CCF Conference on computer Supported Cooperative Work and Social Computing, ChineseCSCW 2023
作者: Xu, Jingwen Chen, Long Li, Xiaoping Wang, Shuang School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing211189 China
Microservice workflows are widely used in real-time mobile computing scenarios such as face recognition and speech recognition. The key challenge is to develop efficient, stable, and robust algorithms capable of handl... 详细信息
来源: 评论
Adaptive sampling for openflow network measurement methods  17
Adaptive sampling for openflow network measurement methods
收藏 引用
12th International Conference on Future Internet Technologies, CFI 2017
作者: Cheng, Guang Yu, Jun School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing211198 China
OpenFlow provides a statistics collection scheme for per-flow and aggregate metrics at a user-specified frequency. However, periodic polling for flow statistics cannot well balance the tradeofi between measurement acc... 详细信息
来源: 评论
Enabling fast recovery from unanticipated data access failure in named data networking  16
Enabling fast recovery from unanticipated data access failur...
收藏 引用
11th International Conference on Future Internet Technologies, CFI 2016
作者: Hu, Xiaoyan Gong, Jian School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China Jiangsu Provincial Key Laboratory of Computer Network Technology China
We show that an aggregated Interest in Named Data networking (NDN) may fail to retrieve desired data as the Interest sent upstream in advance is recognized as a duplicate one due to its multipath forwarding and droppe... 详细信息
来源: 评论
key-insulated aggregate signature
收藏 引用
Frontiers of computer Science 2014年 第5期8卷 837-846页
作者: Huiyan ZHAO Jia YU Shaoxia DUAN Xiangguo CHENG Rong HAO College of Information Engineering Qingdao University Qingdao 266071 China Shandong Provincial Key Laboratory of Computer Network Jinan 250014 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China
In order to minimize the damage caused by key exposure in aggregate signatures, a key-insulated aggregate signature scheme is proposed in this paper. We give the def- inition and the security model of the key-insulate... 详细信息
来源: 评论
A Provably Secure General Construction for key Exchange Protocols Using Smart Card and Password
收藏 引用
Chinese Journal of Electronics 2017年 第2期26卷 271-278页
作者: ZHANG Gefei FAN Dan ZHANG Yuqing LI Xiaowei National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences
key exchange protocols using both smart card and password are widely used nowadays since they provide greater convenience and stronger security than protocols using only a *** of these protocols are often limited to s... 详细信息
来源: 评论
Prediction of Individual Halo Concentrations Across Cosmic Time Using Neural networks
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Tianchi Mao, Tianxiang Xu, Wenxiao Li, Guan Beijing Planetarium Beijing Academy of Science and Technology Beijing100044 China Key Laboratory for Computational Astrophysics National Astronomical Observatories Chinese Academy of Sciences Beijing100012 China School of Science Chongqing University of Posts and Telecommunications Chongqing400065 China Computer Network Information Center Chinese Academy of Sciences Beijing100083 China University of Chinese Academy of Sciences Beijing101408 China
The concentration of dark matter haloes is closely linked to their mass accretion history. We utilize the halo mass accretion histories from large cosmological N-body simulations as inputs for our neural networks, whi... 详细信息
来源: 评论
An SDN Oriented Loop Detection Mechanism Based on TTL Statistics
收藏 引用
China Communications 2020年 第6期17卷 1-12页
作者: Tao Yu Longfei Yu Diyue Chen Hongyan Cui Jilong Wang Institute of Network Science and Cyberspace Tsinghua UniversityBeijing 100084China Beijing Advanced Information Network Key Laboratory School of Information and Communication EngineeringBeijing University of Posts and TelecommunicationsBeijing 100876China Network System Architecture and Integration Beijing Key Laboratory Beijing 100876China
The rise of the network has injected new impetus into the development of traditional *** to the complexity of the network itself and its network programmability,there is a risk of routing loops occurring in the SDN **... 详细信息
来源: 评论