咨询与建议

限定检索结果

文献类型

  • 1,829 篇 会议
  • 1,568 篇 期刊文献

馆藏范围

  • 3,397 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,289 篇 工学
    • 1,677 篇 计算机科学与技术...
    • 1,316 篇 软件工程
    • 613 篇 信息与通信工程
    • 301 篇 电气工程
    • 249 篇 电子科学与技术(可...
    • 232 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 129 篇 网络空间安全
    • 110 篇 仪器科学与技术
    • 109 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 59 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,074 篇 理学
    • 636 篇 数学
    • 244 篇 生物学
    • 228 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 91 篇 化学
  • 675 篇 管理学
    • 391 篇 管理科学与工程(可...
    • 311 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 107 篇 法学
    • 71 篇 社会学
  • 83 篇 医学
    • 68 篇 临床医学
    • 60 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 23 篇 军事学
  • 11 篇 文学
  • 10 篇 教育学
  • 9 篇 艺术学

主题

  • 139 篇 feature extracti...
  • 122 篇 semantics
  • 95 篇 accuracy
  • 78 篇 computational mo...
  • 77 篇 training
  • 65 篇 data models
  • 64 篇 deep learning
  • 62 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 security
  • 43 篇 robustness
  • 41 篇 optimization
  • 41 篇 predictive model...
  • 41 篇 adaptation model...

机构

  • 218 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 166 篇 school of comput...
  • 80 篇 key laboratory o...
  • 64 篇 college of compu...
  • 63 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 fujian provincia...

作者

  • 46 篇 zhao yao
  • 41 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 22 篇 min-ling zhang
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 17 篇 xia chunhe
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,074 篇 英文
  • 191 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3397 条 记 录,以下是3231-3240 订阅
排序:
A Road Segmentation and Road Type Identification Approach Based on New-Type Histogram Calculation
A Road Segmentation and Road Type Identification Approach Ba...
收藏 引用
Congress on Image and Signal Processing, CISP
作者: Li Zhang Er-yong Wu School of Computer Science Hangzhou Dianzi University Hangzhou China Zhejiang Provincial Key Laboratory of Information Network Technology University of Zhejiang Hangzhou China
By analyzing the characteristics of off-road images, a new and computationally efficient algorithm of road segmentation and road type identification for autonomous land vehicle (ALV) navigation system based on the pro... 详细信息
来源: 评论
An Algorithm for Evaluating Credibility of CNO Intelligence information Using Bayesian Estimation
An Algorithm for Evaluating Credibility of CNO Intelligence ...
收藏 引用
International Conference on information Science and Engineering (ICISE)
作者: Chunhe Xia Yunyun Sun Shan Yao Songmei Zhang Xiaojian Li Key Laboratory of Beijing Network Technology Beihang University Beijing China College of Computer Science & Information Technology Guangxi Normal University Guilin China
Intelligence activity is one of the most important activities during computer network Operation (CNO) command and decision-making process. Specially, evaluation of Intelligence information credibility is the basic ele... 详细信息
来源: 评论
On Performance-Adaptive flow control for large data transfer in high speed networks
On Performance-Adaptive flow control for large data transfer...
收藏 引用
IEEE International Conference on Performance, Computing and Communications (IPCCC)
作者: Xukang Lu Qishi Wu Nageswara S. V. Rao Zongmin Wang Department of Computer Science University of Memphis Memphis TN USA Computer Science & Mathematics Div Oak Ridge National Laboratory Oak Ridge TN USA Henan Key Laboratory on Information Network University of Zhengzhou Zhengzhou China
Several research and production high-performance networks now provision multi-Gbps dedicated channels to meet the demands of large data transfers in network-intensive applications. However, end users have not seen cor... 详细信息
来源: 评论
A practical electronic payment scheme
A practical electronic payment scheme
收藏 引用
International Symposium on Communications and information Technologies (ISCIT)
作者: Jingwei Liu Kyung Sup Kwak Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an China UWB Wireless Communications Research Center Inha University Incheon South Korea
In this paper, by converse using blind signature, we propose a practical electronic payment scheme for electronic commerce. This scheme is different from the existing schemes used widely in the Internet at present and... 详细信息
来源: 评论
Ideal Perfect Multilevel Threshold Secret Sharing Scheme
Ideal Perfect Multilevel Threshold Secret Sharing Scheme
收藏 引用
The Fifth International Conference on information Assurance and Security(第五届信息保障与安全国际会议)
作者: Changlu Lin Lein Harn Dingfeng Ye Key Laboratory of Network Security and Cryptology Fujian Normal University China State Key Laborat Department of Computer Science Electrical Engineering University of Missouri-Kansas CityUSA State Key Laboratory of Information Security Graduate University of Chinese Academy of SciencesChin
Shamir proposed the first (t, n) threshold secret sharing scheme. Shamir's scheme is ideal and perfect. In this paper, we propose two modifications of Shamir's secret sharing scheme. In our first modification,... 详细信息
来源: 评论
Monocular vision SLAM for large scale outdoor environment
Monocular vision SLAM for large scale outdoor environment
收藏 引用
IEEE International Conference on Mechatronics and Automation
作者: Eryong Wu Wenhui Zhou Guojun Dai Qicong Wang Zhejiang Provincial Key Laboratory of Information Network Technology University of Zhejiang Hangzhou China Department of Computer Science & Technology Hangzhou Dianzi University Hangzhou China Department of Computer Science Xiamen University Xiamen China
We present an algorithm which can realize the monocular vision simultaneous localization and mapping(SLAM) for mobile robot in the large scale outdoor environment. Unused traditional mechanic odometer sensor informati... 详细信息
来源: 评论
Security Analysis of Two Remote User Authentication Schemes Using Bilinear Pairings
Security Analysis of Two Remote User Authentication Schemes ...
收藏 引用
International Conference on Management of e-Commerce and e-Government, ICMECG
作者: Zuowen Tan Key Laboratory of Network Security and Cryptology School of Mathematics and Computer Science Fujian Normal University Fuzhou China School of Information Technology Jiangxi University of Finance and Economics Nanchang Jiangxi China State Key Laboratory of Information Security Institute of Software of Chinese Academy of Sciences Beijing China
Recently, Das et al. and Tseng et al. proposed a remote user authentication scheme using bilinear pairings, respectively. They can provide a flexible password change option to the users without any help from the remot... 详细信息
来源: 评论
Interested Sample Point Pre-Selection Based Dense Terrain Reconstruction for Autonomous Navigation
Interested Sample Point Pre-Selection Based Dense Terrain Re...
收藏 引用
International Symposium on Intelligent information Technology Application, IITA
作者: Lili Lin Wenhui Zhou College of Information and Electronic Engineering Zhejiang Gongshang University Hangzhou China Zhejiang Provincial Key Laboratory of Information Network Technology University of Zhejiang Hangzhou China College of Computer and Software Hangzhou Dianzi University Hangzhou China
This paper addresses the problem of terrain reconstruction for autonomous navigation. Dense stereo matching based terrain reconstruction methods are sensitive to mismatch pixels in disparity map, and consume lots of c... 详细信息
来源: 评论
Towards a Source-Code Oriented Attestation
收藏 引用
China Communications 2009年 第4期6卷 82-87页
作者: Ruan Anbang Shen Qingni Wang Li Qin Chao Gu Liang Chen Zhong School of Software and Microelectronics Peking University Beijing 102600 China Network and Information Security Laboratory Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Key Laboratory of High Confidence Software Technologies of the Ministry of Education Peking University Beijing 100871 China First Research Institute of Ministry of Public Security of China Beijing 100048 China
The Binary-based attestation (BA) mechanism presented by the Trusted Computing Group can equip the application with the capability of genuinely identifying configurations of remote system. However, BA only supports ... 详细信息
来源: 评论
Anonymous and authenticated routing protocol for mobile ad hoc networks
收藏 引用
Tongxin Xuebao/Journal on Communications 2009年 第11 A期30卷 81-85页
作者: Li, Xiao-Qing Li, Hui Ma, Jan-Feng Ministry of Education Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China
Aimed at the anonymous of open environment of mobile ad hoc networks was not considered in the routing protocol of ARAN, and it was a low efficiency protocol in searching a routing. An new anonymous and authenticated ... 详细信息
来源: 评论