咨询与建议

限定检索结果

文献类型

  • 1,829 篇 会议
  • 1,563 篇 期刊文献

馆藏范围

  • 3,392 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,284 篇 工学
    • 1,674 篇 计算机科学与技术...
    • 1,316 篇 软件工程
    • 613 篇 信息与通信工程
    • 301 篇 电气工程
    • 247 篇 电子科学与技术(可...
    • 232 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 129 篇 网络空间安全
    • 110 篇 仪器科学与技术
    • 109 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 59 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,074 篇 理学
    • 636 篇 数学
    • 244 篇 生物学
    • 228 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 91 篇 化学
  • 675 篇 管理学
    • 391 篇 管理科学与工程(可...
    • 311 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 107 篇 法学
    • 71 篇 社会学
  • 83 篇 医学
    • 68 篇 临床医学
    • 60 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 23 篇 军事学
  • 11 篇 文学
  • 10 篇 教育学
  • 9 篇 艺术学

主题

  • 139 篇 feature extracti...
  • 122 篇 semantics
  • 95 篇 accuracy
  • 78 篇 computational mo...
  • 77 篇 training
  • 65 篇 data models
  • 64 篇 deep learning
  • 61 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 security
  • 42 篇 robustness
  • 41 篇 optimization
  • 41 篇 predictive model...
  • 41 篇 adaptation model...

机构

  • 218 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 166 篇 school of comput...
  • 80 篇 key laboratory o...
  • 64 篇 college of compu...
  • 62 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 fujian provincia...

作者

  • 46 篇 zhao yao
  • 41 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 22 篇 min-ling zhang
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 19 篇 liu ximeng
  • 17 篇 xiaoping li
  • 17 篇 xia chunhe
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,069 篇 英文
  • 191 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3392 条 记 录,以下是3291-3300 订阅
排序:
Novel one-hop transmission algorithm in wireless network based on network coding
收藏 引用
Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition) 2008年 第SUPPL. 1期38卷 213-216页
作者: Lu, Yifei Ju, Xi Tao, Jun Xia, Qin Wang, Cuihan School of Computer Science and Engineering Southeast University Nanjing 211189 China Key Library of Computer Network and Information Integration Nanjing 210096 China
To solve the problem of the efficient transmission in error-prone wireless network, an ideal transmission model based on coding group (ITCG) is proposed in this paper. Furthermore, a retransmission model based on codi... 详细信息
来源: 评论
Node-failure tolerance of topology in wireless sensor networks
收藏 引用
International Journal of network Security 2008年 第2期7卷 261-264页
作者: Wang, Liang-Min Ma, Jian-Feng Guo, Yuan-Bo The Computer School Jiangsu University Zhenjiang 212013 China Key Laboratory of Computer Network and Information Security of Education Ministry Xidian University Xi'an Shaanxi 710071 China School of Electronic Technology Engineering University of PLA Zhengzhou 450004 China
Three basic questions are presented and answered in researching on nodefailure topology in wireless sensor network. First, what is the definition of nodefailure tolerance? Second, how to evaluate this tolerance abilit... 详细信息
来源: 评论
Clustering control algorithm of wireless sensor networks in low probability event scenario
收藏 引用
Jisuanji Yanjiu yu Fazhan/computer Research and Development 2008年 第10期45卷 1662-1668页
作者: Liu, Linfeng Jin, Shan School of Computer Science and Engineering Southeast University Nanjing 210096 China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing 210096 China School of Computer Nanjing University of Posts and Telecommunications Nanjing 210003 China
In order to fulfill the task of prolonging network lifetime, the primary objective of wireless sensor network execution is to consume the battery energy efficiently. The network topology, which is the important founda... 详细信息
来源: 评论
CRMS: A Collusion-Resistant Matrix System for Group key Management in Wireless networks
CRMS: A Collusion-Resistant Matrix System for Group Key Mana...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: W. Wang J. Ma S. Moon Key Laboratory of Computer Networks and Information Security (Ministry of Education) Xidian University Xi'an China Mobile Network Security Technology Research Center Kyungpook National University Daegu South Korea
In this paper, a collusion-resistant matrix system (CRMS) for group key managements is presented. The CRMS is defined as a collection of subsets of users, and the keys held by users in CRMS are organized in a hierarch... 详细信息
来源: 评论
Heuristic cluster control algorithm of wireless sensor networks topology
收藏 引用
Jisuanji Yanjiu yu Fazhan/computer Research and Development 2008年 第7期45卷 1099-1105页
作者: Liu, Linfeng Liu, Ye Key Laboratory of Computer Network and Information Integration Southeast University Nanjing 210096 China School of Computer Science and Engineering Southeast University Nanjing 210096 China Nanjing Research Development Center Alcatel Shanghai Bell Nanjing 210037 China
The main objective of wireless sensor network design is to fulfill the task of prolonging network lifetime. The network topology, which is the important foundation of upper layer protocols, serves as the supportive gr... 详细信息
来源: 评论
Universal provable security authentication protocol for multi-domain
收藏 引用
Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and information Science of Wuhan University 2008年 第10期33卷 1051-1054页
作者: Zhu, Hui Li, Hui Yang, Jiaxi Wang, Yumin Key Laboratory of Computer Network and Information Security Xidian University 2 South Taibai Road Xi'an 710071 China
The problems of existing authentication frameworks are analyzed, and a universal authentication protocol is proposed for the multi-domain. Moreover, entity authentication for cross-domain is supported in the protocol.... 详细信息
来源: 评论
Storage Requirements for key Distribution in Sensor networks
Storage Requirements for Key Distribution in Sensor Networks
收藏 引用
International Conference on Sensor Technologies and Applications, SensorComm
作者: Zhihong Liu Jianfeng Ma Qiping Huang SangJae Moon Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University China School of Communication Engineering Xidian University China Mobile Network Security Technology Research Center Kyungpook National University South Korea
Sensor networks are resource-constrained, which makes developing efficient key distribution scheme a challenging problem. In general, many key distribution techniques are designed to address the trade-off between limi... 详细信息
来源: 评论
Decision support system of variable rate irrigation based on mathematical model and GIS
收藏 引用
IFIP Advances in information and Communication Technology 2008年 259卷 1011-1019页
作者: Zhou, Jianjun Liu, Gang Li, Su Wang, Xiu Zhang, Man Key Laboratory of Modern Precision Agriculture System Integration Research China Agricultural University Beijing100083 China Computer College Beijing Technology and Business University Beijing100037 China National Engineering Research Center for Information Technology in Agriculture Beijing100089 China
Owing to the difference of soil water in the farm, a system of variable rate irrigation was developed with Visual C++ and MapObjects that can save water as well as can improve economy benefit. Soil water content can b... 详细信息
来源: 评论
Trust valuation model in MANET
收藏 引用
Jisuanji Yanjiu yu Fazhan/computer Research and Development 2008年 第5期45卷 765-771页
作者: Ye, Ayong Ma, Jianfeng Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou 350007 China
Being infrastructureless, node trust plays an important role in security and reliability of mobile ad hoc networks. A new trust valuation model based on the experience of node is given to evaluate trustworthiness betw... 详细信息
来源: 评论
Identity (ID)-based threshold multi-secret sharing scheme
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2008年 第10期19卷 2739-2745页
作者: Pang, Liao-Jun Pei, Qing-Qi Jiao, Li-Cheng Wang, Yu-Min Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China Institute of Intelligent Information Processing Xidian University Xi'an 710071 China
In order to avoid the flaw of the secret shadow distribution method in the existing secret sharing schemes, a secret shadow distribution method is proposed with the ID-based public key technology integrated, which use... 详细信息
来源: 评论