咨询与建议

限定检索结果

文献类型

  • 1,831 篇 会议
  • 1,603 篇 期刊文献

馆藏范围

  • 3,434 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,323 篇 工学
    • 1,698 篇 计算机科学与技术...
    • 1,320 篇 软件工程
    • 628 篇 信息与通信工程
    • 318 篇 电气工程
    • 257 篇 电子科学与技术(可...
    • 240 篇 控制科学与工程
    • 223 篇 生物工程
    • 158 篇 机械工程
    • 136 篇 网络空间安全
    • 113 篇 光学工程
    • 112 篇 仪器科学与技术
    • 106 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 79 篇 交通运输工程
    • 77 篇 动力工程及工程热...
    • 62 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,090 篇 理学
    • 645 篇 数学
    • 247 篇 生物学
    • 231 篇 物理学
    • 202 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 91 篇 化学
  • 681 篇 管理学
    • 394 篇 管理科学与工程(可...
    • 316 篇 图书情报与档案管...
    • 143 篇 工商管理
  • 108 篇 法学
    • 71 篇 社会学
  • 88 篇 医学
    • 72 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 39 篇 农学
  • 23 篇 军事学
  • 12 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 140 篇 feature extracti...
  • 123 篇 semantics
  • 95 篇 accuracy
  • 79 篇 computational mo...
  • 79 篇 training
  • 66 篇 data models
  • 63 篇 deep learning
  • 63 篇 federated learni...
  • 49 篇 protocols
  • 49 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 predictive model...
  • 43 篇 security
  • 43 篇 robustness
  • 41 篇 optimization
  • 41 篇 adaptation model...

机构

  • 220 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 166 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 computer network...
  • 65 篇 college of compu...
  • 59 篇 college of infor...
  • 59 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 51 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 42 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 university of ch...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 22 篇 min-ling zhang
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 16 篇 niyato dusit
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,111 篇 英文
  • 191 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3434 条 记 录,以下是481-490 订阅
排序:
Study on Multi-Label Classification of Medical Dispute Documents
收藏 引用
computers, Materials & Continua 2020年 第12期65卷 1975-1986页
作者: Baili Zhang Shan Zhou Le Yang Jianhua Lv Mingjun Zhong School of Computer Science and Engineering Southeast UniversityNanjing21189China Key Laboratory of Computer Network and Information Integration of Ministry of Education Southeast UniversityNanjing211189China Research Center for Judicial Big Data Supreme Count of ChinaNanjing211189China University of Lincoln LincolnLN67TSUK
The Internet of Medical Things(IoMT)will come to be of great importance in the mediation of medical disputes,as it is emerging as the core of intelligent medical ***,IoMT can track the entire medical treatment process... 详细信息
来源: 评论
From model to implementation: a network algorithm programming language
收藏 引用
Science China(information Sciences) 2020年 第7期63卷 205-221页
作者: Jian WANG Jie AN Mingshuai CHEN Naijun ZHAN Lulin WANG Miaomiao ZHANG Ting GAN State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences University of Chinese Academy of Sciences School of Software Engineering Tongji University Network Integration Technology Research Department Huawei Technologies Co. Ltd. School of Computer Science Wuhan University
Software-defined networking(SDN) is a revolutionary technology that facilitates network management and enables programmatically efficient network configuration, thereby improving network performance and flexibility. H... 详细信息
来源: 评论
Fair Non-Repudiation for Web Services Transactions
收藏 引用
Wuhan University Journal of Natural Sciences 2010年 第5期15卷 385-392页
作者: SU Ruidan,FU Shaofeng,ZHOU Lihua key laboratory of computer network and information Security of the Ministry of Education,Xidian University,Xi’an 710071,Shaanxi,China Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi’an Shaanxi China
To safeguard the interests of transacting parties,non-repudiation mechanisms need to assure fairness and *** non-repudiation service currently implemented usually does not consider the requirement of fairness and the ... 详细信息
来源: 评论
Improved sparrow search algorithm for RFID network planning
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2023年 第1期30卷 93-102页
作者: Zhang Jiangbo Zheng Jiali Quan Yixuan Lin Zihan Xie Xiaode School of Computer Electrics and InformationGuangxi UniversityNanning 530004China Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi UniversityNanning 530004China
To solve the problem that the performance of the coverage,interference rate,load balance andweak power in the radio frequency identification(RFID)network *** paper proposes an elite opposition-based learning and L... 详细信息
来源: 评论
Practical decoy-state quantum secure direct communication
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2021年 第12期64卷 68-75页
作者: Xin Liu Zijian Li Di Luo Chunfeng Huang Di Ma Minming Geng Junwei Wang Zhenrong Zhang Kejin Wei Guangxi Key Laboratory for Relativistic Astrophysics School of Physical Science and TechnologyGuangxi UniversityNanning 530004China Guangxi Key Laboratory of Multimedia Communications and Network Technology School of ComputerElectronicsand InformationGuangxi UniversityNanning 530004China CAS Quantum Network Co. LtdShanghai 201315China
Quantum secure direct communication(QSDC) has been demonstrated in both fiber-based and free-space channels using attenuated lasers. Decoy-state QSDC by exploiting four decoy states has been proposed to address the pr... 详细信息
来源: 评论
Dual-Mode Resonant Sectorial Monopole Antenna with Stable Backfire Gain
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1478-1486页
作者: Feiyan JI Heng ZHANG Xiuqiong XING Wenjun LU Lei ZHU Jiangsu Key Laboratory of Wireless Communications Nanjing University of Posts and Telecommunications Key Laboratory of Wireless Sensor Network & Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Department of Electrical and Computer Engineering Faculty of Science and Technology University of Macau
A novel design approach to wideband, dual-mode resonant monopole antenna with stable, enhanced backfire gain is advanced. The sectorial monopole evolves from a linear, 0.75-wavelength electric prototype monopole under... 详细信息
来源: 评论
Random mating mayfly algorithm for RFID network planning
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2022年 第5期29卷 40-50页
作者: Xie Xiaode Zheng Jiali Lin Zihan He Siyi Feng Minyu School of Computer Electrics and InformationGuangxi UniversityNanning 530004China Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi UniversityNanning 530004China
In order to improve robustness and efficiency of the radio frequency identification(RFID)network,a random mating mayfly algorithm(RMMA)was ***,RMMA introduced the mechanism of random mating into the mayfly algorithm(M... 详细信息
来源: 评论
Detecting bot-infected machines based on analyzing the similar periodic DNS queries
Detecting bot-infected machines based on analyzing the simil...
收藏 引用
International Conference on Computing, Management and Telecommunications, ComManTel 2015
作者: Tu, Truong Dinh Guang, Cheng Xin, Liang Yi School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing China Department of Information Technologies Tuyhoa Industrial College Phuyen Viet Nam
Modern botnets such as Zeus and Conficker com-monly utilize a technique called domain fluxing or a Domain Generation Algorithm (DGA) to generate a large number of pseudo-random domain names dynamically for botnet oper... 详细信息
来源: 评论
RFID network planning based on improved brain storm optimization algorithm
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2022年 第5期29卷 30-39页
作者: Lin Zihan Zheng Jiali Xie Xiaode Feng Minyu He Siyi School of Computer Electrics and InformationGuangxi UniversityNanning 530004China Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi UniversityNanning 530004China
In order to improve the service quality of radio frequency identification(RFID) systems, multiple objectives should be comprehensively considered. An improved brain storm optimization algorithm GABSO, which incorporat... 详细信息
来源: 评论
BALLKNN:An Efficient and Scalable KNN based on Euclidean Similarity
BALLKNN:An Efficient and Scalable KNN based on Euclidean Sim...
收藏 引用
International Joint Conference on Neural networks
作者: Peipei Lv Peng Yang Yongqiang Dong Liang Gu Key Laboratory of Computer Network and Information Integration (Southeast University)
The K Nearest Neighbor (KNN) technique is very simple, highly efficient and effective in the field of text cate-gorization, pattern recognition, object recognition etc. However, its efficiency is challenged by Big Dat... 详细信息
来源: 评论