咨询与建议

限定检索结果

文献类型

  • 1,829 篇 会议
  • 1,568 篇 期刊文献

馆藏范围

  • 3,397 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,289 篇 工学
    • 1,677 篇 计算机科学与技术...
    • 1,316 篇 软件工程
    • 613 篇 信息与通信工程
    • 301 篇 电气工程
    • 249 篇 电子科学与技术(可...
    • 232 篇 控制科学与工程
    • 222 篇 生物工程
    • 155 篇 机械工程
    • 129 篇 网络空间安全
    • 110 篇 仪器科学与技术
    • 109 篇 光学工程
    • 105 篇 生物医学工程(可授...
    • 83 篇 化学工程与技术
    • 77 篇 动力工程及工程热...
    • 75 篇 交通运输工程
    • 59 篇 安全科学与工程
    • 55 篇 建筑学
  • 1,074 篇 理学
    • 636 篇 数学
    • 244 篇 生物学
    • 228 篇 物理学
    • 197 篇 统计学(可授理学、...
    • 92 篇 系统科学
    • 91 篇 化学
  • 675 篇 管理学
    • 391 篇 管理科学与工程(可...
    • 311 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 107 篇 法学
    • 71 篇 社会学
  • 83 篇 医学
    • 68 篇 临床医学
    • 60 篇 基础医学(可授医学...
  • 58 篇 经济学
    • 58 篇 应用经济学
  • 38 篇 农学
  • 23 篇 军事学
  • 11 篇 文学
  • 10 篇 教育学
  • 9 篇 艺术学

主题

  • 139 篇 feature extracti...
  • 122 篇 semantics
  • 95 篇 accuracy
  • 78 篇 computational mo...
  • 77 篇 training
  • 65 篇 data models
  • 64 篇 deep learning
  • 62 篇 federated learni...
  • 49 篇 protocols
  • 48 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 security
  • 43 篇 robustness
  • 41 篇 optimization
  • 41 篇 predictive model...
  • 41 篇 adaptation model...

机构

  • 218 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 166 篇 school of comput...
  • 80 篇 key laboratory o...
  • 64 篇 college of compu...
  • 63 篇 computer network...
  • 59 篇 college of infor...
  • 57 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 fujian provincia...

作者

  • 46 篇 zhao yao
  • 41 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 22 篇 min-ling zhang
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 17 篇 xia chunhe
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,074 篇 英文
  • 191 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3397 条 记 录,以下是541-550 订阅
排序:
Resource Cooperative Scheduling Optimization Considering Security in Edge Mobile networks  19th
Resource Cooperative Scheduling Optimization Considering Sec...
收藏 引用
19th EAI International Conference on Collaborative Computing: networking, Applications and Worksharing, CollaborateCom 2023
作者: Fang, Cheng Yang, Peng Yi, Meng Du, Miao Li, Bing Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China School of Computer Science and Engineering Southeast University Nanjing China School of Cyber Science and Engineering Southeast University Nanjing China
With the rapid development of technologies such as the Internet of Things and artificial intelligence, the contradiction between limited user computing resources and real-time, fast, and safe processing of large amoun... 详细信息
来源: 评论
Offensive Text Style Transfer based on Unsupervised Learning
Offensive Text Style Transfer based on Unsupervised Learning
收藏 引用
2022 International Conference on Artificial Intelligence and Intelligent information Processing, AIIIP 2022
作者: Zhao, Hanlin Yang, Peng School of Cyber Science and Engineering Southeast University Nanjing China School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China
As the current mainstream social networking method, online social networking brings convenience to people, but also generates negative problems such as language violence. Therefore, offensive text style transfer resea... 详细信息
来源: 评论
Opinions Are Not Always Positive: Debiasing Opinion Summarization With Model-Specific and Model-Agnostic Methods  30
Opinions Are Not Always Positive: Debiasing Opinion Summariz...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Zhang, Yanyue Lai, Yilong Wang, Zhenglin Li, Pengfei Zhou, Deyu He, Yulan School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China Department of Informatics King's College London United Kingdom The Alan Turing Institute United Kingdom
As in the existing opinion summary data set, more than 70% are positive texts, the current opinion summarization approaches are reluctant to generate the negative opinion summary given the input of negative opinions. ... 详细信息
来源: 评论
PIWD: A plugin-based framework for well-designed SPARQL  6
PIWD: A plugin-based framework for well-designed SPARQL
收藏 引用
6th Joint International Conference on Semantic Technology, JIST 2016
作者: Zhang, Xiaowang Song, Zhenyu Feng, Zhiyong Wang, Xin School of Computer Science and Technology Tianjin University Tianjin China School of Computer Software Tianjin University Tianjin300350 China Tianjin Key Laboratory of Cognitive Computing and Application Tianjin China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing211189 China
In the real world datasets (e.g., DBpedia query log), queries built on well-designed patterns containing only AND and OPT operators (for short, WDAO-patterns) account for a large proportion among all SPARQL queries. I... 详细信息
来源: 评论
Coverage Enhancement Strategy Based on Novel Perception and Co-evolution for Multimedia Sensor networks
收藏 引用
电子学报(英文版) 2013年 第1期22卷 135-140页
作者: XIAO Fu WANG Jing SUN Lijuan WANG Ruchuan GUO Jian College of Computer Nanjing University of Posts and Telecommunications Nanjing 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210003 China Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing 210003 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China
Coverage enhancement is one of the hot research topics in wireless multimedia sensor net- works. A novel Coverage-enhancing algorithm based on three-dimensional Directional perception and co-evolution (DPCCA) is propo... 详细信息
来源: 评论
A robust approach for palm ROI extraction based on real-time region learning
收藏 引用
2012 International Conference on Service-Oriented Computing, ICSOC 2012
作者: Yan, Meng Sun, Dongmei Zhao, Shouguo Zhou, Jiajia Key Laboratory of Advanced Information Science and Network Technology of Beijing School of Computer and Information Technology Beijing Jiaotong University China
A palmprint based authentication system that can work with a popular webcam in non-contact acquisition mode is potentially a good choice for biometric ***,this camera based imaging acquisition mode causes the difficul... 详细信息
来源: 评论
Joint Optimization of Latency and Energy Consumption for Mobile Edge Computing Based Proximity Detection in Road networks
收藏 引用
China Communications 2022年 第4期19卷 274-290页
作者: Tongyu Zhao Yaqiong Liu Guochu Shou Xinwei Yao School of Information and Communication Engineering Beijing University of Posts and TelecommunicationsBeijing 100876China Beijing Laboratory of Advanced Information Networks Beijing Key Laboratory of Network System Architecture and ConvergenceBeijing 100876China School of Computer Science and Technology Zhejiang University of TechnologyChina
In recent years, artificial intelligence and automotive industry have developed rapidly, and autonomous driving has gradually become the focus of the industry. In road networks, the problem of proximity detection refe... 详细信息
来源: 评论
Detecting and mitigating a sophisticated interest flooding attack in NDN from the network-wide view  1
Detecting and mitigating a sophisticated interest flooding a...
收藏 引用
1st International Workshop on network Meets Intelligent Computations, NMIC 2019
作者: Cheng, Guang Zhao, Lixia Hu, Xiaoyan Zheng, Shaoqi Wu, Hua Li, Ruidong Fan, Chengyu School of Cyber Science and Engineering Southeast University Nanjing211189 China Key Laboratory of Computer Network and Information Integration Ministry of Education of China Southeast University China Key Laboratory of Computer Network Technology of Jiangsu Province China National Institute of Information and Communications Technology Tokyo184-8795 Japan Computer Science Department Colorado State University Fort Collins United States
Interest Flooding Attack (IFA) is one of the main security threats for the Named Data networking (NDN). Most of its existing countermeasures enable intermediate routers near the attackers to independently detect the a... 详细信息
来源: 评论
Cs 5D_(5/2)-6F 728 nm Laser Spectroscopy with Single Pumping Laser
收藏 引用
Chinese Physics Letters 2017年 第3期34卷 53-56页
作者: 周琦 常鹏媛 刘忠征 张晓刚 祝传文 陈景标 School of Optoelectronic Information University of Electronic Science and Technology of China State Key Laboratory of Advanced Optical Communication System and Network Institute of Quantum ElectronicsSchool of Electronics Engineering & Computer SciencePeking University
The sub-Doppler absorption laser spectroscopy at 728nm transition from the 5D5/2 state to the 6F state of cesium with linewidth near 10 MHz is first experimentally performed with indirect pumping from the ground state... 详细信息
来源: 评论
Task Offloading and Resource Allocation with Privacy Constraints in End-Edge-Cloud Environment  17th
Task Offloading and Resource Allocation with Privacy Constra...
收藏 引用
17th CCF Conference on computer Supported Cooperative Work and Social Computing, ChineseCSCW 2022
作者: Zhu, Xia Sun, Wei Li, Xiaoping School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China School of Cyber Science and Engineering Southeast University Nanjing China
The end-edge-cloud architecture brings an efficient solution to the big data processing problem caused by massive IoT devices. The characteristics of this architecture, such as massive devices, heterogeneous resources... 详细信息
来源: 评论