咨询与建议

限定检索结果

文献类型

  • 1,831 篇 会议
  • 1,603 篇 期刊文献

馆藏范围

  • 3,434 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,323 篇 工学
    • 1,698 篇 计算机科学与技术...
    • 1,320 篇 软件工程
    • 628 篇 信息与通信工程
    • 318 篇 电气工程
    • 257 篇 电子科学与技术(可...
    • 240 篇 控制科学与工程
    • 223 篇 生物工程
    • 158 篇 机械工程
    • 136 篇 网络空间安全
    • 113 篇 光学工程
    • 112 篇 仪器科学与技术
    • 106 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 79 篇 交通运输工程
    • 77 篇 动力工程及工程热...
    • 62 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,090 篇 理学
    • 645 篇 数学
    • 247 篇 生物学
    • 231 篇 物理学
    • 202 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 91 篇 化学
  • 681 篇 管理学
    • 394 篇 管理科学与工程(可...
    • 316 篇 图书情报与档案管...
    • 143 篇 工商管理
  • 108 篇 法学
    • 71 篇 社会学
  • 88 篇 医学
    • 72 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 39 篇 农学
  • 23 篇 军事学
  • 12 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 140 篇 feature extracti...
  • 123 篇 semantics
  • 95 篇 accuracy
  • 79 篇 computational mo...
  • 79 篇 training
  • 66 篇 data models
  • 63 篇 deep learning
  • 63 篇 federated learni...
  • 49 篇 protocols
  • 49 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 predictive model...
  • 43 篇 security
  • 43 篇 robustness
  • 41 篇 optimization
  • 41 篇 adaptation model...

机构

  • 220 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 166 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 computer network...
  • 65 篇 college of compu...
  • 59 篇 college of infor...
  • 59 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 51 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 42 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 university of ch...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 22 篇 min-ling zhang
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 16 篇 niyato dusit
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,111 篇 英文
  • 191 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3434 条 记 录,以下是541-550 订阅
排序:
Queue length based fair queueing in core-stateless networks  4th
Queue length based fair queueing in core-stateless networks
收藏 引用
4th IFIP/IEEE International Conference on Management of Multimedia networks and Services, MMNS 2001
作者: Zhai, Mingyu Gu, Guanqun Yuan, Yuan Department of Computer Science and Engineering Southeast University Nanjing210096 China The Key Laboratory for Computer Networks and Information Integration Ministry of Education China
In this paper, we present Queue Length based Fair Queueing (QLFQ), a scheme to approximate fair bandwidth allocation without per-flow state. We have evaluated QLFQ together with CSFQ and RFQ with several different con... 详细信息
来源: 评论
Voice conversion towards modeling dynamic characteristics using switching state space model
收藏 引用
Science China(information Sciences) 2013年 第12期56卷 237-251页
作者: XU Ning BAO JingYi LIU XiaoFeng JIANG AiMing TANG YiBing College of Computer and Information Engineering Hohai University Ministry of Education Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications School of Electronic Information and Electric Engineering of Changzhou Institute of Technology
In the literature of voice conversion(VC),the method based on statistical Gaussian mixture model(GMM)serves as a ***,one of the inherent drawbacks of GMM is well-known as discontinuity problem,which is caused by trans... 详细信息
来源: 评论
Watermark Embedding for Direct Binary Searched Halftone Images by Adopting Visual Cryptography
收藏 引用
computers, Materials & Continua 2018年 第5期55卷 255-265页
作者: Yangyang Wang Rongrong Ni Yao Zhao Min Xian Beijing Key Laboratory of Advanced Information Science and Network Technology Institute of Information ScienceBeijing Jiaotong UniversityBeijing 100044China Department of Computer Science University of IdahoIdaho FallsID 83402United States
In this paper,two methods are proposed to embed visual watermark into direct binary search(DBS)halftone images,which are called Adjusted Direct Binary Search(ADBS)and Dual Adjusted Direct Binary Search(DADBS).DADBS is... 详细信息
来源: 评论
Secure AODV Routing Protocol Using SL Multi-Signcryption
收藏 引用
电子学报(英文版) 2007年 第2期16卷 311-314页
作者: ZHANG Chuanrong YIN Zhonghai ZHANG Yuqing XIAO Guozhen Telecommunication Engineering Institute A irforce Engineering University Xi ' an 710077 China National Computer Network Intrusion Protection Center GUCAS Beijing 100049 China State Key Laboratory of Integrated Service Networks Xidian University Xi'an 710071 China The Ministry of Education Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China
Routing security is an important issue in secure ad hoc networks, and it appears to be a problem that is not trivial to solve. In this paper, we consider secure routing protocol and applied new cryptographic mechanism... 详细信息
来源: 评论
Load Balanced Coding Aware Multipath Routing for Wireless Mesh networks
收藏 引用
Chinese Journal of Electronics 2015年 第1期24卷 8-12页
作者: SHAO Xing WANG Ruchuan HUANG Haiping SUN Lijuan College of Computer Nanjing University of Posts and Telecommunications College of Information Engneering Yancheng Institutue of Technology Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Lab of Broadband Wireless Communication and Sensor Network Technology
The growth of network coding opportunities is considered the unique optimization goal by most current network coding based routing algorithms for wireless mesh networks. This usually results in flows aggregation probl... 详细信息
来源: 评论
A PSO Based Multi-Domain Virtual network Embedding Approach
收藏 引用
China Communications 2019年 第4期16卷 105-119页
作者: Yongjing Ni Guoyan Huang Sheng Wu Chenxi Li Peiying Zhang Haipeng Yao College of Information Science and Engineering Yanshan University College of Information Science and Engineering Hebei University of Science and Technology The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University School of Information and Communication Engineering Beijing University of Posts and Telecommunications College of Computer & Communication Engineering China University of Petroleum (East China)
This paper proposed a multi-domain virtual network embedding algorithm based on multi-controller SDN architecture. The local controller first selects candidate substrate nodes for each virtual node in the domain. Then... 详细信息
来源: 评论
Motiviting Others Drives Jamshidi [SMC Innovators]
收藏 引用
IEEE Systems, Man, and Cybernetics Magazine 2015年 第3期1卷 67-72页
作者: M.E. El-Hawary School of Computer Science and Engineering Southeast University China Ministry of Education Key Laboratory of Computer Network and Information Integration China
Presents an interview conducted with Dr. Jamshidi.
来源: 评论
Novel way to research nonlinear feedback shift register
收藏 引用
Science China(information Sciences) 2014年 第9期57卷 161-174页
作者: ZHAO DaWei PENG HaiPeng LI LiXiang HUI SiLi YANG YiXian Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Zhejiang Provincial Key Lab of Data Storage and Transmission Technology Hangzhou Dianzi University National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center
In this paper,we regard the nonlinear feedback shift register(NLFSR)as a special Boolean network,and use semi-tensor product of matrices and matrix expression of logic to convert the dynamic equations of NLFSR into an... 详细信息
来源: 评论
Mobile Anchor Assisted Localization in Wireless Sensor networks with Regular Polygon Path
Mobile Anchor Assisted Localization in Wireless Sensor Netwo...
收藏 引用
2013 IEEE 4th International Conference on Software Engineering and Service Science
作者: Huanqing Cui Chuan'ai Zhou Xiaojing Meng Rong Hua Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center College of Information Science and Engineering Shandong University of Science and Technology
Mobile anchor assisted localization methods for wireless sensor networks can decrease the cost while improving the accuracy,and the moving trajectory is an interesting and basic issue in this kind of *** paper propose... 详细信息
来源: 评论
Adaptive Group Personalization for Federated Mutual Transfer Learning  41
Adaptive Group Personalization for Federated Mutual Transfer...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Xu, Haoqing Shen, Dian Wang, Meng Wang, Beilun School of Computer Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China College of Design and Innovation Tongji University Shanghai China
Mutual transfer learning aims to improve prediction with knowledge from related domains. Recently, federated learning is applied in this field to address the communication and privacy concerns. However, previous clust... 详细信息
来源: 评论