咨询与建议

限定检索结果

文献类型

  • 1,831 篇 会议
  • 1,603 篇 期刊文献

馆藏范围

  • 3,434 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,323 篇 工学
    • 1,698 篇 计算机科学与技术...
    • 1,320 篇 软件工程
    • 628 篇 信息与通信工程
    • 318 篇 电气工程
    • 257 篇 电子科学与技术(可...
    • 240 篇 控制科学与工程
    • 223 篇 生物工程
    • 158 篇 机械工程
    • 136 篇 网络空间安全
    • 113 篇 光学工程
    • 112 篇 仪器科学与技术
    • 106 篇 生物医学工程(可授...
    • 84 篇 化学工程与技术
    • 79 篇 交通运输工程
    • 77 篇 动力工程及工程热...
    • 62 篇 安全科学与工程
    • 56 篇 建筑学
  • 1,090 篇 理学
    • 645 篇 数学
    • 247 篇 生物学
    • 231 篇 物理学
    • 202 篇 统计学(可授理学、...
    • 93 篇 系统科学
    • 91 篇 化学
  • 681 篇 管理学
    • 394 篇 管理科学与工程(可...
    • 316 篇 图书情报与档案管...
    • 143 篇 工商管理
  • 108 篇 法学
    • 71 篇 社会学
  • 88 篇 医学
    • 72 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 59 篇 经济学
    • 59 篇 应用经济学
  • 39 篇 农学
  • 23 篇 军事学
  • 12 篇 教育学
  • 11 篇 文学
  • 9 篇 艺术学

主题

  • 140 篇 feature extracti...
  • 123 篇 semantics
  • 95 篇 accuracy
  • 79 篇 computational mo...
  • 79 篇 training
  • 66 篇 data models
  • 63 篇 deep learning
  • 63 篇 federated learni...
  • 49 篇 protocols
  • 49 篇 clustering algor...
  • 47 篇 data mining
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 visualization
  • 44 篇 privacy
  • 43 篇 predictive model...
  • 43 篇 security
  • 43 篇 robustness
  • 41 篇 optimization
  • 41 篇 adaptation model...

机构

  • 220 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 166 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 computer network...
  • 65 篇 college of compu...
  • 59 篇 college of infor...
  • 59 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 51 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 42 篇 the key laborato...
  • 40 篇 school of comput...
  • 37 篇 university of ch...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...

作者

  • 48 篇 zhao yao
  • 41 篇 ren jiadong
  • 36 篇 zhou deyu
  • 29 篇 zhang min-ling
  • 27 篇 yang yang
  • 26 篇 cong runmin
  • 24 篇 guo wenzhong
  • 22 篇 min-ling zhang
  • 21 篇 xiaoming wu
  • 21 篇 guang cheng
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 19 篇 geng xin
  • 19 篇 wang yun
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 xiaoping li
  • 16 篇 niyato dusit
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan

语言

  • 3,111 篇 英文
  • 191 篇 其他
  • 147 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration"
3434 条 记 录,以下是551-560 订阅
排序:
Resource allocation model based on non-cooperative bidding game in P2P network
Resource allocation model based on non-cooperative bidding g...
收藏 引用
International Symposium on Advances in computer and Sensor networks and Systems, 2008
作者: Jun, Tao Hang, Chen JiaGao, Wu School of Computer Science and Engineering Southeast University Nanjing 210096 China Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing 210096 China College of Computer Nanjing University of Posts and Telecommunications Nanjing 210003 China
Game theory is applied to studying the P2P resource allocation technologies further in this paper. The mechanism of P2P resource pricing, which shows the relation of supply and demand, was presented based on bidding. ... 详细信息
来源: 评论
Remote gas meter reading system based on zigbee networks
Remote gas meter reading system based on zigbee networks
收藏 引用
2012 Spring World Congress on Engineering and Technology, SCET 2012
作者: Cai, Shun Zhang, Sanfeng Huang, Di Yu, Shaofeng College of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China College of Software Engineering Southeast University Nanjing China
recently, intelligent home instruments developed fast and have been deployed widely while a crucial problem of how dealing the left devices and properties come up to the top of the water. This paper presents a remote ... 详细信息
来源: 评论
Zigbee enabled remote temperature monitor system for high-voltage substations
Zigbee enabled remote temperature monitor system for high-vo...
收藏 引用
2012 Spring World Congress on Engineering and Technology, SCET 2012
作者: Jun, Zhang Wei, Dai Di, Huang Sanfeng, Zhang Yi, Ji College of Software Engineering Southeast University Nanjing China College of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China
in high-voltage substations, poor contacts at the junctions of contacts can generate heat leading to high temperature, arc and fire disaster in serious condition. In this paper, we present a remote temperature monitor... 详细信息
来源: 评论
A new operator for ABox revision in DL-Lite  26
A new operator for ABox revision in DL-Lite
收藏 引用
26th AAAI Conference on Artificial Intelligence and the 24th Innovative Applications of Artificial Intelligence Conference, AAAI-12 / IAAI-12
作者: Gao, Sibei Qi, Guilin Wang, Haofen Key Laboratory of Computer Network and Information Integration of State Education Ministry School of Computer Science and Engineering Southeast University China SiPaiLou #2 Nanjing 210096 China Shanghai Jiao Tong University Shanghai China
In this paper, we propose a new operator for revising ABoxes in DL-Lite ontologies. We present a graph-based algorithm for ABox revision in DL-Lite, which implements the revision operator and we show it runs in polyno... 详细信息
来源: 评论
Electronic Payment Scheme to Prevent the Treachery
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1745-1748页
作者: FAN Kai ZHANG Jun KOU Weidong XIAO Guozhen Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 Shaanxi China
Treachery is one of the restrictions to the development of electronic commerce. To prevent the treachery from the participants in electronic commerce, in this paper a secure electronic payment scheme is proposed and i... 详细信息
来源: 评论
High-Order Bit Independence Criterion Test for the S-boxes
收藏 引用
Wuhan University Journal of Natural Sciences 2011年 第5期16卷 447-451页
作者: GAO Sheng MA Wenping ZHU Jiwei Key Laboratory of Computer Network and Information Securityof the Ministry of Education/Xidian University Xi'an 710071Shannxi China
A new security test for the substitution boxes (S-boxes) high-order bit independence criterion (HOBIC) test, is presented. Different from the previous security tests for S-boxes, the HOBIC test can be used to meas... 详细信息
来源: 评论
Fiber-coupler-based microfluidic system for trapping of DNA biomolecules
收藏 引用
Optoelectronics Letters 2019年 第6期15卷 476-480页
作者: WU Ji-xuan WANG Qian SONG Bin-bin LIU Bo ZHANG Hao ZHANG Cheng DUAN Shao-xiang BAI Hua Tianjin Key Laboratory of Optoelectronic Detection Technology and Systems Tianjin Key Laboratory of Engineering Technologies for Cell Phamaceutica College of Electronic and Information Engineering Tianjin Polytechnic University Key Laboratory of Computer Vision and Systems Ministry of Education School of Computer Science and Engineering Tianjin University of Technology Key Laboratory of Optoelectronic Sensor and Sensing Network Technology College of Electronic Information and Optical Engineering Nankai University
A miniature fiber-coupler-based microfluidic system is proposed for trapping of DNA biomolecules. The loop-shaped fiber-coupler is fabricated by using flame tapering technique and integrated in a microfluidic channel.... 详细信息
来源: 评论
Improvement of CORBA audio/vided streaming service
收藏 引用
Jisuanji Gongcheng/computer Engineering 2006年 第5期32卷 207-209+228页
作者: Chu, Zi Feng, Mingzheng Dai, Jiangpeng Department of Computer Science and Engineering Southeast University Nanjing 210096 China Key Laboratory for Computer Network and Information Integration Nanjing 210096 China
The paper makes two contributions to the study of A/V streaming service: (1) introduces a service management mechanism for monitoring and controlling resource utilities to enhance quality of service guarantees;(2) imp... 详细信息
来源: 评论
A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution
收藏 引用
Science China(information Sciences) 2017年 第4期60卷 60-70页
作者: Weidong FANG Wuxiong ZHANG Yang YANG Yang LIU Wei CHEN Key Laboratory of Wireless Sensor Network & Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Shanghai Research Center for Wireless Communication School of Computer Science and Technology China University of Mining and Technology
Compared with the encryption and the authentication which can prevent the external attacks,the trust management schemes are the better approaches for defending against the internal attacks in wireless sensor network(W... 详细信息
来源: 评论
Securing STAR-FC-RIS empowered integrated sensing and multiuser communications against target eavesdropping
收藏 引用
Science China(information Sciences) 2024年 第11期67卷 335-346页
作者: Shuying LIN Yulong ZOU Fu XIAO Bin LI School of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications School of Computer Science Nanjing University of Posts and Telecommunications Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications
This paper investigates a simultaneous-transmitting-and-reflecting fully-connected reconfigurable intelligent surface(STAR-FC-RIS) empowered integrated sensing and multiuser communications(ISAMC) network, where a dual... 详细信息
来源: 评论