咨询与建议

限定检索结果

文献类型

  • 372 篇 会议
  • 289 篇 期刊文献

馆藏范围

  • 661 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 442 篇 工学
    • 348 篇 计算机科学与技术...
    • 288 篇 软件工程
    • 127 篇 信息与通信工程
    • 44 篇 控制科学与工程
    • 38 篇 生物工程
    • 34 篇 电气工程
    • 29 篇 机械工程
    • 28 篇 电子科学与技术(可...
    • 24 篇 生物医学工程(可授...
    • 19 篇 仪器科学与技术
    • 18 篇 光学工程
    • 16 篇 网络空间安全
    • 14 篇 动力工程及工程热...
    • 11 篇 交通运输工程
    • 8 篇 化学工程与技术
    • 8 篇 安全科学与工程
  • 183 篇 理学
    • 124 篇 数学
    • 39 篇 生物学
    • 36 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 18 篇 系统科学
    • 10 篇 化学
  • 148 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 19 篇 医学
    • 17 篇 临床医学
    • 12 篇 基础医学(可授医学...
    • 9 篇 药学(可授医学、理...
  • 16 篇 法学
    • 15 篇 社会学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学
  • 2 篇 军事学

主题

  • 30 篇 semantics
  • 19 篇 routing
  • 19 篇 training
  • 16 篇 feature extracti...
  • 16 篇 machine learning
  • 16 篇 protocols
  • 16 篇 clustering algor...
  • 14 篇 wireless sensor ...
  • 12 篇 computational mo...
  • 12 篇 privacy
  • 11 篇 deep learning
  • 11 篇 optimization
  • 10 篇 network topology
  • 10 篇 educational inst...
  • 10 篇 contrastive lear...
  • 10 篇 estimation
  • 9 篇 computer science
  • 9 篇 peer to peer com...
  • 9 篇 laboratories
  • 9 篇 quality of servi...

机构

  • 167 篇 school of comput...
  • 81 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 46 篇 key laboratory o...
  • 42 篇 school of cyber ...
  • 40 篇 school of comput...
  • 36 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 19 篇 purple mountain ...
  • 15 篇 ministry of educ...
  • 13 篇 the school of co...
  • 12 篇 college of softw...
  • 11 篇 school of cyber ...
  • 10 篇 national mobile ...
  • 10 篇 department of co...
  • 9 篇 guangxi collabor...
  • 9 篇 national key lab...
  • 9 篇 shanghai key lab...
  • 8 篇 the key laborato...
  • 8 篇 southeast univer...

作者

  • 36 篇 zhou deyu
  • 28 篇 zhang min-ling
  • 23 篇 min-ling zhang
  • 21 篇 guang cheng
  • 20 篇 wang yun
  • 19 篇 geng xin
  • 16 篇 xiaoping li
  • 16 篇 he yulan
  • 16 篇 sanfeng zhang
  • 13 篇 cheng guang
  • 13 篇 shu huazhong
  • 12 篇 li xiaoping
  • 12 篇 qi guilin
  • 12 篇 kong youyong
  • 11 篇 jia yuheng
  • 11 篇 yang peng
  • 11 篇 tao jun
  • 10 篇 wei tong
  • 10 篇 yang guanyu
  • 9 篇 xiaoyan hu

语言

  • 544 篇 英文
  • 76 篇 其他
  • 43 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration in Southeast University"
661 条 记 录,以下是211-220 订阅
排序:
Multi-threshold image segmentation through an improved quantum-behaved particle swarm optimization algorithm  1st
Multi-threshold image segmentation through an improved quant...
收藏 引用
1st International Conference on Cloud Computing and Security, ICCCS 2015
作者: Jiali, Wang Hongshen, Liu Yue, Ruan School of Computer Science Anhui University of Technology Maanshan243005 China School of Computer Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing210096 China
Multi-threshold segmentation is a basic and widely used technique in image segmentation. The key step of accomplishing this task is to find the optimal multi-threshold value, which in essence can be reduced to multi-o... 详细信息
来源: 评论
Multimodal Aspect Extraction with Region-Aware Alignment network  9th
Multimodal Aspect Extraction with Region-Aware Alignment Net...
收藏 引用
9th CCF International Conference on Natural Language Processing and Chinese Computing, NLPCC 2020
作者: Wu, Hanqian Cheng, Siliang Wang, Jingjing Li, Shoushan Chi, Lian School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China School of Computer Science and Technology Soochow University Suzhou China Nanjing University of Information Science and Technology Nanjing China
Fueled by the rise of social media, documents on these platforms (e.g., Twitter, Weibo) are increasingly multimodal in nature, with images in addition to text. To well automatically analyze the opinion information ins... 详细信息
来源: 评论
NL2SQL Enhancement through Semantic Representation Aggregation  5
NL2SQL Enhancement through Semantic Representation Aggregati...
收藏 引用
5th International Conference on computer information Science and Application Technology, CISAT 2022
作者: Long, Lingli Zhu, Yongjin Shao, Jun Kong, Zheng Li, Jian Liu, Zejie Zhang, Xu Jiangsu Frontier Electric Technology Co. Ltd. China School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China
Natural Language to SQL (NL2SQL) is a technology that converts natural language into executable SQL statements. For single table tasks, the dominant approach is a slot-filling-based model which actually performs multi... 详细信息
来源: 评论
NL2SQL Generation with Noise Labels based on Multi-task Learning  5
NL2SQL Generation with Noise Labels based on Multi-task Lear...
收藏 引用
2022 5th International Symposium on Big Data and Applied Statistics, ISBDAS 2022
作者: Long, Lingli Zhu, Yongjin Shao, Jun Kong, Zheng Li, Jian Xiang, Yanzheng Zhang, Xu Jiangsu Frontier Electric Technology Co. Ltd. China School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China
With the rapid development of artificial intelligence technology, semantic recognition technology is becoming more and more mature, providing the preconditions for the development of natural language to SQL (NL2SQL) t... 详细信息
来源: 评论
An effective heuristic for on-line tenant placement problem in SaaS
An effective heuristic for on-line tenant placement problem ...
收藏 引用
2010 IEEE 8th International Conference on Web Services, ICWS 2010
作者: Zhang, Yi Wang, Zhihu Gao, Bo Guo, Changjie Sun, Wei Li, Xiaoping School of Computer Science and Engineering Southeast University 210096 Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education China IBM Research-China 100096 Beijing China
As one of the key characteristics of Software as a Service (SaaS), multi-tenancy aims to support massive customers by sharing application instances and databases. To achieve the high economies of scale, one of the mos... 详细信息
来源: 评论
Semantic access control for cloud computing based on e-Healthcare
Semantic access control for cloud computing based on e-Healt...
收藏 引用
2012 IEEE 16th International Conference on computer Supported Cooperative Work in Design, CSCWD 2012
作者: Sun, Lili Wang, Hua Yong, Jianming Wu, Guoxin Centre for Systems Biology University of Southern Queensland Toowoomba Australia School of Information Systems University of Southern Queensland Toowoomba Australia School of Computer Science and Engineering Key Laboratory for Computer Network and Information Integration Southeast University China
With the increased development of cloud computing, access control policies have become an important issue in the security filed of cloud computing. Semantic web is the extension of current Web which aims at automation... 详细信息
来源: 评论
A novel search engine-based method for discovering command and control server  15th
A novel search engine-based method for discovering command a...
收藏 引用
15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015
作者: Guo, Xiaojun Cheng, Guang Pan, Wubin Dinhtu, Truong Liang, Yixin School of Computer Science and Engineering Southeast University Nanjing211189 China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing211189 China School of Information Engineering Xizang Minzu University Xianyang712082 China XiZang Key Laboratory of Optical Information Processing and Visualization Technology Xizang Minzu University Xianyang712082 China
To solve the problem of getting command and control (C&C) server address covertly for malware of Botnet or advanced persistent threats, we propose a novel C&C-server address discovery scheme via search engine.... 详细信息
来源: 评论
Logistic boosting regression for label distribution learning?
Logistic boosting regression for label distribution learning...
收藏 引用
2016 IEEE Conference on computer Vision and Pattern Recognition, CVPR 2016
作者: Xing, Chao Geng, Xin Xue, Hui Key Lab of Computer Network and Information Integration Ministry of Education School of Computer Science and Engineering Southeast University Nanjing211189 China
Label Distribution Learning (LDL) is a general learning framework which includes both single label and multi-label learning as its special cases. One of the main assumptions made in traditional LDL algorithms is the d... 详细信息
来源: 评论
Queue length based fair queueing in core-stateless networks  4th
Queue length based fair queueing in core-stateless networks
收藏 引用
4th IFIP/IEEE International Conference on Management of Multimedia networks and Services, MMNS 2001
作者: Zhai, Mingyu Gu, Guanqun Yuan, Yuan Department of Computer Science and Engineering Southeast University Nanjing210096 China The Key Laboratory for Computer Networks and Information Integration Ministry of Education China
In this paper, we present Queue Length based Fair Queueing (QLFQ), a scheme to approximate fair bandwidth allocation without per-flow state. We have evaluated QLFQ together with CSFQ and RFQ with several different con... 详细信息
来源: 评论
Detecting bot-infected machines based on analyzing the similar periodic DNS queries
Detecting bot-infected machines based on analyzing the simil...
收藏 引用
International Conference on Computing, Management and Telecommunications, ComManTel 2015
作者: Tu, Truong Dinh Guang, Cheng Xin, Liang Yi School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing China Department of Information Technologies Tuyhoa Industrial College Phuyen Viet Nam
Modern botnets such as Zeus and Conficker com-monly utilize a technique called domain fluxing or a Domain Generation Algorithm (DGA) to generate a large number of pseudo-random domain names dynamically for botnet oper... 详细信息
来源: 评论