咨询与建议

限定检索结果

文献类型

  • 385 篇 会议
  • 294 篇 期刊文献

馆藏范围

  • 679 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 455 篇 工学
    • 359 篇 计算机科学与技术...
    • 290 篇 软件工程
    • 127 篇 信息与通信工程
    • 51 篇 控制科学与工程
    • 38 篇 生物工程
    • 35 篇 电气工程
    • 29 篇 机械工程
    • 29 篇 电子科学与技术(可...
    • 24 篇 生物医学工程(可授...
    • 19 篇 仪器科学与技术
    • 18 篇 光学工程
    • 16 篇 网络空间安全
    • 14 篇 动力工程及工程热...
    • 11 篇 交通运输工程
    • 8 篇 化学工程与技术
    • 8 篇 安全科学与工程
  • 185 篇 理学
    • 125 篇 数学
    • 39 篇 生物学
    • 36 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 18 篇 系统科学
    • 10 篇 化学
  • 148 篇 管理学
    • 79 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 31 篇 工商管理
  • 19 篇 医学
    • 17 篇 临床医学
    • 12 篇 基础医学(可授医学...
    • 9 篇 药学(可授医学、理...
  • 16 篇 法学
    • 15 篇 社会学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学
  • 2 篇 军事学

主题

  • 30 篇 semantics
  • 19 篇 routing
  • 19 篇 training
  • 16 篇 feature extracti...
  • 16 篇 machine learning
  • 16 篇 protocols
  • 16 篇 clustering algor...
  • 14 篇 wireless sensor ...
  • 12 篇 contrastive lear...
  • 12 篇 computational mo...
  • 12 篇 privacy
  • 11 篇 deep learning
  • 11 篇 optimization
  • 10 篇 network topology
  • 10 篇 educational inst...
  • 10 篇 estimation
  • 9 篇 computer science
  • 9 篇 peer to peer com...
  • 9 篇 laboratories
  • 9 篇 quality of servi...

机构

  • 175 篇 school of comput...
  • 85 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 46 篇 key laboratory o...
  • 43 篇 school of cyber ...
  • 41 篇 school of comput...
  • 36 篇 key laboratory o...
  • 21 篇 purple mountain ...
  • 19 篇 key laboratory o...
  • 16 篇 ministry of educ...
  • 13 篇 the school of co...
  • 12 篇 college of softw...
  • 11 篇 school of cyber ...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 department of co...
  • 9 篇 southeast univer...
  • 9 篇 guangxi collabor...
  • 9 篇 national key lab...
  • 9 篇 shanghai key lab...

作者

  • 37 篇 zhou deyu
  • 33 篇 zhang min-ling
  • 29 篇 min-ling zhang
  • 21 篇 guang cheng
  • 20 篇 wang yun
  • 19 篇 geng xin
  • 17 篇 he yulan
  • 16 篇 xiaoping li
  • 16 篇 sanfeng zhang
  • 13 篇 cheng guang
  • 13 篇 shu huazhong
  • 12 篇 li xiaoping
  • 12 篇 qi guilin
  • 12 篇 kong youyong
  • 11 篇 jia yuheng
  • 11 篇 yang peng
  • 11 篇 tao jun
  • 10 篇 wei tong
  • 10 篇 yang guanyu
  • 9 篇 liu bo

语言

  • 546 篇 英文
  • 92 篇 其他
  • 44 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration in Southeast University"
679 条 记 录,以下是531-540 订阅
排序:
TTL sensitive social-aware routing in mobile opportunistic networks
TTL sensitive social-aware routing in mobile opportunistic n...
收藏 引用
Consumer Communications and networking Conference, CCNC IEEE
作者: Yongfeng Huang Yongqiang Dong Sanfeng Zhang Guoxin Wu Ministry of Education China Key Laboratory of Computer Network and Information Integration (Southeast University) Nanjing China
Social characteristics such as community and centrality have been used as forwarding metrics in literature to predict nodes encounter probability in mobile opportunistic networks. However, the community detection and ... 详细信息
来源: 评论
A Personalized Service Recommendation Algorithm for Service Functionality
A Personalized Service Recommendation Algorithm for Service ...
收藏 引用
International Conference on Advanced Cloud and Big Data (CBD)
作者: Wei Li Di Hu Junzhou Luo School of Computer Science and Engineering Key Laboratory of Computer Network Information Integration (Southeast University) Ministry of Education Southeast University Nanjing China
With the increasing number of services on the Internet, it has become a great challenge to help users find services according to their demands. Personalized recommendation technology is an effective way to solve the p... 详细信息
来源: 评论
Defense Technology of Wormhole Attacks Based on Node Connectivity
Defense Technology of Wormhole Attacks Based on Node Connect...
收藏 引用
IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity)
作者: Jiu-hu Zheng Huan-yan Qian Lei Wang School of Information Technology Jiangsu Institute of Commerce Nanjing Jiangsu China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing Jiangsu China National Mobile Communications esearch Laboratory Southeast University Nanjing Jiangsu China Key Lab of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing Jiangsu China
After wormhole attacks the routing mechanism of wireless sensor network (WSN) is damaged, then the hop count and distance between nodes cannot be well matched, so that the WSN becomes the anisotropic sensor network, r... 详细信息
来源: 评论
MT-NCOR: A practical optimization method for network coded opportunistic routing in WMN
MT-NCOR: A practical optimization method for network coded o...
收藏 引用
International Conference on computer Communications and networks (ICCCN)
作者: Xiang Lan Sanfeng Zhang School of Software Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration in Southeast University Ministry of Education Southeast University Nanjing China
network coded opportunistic routing (NCOR) is a potential communication paradigm in wireless multi-hop networks (WMN) with lossy links. It leverages the multipath diversity of wireless networks and applies network cod... 详细信息
来源: 评论
An improved DV-Hop positioning algorithm for wireless sensor network
An improved DV-Hop positioning algorithm for wireless sensor...
收藏 引用
IEEE International Conference on Progress in Informatics and Computing (PIC)
作者: Jiuhu Zheng Huanyan Qian Lie Wang School of Information Technology Jiangsu Institute of Commerce Nanjing Jiangsu China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing Jiangsu China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing Nanjing Jiangsu China National Mobile Communications esearch Laboratory Southeast University Nanjing Jiangsu China Ministry of Education Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications) Nanjing Jiangsu China
In the view of the DV-Hop positioning algorithm which relies on the distance vector and beacon nodes, several aspects are improved: the average hop distance and hop count are corrected; a method to detect the abnormal... 详细信息
来源: 评论
Dynamics Nature and Link Prediction Methods in Opportunistic networks
Dynamics Nature and Link Prediction Methods in Opportunistic...
收藏 引用
IEEE International Conference on Computational Science and Engineering, CSE
作者: Yin Li Xuebing Zhao Hao Tang Qi Wang Sanfeng Zhang College of Software Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Ministry of Education Southeast University Nanjing China
With the increasing popularization of low-cost smart mobile devices, which have the capability of short-range wireless communication, opportunistic networks aimed to meet different requirements start to put into pract... 详细信息
来源: 评论
Quantitative Measurement of Coronary Artery Stenosis in CCTA Images Using a 2D Parametric Intensity Model
Quantitative Measurement of Coronary Artery Stenosis in CCTA...
收藏 引用
Annual International Conference of the IEEE Engineering in Medicine and Biology Society
作者: Guanyu YANG Xinglou ZHAO Lijun TANG Huzhong SHU Christine TOUMOULIN Lab of Image Science and Technology Key Laboratory of Computer Network and Information Integration (Southeast University) Dept. of Radiology the First Affiliated Hospital of Nanjing Medical University INSERM-U1099 LTSI Universite de Rennes 1
In this paper, we propose an approach based on 2D vessel model to segment the vessel lumen in three-dimensional coronary computed tomographic angiography (CCTA) images. The 2D parametric intensity model is introduced ... 详细信息
来源: 评论
Implementation and evaluation of a backtracking algorithm for finding all justifications in OWL 2 EL
Implementation and evaluation of a backtracking algorithm fo...
收藏 引用
7th Chinese Semantic Web Symposium and the 2nd Chinese Web ScienceConference, CSWS 2013
作者: Zhou, Zhangquan Qi, Guilin Key Laboratory of Computer Network and Information Integration of State Education Ministry School of Computer Science and Engineering Southeast University China
Finding justifications plays an important role in the development and maintenance of ontologies. It helps users or developers to understand the entailments by presenting the minimal subsets of the ontology which are r... 详细信息
来源: 评论
Multi-label classification with unlabeled data: An inductive approach  5
Multi-label classification with unlabeled data: An inductive...
收藏 引用
5th Asian Conference on Machine Learning, ACML 2013
作者: Wu, Lei Zhang, Min-Ling MOE Key Laboratory of Computer Network and Information Integration School of Computer Science and Engineering Southeast University Nanjing210096 China
The problem of multi-label classification has attracted great interests in the last decade. Multi-label classification refers to the problems where an example that is represented by a single instance can be assigned t... 详细信息
来源: 评论
Execution recovery in transactional composite service
Execution recovery in transactional composite service
收藏 引用
2013 IEEE 20th International Conference on Web Services, ICWS 2013
作者: Cao, Jiuxin Zhou, Tao Zhu, Gongrui Liu, Bo Luo, Junzhou School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration of MoE of China Southeast University Nanjing 211189 China
In the composite service which runs for a long time under the heterogeneous and loose-coupled circumstance, the failure of service tends to occur. The transaction and recovery mechanism is urgently needed in order to ... 详细信息
来源: 评论