咨询与建议

限定检索结果

文献类型

  • 383 篇 会议
  • 291 篇 期刊文献

馆藏范围

  • 674 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 451 篇 工学
    • 356 篇 计算机科学与技术...
    • 293 篇 软件工程
    • 127 篇 信息与通信工程
    • 46 篇 控制科学与工程
    • 38 篇 生物工程
    • 34 篇 电气工程
    • 29 篇 机械工程
    • 29 篇 电子科学与技术(可...
    • 24 篇 生物医学工程(可授...
    • 20 篇 仪器科学与技术
    • 19 篇 光学工程
    • 16 篇 网络空间安全
    • 14 篇 动力工程及工程热...
    • 11 篇 交通运输工程
    • 8 篇 化学工程与技术
    • 8 篇 安全科学与工程
  • 185 篇 理学
    • 125 篇 数学
    • 39 篇 生物学
    • 36 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 18 篇 系统科学
    • 10 篇 化学
  • 148 篇 管理学
    • 78 篇 管理科学与工程(可...
    • 72 篇 图书情报与档案管...
    • 30 篇 工商管理
  • 19 篇 医学
    • 17 篇 临床医学
    • 12 篇 基础医学(可授医学...
    • 9 篇 药学(可授医学、理...
  • 17 篇 法学
    • 16 篇 社会学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 30 篇 semantics
  • 19 篇 routing
  • 19 篇 training
  • 16 篇 machine learning
  • 16 篇 protocols
  • 16 篇 clustering algor...
  • 15 篇 feature extracti...
  • 14 篇 wireless sensor ...
  • 12 篇 contrastive lear...
  • 12 篇 computational mo...
  • 12 篇 privacy
  • 11 篇 optimization
  • 10 篇 deep learning
  • 10 篇 network topology
  • 10 篇 educational inst...
  • 10 篇 estimation
  • 9 篇 computer science
  • 9 篇 peer to peer com...
  • 9 篇 laboratories
  • 9 篇 servers

机构

  • 173 篇 school of comput...
  • 84 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 46 篇 key laboratory o...
  • 42 篇 school of cyber ...
  • 41 篇 school of comput...
  • 35 篇 key laboratory o...
  • 21 篇 purple mountain ...
  • 19 篇 key laboratory o...
  • 15 篇 ministry of educ...
  • 13 篇 the school of co...
  • 12 篇 college of softw...
  • 11 篇 school of cyber ...
  • 11 篇 school of comput...
  • 10 篇 national mobile ...
  • 10 篇 department of co...
  • 9 篇 southeast univer...
  • 9 篇 guangxi collabor...
  • 9 篇 national key lab...
  • 9 篇 shanghai key lab...

作者

  • 37 篇 zhou deyu
  • 31 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 21 篇 guang cheng
  • 20 篇 wang yun
  • 19 篇 geng xin
  • 17 篇 he yulan
  • 16 篇 xiaoping li
  • 15 篇 sanfeng zhang
  • 14 篇 shu huazhong
  • 13 篇 cheng guang
  • 12 篇 li xiaoping
  • 12 篇 qi guilin
  • 12 篇 kong youyong
  • 11 篇 jia yuheng
  • 11 篇 yang peng
  • 11 篇 tao jun
  • 10 篇 wei tong
  • 10 篇 yang guanyu
  • 9 篇 liu bo

语言

  • 549 篇 英文
  • 85 篇 其他
  • 43 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Integration in Southeast University"
674 条 记 录,以下是571-580 订阅
排序:
Filter-Based information Selection Mechanism in Publish/Subscribe Middleware
Filter-Based Information Selection Mechanism in Publish/Subs...
收藏 引用
2012 3rd International Conference on information Technology for Manufacturing Systems(ITMS 2012)
作者: Jigang Xiao Yunqing Chen Zhuowei Shen Systems Engineering Research Institute China State Shipbuilding Corporation Key Lab of Computer Network and Information Integration MOE School of Computer Science and Engineering Southeast University
Publish/Subscribe middleware is getting more and more attentions for its feature of loose *** some scenarios,Subscribersof a topic need not all the information belonging to that topic, but only those of interest. To f... 详细信息
来源: 评论
Detection of selfish nodes based on credit mechanism in opportunistic networks
收藏 引用
Tongxin Xuebao/Journal on Communications 2012年 第SUPPL.2期33卷 217-221页
作者: Tang, Zuo-Yong Yuan, Yi-Jia Dong, Yong-Qiang Wu, Guo-Xin School of Computer Science and Engineering Southeast University Nanjing 211189 China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing 211189 China
The existence of selfish nodes seriously affects the routing performance of opportunistic networks (OppNet). To protect the OppNet against the nodes' selfish behavior, a credit-based selfish nodes detection mechan... 详细信息
来源: 评论
Differentiated priority queue management in event-driven wireless sensor networks
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2012年 第SUPPL.期23卷 120-125页
作者: Yang, Qi Dong, Yong-Qiang School of Computer Science and Engineering Southeast University Nanjing 211189 China Key Laboratory of Computer Network and Information Integration of Ministry of Education Southeast University Nanjing 211189 China
In event-driven wireless sensor networks, many redundant packets flow from monitored sites through the network and to the sink, resulting in a typical funnel effect which affects event reliability, negatively. Taking ... 详细信息
来源: 评论
Effect evaluation of one-hop transmission distance vs performance in wireless sensor network
收藏 引用
Tongxin Xuebao/Journal on Communications 2012年 第SUPPL.1期33卷 255-261页
作者: Liu, Zhi-Jie Tao, Jun Chen, Wen-Qiang Key Laboratory of Computer Network and Information Integration of Ministry of China Nanjing 210096 China School of Computer Science and Engineering Southeast University Nanjing 210096 China
The research was on the influence of transmission distance respectively on energy consumption and transmission rate in wireless sensor network. The views of traditional work on this impact was not so precise, which wa... 详细信息
来源: 评论
Restrictive mechanism of flow control among non-cooperative Internet users
收藏 引用
Science China(information Sciences) 2011年 第1期54卷 12-22页
作者: TAO Jun1,2,ZHONG Xiao1,2 & LU YiFei1,2 1key laboratory of computer network and information integration,southeast university, Ministry of Education,Nanjing 210096,China 2School of computer Science and Engineering,southeast university,Nanjing 210096,China 1. Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing 210096 China2. School of Computer Science and Engineering Southeast University Nanjing 210096 China
The flow and congestion control methods based on one-shot game model with non-cooperative game theory can explain the non-cooperative behavior of Internet ***,the low effciency of equilibrium solutions affects their *... 详细信息
来源: 评论
Wireless sensor network-enabled intravenous infusion monitoring
Wireless sensor network-enabled intravenous infusion monitor...
收藏 引用
作者: Zhang, Y. Zhang, S.F. Ji, Y. Wu, G.X. Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
Considering that intravenous in blood infusion, usually applied without a proper control of the progress and velocity under unreliable manual monitoring practice, is the most popular and frequent clinical activity thr... 详细信息
来源: 评论
Alloy-based verification of Web service composition
收藏 引用
Tongxin Xuebao/Journal on Communications 2012年 第SUPPL.2期33卷 1-8页
作者: Cao, Jiu-Xin Wu, Jiang-Lin Wang, Guo-Jin Liu, Bo Yang, Peng-Wei Dong, Dan School of Computer Science and Engineering Southeast University Nanjing 210096 China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing 210096 China Huawei Technologies Co. Nanjing 210012 China
Service composition was the core problem of service computing, the validity and reliability of service composition had become the premise of service execution. A method was presented which utilizes the finite state ma... 详细信息
来源: 评论
Anonymous authentication-oriented vehicular privacy protection technology research in VANET
Anonymous authentication-oriented vehicular privacy protecti...
收藏 引用
2nd Annual Conference on Electrical and Control Engineering, ICECE 2011
作者: Zhang, Shuai Tao, Jun Yuan, Yijia Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
Vehicular Ad hoc networks (VANET) consists of several vehicular nodes and uses 802.11p protocol for communication. Because of its unique characteristics, such as fast speed, serious Doppler effect, large node number e... 详细信息
来源: 评论
Traffic classification based on port connection pattern
Traffic classification based on port connection pattern
收藏 引用
2011 International Conference on computer Science and Service System, CSSS 2011
作者: Cheng, Guang Wang, Song Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing 210096 China
While the traditional Web, Email and other Internet applications are still used large-scale, Internet applications, such as typical P2P resource sharing, streaming, games, instant messaging and other new applications ... 详细信息
来源: 评论
A fast broadcast protocol for wireless sensor networks
A fast broadcast protocol for wireless sensor networks
收藏 引用
4th International Conference on Human-Centric Computing, HumanCom'11 and the 6th International Conference on Embedded and Multimedia Computing, EMC'11
作者: Zhang, Yang Wang, Yun School of Computer Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration MOE Nanjing China
Broadcast is a hot topic in wireless sensor network research. The main challenges are from network instability and complexity of communication collision. Currently, the broadcast protocols for sensor network focus on ... 详细信息
来源: 评论