咨询与建议

限定检索结果

文献类型

  • 1,763 篇 会议
  • 1,376 篇 期刊文献

馆藏范围

  • 3,139 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,051 篇 工学
    • 1,516 篇 计算机科学与技术...
    • 1,178 篇 软件工程
    • 560 篇 信息与通信工程
    • 308 篇 电气工程
    • 224 篇 电子科学与技术(可...
    • 223 篇 控制科学与工程
    • 200 篇 生物工程
    • 140 篇 网络空间安全
    • 139 篇 机械工程
    • 102 篇 仪器科学与技术
    • 98 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 73 篇 交通运输工程
    • 67 篇 化学工程与技术
    • 64 篇 动力工程及工程热...
    • 61 篇 安全科学与工程
    • 42 篇 建筑学
  • 924 篇 理学
    • 531 篇 数学
    • 221 篇 生物学
    • 204 篇 物理学
    • 163 篇 统计学(可授理学、...
    • 81 篇 系统科学
    • 80 篇 化学
  • 573 篇 管理学
    • 351 篇 管理科学与工程(可...
    • 245 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 93 篇 法学
    • 60 篇 社会学
  • 73 篇 医学
    • 60 篇 临床医学
    • 52 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 31 篇 农学
  • 22 篇 军事学
  • 12 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 152 篇 feature extracti...
  • 123 篇 semantics
  • 122 篇 accuracy
  • 89 篇 computational mo...
  • 86 篇 training
  • 85 篇 federated learni...
  • 72 篇 data models
  • 60 篇 deep learning
  • 55 篇 robustness
  • 51 篇 privacy
  • 48 篇 protocols
  • 48 篇 adaptation model...
  • 47 篇 optimization
  • 47 篇 cryptography
  • 46 篇 transformers
  • 46 篇 neural networks
  • 45 篇 data mining
  • 45 篇 security
  • 43 篇 visualization
  • 41 篇 authentication

机构

  • 272 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 160 篇 school of comput...
  • 85 篇 key laboratory o...
  • 68 篇 computer network...
  • 68 篇 shandong provinc...
  • 67 篇 college of compu...
  • 59 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 49 篇 beijing key labo...
  • 45 篇 institute of inf...
  • 42 篇 school of cyber ...
  • 41 篇 school of comput...
  • 40 篇 shandong provinc...
  • 39 篇 key laboratory o...
  • 38 篇 fujian provincia...
  • 36 篇 university of ch...
  • 35 篇 key laboratory o...

作者

  • 47 篇 zhao yao
  • 37 篇 zhou deyu
  • 28 篇 zhang min-ling
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 xiaoming wu
  • 26 篇 min-ling zhang
  • 26 篇 guo wenzhong
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 19 篇 xiangzhi liu
  • 19 篇 guang cheng
  • 19 篇 du bo
  • 19 篇 liu ximeng
  • 18 篇 xiaoping li
  • 18 篇 wei zhang
  • 17 篇 geng xin
  • 17 篇 di xiaoqiang
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang

语言

  • 2,540 篇 英文
  • 501 篇 其他
  • 121 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3139 条 记 录,以下是2461-2470 订阅
排序:
Virtual brain surgery simulation system based on haptic interaction
收藏 引用
High Technology Letters 2015年 第2期21卷 185-191页
作者: 张小瑞 Zhu Jiandong Sun Wei Norman I.Badler Song Aiguo Niu Jianwei Liu Jia School of Computer and Software Nanjing University of Information Science & Technology Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology School of Information and Control Nanjing University of Information Science & Technology School of Engineering and Applied Science University of Pennsylvania School of Instrument Science and Engineering Southeast University State key Laboratory of Virtual Reality Technology and Systems Beihang University
To improve the accuracy and interactivity of soft tissue delormatlon simulation, a new plate spring model based on physics is proposed. The model is parameterized and thus can be adapted to simulate different organs. ... 详细信息
来源: 评论
Research on privacy protection of WHOIS information in DNS  6
Research on privacy protection of WHOIS information in DNS
收藏 引用
6th FTRA International Conference on computer Science and its Applications, CSA 2014
作者: Zhang, Wei Wang, Wei Zhang, Xinchang Shi, Huiling Shandong Provincial Key Laboratory of Computer Networks Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250000 China DNSLAB China Internet Network Information Center Beijing100190 China
WHOIS service allows people to ask the current registrant some Internet resources. WHOIS service has become an indispensable information service in the DNS. Unfortunately, WHOIS information is often available by the m... 详细信息
来源: 评论
Conditional privacy-protection remote user authentication mechanism for WBAN
收藏 引用
Tongxin Xuebao/Journal on Communications 2016年 37卷 63-71页
作者: Cao, Jin Zheng, Yi-Qing Li, Hui State Key Laboratory of Integrated Services Networks School of Cyber Engineering Xidian University Xi'an710126 China Shaanxi Key Laboratory of Computer Network School of Electronic and Information Engineering Xi'an Jiaotong University Xi'an710049 China
A conditional privacy-protection remote user authentication scheme based on a certificateless group signature was proposed, which can accomplish the anonymous mutual authentication between the user and the remote doct... 详细信息
来源: 评论
Motiviting Others Drives Jamshidi [SMC Innovators]
收藏 引用
IEEE Systems, Man, and Cybernetics Magazine 2015年 第3期1卷 67-72页
作者: M.E. El-Hawary School of Computer Science and Engineering Southeast University China Ministry of Education Key Laboratory of Computer Network and Information Integration China
Presents an interview conducted with Dr. Jamshidi.
来源: 评论
Soft information assisted phase noise estimation in vector OFDM using linear MMSE receivers  19
Soft information assisted phase noise estimation in vector O...
收藏 引用
19th International ITG Workshop on Smart Antennas, WSA 2015
作者: Ngebani, Ibo Li, Yabo Xia, Xiang-Gen Zhao, Minjian Chuma, Joseph Cai, Yunlong Department of Information Science and Electrical Engineering Zhejiang Provincial Key Laboratory of Information Network Technology Zhejiang University Hangzhou Zhejiang China Department of Electrical and Computer Engineering University of Delaware NewarkDE19716 United States
Vector orthogonal frequency division multiplexing (V-OFDM) for single transmit antenna systems is a generalization of OFDM where single-carrier frequency domain equalization (SC-FDE) and OFDM are just two special case... 详细信息
来源: 评论
Multi-threshold image segmentation through an improved quantum-behaved particle swarm optimization algorithm  1st
Multi-threshold image segmentation through an improved quant...
收藏 引用
1st International Conference on Cloud Computing and Security, ICCCS 2015
作者: Jiali, Wang Hongshen, Liu Yue, Ruan School of Computer Science Anhui University of Technology Maanshan243005 China School of Computer Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing210096 China
Multi-threshold segmentation is a basic and widely used technique in image segmentation. The key step of accomplishing this task is to find the optimal multi-threshold value, which in essence can be reduced to multi-o... 详细信息
来源: 评论
Research and implementation of CDP disaster recovery system based on oracle
International Journal of Control and Automation
收藏 引用
International Journal of Control and Automation 2015年 第11期8卷 325-336页
作者: Ren, Yongjian Ye, Jiaolong Zhang, Jilin Zhou, Li Wang, Jue Zhang, Lei School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China Key Laboratory of Complex Systems Modeling and Simulation Ministry of Education China College of Electrical Engineering Zhejiang University Hangzhou China Supercomputing Center of Computer Network Information Center Chinese Academy of Sciences Beijing China Computer Science Department Beijing University of Civil Engineering and Architecture Beijing China
The OraCDP disaster recovery system uses CDP disaster recovery technology based on the combination of block level, combining with the communication coupling between the underlying I/O and Oracle database. The experime... 详细信息
来源: 评论
An efficient storage technology for object-based distributed storage system
International Journal of Control and Automation
收藏 引用
International Journal of Control and Automation 2015年 第11期8卷 337-348页
作者: Zhang, Jilin Su, Yucheng Wan, Jian Zhou, Li Wang, Jue Zhang, Lei College of Electrical Engineering Zhejiang University Hangzhou China School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China Key Laboratory of Complex Systems Modeling and Simulation Ministry of Education China Supercomputing Center of Computer Network Information Center Chinese Academy of Sciences Beijing China Computer Science Department Beijing University of Civil Engineering and Architecture Beijing China
There have two effective ways to improve the overall efficiency of the object-based distributed storage system, one is network caching technology and the other is metadata server cluster load balancing strategy. Under... 详细信息
来源: 评论
A New Logistic Map Based Chaotic Biogeography-based Optimization Approach for Cluster Analysis
A New Logistic Map Based Chaotic Biogeography-based Optimiza...
收藏 引用
2016 IEEE International Conference on Progress in Informatics and Computing
作者: Shui-Hua Wang Hui-Min Lu Yu-Jie Li Yang Wang Zhi-Min Chen Yu-Min Wei Wen-Juan Jia Fang-Yuan Liu Yu-Dong Zhang School of Computer Science and Technology Nanjing Normal University Hunan Provincial Key Laboratory of Network Investigational Technology Hunan Policy Academy Department of Electrical Engineering The city college of New YorkCUNY Department of Mechanical and Control Engineering Kyushu Institute of Technology School of Information Engineering Yangzhou University School of Physics and Electronic Engineering Taizhou University School of Electronic Information Shanghai Dianji University School of Energy and Mechanical Engineering Nanjing Normal University Key Laboratory of Intelligent Computing and Information Processing in Fujian Provincial University Quanzhou Normal University
Cluster analysis is important in scientific and industrial fields. In this study, we proposed a novel chaotic biogeography-based optimization(CBBO) method, and applied it in centroid-based clustering methods. The resu... 详细信息
来源: 评论
Improved protein residue-residue contacts prediction using learning-to-rank
Improved protein residue-residue contacts prediction using l...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Xiaoyang Jing Qiwen Dong School of Computer Science Fudan University Shanghai People's Republic of China Shanghai Key Laboratory of Intelligent Information Processing Shanghai People's Republic of China Key Laboratory of Network Oriented Intelligent Computation Harbin Institute of Technology Shenzhen Graduate School Shenzhen Guangdong People's Republic of China Institute for Data Science and Engineering East China Normal University Shanghai People's Republic of China
Protein residue-residue contacts dictate the topology of protein structure and play an important role in structural biology, especially in de novo protein structure prediction. Accurate prediction of residue contacts ... 详细信息
来源: 评论