咨询与建议

限定检索结果

文献类型

  • 1,702 篇 会议
  • 1,349 篇 期刊文献

馆藏范围

  • 3,051 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,017 篇 工学
    • 1,493 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 546 篇 信息与通信工程
    • 275 篇 电气工程
    • 214 篇 电子科学与技术(可...
    • 208 篇 控制科学与工程
    • 199 篇 生物工程
    • 134 篇 机械工程
    • 127 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 97 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 67 篇 交通运输工程
    • 65 篇 化学工程与技术
    • 64 篇 动力工程及工程热...
    • 54 篇 安全科学与工程
    • 42 篇 建筑学
  • 920 篇 理学
    • 532 篇 数学
    • 219 篇 生物学
    • 199 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 75 篇 化学
  • 565 篇 管理学
    • 344 篇 管理科学与工程(可...
    • 244 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 94 篇 法学
    • 60 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 31 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 135 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 59 篇 deep learning
  • 59 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 privacy
  • 42 篇 robustness
  • 41 篇 security
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 162 篇 school of comput...
  • 83 篇 key laboratory o...
  • 67 篇 computer network...
  • 67 篇 college of compu...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 39 篇 fujian provincia...
  • 37 篇 school of cyber ...
  • 36 篇 university of ch...
  • 36 篇 shandong provinc...
  • 35 篇 key laboratory o...
  • 31 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 28 篇 zhang min-ling
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 26 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 237 篇 其他
  • 120 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3051 条 记 录,以下是2581-2590 订阅
排序:
Accountable authority identity-based encryption with public traceability  1
收藏 引用
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013
作者: Lai, Junzuo Deng, Robert H. Zhao, Yunlei Weng, Jian School of Information Systems Singapore Management University Singapore Singapore Software School Fudan University China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security China
At Crypto'07, Goyal introduced the notion of accountable authority identity-based encryption (A-IBE) in order to mitigate the inherent key escrow problem in identity-based encryption, and proposed two concrete con... 详细信息
来源: 评论
On the spatial-Temporal Reachability of DTNs
On the spatial-Temporal Reachability of DTNs
收藏 引用
2nd CCF Internet Conference of China, ICoC 2013
作者: Zhang, Cheng Xia, Chunhe Wang, Haiquan Li, Xiaojian Beijing Key Laboratory of Network Technology Beihang University Beijing China State Key Laboratory of Virtual Reality Technology and Systems Beihang University Beijing China College of Software Beihang University Beijing China College of Computer Science and Information Technology Guangxi Normal University Guilin China
As traditional "Connectivity" concept from the Internet ignores the possibility of opportunistic contacts in DTNs, this paper brings time dimension into consideration, proposes Spatial-Temporal Path, Spatial... 详细信息
来源: 评论
A computer network defense policy refinement method
A computer network defense policy refinement method
收藏 引用
2nd CCF Internet Conference of China, ICoC 2013
作者: Wei, Zhao Lv, Yanli Xia, Chunhe Luo, Yang Wei, Qing Key Laboratory of Beijing Network Technology School of Computer Science and Engineering Beihang University Beijing China Information Center of Ministry of Science and Technology The Ministry of Science Technology of the People's Republic of China Beijing China
The existing methods of policy refinement in computer network defense (CND) can only support the refinement of access control policy, but not the policies of protection, detection, response, and recovery. To solve thi... 详细信息
来源: 评论
ENERGY EFFICIENT DISTRIBUTED STEGANOGRAPHY FOR SECURE COMMUNICATION IN WIRELESS MULTIMEDIA SENSOR networkS
收藏 引用
Journal of Electronics(China) 2013年 第1期30卷 9-16页
作者: Lin Qiaomin Wang Ruchuan Ye Ning Wang Zhongqin College of Computer Nanjing University of Posts and Telecommunications Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications) Ministry of Education Department of Information Science Nanjing College for Population Management
A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, give... 详细信息
来源: 评论
Performance analysis of optimal relay selective cooperation in railway network
Performance analysis of optimal relay selective cooperation ...
收藏 引用
5th IET International Conference on Wireless, Mobile and Multimedia networks, ICWMMN 2013
作者: You, Jia Zhong, Zhangdui Yang, Shan Liu, Yang Wang, Gongpu State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing China School of Computer and Information Technology Beijing Jiaotong University Beijing China Network Technology Research Institute China United Network Communications Co. Ltd. China
In the railway network, the fact that signal amplitude suffers loss resulted from signal traversing through the carriage which named by carriage pass loss, highly influences the reliability of the wireless communicati... 详细信息
来源: 评论
Frequent itemset mining over stream data: Overview
Frequent itemset mining over stream data: Overview
收藏 引用
IET International Conference on information and Communications Technologies, IETICT 2013
作者: Qu, Z.G. Niu, X.X. Deng, J. McArdle, C. Wang, X.J. Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China School of Electronic Engineering Dublin City University Dublin Ireland Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China
During the past decade, stream data mining has been attracting widespread attentions of the experts and the researchers all over the world and a large number of interesting research results have been achieved. Among t... 详细信息
来源: 评论
Dynamic bandwidth allocation&guarantee for virtualized networks in cloud
Dynamic bandwidth allocation&guarantee for virtualized netwo...
收藏 引用
9th International Conference on information, Communications and Signal Processing, ICICS 2013
作者: Luo, Xuan Zhang, Pengfei Ye, Tong Jin, Yaohui Wang, Jianping Network and Information Center Shanghai Jiaotong University China State Key Laboratory of Advanced Optical Communication Systems and Networks Shanghai Jiaotong University China Department of Computer Science City University of Hong Kong Hong Kong
Among all SLAs(Service Level Agreements) about network resources in the cloud, a critical problem would be achieving bandwidth guarantee under all communication environment (e.g., when misbehaved VMs exist) while keep... 详细信息
来源: 评论
A color digital watermarking in nonsampled contourlet domain using generic algorithm
A color digital watermarking in nonsampled contourlet domain...
收藏 引用
5th IEEE International Conference on Intelligent networking and Collaborative Systems, INCoS 2013
作者: Luo, Peng Wei, Ping Liu, Yi-Qun Key Laboratory of Network and Information Security of APF Department of Electronic Technology Engineering University of APF Xi'an 710086 China Laboratory-Center of Computer Department of Information Engineering Engineering University of APF China Xi'an 710086 China Department of Electronic Technology Engineering University of Armed Police Force Xi'an 710086 China
A novel watermarking approach for copyright protection of color images based on the nonsubsampled contour let transform (NSCT). We employ the genetic algorithm optimization principles and HVS masking technique to obta... 详细信息
来源: 评论
A Centrality Estimation Method Based on Hidden Markov Model in Social Delay Tolerant networks
A Centrality Estimation Method Based on Hidden Markov Model ...
收藏 引用
2013 22nd Wireless and Optical Communication Conference
作者: Yongfeng Huang Yongqiang Dong Sanfeng Zhang Guoxin Wu School of Computer Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of Education
Complex network analysis method has recently been proposed to solve the problem of contact prediction in Delay Tolerant networks(DTNs).Centrality Estimation remains as an important issue in such *** schemes such as si... 详细信息
来源: 评论
An extension of distributed dynamic description logics for the representation of heterogeneous mappings
Journal of Software
收藏 引用
Journal of Software 2013年 第1期8卷 243-250页
作者: Wang, Zhuxiao Guo, Jing Chen, Fei Wu, Kehe Wang, Peng School of Control and Computer Engineering State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources North China Electric Power University 102206 Beijing China National Computer Network Emergency Response Technical Team Coordination Center of China 100029 Beijing China School of Control and Computer Engineering North China Electric Power University 102206 Beijing China Institute of Information Engineering Chinese Academy of Sciences 100195 Beijing China
As a family of dynamic description logics, DDL(X) is constructed by embracing actions into the description logic X, where X represents well-studied description logics ranging from the ALC to the SHOIQ. To efficiently ... 详细信息
来源: 评论