咨询与建议

限定检索结果

文献类型

  • 1,743 篇 会议
  • 1,347 篇 期刊文献

馆藏范围

  • 3,090 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,005 篇 工学
    • 1,479 篇 计算机科学与技术...
    • 1,156 篇 软件工程
    • 538 篇 信息与通信工程
    • 272 篇 电气工程
    • 213 篇 电子科学与技术(可...
    • 204 篇 控制科学与工程
    • 199 篇 生物工程
    • 135 篇 机械工程
    • 125 篇 网络空间安全
    • 99 篇 仪器科学与技术
    • 94 篇 光学工程
    • 88 篇 生物医学工程(可授...
    • 66 篇 化学工程与技术
    • 66 篇 交通运输工程
    • 63 篇 动力工程及工程热...
    • 54 篇 安全科学与工程
    • 42 篇 建筑学
  • 912 篇 理学
    • 525 篇 数学
    • 219 篇 生物学
    • 198 篇 物理学
    • 162 篇 统计学(可授理学、...
    • 81 篇 系统科学
    • 76 篇 化学
  • 559 篇 管理学
    • 340 篇 管理科学与工程(可...
    • 241 篇 图书情报与档案管...
    • 123 篇 工商管理
  • 93 篇 法学
    • 60 篇 社会学
  • 70 篇 医学
    • 57 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 31 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 150 篇 feature extracti...
  • 123 篇 semantics
  • 119 篇 accuracy
  • 89 篇 computational mo...
  • 85 篇 training
  • 82 篇 federated learni...
  • 70 篇 data models
  • 58 篇 deep learning
  • 53 篇 robustness
  • 49 篇 privacy
  • 48 篇 adaptation model...
  • 47 篇 protocols
  • 46 篇 transformers
  • 46 篇 neural networks
  • 46 篇 cryptography
  • 45 篇 optimization
  • 45 篇 data mining
  • 45 篇 security
  • 43 篇 visualization
  • 41 篇 authentication

机构

  • 265 篇 key laboratory o...
  • 206 篇 shandong provinc...
  • 158 篇 school of comput...
  • 85 篇 key laboratory o...
  • 67 篇 college of compu...
  • 66 篇 computer network...
  • 64 篇 shandong provinc...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong enginee...
  • 50 篇 shandong fundame...
  • 49 篇 beijing key labo...
  • 45 篇 institute of inf...
  • 41 篇 school of comput...
  • 40 篇 school of cyber ...
  • 39 篇 key laboratory o...
  • 38 篇 fujian provincia...
  • 36 篇 university of ch...
  • 35 篇 key laboratory o...
  • 33 篇 shandong provinc...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 28 篇 zhang min-ling
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 xiaoming wu
  • 26 篇 min-ling zhang
  • 26 篇 guo wenzhong
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 19 篇 xiangzhi liu
  • 19 篇 guang cheng
  • 19 篇 du bo
  • 19 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 15 篇 jianfeng ma

语言

  • 2,613 篇 英文
  • 381 篇 其他
  • 116 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3090 条 记 录,以下是2591-2600 订阅
排序:
AGC design in frequency modulation system for voice communication via underwater acoustic channel
收藏 引用
Sensors and Transducers 2013年 第5期152卷 116-121页
作者: Cheng, En Chen, Sheng-Li Li, Ye Ke, Fu-Yuan Yuan, Fei Key Lab of Underwater Acoustic Communication and Marine Information Tech of the Ministry of Edu Xiamen University Xiamen 361005 China Key Laboratory of Computer Network of Shandong Province Shandong Computer Science Center Jinan 250014 China
The FM modulation improves the anti-interference ability by sacrificing the bandwidth of the communication channel. In the underwater acoustic communication, as the bandwidth of the communication channel is very limit... 详细信息
来源: 评论
Joint source-channel coding for underwater image transmission
收藏 引用
Sensors and Transducers 2013年 第5期152卷 122-128页
作者: Chen, Hua-Bin Chen, Wei-Ling Li, Ye Cheng, En Yuan, Fei Key Lab of Underwater Acoustic Communication and Marine Information Tech of the Ministry of Edu Xiamen University Xiamen 361005 China Key Laboratory of Computer Network of Shandong Province Shandong Computer Science Center Jinan 250014 China
Underwater acoustic (UWA) channel is a complex time-, space- and frequency-variant channel. So to realize the high efficiency and real-time transmission of image with great data quantity, it will refer to both source ... 详细信息
来源: 评论
Quantitative Measurement of Coronary Artery Stenosis in CCTA Images Using a 2D Parametric Intensity Model
Quantitative Measurement of Coronary Artery Stenosis in CCTA...
收藏 引用
Annual International Conference of the IEEE Engineering in Medicine and Biology Society
作者: Guanyu YANG Xinglou ZHAO Lijun TANG Huzhong SHU Christine TOUMOULIN Lab of Image Science and Technology Key Laboratory of Computer Network and Information Integration (Southeast University) Dept. of Radiology the First Affiliated Hospital of Nanjing Medical University INSERM-U1099 LTSI Universite de Rennes 1
In this paper, we propose an approach based on 2D vessel model to segment the vessel lumen in three-dimensional coronary computed tomographic angiography (CCTA) images. The 2D parametric intensity model is introduced ... 详细信息
来源: 评论
Voice conversion towards modeling dynamic characteristics using switching state space model
收藏 引用
Science China(information Sciences) 2013年 第12期56卷 237-251页
作者: XU Ning BAO JingYi LIU XiaoFeng JIANG AiMing TANG YiBing College of Computer and Information Engineering Hohai University Ministry of Education Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications School of Electronic Information and Electric Engineering of Changzhou Institute of Technology
In the literature of voice conversion(VC),the method based on statistical Gaussian mixture model(GMM)serves as a ***,one of the inherent drawbacks of GMM is well-known as discontinuity problem,which is caused by trans... 详细信息
来源: 评论
Cloud Computing in Electric Vehicles Charging Control and Dispatch Optimization
Cloud Computing in Electric Vehicles Charging Control and Di...
收藏 引用
2014 IEEE International Conference on Progress in Informatics and Computing
作者: Dan Wu Bo Liu Zhijian Chen Wenyan Xie Xiang Huang Shuwei Pei Bin Sheng Donghan Feng Information Center China Southern Power Grid Co. Ltd. Dept. of Computer Science and Engineering Shanghai JiaoTong University Network & Information Branch Guangdong Electric Power Design Institute The State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Dept. of Electrical Engineering Shanghai JiaoTong University
Charging of large-scale electric vehicles will have a significantimpact on the grid sothat their charging schedule needs tobe optimized. The traditional centralized scheduling method requires high performance in infor... 详细信息
来源: 评论
Mobile Anchor Assisted Localization in Wireless Sensor networks with Regular Polygon Path
Mobile Anchor Assisted Localization in Wireless Sensor Netwo...
收藏 引用
2013 IEEE 4th International Conference on Software Engineering and Service Science
作者: Huanqing Cui Chuan'ai Zhou Xiaojing Meng Rong Hua Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center College of Information Science and Engineering Shandong University of Science and Technology
Mobile anchor assisted localization methods for wireless sensor networks can decrease the cost while improving the accuracy,and the moving trajectory is an interesting and basic issue in this kind of *** paper propose... 详细信息
来源: 评论
Provably-secure certificateless proxy re-signature scheme
Provably-secure certificateless proxy re-signature scheme
收藏 引用
5th IEEE International Conference on Intelligent networking and Collaborative Systems, INCoS 2013
作者: Xiao, Haiyan Zhang, Minqing Key Laboratory of computer Network and Information Security of Engineering Institute of the Armed Police Xi'an Shanxi China
The paper proposes a provably-secure certificateless proxy re-signature scheme. Based certificateless public cryptosystem, it solves the using of certificate in certificate-based scheme and removes key escrow in ID-ba... 详细信息
来源: 评论
Secure multi-party confidential protocol of matrix factorization
Secure multi-party confidential protocol of matrix factoriza...
收藏 引用
5th IEEE International Conference on Intelligent networking and Collaborative Systems, INCoS 2013
作者: Xiao, Haiyan Yang, Xiaoyuan Key Laboratory of computer Network Information Security of Engineering Institute of the Armed Police Xi'an Shanxi China
The confidential computation of matrix is a very important issue in secure multi-party computation. But there is no literature proposed truly multi-party confidential computation protocol on matrix factorization. In t... 详细信息
来源: 评论
Coverage Enhancement Strategy Based on Novel Perception and Co-evolution for Multimedia Sensor networks
收藏 引用
电子学报(英文版) 2013年 第1期22卷 135-140页
作者: XIAO Fu WANG Jing SUN Lijuan WANG Ruchuan GUO Jian College of Computer Nanjing University of Posts and Telecommunications Nanjing 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210003 China Key Laboratory of Broadband Wireless Communication and Sensor Network Technology Ministry of Education Nanjing 210003 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China
Coverage enhancement is one of the hot research topics in wireless multimedia sensor networks. A novel Coverage-enhancing algorithm based on three-dimensional Directional perception and co-evolution (DPCCA) is propose... 详细信息
来源: 评论
A robust approach for palm ROI extraction based on real-time region learning
收藏 引用
2012 International Conference on Service-Oriented Computing, ICSOC 2012
作者: Yan, Meng Sun, Dongmei Zhao, Shouguo Zhou, Jiajia Key Laboratory of Advanced Information Science and Network Technology of Beijing School of Computer and Information Technology Beijing Jiaotong University China
A palmprint based authentication system that can work with a popular webcam in non-contact acquisition mode is potentially a good choice for biometric ***,this camera based imaging acquisition mode causes the difficul... 详细信息
来源: 评论