咨询与建议

限定检索结果

文献类型

  • 1,702 篇 会议
  • 1,349 篇 期刊文献

馆藏范围

  • 3,051 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,017 篇 工学
    • 1,493 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 546 篇 信息与通信工程
    • 275 篇 电气工程
    • 214 篇 电子科学与技术(可...
    • 208 篇 控制科学与工程
    • 199 篇 生物工程
    • 134 篇 机械工程
    • 127 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 97 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 67 篇 交通运输工程
    • 65 篇 化学工程与技术
    • 64 篇 动力工程及工程热...
    • 54 篇 安全科学与工程
    • 42 篇 建筑学
  • 920 篇 理学
    • 532 篇 数学
    • 219 篇 生物学
    • 199 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 75 篇 化学
  • 565 篇 管理学
    • 344 篇 管理科学与工程(可...
    • 244 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 94 篇 法学
    • 60 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 31 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 135 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 59 篇 deep learning
  • 59 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 privacy
  • 42 篇 robustness
  • 41 篇 security
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 162 篇 school of comput...
  • 83 篇 key laboratory o...
  • 67 篇 computer network...
  • 67 篇 college of compu...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 39 篇 fujian provincia...
  • 37 篇 school of cyber ...
  • 36 篇 university of ch...
  • 36 篇 shandong provinc...
  • 35 篇 key laboratory o...
  • 31 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 28 篇 zhang min-ling
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 26 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 237 篇 其他
  • 120 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3051 条 记 录,以下是2611-2620 订阅
排序:
Dynamic bandwidth allocation& guarantee for virtualized networks in cloud
Dynamic bandwidth allocation& guarantee for virtualized netw...
收藏 引用
International Conference on information, Communications and Signal Processing
作者: Xuan Luo Pengfei Zhang Tong Ye Yaohui Jin Jianping Wang Network and Information Center Shanghai Jiaotong University State Key Laboratory of Advanced Optical Communication Systems & Networks Shanghai Jiaotong University Department of Computer Science City University of Hong Kong
Among all SLAs(Service Level Agreements) about network resources in the cloud, a critical problem would be achieving bandwidth guarantee under all communication environment (e.g., when misbehaved VMs exist) while keep... 详细信息
来源: 评论
Using Chou’s Pseudo Amino Acid Composition for Protein Remote Homology Detection
收藏 引用
Engineering(科研) 2013年 第10期5卷 149-153页
作者: Bin Liu Xiaolong Wang School of Computer Science and Technology Harbin Institute of Technology Shenzhen Graduate School Shenzhen Guangdong China Key Laboratory of Network Oriented Intelligent Computation Harbin Institute of Technology Shenzhen Graduate School Shenzhen Guangdong China Shanghai Key Laboratory of Intelligent Information Processing Shanghai China School of Computer Science and Technology Harbin Institute of Technology Shenzhen Graduate School Shenzhen Guangdong China Key Laboratory of Network Oriented Intelligent Computation Harbin Institute of Technology Shenzhen Graduate School Shenzhen Guangdong China
Protein remote homology detection is a key problem in bioinformatics. Currently, the discriminative methods, such as Support Vector Machine (SVM), can achieve the best performance. The most efficient approach to impro... 详细信息
来源: 评论
Research on network malicious code dendritic cell immune algorithm based on fuzzy weighted support vector machine
Research on network malicious code dendritic cell immune alg...
收藏 引用
6th China Conference of Wireless Sensor networks, CWSN 2012
作者: Li, Peng Wang, Ruchuan Zhou, Yanting Dai, Qiuyu College of Computer Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing Jiangsu 210003 China Key Lab. of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing Jiangsu 210003 China College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications Nanjing Jiangsu 210003 China
According to the significant impact on the accuracy rate of detection of current immune algorithms brought by incorrect classification of signal, it proposes network malicious code dendritic cell immune algorithm base... 详细信息
来源: 评论
Performance analysis of optimal relay selective cooperation in railway network
Performance analysis of optimal relay selective cooperation ...
收藏 引用
5th IET International Conference on Wireless, Mobile and Multimedia networks (ICWMMN 2013)
作者: Jia You Zhangdui Zhong Shan Yang Yang Liu Gongpu Wang State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing China Network Technology Research Institute China United Network Communications Co. Ltd School of Computer and Information Technology Beijing Jiaotong University Beijing China
In the railway network, the fact that signal amplitude suffers loss resulted from signal traversing through the carriage which named by carriage pass loss, highly influences the reliability of the wireless communicati...
来源: 评论
Research on short-term wind farm output power prediction model based on meteorological data collected by WSN
收藏 引用
International Journal of Hybrid information Technology 2013年 第5期6卷 219-226页
作者: Ma, Li Li, Bo Jie, Du Shen, Jian Wang, Jin Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China Key Laboratory of Meteorological Disaster of Ministry of Education Nanjing University of Information Science and Technology Nanjing 210044 China
The prediction of wind farm output power is considered as an effective way to increase the wind power capacity and improve the safety and economy of power system. It is one of the hot research topics on wind power. Th... 详细信息
来源: 评论
Overlapping community detection combining content and link
收藏 引用
Journal of Zhejiang University-Science C(computers and Electronics) 2012年 第11期13卷 828-839页
作者: Zhou-zhou HE Zhong-fei(Mark)ZHANG Philip S.YU Zhejiang Provincial Key Laboratory of Information Network Technology Department of Information Science and Electronic EngineeringZhejiang UniversityHangzhou 310027China Department of Computer Science University of Illinois at ChicagoIL 60607USA
In classic community detection, it is assumed that communities are exclusive, in the sense of either soft clustering or hard clustering. It has come to attention in the recent literature that many real-world problems ... 详细信息
来源: 评论
Nonlinearity profile test for an S-box
收藏 引用
2011 International Conference on Future Wireless networks and information Systems, ICFWI 2011
作者: Gao, Sheng Ma, Wenping Zhu, Jiwei Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China
A new security test for substitution boxes (S-boxes), the nonlinearity profile test, is presented, together with its results over the S-boxes of DES and AES. The test can be used to measure the global nonlinearity for... 详细信息
来源: 评论
A memory and variable neighborhood structure based complete local search for the no-wait job shop problem
A memory and variable neighborhood structure based complete ...
收藏 引用
2012 IEEE 16th International Conference on computer Supported Cooperative Work in Design, CSCWD 2012
作者: Li, Minmin Zhu, Jie Li, Xiaoping Key Laboratory of Computer Network and Information Integration of Ministry of Education School of Computer Science and Engineering Southeast University Nanjing China
In this paper, an effective metaheuristic is developed for the no-wait job shop problem with the objective of makespan minimization, which is strongly NP-hard. The problem is usually decomposed into a sequencing sub-p... 详细信息
来源: 评论
A netflow v9 measurement system with network performance function  5th
收藏 引用
5th International Conference on Internet and Distributed Computing Systems, IDCS 2012
作者: Cheng, Guang Wu, Hua School of Computer Science and Engineering Southeast University Nanjing210096 China Key Laboratory of Computer Network and Information Integration Ministry of Education China
Netflow can be employed for accounting, anomaly detection and network monitoring, and can bring new data source for network management. But most IPv6 routers in CERNET2 backbone network don’t provide IPFIX or NetFlow... 详细信息
来源: 评论
Estimation packet loss ratios for the two segments of end-to-end path on the monitor
Estimation packet loss ratios for the two segments of end-to...
收藏 引用
2012 International Conference on computer Science and Service System, CSSS 2012
作者: Cheng, Guang Gao, Zhongyao School of Computer Science and Engineering Southeast University Nanjing 210096 China Key Laboratory of Computer Network and Information Integration Ministry of Education China
Packet loss may cause the degradation of network and application performance. This paper proposes a passive measurement method called LTS to estimate end-to-end path packet loss ratio for the two segments of the path ... 详细信息
来源: 评论