咨询与建议

限定检索结果

文献类型

  • 1,702 篇 会议
  • 1,349 篇 期刊文献

馆藏范围

  • 3,051 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,017 篇 工学
    • 1,493 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 546 篇 信息与通信工程
    • 275 篇 电气工程
    • 214 篇 电子科学与技术(可...
    • 208 篇 控制科学与工程
    • 199 篇 生物工程
    • 134 篇 机械工程
    • 127 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 97 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 67 篇 交通运输工程
    • 65 篇 化学工程与技术
    • 64 篇 动力工程及工程热...
    • 54 篇 安全科学与工程
    • 42 篇 建筑学
  • 920 篇 理学
    • 532 篇 数学
    • 219 篇 生物学
    • 199 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 75 篇 化学
  • 565 篇 管理学
    • 344 篇 管理科学与工程(可...
    • 244 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 94 篇 法学
    • 60 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 31 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 135 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 59 篇 deep learning
  • 59 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 44 篇 privacy
  • 42 篇 robustness
  • 41 篇 security
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 225 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 162 篇 school of comput...
  • 83 篇 key laboratory o...
  • 67 篇 computer network...
  • 67 篇 college of compu...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 39 篇 fujian provincia...
  • 37 篇 school of cyber ...
  • 36 篇 university of ch...
  • 36 篇 shandong provinc...
  • 35 篇 key laboratory o...
  • 31 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 28 篇 zhang min-ling
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 26 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 20 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 237 篇 其他
  • 120 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3051 条 记 录,以下是2661-2670 订阅
排序:
Structural Basis for the Thermostability of Sulfur Oxygenase Reductases
收藏 引用
Chinese Journal of Chemical Engineering 2012年 第1期20卷 52-61页
作者: 尤晓颜 孟珍 陈栋炜 郭旭 Josef Zeyer 刘双江 姜成英 State Key Laboratory of Microbial Resources Institute of MicrobiologyChinese Academy of Sciences Scientific Data Center Computer Network Information CenterChinese Academy of Sciences Environmental Microbiology Institute for Biogeochemistry and Pollutant Dynamics(IBP)Federal Institute of Technology(ETH)Switzerland
The thermostability of three sulfur oxygenase reductases (SORs) was investigated from thermoacidophilic achaea Acidianus tengchongensis (SORAT) and Sulfolobus tokodaii (SORsT) as well as the moderately thermophi... 详细信息
来源: 评论
Microblog bursty feature detection based on dynamics model
Microblog bursty feature detection based on dynamics model
收藏 引用
International Conference on Systems and Informatics (ICSAI)
作者: Yanyan Du Wei Wu Yanxiang He Nan Liu School of Computer Wuhan University of China Wuhan China Key Laboratory of Information Network Security Ministry of Public Security Shanghai China
Microblog is becoming more and more popular in our life. Due to the numerous information on this platform, it is very useful to detect bursty topic in real-time to help people get essential information quickly. As a n... 详细信息
来源: 评论
Generalized geometry-based optimal power control in wireless networks
Generalized geometry-based optimal power control in wireless...
收藏 引用
2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and networks, SECON 2012
作者: Wang, Wei Shin, Kang G. Zhang, Zhaoyang Wang, Wenbo Peng, Tao Department of Information Science and Electronic Engineering Zhejiang Provincial Key Laboratory of Information Network Technology Zhejiang University Hangzhou 310027 China Department of Electrical Engineering and Computer Science University of Michigan Ann Arbor MI 48109-2121 United States Wireless Signal Processing and Networking Lab Beijing University of Posts and Telecommunications Beijing 100876 China
Geometry-based optimal power control was proposed in [14] to transform the power-control problem to a new geometrical problem on the position relationship between a line and some points. This scheme provides a novel v... 详细信息
来源: 评论
Path planning of mobile anchor in three-dimensional wireless sensor networks for localization
收藏 引用
Journal of information and Computational Science 2012年 第8期9卷 2203-2210页
作者: Cui, Huanqing Wang, Yinglong Lv, Jialiang College of Information Science and Engineering Shandong University of Science and Technology Qingdao 266590 China Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center Ji'nan 250014 China
Node-localization is one of the key technologies of wireless sensor networks, and mobile-anchor assisted localization method is a promising method of saving network cost. The path planning of mobile anchor is a basis ... 详细信息
来源: 评论
Analysis of modular inverse and improvement of extended euclid algorithm
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2012年 第7期6卷 225-233页
作者: Xin, Li Ru, Zhang Xinxin, Niu Junfeng, Xu Information Security Center Beijing University of Posts and Telecommunications China Information Security Center Beijing University of Posts and Telecommunications Key Laboratory of Information Network Security Ministry of Public Security China National Computer network Emergency Response technical Team/Coordination Center of China China
The properties of modular inverse were analyzed and gain to improve the extended Euclid algorithm. In the new scheme, even-reduction and remainder-attenuation were proposed which insured the remainder be attenuated to... 详细信息
来源: 评论
Security Analysis of an Electronic Commerce Protocol Using Casper/FDR2
Security Analysis of an Electronic Commerce Protocol Using C...
收藏 引用
第六届中国可信计算与信息安全学术会议
作者: CHANG Yinlong HU Huaping Department of Mathematics and Computer Science/Key Laboratory of Information Security of Network Sys School of Computer Science National University of Defense TechnologyChangsha 410073HunanChina
Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure *** article extends model checking method with Casper/FDR2 to model an... 详细信息
来源: 评论
Provably secure and effcient identity-based signature scheme based on cubic residues
收藏 引用
International Journal of network Security 2012年 第1期14卷 33-38页
作者: Wang, Zhiwei Wang, Licheng Zheng, Shihui Yang, Yixian Hu, Zhengming Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China College of Computer Nanjing University of Posts and Telecommunications China
Many identity based signature (IBS) schemes have been proposed so far. However, most of the schemes are based on bilinear pairings. Only a few IBS schemes are with-out pairings. Up to now, there still remains a challe... 详细信息
来源: 评论
Performance analysis of vector OFDM with linear MMSE receiver
Performance analysis of vector OFDM with linear MMSE receive...
收藏 引用
2012 1st IEEE International Conference on Communications in China, ICCC 2012
作者: Li, Yabo Ngebani, Ibo Xia, Xiang-Gen Høst-Madsen, Anders Department of Information Science and Electrical Engineering Zhejiang Provincial Key Laboratory of Information Network Technology Zhejiang University Hangzhou Zhejiang China Department of Electrical and Computer Engineering University of Delaware Newark DE 19716 United States Department of Electrical Engineering University of Hawaii at Manoa Honolulu HI 96822 United States Chonbuk National University Jeonju Korea Republic of
Vector OFDM (V-OFDM) for single transmit antenna systems is a general transmission scheme in which OFDM and Single-Carrier Frequency Domain Equalization (SC-FDE) can be considered as two extreme/special cases. Due to ... 详细信息
来源: 评论
A generic approach for providing revocation support in secret handshake
A generic approach for providing revocation support in secre...
收藏 引用
14th International Conference on information and Communications Security, ICICS 2012
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Ding, Xuhua Zhou, Jianying Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai China School of Information Systems Singapore Management University Singapore Singapore
Privacy protection and user revocation are essentially conflicting requirements in many cryptographic protocols. It is a particularly challenging problem to harmonize them in a secret handshake protocol that is geared... 详细信息
来源: 评论
DRTEMBB: Dynamic recommendation trust evaluation model based on bidding
收藏 引用
Journal of Multimedia 2012年 第4期7卷 279-288页
作者: Wang, Gang Gui, Xiao-lin Department of Electronics and Information Engineering Xi'an Jiaotong University Xi'an China Shanxi Province Key Laboratory of Computer Network Xi'an Jiaotong University Xi'an China School of Information Xi'an University of Finance and Economics Xi'an China
Fraud or cheating of malicious nodes were restrained by reducing the trust value of malicious nodes in the past trust model, but few recommendation nodes for cooperation cheating are punished, so it has had only limit... 详细信息
来源: 评论