咨询与建议

限定检索结果

文献类型

  • 1,706 篇 会议
  • 1,361 篇 期刊文献

馆藏范围

  • 3,067 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,032 篇 工学
    • 1,508 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 552 篇 信息与通信工程
    • 278 篇 电气工程
    • 221 篇 控制科学与工程
    • 220 篇 电子科学与技术(可...
    • 200 篇 生物工程
    • 136 篇 机械工程
    • 129 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 96 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 65 篇 动力工程及工程热...
    • 65 篇 化学工程与技术
    • 53 篇 安全科学与工程
    • 43 篇 建筑学
  • 921 篇 理学
    • 535 篇 数学
    • 218 篇 生物学
    • 198 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 75 篇 化学
  • 567 篇 管理学
    • 345 篇 管理科学与工程(可...
    • 246 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 93 篇 法学
    • 59 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 10 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 62 篇 federated learni...
  • 61 篇 deep learning
  • 45 篇 protocols
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 43 篇 security
  • 42 篇 robustness
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 164 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 30 篇 zhang min-ling
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 250 篇 其他
  • 123 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3067 条 记 录,以下是2721-2730 订阅
排序:
Differentiated priority queue management in event-driven wireless sensor networks
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2012年 第SUPPL.期23卷 120-125页
作者: Yang, Qi Dong, Yong-Qiang School of Computer Science and Engineering Southeast University Nanjing 211189 China Key Laboratory of Computer Network and Information Integration of Ministry of Education Southeast University Nanjing 211189 China
In event-driven wireless sensor networks, many redundant packets flow from monitored sites through the network and to the sink, resulting in a typical funnel effect which affects event reliability, negatively. Taking ... 详细信息
来源: 评论
miRDeathDB:a database bridging microRNAs and the programmed cell death
miRDeathDB:a database bridging microRNAs and the programmed ...
收藏 引用
第五届全国生物信息学与系统生物学学术大会暨国际生物信息学前沿研讨会高通量时代的生物信息学与系统生物学
作者: Jianzhen Xu Yan-Hui Li College of Bioengineering Henan University of TechnologyZhengzhouChina 450001 Institute of Cardiovascular Sciences and Key Laboratory of Molecular Cardiovascular Sciences Ministry of EducationPeking University Health Science Center Scientific Data Center Computer Network Information CenterChinese Academy of Sciences
Background:MicroRNAs(miRNAs) are a class of small non-coding RNAs,which negatively regulate protein coding genes at the posttranscriptional *** tiny regulators have been associated to almost all known physiological an... 详细信息
来源: 评论
Wireless sensor network-enabled intravenous infusion monitoring
Wireless sensor network-enabled intravenous infusion monitor...
收藏 引用
作者: Zhang, Y. Zhang, S.F. Ji, Y. Wu, G.X. Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
Considering that intravenous in blood infusion, usually applied without a proper control of the progress and velocity under unreliable manual monitoring practice, is the most popular and frequent clinical activity thr... 详细信息
来源: 评论
Restrictive mechanism of flow control among non-cooperative Internet users
收藏 引用
Science China(information Sciences) 2011年 第1期54卷 12-22页
作者: TAO Jun1,2,ZHONG Xiao1,2 & LU YiFei1,2 1key laboratory of computer network and information Integration,Southeast University, Ministry of Education,Nanjing 210096,China 2School of computer Science and Engineering,Southeast University,Nanjing 210096,China 1. Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing 210096 China2. School of Computer Science and Engineering Southeast University Nanjing 210096 China
The flow and congestion control methods based on one-shot game model with non-cooperative game theory can explain the non-cooperative behavior of Internet ***,the low effciency of equilibrium solutions affects their *... 详细信息
来源: 评论
Lightweight Privacy-Aware Yet Accountable Secure Scheme for SM-SGCC Communications in Smart Grid
收藏 引用
Tsinghua Science and Technology 2011年 第6期16卷 640-647页
作者: Wei Ren Jun Song Yu Yang Yi Ren School of Computer Science China University of Geosciences Wuhan 430074 China Shandong Provincial Key Laboratory of Computer Network Jinan 250014 China Key Laboratory of Network and Information Attack and Defense Technology of Ministry of Education Beijing University of Posts and Telecommunications Beijing100876 China Department of Information and Communication Technology University of Agder (UiA) Grimstad Norway
Smart grid is envisioned as a critical application of cyber-physical systems and of the internet of things. In the smart grid, smart meters equipped with wireless sensors can upload meter readings (data) to smart gr... 详细信息
来源: 评论
Anonymous authentication-oriented vehicular privacy protection technology research in VANET
Anonymous authentication-oriented vehicular privacy protecti...
收藏 引用
2nd Annual Conference on Electrical and Control Engineering, ICECE 2011
作者: Zhang, Shuai Tao, Jun Yuan, Yijia Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
Vehicular Ad hoc networks (VANET) consists of several vehicular nodes and uses 802.11p protocol for communication. Because of its unique characteristics, such as fast speed, serious Doppler effect, large node number e... 详细信息
来源: 评论
Universal Three-Party Quantum Secret Sharing Against Collective Noise
收藏 引用
Communications in Theoretical Physics 2011年 第4期55卷 589-593页
作者: 杨宇光 王园 滕义伟 温巧燕 College of Computer Science and Technology Beijing University of Technology State Key Laboratory of Integrated Services Network Xidian University State Key Laboratory of Information Security(Graduate University of Chinese Academy of Sciences) State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications
we present a robust and universal quantum secret sharing protocol with four-qubit decoherence-free (DF) states against collective noise. The transmission's safety is ensured by the nonorthogonality of the noiseless... 详细信息
来源: 评论
A public cryptosystem from R-LWE
A public cryptosystem from R-LWE
收藏 引用
IEEE International Conference on Communication Software and networks
作者: Wei, Ping Wu, Liqiang Yang, Xiaoyuan Hao, Bin Key Laboratory of Network and Information Security of APF Engineering College of APF Xi'an 710086 China Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China
Recently Vadim Lyubashevsky etc. built LWE problem on ring and proposed a public cryptosystem based on R-LWE, which, to a certain extent, solved the defect of large public key of this kind, but it didn't offer par... 详细信息
来源: 评论
A fast broadcast protocol for wireless sensor networks
A fast broadcast protocol for wireless sensor networks
收藏 引用
4th International Conference on Human-Centric Computing, HumanCom'11 and the 6th International Conference on Embedded and Multimedia Computing, EMC'11
作者: Zhang, Yang Wang, Yun School of Computer Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration MOE Nanjing China
Broadcast is a hot topic in wireless sensor network research. The main challenges are from network instability and complexity of communication collision. Currently, the broadcast protocols for sensor network focus on ... 详细信息
来源: 评论
High-Order Bit Independence Criterion Test for the S-boxes
收藏 引用
Wuhan University Journal of Natural Sciences 2011年 第5期16卷 447-451页
作者: GAO Sheng MA Wenping ZHU Jiwei Key Laboratory of Computer Network and Information Securityof the Ministry of Education/Xidian University Xi'an 710071Shannxi China
A new security test for the substitution boxes (S-boxes) high-order bit independence criterion (HOBIC) test, is presented. Different from the previous security tests for S-boxes, the HOBIC test can be used to meas... 详细信息
来源: 评论