咨询与建议

限定检索结果

文献类型

  • 1,706 篇 会议
  • 1,361 篇 期刊文献

馆藏范围

  • 3,067 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,032 篇 工学
    • 1,508 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 552 篇 信息与通信工程
    • 278 篇 电气工程
    • 221 篇 控制科学与工程
    • 220 篇 电子科学与技术(可...
    • 200 篇 生物工程
    • 136 篇 机械工程
    • 129 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 96 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 65 篇 动力工程及工程热...
    • 65 篇 化学工程与技术
    • 53 篇 安全科学与工程
    • 43 篇 建筑学
  • 921 篇 理学
    • 535 篇 数学
    • 218 篇 生物学
    • 198 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 75 篇 化学
  • 567 篇 管理学
    • 345 篇 管理科学与工程(可...
    • 246 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 93 篇 法学
    • 59 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 10 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 62 篇 federated learni...
  • 61 篇 deep learning
  • 45 篇 protocols
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 43 篇 security
  • 42 篇 robustness
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 164 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 30 篇 zhang min-ling
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 250 篇 其他
  • 123 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3067 条 记 录,以下是2741-2750 订阅
排序:
Cooperative Agent-based QoS Framework for heterogeneous networks
Cooperative Agent-based QoS Framework for heterogeneous netw...
收藏 引用
2011 International Conference on information Technology, computer Engineering and Management Sciences, ICM 2011
作者: Ding, Feng Zhang, Shuai Wang, Heng Huang, Songhua Tao, Jun Key Laboratory of Science and Technology on Information Systems Engineering Nanjing Research Institute of Electronics Engineering Nanjing China Key Laboratory of Computer Network and Information Integration of Ministry of Education Southeast University Nanjing China
With the fast development of network technology and expansion of the network scale, the heterogeneity of Internet makes the Quality of Service (QoS) guarantee techniques even more challenging. In this paper the state-... 详细信息
来源: 评论
Message redundancy removal of multi-copy routing in delay tolerant MANET
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2011年 第1期18卷 42-48页
作者: YU Hai-zheng MA Jian-feng BIAN Hong Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China College of Mathematics and System Sciences Xinjiang University Urumqi 830046 China School of Mathematical Sciences Xinjiang Normal University Urumqi 830054 China
This article puts forward a new scheme to control message redundancy efficiently in delay tolerant mobile Ad-hoc networks (MANET). The class of networks generally lacks end-to-end connectivity. In order to improve t... 详细信息
来源: 评论
An evolutionary algorithm for no-wait flowshop problems with flowtime minimization
An evolutionary algorithm for no-wait flowshop problems with...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Zhu, Xia Li, Xiaoping Wang, Qian School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
In this paper, no-wait flow shop scheduling problem with flowtime minimization is considered. Objective increment properties are analyzed and proved for fundamental operations of heuristics. With these properties, whe... 详细信息
来源: 评论
Performance Analysis for Intrusion Target Detection in Wireless Sensor networks
收藏 引用
电子学报(英文版) 2011年 第4期20卷 725-729页
作者: FAN Gaojuan WANG Ruchuan HUANG Haiping SUN Lijuan XIAO Fu College of Computer Nanjing University of Posts and Telecommunications Nanjing Chin School of Computer and Information Engineering Henan University Kaifeng China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Key Laboratory of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications) Ministry of Education of Jiangsu Province Nanjing China
Target detection and field surveillance are among the most prominent applications of wireless sensor networks. The quality of detection achieved by a sensor network can be quantified by evaluating the probability of d... 详细信息
来源: 评论
L-WMxD: Lexical based Webmail XSS Discoverer
L-WMxD: Lexical based Webmail XSS Discoverer
收藏 引用
2011 IEEE Conference on computer Communications Workshops, INFOCOM WKSHPS 2011
作者: Tang, Zhushou Zhu, Haojin Cao, Zhenfu Zhao, Shuai Department of Computer Science and Engineering Shanghai Jiao Tong University China Key Laboratory of Information Network Security Ministry of Public Security China
XSS (Cross-Site Scripting) is a major security threat for web applications. Due to lack of source code of web application, fuzz technique has become a popular approach to discover XSS in web application except Webmail... 详细信息
来源: 评论
Three-mobile-beacon assisted weighted centroid localization method in wireless sensor networks
Three-mobile-beacon assisted weighted centroid localization ...
收藏 引用
2011 IEEE 2nd International Conference on Software Engineering and Service Science, ICSESS 2011
作者: Cui, Huan-Qing Wang, Ying-Long Lv, Jia-Liang Mao, Yu-Ming College of Information Science and Engineering Shandong University of Science and Technology Qingdao China Shandong Provincial Key Laboratory of Computer Network Shandong Computer Science Center Jinan China
Localization is one of the key technologies in wireless sensor networks, and the mobile beacon assisted localization method is promising to reduce the cost. The methods with only one beacon introduce collinearity prob... 详细信息
来源: 评论
Knowledge discovery from noisy datasets
Knowledge discovery from noisy datasets
收藏 引用
2011 International Conference on Automation and Robotics, ICAR 2011
作者: Li, Hong Zong, Yu Chen, Enhong Key Laboratory of Network and Intelligent Information Processing Department of Computer Science and Technology Hefei University 230001 China School of Computer Science and Technology University of Science and Technology of China 230001 China
It is a significant challenges to deal with the noise data in data mining and knowledge discovery applications. Most of previous works on data cleansing and correction have been focused on addressing class noise or at... 详细信息
来源: 评论
A single Neuron Self-adaptive PID controller of Brushless DC Motor
A single Neuron Self-adaptive PID controller of Brushless DC...
收藏 引用
International Conference on Measuring Technology and Mechatronics Automation
作者: Wang, Maoli Guanghe, Cheng Kong, Xiangxin Shandong Provincial Key Laboratory of computer Network Shandong Computer Science Center Shandong 250014 China School of Electrical Information and Automation Qufu Normal University Rizhao Shandong 276826 China
This paper presents the Neuron Self-adaptive PID control of Brushless DC (BLDC) Motor. It is difficult to tune the parameters and get satisfied control characteristics by using normal PID controller. As the single neu... 详细信息
来源: 评论
A new digital video watermark algorithm based on the HVS
A new digital video watermark algorithm based on the HVS
收藏 引用
2011 International Conference on Internet Computing and information Services, ICICIS 2011
作者: Liao, Lufang Zheng, Xiaoshi Zhao, Yanling Liu, Guangqi Shandong Computer Science Center Shandong Provincial Key Laboratory of Computer Network Technology Jinan China School of Information Science and Technology Shandong Institute of Light Industry SDILI Jinan China
The algorithm applied to video watermark based on HVS is rare recently , but adaptively selecting the embedding position and the embedding strength according to the host(such as videos, images etc.) is necessary, whic... 详细信息
来源: 评论
Detecting DDoS Attack With Hilbert-Huang Transformation
收藏 引用
China Communications 2011年 第2期8卷 126-133页
作者: 郑康锋 王秀娟 杨义先 郭世泽 Key Laboratory of Network and Information Attack & Defense Technology of MOE Beijing University of Posts and Telecommunications College of Computer Sciences Beijing University of Technology
DDoS detection has been the research focus in the field of information security. Existing detecting methods such as Hurst parameter method and Markov model must ensure that the network traffic signal f(t) is a station... 详细信息
来源: 评论