咨询与建议

限定检索结果

文献类型

  • 1,706 篇 会议
  • 1,361 篇 期刊文献

馆藏范围

  • 3,067 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,032 篇 工学
    • 1,508 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 552 篇 信息与通信工程
    • 278 篇 电气工程
    • 221 篇 控制科学与工程
    • 220 篇 电子科学与技术(可...
    • 200 篇 生物工程
    • 136 篇 机械工程
    • 129 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 96 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 65 篇 动力工程及工程热...
    • 65 篇 化学工程与技术
    • 53 篇 安全科学与工程
    • 43 篇 建筑学
  • 921 篇 理学
    • 535 篇 数学
    • 218 篇 生物学
    • 198 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 75 篇 化学
  • 567 篇 管理学
    • 345 篇 管理科学与工程(可...
    • 246 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 93 篇 法学
    • 59 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 10 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 62 篇 federated learni...
  • 61 篇 deep learning
  • 45 篇 protocols
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 43 篇 security
  • 42 篇 robustness
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 164 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 30 篇 zhang min-ling
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 250 篇 其他
  • 123 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3067 条 记 录,以下是2791-2800 订阅
排序:
RETRACTED ARTICLE: An approach to evaluate the effects of virtual topology on in-band crosstalk attack propagation in transparent optical networks
收藏 引用
Photonic network Communications 2012年 第2期24卷 166-166页
作者: Xiao, Yonghua Peng, Yunfeng Sun, Zeyu Zhao, Changming Long, Keping Key Laboratory of Optical Fiber Sensing and Communications Education Ministry of China University of Electronic Science and Technology of China Chengdu China Institute of Advanced Network Technology and New Services (ANTS) School of Computer and Communication Engineering (CCE) University of Science and Technology Beijing (USTB) Beijing China College of Communication and Information Engineering Chongqing University of Posts and Telecommunications Chongqing China
来源: 评论
Threshold-based message copies control in delay tolerant networks
收藏 引用
Journal of networks 2011年 第1期6卷 96-103页
作者: Yu, Haizheng Bian, Hong College of Mathematics and System Sciences Xinjiang University Urumqi China Key Laboratory of Computer Network and Information Security Xidian University Xi'an China School of Mathematical Sciences Xinjiang Normal University Urumqi Xinjiang China
Delay Tolerant networks (DTN) generally lack end-to-end connectivity and multiple message copies routing protocols are often used to improve the efficiency that messages are delivered successfully, but network load is... 详细信息
来源: 评论
Runtime-Based Boot Components Re-measurement Scheme for Trusted Platform
Runtime-Based Boot Components Re-measurement Scheme for Trus...
收藏 引用
2011 International Conference on Informatics,Cybernetics,and computer Engineering(ICCE 2011)
作者: Peng Weiping Zhou Yajian Wang Cong Yang Yixian Key Laboratory of Network and Information Attack & Defence Technology of MOE Beijing University of Posts and Telecommunications School of Computer Science and Technology Henan Polytechnic University Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications
Integrity measurement is just one of the most important features in a trusted computing platform to provide evidence of platform configuration and behavior. Each set of software instructions(binary code) is measured a... 详细信息
来源: 评论
An anonymity and authentication mechanism for internet of things
收藏 引用
Journal of Convergence information Technology 2011年 第3期6卷 98-105页
作者: Wang, Xiaoliang Sun, Xingming Yang, Hengfu Shah, Saeed Arif College of Information Engineering Xiangtan University Xiangtan 411105 China Department of Computer Science and Technology Nanjing University of Information Science and Technology Nanjin 210044 China Department of Information Science and Engineering Hunan First Normal University Changsha 410205 China Hunan Provincial Key Laboratory of Network and Information Security Hunan University Changsha 410082 China
Authentication has received increasing attention in the literatures of Internet of Things. At the same time, numerous concerns have been raised about the issue of anonymity due to users' awareness of their privacy... 详细信息
来源: 评论
SWP2P: P2P anonymous trace system based on superposition watermarking
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2011年 第8期5卷 116-126页
作者: Wang, Xiaoliang Sun, Xingming Yang, Hengfu Shah, Saeed Arif College of Information Engineering Xiangtan University Xiangtan 411105 China Department of Computer Science and Technology Nanjing University of Information Science and Technology Nanjin 210044 China Department of Information Science and Engineering Hunan First Normal University Changsha 410205 China Hunan Provincial Key Laboratory of Network and Information Security Hunan University Changsha 410082 China
A lot of attention has been paid to anonymity due to the users' privacy protection. While peer-topeer (P2P) networks need anonymity capacity, the authority also requires partner traceability to prevent anonymous a... 详细信息
来源: 评论
Genetic Algorithm-Based Power Management in Cloud Platform
Genetic Algorithm-Based Power Management in Cloud Platform
收藏 引用
International Conference on Internet Technology and Applications (iTAP)
作者: Zili Xiong Zhang Zhang Huafeng Kong Deqing Zou School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Key Laboratory of Information Network Security Ministry of Public Security Third Research Institute of Ministry of Public Security Shanghai China
Cloud computing is a novel computing pattern, and it can provide underlying hardware resource for cloud users on demand. Virtualization is the key technology of cloud computing, and it provides the technical support f... 详细信息
来源: 评论
Conflict-Free Transmission Schedule Based on network Coding in Wireless networks
Conflict-Free Transmission Schedule Based on Network Coding ...
收藏 引用
WRI International Conference on Communications and Mobile Computing, CMC
作者: Jing Wang Xiangyang Liu Xinmei Wang School of Information Engineering Chang'an University Xi'an China Computer Network Teaching Office Xian Communications College Xi'an China State Key Laboratory of Integrated Service Networks Xidian University Xi'an China
In wireless networks, the cross-layer design of joint medium access control and network coding can avoid destructive interferences among concurrent transmissions. Wireless network codes in conjunction with conflict-fr... 详细信息
来源: 评论
A Dynamic Resource Allocation Algorithm for Database-as-a-Service
A Dynamic Resource Allocation Algorithm for Database-as-a-Se...
收藏 引用
IEEE International Conference on Web Services (ICWS)
作者: Jie Zhu Bo Gao Zhihu Wang Berthold Reinwald Changjie Guo Xiaoping Li Wei Sun School of Computer Science & Engineering South-East University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education China IBM Research China Beijing China IBM Almaden Research Center San Jose CA USA
In Database-as-a-Service (DBaaS), a large number of tenants share DBaaS resources (CPU, I/O and Memory). While the DBaaS provider runs DBaaS to "share" resources across the entire tenant population to maximi... 详细信息
来源: 评论
A novel framework for gene selection
收藏 引用
International Journal of Advancements in Computing Technology 2011年 第3期3卷 184-191页
作者: Zhao, Wei Wang, Gang Wang, Hong-bin Chen, Hui-ling Dong, Hao Zhao, Zheng-dong Network Information Center Changchun University of Science and Technology Changchun 130022 China College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
Microarray data are highly redundant and noisy, and most genes are believed to be uninformative with respect to studied classes, as only a fraction of genes may present distinct profiles for different classes of sampl... 详细信息
来源: 评论
Blind Carrier Frequency Offset Estimation for MIMO OFDMA Uplink
Blind Carrier Frequency Offset Estimation for MIMO OFDMA Upl...
收藏 引用
2011 IEEE Global Telecommunications Conference - GLOBECOM 2011
作者: Weile Zhang H. Chen Qinye Yin T. Ohtsuki MOE Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an China The State Key Laboratory of Integrated Services Networks Xidian University China Institute of Industrial Science University of Tokyo Tokyo Japan Department of Information and Computer Science Keio University Yokohama Japan
In this paper, we develop a new subspace based multiuser carrier frequency offset (CFO) estimation scheme for multi-input multi- output (MIMO) orthogonal frequency division multiple access (OFDMA) uplink transmission.... 详细信息
来源: 评论