咨询与建议

限定检索结果

文献类型

  • 1,706 篇 会议
  • 1,361 篇 期刊文献

馆藏范围

  • 3,067 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,032 篇 工学
    • 1,508 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 552 篇 信息与通信工程
    • 278 篇 电气工程
    • 221 篇 控制科学与工程
    • 220 篇 电子科学与技术(可...
    • 200 篇 生物工程
    • 136 篇 机械工程
    • 129 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 96 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 65 篇 动力工程及工程热...
    • 65 篇 化学工程与技术
    • 53 篇 安全科学与工程
    • 43 篇 建筑学
  • 921 篇 理学
    • 535 篇 数学
    • 218 篇 生物学
    • 198 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 75 篇 化学
  • 567 篇 管理学
    • 345 篇 管理科学与工程(可...
    • 246 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 93 篇 法学
    • 59 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 10 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 62 篇 federated learni...
  • 61 篇 deep learning
  • 45 篇 protocols
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 43 篇 security
  • 42 篇 robustness
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 164 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 30 篇 zhang min-ling
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 250 篇 其他
  • 123 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3067 条 记 录,以下是2801-2810 订阅
排序:
Distributed Angle Estimation for Wireless Sensor network Localization with Multipath Fading
Distributed Angle Estimation for Wireless Sensor Network Loc...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Weile Zhang Qinye Yin Hongyang Chen Wenjie Wang Tomoaki Ohtsuki MOE Key Laboratory for Intelligent Networks and Network Security Xi''an Jiaotong University Xi'an China Institute of Industrial Science University of Tokyo Tokyo Japan Department of Information and Computer Science Keio University Yokohama Japan
In this paper, we propose a distributed angle estimation method for wireless sensor network localization with multipath fading. The multiple antenna system is equipped at the anchor and the angle of departure (AOD) ca... 详细信息
来源: 评论
Strong Security Enabled Certificateless Aggregate Signatures Applicable to Mobile Computation
Strong Security Enabled Certificateless Aggregate Signatures...
收藏 引用
International Conference on Intelligent networking and Collaborative Systems (INCOS)
作者: Hu Xiong Qianhong Wu Zhong Chen Key Laboratory of Network and Software Security Assurance of the Ministry of Education Institute of Software School of Electronics Engineering and Computer Science Peking University Beijing China Department of Computer Engineering and Mathematics UNESCO Chair in Data Pr Universitat Rovira i Virgili Tarragona Spain Key Laboratory of AeroSpace Information Security and Trusted Computing Ministry of Education School of Computer Wuhan University of China China
An aggregate signature scheme allows a public algorithm to aggregate n signatures of n distinct messages from n signers into a single signature. By validating the single resulting signature, one can be convinced that ... 详细信息
来源: 评论
Genetic algorithm-based power management in cloud platform
Genetic algorithm-based power management in cloud platform
收藏 引用
International Conference on Internet Technology and Applications
作者: Xiong, Zili Zhang, Zhang Kong, Huafeng Zou, Deqing School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China Key Laboratory of Information Network Security Ministry of Public Security Third Research Institute of Ministry of Public Security Shanghai 201204 China
Cloud computing is a novel computing pattern, and it can provide underlying hardware resource for cloud users on demand. Virtualization is the key technology of cloud computing, and it provides the technical support f... 详细信息
来源: 评论
A Novel Effective ICI Self-Cancellation Method
A Novel Effective ICI Self-Cancellation Method
收藏 引用
2011 IEEE Global Telecommunications Conference - GLOBECOM 2011
作者: Miao-Wen Wen Xiang Cheng Xing Wei Bo Ai Bing-Li Jiao School of Electronics Engineering & Computer Science Peking University Beijing China Key Laboratory of Wireless Sensor Network & Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Shanghai China School of Information and Electronics Beijing Institute of Technology Beijing China State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing China
Orthogonal Frequency Division Multiplexing (OFDM) systems may suffer from both carrier frequency offset (CFO) and in-phase/quadrature-phase (I/Q) imbalance at the receiver front end. In this paper, a novel type of int... 详细信息
来源: 评论
A fuzzy adaptive multi-population parallel genetic algorithm for spam filtering
收藏 引用
Journal of Convergence information Technology 2011年 第2期6卷 172-182页
作者: Zhao, Zheng-dong Wang, Gang Zhao, Wei Chen, Hui-ling Zhao, Wei Li, Lu-lu Network Information Center Changchun University of Science and Technology Changchun China College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China Department of Information Engineering Jilin Police College China Branch Institute of information technology Changchun Vocational Institute of Technology Changchun China
Nowadays, e-mail is one of the most inexpensive and expeditious means of communication. However, a principal problem of any internet user is the increasing number of spam, and therefore an efficient spam filtering met... 详细信息
来源: 评论
Large scale plane wave pseudopotential density functional theory calculations on GPU clusters
Large scale plane wave pseudopotential density functional th...
收藏 引用
2011 International Conference for High Performance Computing, networking, Storage and Analysis, SC11
作者: Wang, Long Jia, Weile Chi, Xuebin Wu, Yue Gao, Weiguo Wang, Lin-Wang Supercomputing Center of Computer Network Information Center Chinese Academy of Sciences No. 4 South 4th Street ZhongGuanCun Beijing China School of Mathematical Sciences Fudan University 220 Handan Road Shanghai 200433 China MOE Key Laboratory of Computational Physical Sciences School of Mathematical Sciences Fudan University 220 Handan Road Shanghai 200433 China Lawrence Berkeley National Laboratory Material Science Division Mail stop 50F One Cyclotron Road Berkeley CA 94720 United States
In this work, we present our implementation of the density functional theory (DFT) plane wave pseudopotential (PWP) calculations on GPU clusters. This GPU version is developed based on a CPU DFT-PWP code: PEtot, which... 详细信息
来源: 评论
Based on Ajax technology's online time functional analysis and implementation
Based on Ajax technology's online time functional analysis a...
收藏 引用
International Conference on computer Science and Service System (CSSS)
作者: Lei Xia Shujun Zhang School of computer and information technology Beijing key laboratory of advanced information science and network technology Beijing Jiaotong University Beijing China
With the continuous development of Internet technology and Page Content's Diversity form, Traditional page model Shows its drawbacks. Ajax technology can transfer important information between client and Server-si... 详细信息
来源: 评论
The Evolutionary Dynamics of Apomixis in Ferns: A Case Study from Polystichoid Ferns
收藏 引用
Journal of Botany 2012年 第1期2012卷
作者: Hong-Mei Liu Robert J. Dyer Zhi-You Guo Zhen Meng Jian-Hui Li Harald Schneider Key Laboratory of Southern Subtropical Plant Diversity Fairylake Botanical Garden Shenzhen & Chinese Academy of Sciences Shenzhen 518004 China Department of Life Sciences Natural History Museum London SW7 5BD UK Research Group in Biodiversity Genomics and Environmental Sciences Imperial College London Silwood Park Campus Ascot Berkshire SL5 7PY UK Department of Biological Sciences Qiannan Normal College for Nationalities Duyun 558000 China Computer Network Information Center Chinese Academy of Sciences Beijing 100190 *** State Key Laboratory of Systematic and Evolutionary Botany Institute of Botany Chinese Academy of Sciences Beijing 100093 ***
The disparate distribution of apomixis between the major plant lineages is arguably one of the most paradoxical phenomena in plant evolution. Ferns are particularly interesting for addressing this issue because apomix...
来源: 评论
Multi-User Private keyword Search for Cloud Computing
Multi-User Private Keyword Search for Cloud Computing
收藏 引用
IEEE International Conference on Cloud Computing Technology and Science (CloudCom)
作者: Yanjiang Yang Haibing Lu Jian Weng Institute for Infocomm Research Singapore Department of Operations Management and Information Systems The Leavey School of Business Santa Clara University USA State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China Department of Computer Science and Emergency Technology Research Center of Risk Department of Computer Science and Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论
Digital image hiding arithmetic based on hermite chaotic neural networks
收藏 引用
ICIC Express Letters, Part B: Applications 2011年 第1期2卷 165-170页
作者: Zou, Ajin Luo, Yixiang Xie, Dongqing Peng, Lingxi Information College Guangdong Ocean University No. 40 East Jiefang Road Xiashan District Zhanjiang 524088 China School of Computer Science Educational Software Guangzhou University No. 230 Wai Huan Xi Road Guangzhou 510006 China Network and Data Security Key Laboratory of Sichuan Province Chengdu 611731 China
An image hidden information algorithm inspired by chaotic neural networks, referred as DiaHao, is presented. The secret information of digital image is XOR en- crypted by chaotic stream cipher sequence that is generat... 详细信息
来源: 评论