咨询与建议

限定检索结果

文献类型

  • 1,706 篇 会议
  • 1,361 篇 期刊文献

馆藏范围

  • 3,067 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,032 篇 工学
    • 1,508 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 552 篇 信息与通信工程
    • 278 篇 电气工程
    • 221 篇 控制科学与工程
    • 220 篇 电子科学与技术(可...
    • 200 篇 生物工程
    • 136 篇 机械工程
    • 129 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 96 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 65 篇 动力工程及工程热...
    • 65 篇 化学工程与技术
    • 53 篇 安全科学与工程
    • 43 篇 建筑学
  • 921 篇 理学
    • 535 篇 数学
    • 218 篇 生物学
    • 198 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 75 篇 化学
  • 567 篇 管理学
    • 345 篇 管理科学与工程(可...
    • 246 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 93 篇 法学
    • 59 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 10 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 62 篇 federated learni...
  • 61 篇 deep learning
  • 45 篇 protocols
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 43 篇 security
  • 42 篇 robustness
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 164 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 30 篇 zhang min-ling
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 250 篇 其他
  • 123 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3067 条 记 录,以下是2811-2820 订阅
排序:
Large scale plane wave pseudopotential density functional theory calculations on GPU clusters
Large scale plane wave pseudopotential density functional th...
收藏 引用
Supercomputing Conference
作者: Long Wang Yue Wu Weile Jia Weiguo Gao Xuebin Chi Lin-Wang Wang Supercomputing Center of Computer Network Information Center Chinese Academy of Sciences Beijing China School of Mathematical Sciences Fudan University Shanghai China MOE Key Laboratory of Computational Physical Sciences School of Mathematical Sciences Fudan University Shanghai China Material Science Division Lawrence Berkeley National Laboratory Berkeley CA USA
In this work, we present our implementation of the density functional theory (DFT) plane wave pseudopotential (PWP) calculations on GPU clusters. This GPU version is developed based on a CPU DFT-PWP code: PEtot, which... 详细信息
来源: 评论
Research of routing techniques on delay tolerant networks
收藏 引用
Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology 2011年 第SUPPL. 1期35卷 215-222页
作者: Xu, Jia Wang, Ru-Chuan Sun, Li-Juan Xiao, Fu Computer Institute Nanjing University of Posts and Telecommunications Nanjing 210003 China Key Laboratory for Computer Network and Information Integration of Ministry of Education Southeast University Nanjing 211189 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing 210093 China
Delay tolerant networks(DTNs) can interconnect highly heterogeneous networks among extreme environments even between nodes without end-to-end path. As a new evolution of Mobile Ad hoc network(MANET)and wireless sensor... 详细信息
来源: 评论
Recursive constructions and counting of orthomorphic permutations
收藏 引用
Tongxin Xuebao/Journal on Communications 2011年 第11 A期32卷 204-208页
作者: Zhang, Feng-Rong Hu, Yu-Pu Ma, Hua Xie, Min Gao, Jun-Tao Key Laboratory of Computer Network and Information Security Ministry of Education Xidian University Xi'an 710071 China School of Science Xidian University Xi'an 710071 China State Key Laboratory of Information Security Graduate University of Chinese Acad. of Sci. Beijing 100049 China
The properties and known constructions of orthomorphic permutations were investigated. On this basis, a new recursive method to construct an n-variable orthomorphic permutations from two (n-2)-variable ones is present... 详细信息
来源: 评论
Quantum broadcast communication with authentication
收藏 引用
Chinese Physics B 2010年 第7期19卷 63-67页
作者: 杨宇光 王叶红 温巧燕 College of Computer Science and Technology Beijing University of Technology State Key Laboratory of Information Security (Graduate University of Chinese Academy of Sciences) State Key Laboratory of Integrated Services Network Xidian University State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications
Two simple quantum broadcast communication schemes are proposed. A central party can broadcast his secret message to all the legitimate receivers simultaneously. Compared with the three schemes proposed recently (Wan... 详细信息
来源: 评论
Fair Non-Repudiation for Web Services Transactions
收藏 引用
Wuhan University Journal of Natural Sciences 2010年 第5期15卷 385-392页
作者: SU Ruidan,FU Shaofeng,ZHOU Lihua key laboratory of computer network and information Security of the Ministry of Education,Xidian University,Xi’an 710071,Shaanxi,China Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi’an Shaanxi China
To safeguard the interests of transacting parties,non-repudiation mechanisms need to assure fairness and *** non-repudiation service currently implemented usually does not consider the requirement of fairness and the ... 详细信息
来源: 评论
Scalable Arbitrated Quantum Signature of Classical Messages with Multi-Signers
收藏 引用
Communications in Theoretical Physics 2010年 第7期54卷 84-88页
作者: 杨宇光 王园 腾义伟 柴海平 温巧燕 College of Computer Science and Technology Beijing University of Technology State Key Laboratory of Information Security Graduate University of Chinese Academy of Sciences State Key Laboratory of Integrated Services Network Xidian University State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications
Unconditionally secure signature is an important part of quantum cryptography. Usually, a signature scheme only provides an environment for a single signer. Nevertheless, in real applications, many signers may collabo... 详细信息
来源: 评论
Video steganography using motion vector and linear block codes
Video steganography using motion vector and linear block cod...
收藏 引用
2010 IEEE International Conference on Software Engineering and Service Sciences, ICSESS 2010
作者: Pan, Feng Xiang, Li Yang, Xiao-Yuan Guo, Yao Key Laboratory of Network and Information Security of APF Engineering College of the Armed Police Force Xi'an China Key Laboratory of Computer Network and Information Security of the Ministry of Education Xidian University Xi'an China
A novel video steganography scheme based on motion vectors and linear block codes has been proposed in this paper. Our method embed secret messages in the motion vectors of cover media during the process of H.264 comp... 详细信息
来源: 评论
Static channel assignment with the physical interference model for maximum capacity in multi-radio multi-channel wireless mesh networks
Static channel assignment with the physical interference mod...
收藏 引用
International Conference on Grid and Cloud Computing
作者: Shao, Birui Tao, Jun Wang, Fangfang Key Laboratory of Computer Network and Information Integration of Ministry of Education Southeast University Nanjing 210096 China
In this paper, a model for the static channel assignment in multi-radio multi-channel wireless mesh networks is proposed. We describe an interference model in wireless communication environment. The degree of detail i... 详细信息
来源: 评论
An energy-balanced multicast routing algorithm in wireless sensor networks
An energy-balanced multicast routing algorithm in wireless s...
收藏 引用
International Conference on Grid and Cooperative Computing (GCC)
作者: Wang, Fangfang Tao, Jun Shao, Birui Key Laboratory of Computer Network and Information Integration of Ministry of Education Southeast University Nanjing 210096 China
An energy-balanced multicast routing algorithm EBMR in wireless sensor networks (WSNs) is proposed. The objective of EMBR algorithm is to improve the energy efficiency and extend the network lifetime in multicast. To ... 详细信息
来源: 评论
Animating 2D moving deformable objects based on complex barycentric coordinates
收藏 引用
Journal of information and Computational Science 2011年 第9期8卷 1533-1540页
作者: Deng, Zhengjie Li, Zheng Liang, Yun Su, Zhuo School of Information Science and Technology Sun Yat-sen University Guangzhou 510006 China Shenzhen Key Laboratory of Digital Living Network and Content Service Shenzhen Guangdong 518057 China Research Institute of Sun Yat-sen University in Shenzhen Shenzhen Guangdong 518057 China Faculty of Computer Guangdong University of Technology Guangzhou 510006 China College of Informatics South China Agricultural University Guangzhou 510642 China
In 2D animation processes, many simulated the movement and the deformation of a moving deformable object simultaneously. The binding of the movement and the deformation increased the complexity and restricted user'... 详细信息
来源: 评论