咨询与建议

限定检索结果

文献类型

  • 1,687 篇 会议
  • 1,322 篇 期刊文献

馆藏范围

  • 3,009 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,984 篇 工学
    • 1,467 篇 计算机科学与技术...
    • 1,153 篇 软件工程
    • 541 篇 信息与通信工程
    • 270 篇 电气工程
    • 215 篇 电子科学与技术(可...
    • 203 篇 控制科学与工程
    • 200 篇 生物工程
    • 135 篇 机械工程
    • 125 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 95 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 64 篇 动力工程及工程热...
    • 64 篇 化学工程与技术
    • 52 篇 安全科学与工程
    • 41 篇 建筑学
  • 910 篇 理学
    • 528 篇 数学
    • 218 篇 生物学
    • 196 篇 物理学
    • 164 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 74 篇 化学
  • 561 篇 管理学
    • 342 篇 管理科学与工程(可...
    • 243 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 93 篇 法学
    • 59 篇 社会学
  • 71 篇 医学
    • 58 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 21 篇 军事学
  • 10 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 93 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 60 篇 deep learning
  • 60 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 privacy
  • 43 篇 neural networks
  • 42 篇 security
  • 42 篇 robustness
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 predictive model...
  • 38 篇 optimization
  • 37 篇 authentication

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 156 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 64 篇 computer network...
  • 58 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 40 篇 school of comput...
  • 37 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 fujian provincia...
  • 35 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 46 篇 zhao yao
  • 36 篇 zhou deyu
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 25 篇 zhang min-ling
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan
  • 16 篇 xia chunhe
  • 16 篇 wang jin
  • 15 篇 zhenrong zhang

语言

  • 2,727 篇 英文
  • 173 篇 其他
  • 121 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3009 条 记 录,以下是2851-2860 订阅
排序:
A Novel Clustering Algorithm in Wireless Sensor networks
A Novel Clustering Algorithm in Wireless Sensor Networks
收藏 引用
International Conference on Industrial and information Systems, IIS
作者: Jiangpeng Dai Shu Liu Key Laboratory of Computer Network and Information Integration Ministry of Education School of Computer Science & Engineering South-East University Nanjing China
The demands of energy-efficient, distributed and scalable features are critical factors for designing topology control and routing management scheme in wireless sensor networks. To meet these demands, clustering is a ... 详细信息
来源: 评论
A Reputation-Based Trust Model for P2P Systems
A Reputation-Based Trust Model for P2P Systems
收藏 引用
International Conference on Computational Intelligence and Security
作者: Peng Wu Guoxin Wu Key Laboratory of Computer Network and Information Integration Ministry of Education School of Computer Science and Engineering South-East University Nanjing China
One of the fundamental challenges for Peer to Peer (P2P) systems is the ability to manage risks involved in interacting and collaborating with prior unknown and potentially malicious parties. Reputation-based trust ma... 详细信息
来源: 评论
A SOA Based Framework of Service Ability Description and Selection Methods for Application Integration in Manufacturing Domain
A SOA Based Framework of Service Ability Description and Sel...
收藏 引用
International Conference on Interoperability for Enterprise Software and Applications China, IESA
作者: Weihua Huang Xiaoping Li School of Computer Science & Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education South-East University Nanjing China
In this paper, an SOA based framework for service ability description and selection methods is proposed for the application integration in manufacturing domain. A uniform and standard schema is introduced to accuratel... 详细信息
来源: 评论
Access model of web users based on multi-chains hidden Markov models
Access model of web users based on multi-chains hidden Marko...
收藏 引用
作者: Zheng, Kangfeng Yang, Yixian Wang, Xiujuan Guo, Shize Key Laboratory of Network and Information Attack and Defence Technology MOE Beijing University of Posts and Telecommunications Beijing China College of Computer Sciences Beijing University of Technology Beijing China No. 54 Research Institute of the General Staff PLA Beijing China
How to distinguish abnormal access from normal ones is the key problem in Distribution Denial of service(DDoS) attack detection. This research aims at finding out the major difference between the abnormal access and t... 详细信息
来源: 评论
Reputation Mechanism in Peer-to-Peer network
Reputation Mechanism in Peer-to-Peer Network
收藏 引用
International Conference on information Science and Engineering (ICISE)
作者: Peng Wu Guoxin Wu Key Laboratory of Computer Network and Information Integration Ministry of Education School of Computer Science and Engineering South-East University Nanjing China
Peer-to-Peer (P2P) technology has been widely used in file-sharing, distributed computing, e-market and information management. However, one of the critical challenges for P2P systems is the ability to manage risks in... 详细信息
来源: 评论
A static method for detection of information theft malware
A static method for detection of information theft malware
收藏 引用
2nd International Symposium on Electronic Commerce and Security, ISECS 2009
作者: Li, JiaJing Wei, Tao Zou, Wei Mao, Jian Key Laboratory of Network and Software Security Assurance Ministry of Education Peking University Beijing 100871 China Institute of Computer Science and Technology Peking University Beijing 100871 China Department of Electronic and Information Engineering BeiHang University Beijing 10083 China
Existing techniques based on behavior semantics for information theft malware detection have the main shortcomings of low path coverage and disability of finding hidden malicious behaviors. In this paper we propose a ... 详细信息
来源: 评论
Statistical Analysis of Trust Overlay network
Statistical Analysis of Trust Overlay Network
收藏 引用
International Seminar on Future information Technology and Management Engineering, FITME
作者: Zhong Zhu Guoxin Wu Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education South-East University Nanjing China
A TON (trust overlay network) is a virtual network on top of the underlying distributed application network, which is a directed and weighted complex network. A detailed understanding of the structural properties of T... 详细信息
来源: 评论
Efficient Mining of Strong Negative Association Rules in Multi-Database
Efficient Mining of Strong Negative Association Rules in Mul...
收藏 引用
International Conference on Computational Intelligence and Software Engineering (CiSE)
作者: Hong Li Xuegang Hu Key Laboratory of Network and Intelligent Information Processing Department of Computer Science and Tchnology Hefei University Hefei China School of Computer & Information Hefei University of technology Hefei China
Strong negative association rules can reveal irrelevances hidden between frequent itemsets. Existing research has made significant efforts in discovering both positive and negative association rules from single databa... 详细信息
来源: 评论
A novel mining Method of Global Negative Association Rules in Multi-Database
A novel mining Method of Global Negative Association Rules i...
收藏 引用
IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS)
作者: Hong Li Yijun Shen Xuegang Hu Key Laboratory of Network and Intelligent Information Processing Department of Computer Science and Technology Hefei University of Technology Hefei  China School of Computer & Information Hefei University of technology Hefei  China
Mining negative association rules in multi-database has attracted more and more attention. Most existing research focuses on unifying all negative rules discovered from different single databases into a single view. T... 详细信息
来源: 评论
Improvement of MODIS 8-day LAI/FPAR product with temporal filters to generate high quality time-series product
Improvement of MODIS 8-day LAI/FPAR product with temporal fi...
收藏 引用
2009 Joint Urban Remote Sensing Event
作者: Huifang, Zhang Runhe, Shi Honglin, Zhong Peiqing, Qu Juan, Sun Wenpeng, Lin Su, Li Key Lab. of Geographic Information Science Ministry of Education East China Normal University Shanghai China Key Laboratory of Ecosystem Network Observation and Modeling IGSNRR CAS Beijing China Key Lab. of Urban Ecology and Environment Restoration Shanghai Normal University Shanghai China Computer College Beijing Technology and Business University Beijing China
Numerous studies have reported that the timeseries terrestrial parameters such as the Normalized Difference Vegetation Index (NDVI), Leaf Area of Index (LAI), Fraction of Absorbed Photosynthetic Active Radiation (FPAR... 详细信息
来源: 评论