咨询与建议

限定检索结果

文献类型

  • 1,706 篇 会议
  • 1,361 篇 期刊文献

馆藏范围

  • 3,067 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,032 篇 工学
    • 1,508 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 552 篇 信息与通信工程
    • 278 篇 电气工程
    • 221 篇 控制科学与工程
    • 220 篇 电子科学与技术(可...
    • 200 篇 生物工程
    • 136 篇 机械工程
    • 129 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 96 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 65 篇 动力工程及工程热...
    • 65 篇 化学工程与技术
    • 53 篇 安全科学与工程
    • 43 篇 建筑学
  • 921 篇 理学
    • 535 篇 数学
    • 218 篇 生物学
    • 198 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 75 篇 化学
  • 567 篇 管理学
    • 345 篇 管理科学与工程(可...
    • 246 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 93 篇 法学
    • 59 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 10 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 62 篇 federated learni...
  • 61 篇 deep learning
  • 45 篇 protocols
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 43 篇 security
  • 42 篇 robustness
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 164 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 30 篇 zhang min-ling
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 250 篇 其他
  • 123 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3067 条 记 录,以下是2871-2880 订阅
排序:
Volume exploration using ellipsoidal Gaussian transfer functions
Volume exploration using ellipsoidal Gaussian transfer funct...
收藏 引用
Pacific (formerly Asia-Pacific APVIS) Visualization Symposium
作者: Yunhai Wang Wei Chen Guihua Shan Tingxin Dong Xuebin Chi Graduate University of Chinese Academy of Science USA State Key Laboratory of CAD&CG University of Zhejiang China Computer Network Information Center Chinese Academy and Sciences China
This paper presents an interactive transfer function design tool based on ellipsoidal Gaussian transfer functions (ETFs). Our approach explores volumetric features in the statistical space by modeling the space using ... 详细信息
来源: 评论
Enhancing fairness: A novel C2C e-commerce community member reputation algorithm based on transaction social networks
Enhancing fairness: A novel C2C e-commerce community member ...
收藏 引用
IADIS International Conference WWW/Internet 2010
作者: Feng, Wangsen Zhang, Bei Xia, Yunni Li, Jiajing Meng, Tao Key Laboratory of Network and Software Security Assurance of Ministry of Education Computing Center Peking University Beijing 100871 China College of Computer Science Chongqing University Chongqing 400044 China School of Mechanical Electronic and Information Engineering China University of Mining and Technology Beijing 100083 China Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
Today, almost all the C2C e-commerce community member reputation evaluating algorithms are time sensitive. The reputation of a community member is accumulated after transactions and the increment of reputation after a... 详细信息
来源: 评论
Design of the late-model key exchange algorithm based on the polymorphic cipher
Design of the late-model key exchange algorithm based on the...
收藏 引用
IEEE International Conference on Industrial Engineering and Engineering Management
作者: Yifeng Yin Yong Gan Hongyan Liu Yupu Hu School of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China NO.202 Institute of China Ordnance Industry Xianyang China Key Laboratory of Computer Network & Information Security Xidian University Xi'an China
Diffie-Hellman key exchange algorithm, which is used in regular scenes base on the discrete logarithm problem, demands that typically two communication parties should struck up a lively conversation leading to a long-... 详细信息
来源: 评论
Enhance information Flow Tracking with Function Recognition
收藏 引用
China Communications 2010年 第6期7卷 24-29页
作者: Zhou Kan Huang Shiqiu Huang Shan Qi Zhengwei Gu Jian Guan Haibing School of software Shanghai Jliao Tong University Shanghai 200240 P. R. China Key Lab of Information Network Security Ministry of Public Security Department of Computer Science & Engineering Shanghai Jiao Tong University Shanghai 200240 P. R China Shanghai Key Laboratory of Scalable Computing & System Shanghai P. R. China
With the spread use of the computers, a new crime space and method are presented for criminals. Thus computer evidence plays a key part in criminal cases. Traditional computer evidence searches require that the comput... 详细信息
来源: 评论
A Discriminative Model for Mongolian-English Word Alignment
A Discriminative Model for Mongolian-English Word Alignment
收藏 引用
Chinese Conference on Pattern Recognition (CCPR)
作者: Guanhong Zhang Odbal Department of Computer Science and Technology Key Laboratory of Network and Intelligent Information Processing Hefei University Hefei Anhui China Hefei Institutes of Physical Science Chinese Academy and Sciences Hefei Anhui China
In this paper we have developed a discriminative word alignment method using the liner CRF model for Mongolian-English language pair. Discriminative approaches have the ability to use large variety of features flexibl... 详细信息
来源: 评论
Reduction Method of Regression Testing Requirements Based on Relation Mode
Reduction Method of Regression Testing Requirements Based on...
收藏 引用
International Conference on Computational Intelligence and Software Engineering (CiSE)
作者: Jing Chen Lu Wang Zhiquan Bai Yongjie Xu Software Testing Center Shandong Provincial Key Laboratory of Computer Network Jinan China Software Development Center Shandong Zhengfangrenhe Information Technology Co. Ltd Jinan China School of Information Science and Engineering Shandong University Jinan China
The variations in testing requirements often result in the problem of numerous test cases and low efficiency in regression testing. To solve this problem, a reduction method of testing requirements is proposed based o... 详细信息
来源: 评论
OpenMP在悬架实时动力学中的应用
OpenMP在悬架实时动力学中的应用
收藏 引用
首届中国科学院超级计算应用大会(SCA2011)
作者: Ye Xianfeng 叶显锋 Chi Xuebing 迟学斌 Qiu Jun 邱君 Li Qiang 李强 Supercomputing Center Computer Network Information Center Chinese Academy of Sciences Beijing 100 中国科学院计算机网络信息中心超级计算中心 北京 100190 中国科学院研究生院 北京 100190 吉林大学汽车动态模拟国家重点实验室 长春 130025 Supercomputing Center Computer Network Information Center Chinese Academy of Sciences Beijing 100 中国科学院计算机网络信息中心超级计算中心 北京 100190 State Key Laboratory of Dynamic Simulation Jilin University Changchun 130025China 吉林大学汽车动态模拟国家重点实验室 长春 130025 Supercomputing Center Computer Network Information Center Chinese Academy of Sciences Beijing 100 中国科学院计算机网络信息中心超级计算中心 北京 100190 中国科学院研究生院 北京 100190
悬架动力学模型中应用的串行算法满足不了车辆实时性的要求,本文延续原有的动力学模型,尝试了一种并行算法(OpenMP),将之应用于悬架动力学,并改写了悬架动力学程序,经模拟结果验证,实时性得到了很大的提高。
来源: 评论
Efficient and provably-secure certificateless blind signature scheme
收藏 引用
Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology 2010年 第SUPPL. 2期36卷 64-69页
作者: Yang, Xiao-Yuan Chen, Hai-Bin Guo, Dun-Tao Key Laboratory of Network and Information Security of APF Engineering College of APF Xi'an 710086 China Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 China
Combined blind signature with certificateless cryptography, we propose an efficient provable certificateless blind signature scheme, which is proved to be neither easier than the q-strong Diffie-Hellman problem nor ha... 详细信息
来源: 评论
A Discriminative Model for Traditional Mongolian Part of Speech
A Discriminative Model for Traditional Mongolian Part of Spe...
收藏 引用
Chinese Conference on Pattern Recognition (CCPR)
作者: Guanhong Zhang sloglo Odbal Department of Computer Science and Technology Key Laboratory of Network and Intelligent Information Processing Hefei University Hefei Anhui China Inner Mongolia University for the Nationalities Hohhot Inner Mongolia China Hefei Institutes of Physical Science Chinese Academy and Sciences Hefei Anhui China
This paper presents a discriminative model for part of speech tagging of traditional *** use Maximum Entropy Model with Morphological features of Mongolian. First, the context feature templates are defined and extract... 详细信息
来源: 评论
Notice of Retraction: Reliability-based CBM system design for feed water pump
Notice of Retraction: Reliability-based CBM system design fo...
收藏 引用
International Conference on computer Science and information Technology (CSIT)
作者: Qin Jinlei Niu Yuguang Li Zheng Information and Network Management Center North China Electric Power University Baoding China Key Laboratory of Condition Monitoring and Control for Power Plant Equipment Ministry of Education North China Electric Power University Baoding China Department of Computer Science and Technology North China Electric Power University Baoding China
This article has been retracted by the publisher.
来源: 评论