咨询与建议

限定检索结果

文献类型

  • 1,687 篇 会议
  • 1,331 篇 期刊文献

馆藏范围

  • 3,018 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,994 篇 工学
    • 1,476 篇 计算机科学与技术...
    • 1,159 篇 软件工程
    • 542 篇 信息与通信工程
    • 278 篇 电气工程
    • 215 篇 电子科学与技术(可...
    • 203 篇 控制科学与工程
    • 200 篇 生物工程
    • 136 篇 机械工程
    • 125 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 95 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 64 篇 动力工程及工程热...
    • 64 篇 化学工程与技术
    • 52 篇 安全科学与工程
    • 42 篇 建筑学
  • 910 篇 理学
    • 529 篇 数学
    • 218 篇 生物学
    • 196 篇 物理学
    • 165 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 74 篇 化学
  • 561 篇 管理学
    • 342 篇 管理科学与工程(可...
    • 243 篇 图书情报与档案管...
    • 122 篇 工商管理
  • 94 篇 法学
    • 59 篇 社会学
  • 71 篇 医学
    • 58 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 21 篇 军事学
  • 10 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 93 篇 accuracy
  • 76 篇 computational mo...
  • 76 篇 training
  • 64 篇 data models
  • 60 篇 deep learning
  • 60 篇 federated learni...
  • 45 篇 protocols
  • 45 篇 cryptography
  • 44 篇 privacy
  • 43 篇 neural networks
  • 42 篇 security
  • 42 篇 robustness
  • 41 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 predictive model...
  • 38 篇 optimization
  • 37 篇 authentication

机构

  • 221 篇 key laboratory o...
  • 202 篇 shandong provinc...
  • 156 篇 school of comput...
  • 80 篇 key laboratory o...
  • 65 篇 college of compu...
  • 63 篇 computer network...
  • 58 篇 key laboratory o...
  • 56 篇 college of mathe...
  • 50 篇 shandong fundame...
  • 47 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 43 篇 institute of inf...
  • 40 篇 school of comput...
  • 37 篇 school of cyber ...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 fujian provincia...
  • 35 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 46 篇 zhao yao
  • 36 篇 zhou deyu
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 26 篇 min-ling zhang
  • 25 篇 zhang min-ling
  • 24 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 19 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 16 篇 di xiaoqiang
  • 16 篇 he yulan
  • 16 篇 xia chunhe
  • 16 篇 wang jin
  • 15 篇 zhenrong zhang

语言

  • 2,733 篇 英文
  • 176 篇 其他
  • 121 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3018 条 记 录,以下是2931-2940 订阅
排序:
ACO-based overlay routing scalability
Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of ...
收藏 引用
Jiefangjun Ligong Daxue Xuebao/Journal of PLA University of Science and Technology (Natural Science Edition) 2008年 第5期9卷 492-496页
作者: Ye, Ping Li, Yi-Zhong Xia, Qin Key Laboratory of Computer Network and Information Integration Southeast University Nanjing 210096 China School of Computer Science and Engineering Southeast University Nanjing 210096 China
Scalability is one of the most important problems in Overlay network research. Ant colony optimization was used to improve the widely-used one-hop path routing algorithm(OHPR) in Overlay routing system, and the deploy... 详细信息
来源: 评论
Novel fast handoff solution based on Cache update for WLAN
收藏 引用
Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition) 2008年 第SUPPL. 1期38卷 204-208页
作者: Xu, Wei Yang, Yi Xia, Qin Tao, Jun Wang, Cuihan School of Computer Science and Engineering Southeast University Nanjing 210096 China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing 210096 China
Through analysis of the process of handoff and existing improvement program, a novel Cache update solution is proposed. It is composed of slice Cache update algorithm, which contains a Cache update trigger mechanism b... 详细信息
来源: 评论
keying material based key pre-distribution scheme
Keying material based key pre-distribution scheme
收藏 引用
IEEE International Conference on Intelligence and Security Informatics, ISI
作者: Zhihong Liu Jianfeng Ma Qiping Huang SangJae Moon Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an China School of Communication Engineering Xidian University Xi'an China Mobile Network Security Technology Research Center Kyungpook National University South Korea
A key pre-distribution scheme is a method by which initially an off-line trusted authority T A distributes pieces of information among a set of users. Later, each member of a group of users can compute a common key fo... 详细信息
来源: 评论
Limitedly dividable stream-based modeling and performance analysis of P2P streaming networks
收藏 引用
Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition) 2008年 第SUPPL. 1期38卷 145-149页
作者: Wu, Jiagao Tao, Jun Zou, Zhiqiang Institute of Computer Technology College of Computer Nanjing University of Posts and Telecommunications Nanjing 210003 China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing 210096 China
Due to the deficiency of fluid-based (FB) P2P network model in dealing with the stream which could not be divided infinitely, a limitedly dividable stream-based (LDSB) model was studied and proposed for P2P streaming ... 详细信息
来源: 评论
Action-Based Access Control Modelt
收藏 引用
电子学报(英文版) 2008年 第3期17卷 396-401页
作者: LI Fenghua WANG Wei MA Jianfeng Sang JaeMoon Key Laboratory of Computer Networks and Information Security (Ministry of Education) Xidian University Xi'an 710071 China) Graduate School Beijing Electronic Science and Technology Institute Beijing 100070 China) Mobile Network Security Technology Research Center Kyungpook National UniversitySankyuk-dong~ Buk-ku~ Daeyu 702-701~ KoreaI
来源: 评论
Clustering control algorithm of wireless sensor networks in low probability event scenario
收藏 引用
Jisuanji Yanjiu yu Fazhan/computer Research and Development 2008年 第10期45卷 1662-1668页
作者: Liu, Linfeng Jin, Shan School of Computer Science and Engineering Southeast University Nanjing 210096 China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing 210096 China School of Computer Nanjing University of Posts and Telecommunications Nanjing 210003 China
In order to fulfill the task of prolonging network lifetime, the primary objective of wireless sensor network execution is to consume the battery energy efficiently. The network topology, which is the important founda... 详细信息
来源: 评论
MPMAC and its security analysis
收藏 引用
Beijing Gongye Daxue Xuebao / Journal of Beijing University of Technology 2008年 第SUPPL. 2期34卷 62-66页
作者: Zhang, Shao-Lan Yang, Yi-Xian Xing, Guo-Bo Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Network and Information Attack and Defense Technology of MOE Beijing University of Posts and Telecommunications Beijing 100876 China School of Computer Science and Technology Shandong Jianzhu University Jinan 250101 China
According to the weakness of mode of operation, a modified parallelizable message authentication code (MPMAC) is proposed. The mode to process the last block of message is improved to avoid the forgery attack with ran... 详细信息
来源: 评论
Heuristic cluster control algorithm of wireless sensor networks topology
收藏 引用
Jisuanji Yanjiu yu Fazhan/computer Research and Development 2008年 第7期45卷 1099-1105页
作者: Liu, Linfeng Liu, Ye Key Laboratory of Computer Network and Information Integration Southeast University Nanjing 210096 China School of Computer Science and Engineering Southeast University Nanjing 210096 China Nanjing Research Development Center Alcatel Shanghai Bell Nanjing 210037 China
The main objective of wireless sensor network design is to fulfill the task of prolonging network lifetime. The network topology, which is the important foundation of upper layer protocols, serves as the supportive gr... 详细信息
来源: 评论
Secure AODV Routing Protocol Using SL Multi-Signcryption
收藏 引用
电子学报(英文版) 2007年 第2期16卷 311-314页
作者: ZHANG Chuanrong YIN Zhonghai ZHANG Yuqing XIAO Guozhen Telecommunication Engineering Institute A irforce Engineering University Xi ' an 710077 China National Computer Network Intrusion Protection Center GUCAS Beijing 100049 China State Key Laboratory of Integrated Service Networks Xidian University Xi'an 710071 China The Ministry of Education Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China
Routing security is an important issue in secure ad hoc networks, and it appears to be a problem that is not trivial to solve. In this paper, we consider secure routing protocol and applied new cryptographic mechanism... 详细信息
来源: 评论
Hybrid heuristic for total flowtime minimization in no-wait flow shops
Hybrid heuristic for total flowtime minimization in no-wait ...
收藏 引用
11th International Conference on computer Supported Cooperative Work in Design, CSCWD 2007
作者: Zhu, Xia Li, Xiaoping Wang, Qian School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
In this paper, no-wait flow shop scheduling problem with total flowtime minimization is considered. A hybrid heuristic is proposed, which is based on PH1 (p) (presented by Aldowaisan and Allahverdi, OMEGA, 2004). A co... 详细信息
来源: 评论