咨询与建议

限定检索结果

文献类型

  • 1,706 篇 会议
  • 1,361 篇 期刊文献

馆藏范围

  • 3,067 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,032 篇 工学
    • 1,508 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 552 篇 信息与通信工程
    • 278 篇 电气工程
    • 221 篇 控制科学与工程
    • 220 篇 电子科学与技术(可...
    • 200 篇 生物工程
    • 136 篇 机械工程
    • 129 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 96 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 65 篇 动力工程及工程热...
    • 65 篇 化学工程与技术
    • 53 篇 安全科学与工程
    • 43 篇 建筑学
  • 921 篇 理学
    • 535 篇 数学
    • 218 篇 生物学
    • 198 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 75 篇 化学
  • 567 篇 管理学
    • 345 篇 管理科学与工程(可...
    • 246 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 93 篇 法学
    • 59 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 10 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 62 篇 federated learni...
  • 61 篇 deep learning
  • 45 篇 protocols
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 43 篇 security
  • 42 篇 robustness
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 164 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 30 篇 zhang min-ling
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 250 篇 其他
  • 123 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3067 条 记 录,以下是3021-3030 订阅
排序:
Advanced algorithm to P2P semantic routing based on the topologically-aware clustering in self-organizing mode
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2006年 第2期17卷 339-348页
作者: Liu, Ye Yang, Peng Key Laboratory of Computer Network and Information Integration Southeast University Nanjing 210096 China
Structured P2P networks create a virtual topology on top of the physical topology. The only relation between the two layers is the hashing algorithm, which makes the node's logical ID independent of its physical l... 详细信息
来源: 评论
Improved traitor tracing scheme based on bilinear map
收藏 引用
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications 2006年 第6期29卷 17-20页
作者: Zhang, Xue-Jun Zhou, Li-Hua Wang, Yu-Min Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China
Tô et al. presented a bilinear-map-based traitor tracing scheme with revocation, but it is a symmetric scheme because it does not provide non-repudiation. An improved Tô scheme was proposed using oblivious p... 详细信息
来源: 评论
P2P semantic routing model with match path and probability balance tree
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2006年 第10期17卷 2106-2117页
作者: Xu, Li-Bo Yu, Kun Wu, Guo-Xin Key Laboratory of Computer Network and Information Integration Southeast University Nanjing 210096 China
Semantic routing is one of key parts in P2P routing researches. The intelligent search mechanisms support flexible semantic expression but hold low scalability and recall rate. Contrastively, semantic overlay network ... 详细信息
来源: 评论
Disaster recovery system model with e-government case study
收藏 引用
Natural Hazards Review 2006年 第4期7卷 145-149页
作者: Wang, Kun Li, Long-Hai Yuan, Feng Zhou, Li-Hua Key Laboratory of Computer Network and Information Security Xidian Univ. Ministry of Education Xi'an 710071 Shaanxi China Dept. of Computer Science and Technology Xidian Univ. Xi'an 710071 Shaanxi China National Information Security Engineering and Technology Research Center Beijing 100093 China
We present a robust disaster recovery system model according to the requests of disaster recovery talent of a key e-government project of China. The model strengthens the safe communication ability and guarantees the ... 详细信息
来源: 评论
network pricing mechanism based on the utility characteristics of transport control protocol
收藏 引用
Zhongshan Daxue Xuebao/Acta Scientiarum Natralium Universitatis Sunyatseni 2006年 第SUPPL.期45卷 54-58页
作者: Dong, Yong-Qiang Tu, Hao Key Laboratory of Computer Network and Information Integration College of Computer Science and Engineering Southeast University Nanjing 210096 China
Assuming a specific network service provider is in the position of natural monopolization, the pricing strategy most likely adopted by the provider is analyzed with the objective of profit maximization. The optimal pr... 详细信息
来源: 评论
Ternary Tree based Group key Management in Dynamic Peer networks
收藏 引用
International Conference on Computational Intelligence and Security
作者: Wei Wang Jianfeng Ma Sangjae Moon Key Laboratory of Computer Networks and Information Security Ministry ofEducation Xidian University Xi'an China Mobile Network Security Technology Research Center Kyungpook National University Daegu South Korea
For group-oriented applications, designing secure and efficient group key management schemes is a major problem. We present a group key management scheme for dynamic peer networks, which supports join, leave, merge an... 详细信息
来源: 评论
Schedulability analysis algorithm for EDF-based end-to-end real-time systems
收藏 引用
Jisuanji Yanjiu yu Fazhan/computer Research and Development 2006年 第5期43卷 813-820页
作者: Shen, Zhuowei Wang, Yun Department of Computer Science and Engineering Southeast University Nanjing 210096 China Key Laboratory of Computer Network and Information Integration Nanjing 210096 China
An end-to-end real-time scheduling model can be used to describe many distributed real-time systems. An EDF-based end-to-end real-time scheduling model is proposed. According to the time demand analysis technique, a s... 详细信息
来源: 评论
E-μTESLA: An efficient broadcast authentication protocol for wireless sensor network
收藏 引用
Journal of Computational information Systems 2005年 第3期1卷 433-438页
作者: Wang, Liang-Min Zhang, Jian-Ming Zhan, Yong-Zhao Ma, Jian-Feng Key Laboratory of Computer Network and Information Security Xidian University Xi'an 710071 China The Computer School Jiangsu University Zhenjiang 212013 China
Due to wide application of the wireless sensor network (WSN), the WSN security problems have become very critical. In broadcast authentication mechanisms, the traditional protocols are confronted with large challenges... 详细信息
来源: 评论
Packet-level adaptive sampling on multi-fluctuation scale traffic
Packet-level adaptive sampling on multi-fluctuation scale tr...
收藏 引用
2005 International Conference on Communications, Circuits and Systems
作者: Xu, Li-Bo Wu, Guo-Xin Li, Jian-Fei Key Laboratory of Computer Network and Information Integration Southeast University Nanjing 210096 China
In high-speed Internet links, effective and efficient packet sampling technology in traffic measurement becomes more and more indispensable for its benefits of reducing data quantity and saving various resources. We a... 详细信息
来源: 评论
TCS-Chord: An improved routing algorithm to Chord based on the topology-aware clustering in self-organizing mode
TCS-Chord: An improved routing algorithm to Chord based on t...
收藏 引用
1st International Conference on Semantics, Knowledge and Grid, SKG 2005
作者: Ye, Liu Peng, Yang Zi, Chu Jiagao, Wu Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing 210096 China
The study on semantic routing efficiency of DHTP2P networks is a key element to promote the development of P2P networks, it is critical for a P2P routing algorithm to be aware of the network physical topology, which l... 详细信息
来源: 评论