咨询与建议

限定检索结果

文献类型

  • 1,706 篇 会议
  • 1,361 篇 期刊文献

馆藏范围

  • 3,067 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,032 篇 工学
    • 1,508 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 552 篇 信息与通信工程
    • 278 篇 电气工程
    • 221 篇 控制科学与工程
    • 220 篇 电子科学与技术(可...
    • 200 篇 生物工程
    • 136 篇 机械工程
    • 129 篇 网络空间安全
    • 98 篇 仪器科学与技术
    • 96 篇 光学工程
    • 89 篇 生物医学工程(可授...
    • 66 篇 交通运输工程
    • 65 篇 动力工程及工程热...
    • 65 篇 化学工程与技术
    • 53 篇 安全科学与工程
    • 43 篇 建筑学
  • 921 篇 理学
    • 535 篇 数学
    • 218 篇 生物学
    • 198 篇 物理学
    • 166 篇 统计学(可授理学、...
    • 83 篇 系统科学
    • 75 篇 化学
  • 567 篇 管理学
    • 345 篇 管理科学与工程(可...
    • 246 篇 图书情报与档案管...
    • 124 篇 工商管理
  • 93 篇 法学
    • 59 篇 社会学
  • 72 篇 医学
    • 59 篇 临床医学
    • 51 篇 基础医学(可授医学...
  • 51 篇 经济学
    • 51 篇 应用经济学
  • 30 篇 农学
  • 22 篇 军事学
  • 11 篇 教育学
  • 10 篇 文学
  • 10 篇 艺术学

主题

  • 136 篇 feature extracti...
  • 118 篇 semantics
  • 94 篇 accuracy
  • 76 篇 computational mo...
  • 75 篇 training
  • 64 篇 data models
  • 62 篇 federated learni...
  • 61 篇 deep learning
  • 45 篇 protocols
  • 45 篇 privacy
  • 45 篇 cryptography
  • 44 篇 neural networks
  • 43 篇 security
  • 42 篇 robustness
  • 40 篇 predictive model...
  • 40 篇 visualization
  • 40 篇 adaptation model...
  • 39 篇 data mining
  • 39 篇 authentication
  • 38 篇 optimization

机构

  • 228 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 164 篇 school of comput...
  • 84 篇 key laboratory o...
  • 69 篇 college of compu...
  • 66 篇 computer network...
  • 60 篇 key laboratory o...
  • 55 篇 college of mathe...
  • 52 篇 shandong fundame...
  • 48 篇 beijing key labo...
  • 46 篇 shandong enginee...
  • 45 篇 key laboratory o...
  • 44 篇 institute of inf...
  • 41 篇 school of comput...
  • 38 篇 school of cyber ...
  • 37 篇 fujian provincia...
  • 37 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 36 篇 university of ch...
  • 33 篇 fujian key labor...

作者

  • 48 篇 zhao yao
  • 37 篇 zhou deyu
  • 30 篇 zhang min-ling
  • 27 篇 min-ling zhang
  • 26 篇 cong runmin
  • 26 篇 yang yang
  • 25 篇 guo wenzhong
  • 21 篇 xiaoming wu
  • 21 篇 zhang zhenrong
  • 20 篇 guo kun
  • 20 篇 guang cheng
  • 19 篇 du bo
  • 18 篇 liu ximeng
  • 17 篇 geng xin
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 16 篇 zhenrong zhang
  • 16 篇 di xiaoqiang
  • 16 篇 xia chunhe
  • 15 篇 xiangzhi liu

语言

  • 2,708 篇 英文
  • 250 篇 其他
  • 123 篇 中文
检索条件"机构=Key Laboratory of Computer Network and Information Intergration"
3067 条 记 录,以下是541-550 订阅
排序:
Timo: In-memory temporal query processing for big temporal data
Timo: In-memory temporal query processing for big temporal d...
收藏 引用
作者: Zheng, Xiao Liu, Houkai Wang, Xiujun Wu, Xuangou Yu, Feng School of Computer Science and Technology Anhui University of Technology Maanshan China Institute for Artificial Intelligence Hefei Comprehensive National Science Center Hefei China Anhui Engineering Laboratory for Intelligent Applications and Security of Industrial Internet Anhui University of Technology Anhui Maanshan China School of Computer Science and Engineering & School of Software Guangxi Normal University Guilin China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China
Today's internet applications generate massive temporal data anywhere and anytime. Although some disk-based temporal systems are currently available, they suffer from poor I/O performance, especially when applied ... 详细信息
来源: 评论
Secure Judgment of Line Segments Intersection Under the Malicious Model
Secure Judgment of Line Segments Intersection Under the Mali...
收藏 引用
TEPEN International Workshop on Fault Diagnostics and Prognostics, TEPEN-IWFDP 2024
作者: Wang, Yang-Tao Liu, Xin Liu, Shuo Wang, Ji Peng, Lu Xu, Gang Chen, Xiu-Bo Liu, Xiao-Meng School of Digital and Intelligence Industry Inner Mongolia University of Science and Technology Baotou014010 China State Key Laboratory of Network and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China Beijing Institute of Computer Technology and Applications Beijing100854 China College of Information North China University of Technology Beijing100144 China
Confidential computational geometry problems are one of the more popular classes of topics in secure multi-party computation. In the secure computation of geometric problems, the cross product can be used to judge the... 详细信息
来源: 评论
A generalized reliability analysis of 3-ary n-cubes
A generalized reliability analysis of 3-ary n-cubes
收藏 引用
International Conference on Communication Software and networks, ICCSN
作者: Zefang Bai Guijuan Wang Meijie Ma School of Mathematics and Statistics Qilu University of Technology (Shandong Academy of Sciences) Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Evaluating the reliability of interconnection networks is crucial. The edge-connectivity is a parameter used to assess reliability. In this paper, we discuss a conditional edge-connectivity called the h-extra g-compon... 详细信息
来源: 评论
Natural Human Skin‑Inspired Wearable and Breathable Nanofiber‑based Sensors with Excellent Thermal Management Functionality
收藏 引用
Advanced Fiber Materials 2024年 第6期6卷 1955-1968页
作者: Peng Wang Xiaodan Li Guifen Sun Guoqing Wang Qing Han Chuizhou Meng Zhonghe Wei Yang Li School of Mechanical Engineering University of JinanJinan 250022China School of Information and Control Engineering China University of Mining and TechnologyXuzhou 221116China State Key Laboratory for Reliability and Intelligence of Electrical Equipment Engineering Research Center of Ministry of Education for Intelligent Rehabilitation Device and Detection TechnologyHebei Key Laboratory of Smart Sensing and Human‑Robot InteractionSchool of Mechanical EngineeringHebei University of TechnologyTianjin 300401China Shandong Provincial Key Laboratory of Network‑Based Intelligent Computing School of Information Science and EngineeringUniversity of JinanJinan 250022China Network Information Center Department of Computer ScienceQilu University of Technology(Shandong Academy of Sciences)Jinan 250353China School of Integrated Circuits Shandong UniversityJinan 250101China
Wearable sensors have been rapidly developed for application in various human monitoring ***,the wearing comfort and thermal properties of these devices have been largely ignored,and these characteristics urgently nee... 详细信息
来源: 评论
Multimodal Dialogue Emotion Recognition Based on Label Optimization and Coarse-Grained Assisted Fine-Grained
Multimodal Dialogue Emotion Recognition Based on Label Optim...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhibo Zhang Zhenyu Yang Yan Huang Baojie Xu Wenyue Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China
Multimodal dialogue emotion recognition integrates data from multiple modalities to accurately identify emotional states in conversations. However, differences in expression and information density across modalities c... 详细信息
来源: 评论
Learning label shift correction for test-agnostic long-tailed recognition  24
Learning label shift correction for test-agnostic long-taile...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Tong Wei Zhen Mao Zi-Hao Zhou Yuanyu Wan Min-Ling Zhang School of Computer Science and Engineering Southeast University Nanjing China and Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education China School of Software Technology Zhejiang University Ningbo China
Long-tail learning primarily focuses on mitigating the label distribution shift between longtailed training data and uniformly distributed test data. However, in real-world applications, we often encounter a more intr...
来源: 评论
Learnware Specification via Label-Aware Neural Embedding  39
Learnware Specification via Label-Aware Neural Embedding
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Chen, Wei Mao, Jun-Xiang Zhang, Min-Ling School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education China Information Technology and Data Management Department of China Mobile Communications Group Zhejiang Co. Ltd China
The learnware paradigm aims to establish a learnware dock system of numerous well-trained machine learning models, enabling users to reuse existing helpful models for their tasks instead of starting from scratch. Each... 详细信息
来源: 评论
D-Router: Decoupled Content Routers with Remote Content Store
D-Router: Decoupled Content Routers with Remote Content Stor...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Shuyi Chen Tian Pan Chunyang Wu Guohao Ruan Jiao Zhang Tao Huang Yunjie Liu Beijing University of Posts and Telecommunications Beijing China Purple Mountain Laboratories Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China
Named Data networking (NDN) enables efficient content distribution through in-network caching. However, the additional states of network intermediary nodes make NDN forwarding more burdensome, and the unpredictability... 详细信息
来源: 评论
Fault-tolerant identity-based encryption from SM9
收藏 引用
Science China(information Sciences) 2024年 第2期67卷 104-117页
作者: Xiaohong LIU Xinyi HUANG Zhaohui CHENG Wei WU Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal University Artificial Intelligence Thrust Information HubThe Hong Kong University of Science and Technology (Guangzhou) Olym Information Security Technology Ltd. Center for Applied Mathematics of Fujian Province School of Mathematics and StatisticsFujian Normal University
This paper initiates the formal study of attribute-based encryption within the framework of SM9,the Chinese National Cryptography Standard for Identity-Based Cryptography, by presenting two new faulttolerant identity-... 详细信息
来源: 评论
FDSC-YOLOv8:Advancements in Automated Crack Identification for Enhanced Safety in Underground Engineering
收藏 引用
computer Modeling in Engineering & Sciences 2024年 第9期140卷 3035-3049页
作者: Rui Wang Zhihui Liu Hongdi Liu Baozhong Su Chuanyi Ma Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan250353China School of Qilu Transportation Shandong UniversityJinan250100China Geotechnical and Structural Engineering Center Shandong UniversityJinan250061China Shandong Lairong High-Speed Railway Co. Ltd.Weihai264200China Shandong High-Speed Group Co. Ltd.Jinan250014China
In underground engineering,the detection of structural cracks on tunnel surfaces stands as a pivotal task in ensuring the health and reliability of tunnel ***,the dim and dusty environment inherent to under-ground eng... 详细信息
来源: 评论