咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3111-3120 订阅
排序:
A robust collaborative threshold authenticeted encryption scheme based on message blocking  6
A robust collaborative threshold authenticeted encryption sc...
收藏 引用
6th International Conference on Cyber-Enabled Distributed computing and Knowledge Discovery, CyberC 2014
作者: Chen, Zhen Zhang, Wenfang Wang, Xiaomin School of Information Science and Technology Southwest Jiaotong University China Key Laboratory of Information Security and National Computing Grid Southwest Jiaotong University Chengdu China
In recent years, some collaborative threshold authenticated encryption schemes were put forward to ease the workloads of the individual signers. Unfortunately, the original scheme was found to have design flaws in its... 详细信息
来源: 评论
An Efficient Centralized Algorithm for Connected Dominating Set on Wireless networks
收藏 引用
Procedia Computer Science 2015年 56卷 162-167页
作者: Deqian Fu Lihua Han Li Liu Qian Gao Zhiquan Feng School of Informatics Linyi University Linyi 276005 P.R. China Provincial Key Laboratory for Network Based Intelligent Computing University of Jinan Jinan 250022 P.R. China School of Information Qilu University of Technology Jinan Shandong 250353 China School of Information Science and Engineering Universityof Jinan Jinan Shandong 250022 China
In wireless network, backbone network plays an important role on forwarding data. Further, in order to reduce the delay and save energy, the minimum connected dominating set (MCDS) is an effective way to construct a b... 详细信息
来源: 评论
On Constructing Minimum 2-Connected 2-Domiating Set with Maximum Spectrums in Cognitive Radio networks
收藏 引用
Procedia Computer Science 2015年 56卷 156-161页
作者: Lihua Han Deqian Fu Zifen Yang Qian Gao Zhiquan Feng School of Informatics Linyi University Linyi Shandong 276005 P.R. China Provincial Key Laboratory for Network Based Intelligent Computing University of Jinan Jinan 250022 P.R. China School of Information Qilu University of Technology Jinan Shandong 250353 China School of Information Science and Engineering Universityof Jinan Jinan Shandong 250022 China
Connected dominating set (CDS) is a representative technique for constructing virtual backbones of wireless networks to improve the efficiency of communication. Most of existing works on CDS aim to construct the minim... 详细信息
来源: 评论
Tuning linux's load balancing algorithm for CMT system
Tuning linux's load balancing algorithm for CMT system
收藏 引用
2013 IEEE Conference Anthology, ANTHOLOGY 2013
作者: Peng, Jianzhang Gu, Naijie Li, Yehua Xu, Zhang School of Computer Science and Technology University of Science and Technology of China Hefei China Anhui Province Key Laboratory of Computing and Communication Software USTC SICT Joint Laboratory of Network and Communication Hefei China
Linux 2.6 load balancing algorithm on scheduling domain supports CMP, CMT, SMP, NUMA architecture. For SMT, the algorithm try to assign the new process to the idlest CPU of the idlest core, and if the first CPU of a c... 详细信息
来源: 评论
Independent component analysis based on information bottleneck
Abstract and Applied Analysis
收藏 引用
Abstract and Applied Analysis 2015年 第1期2015卷
作者: Ke, Qiao Zhang, Jiangshe Srivastava, H.M. Wei, Wei Chen, Guang-Sheng School of Mathematics and Statistics Xi'An Jiaotong University Xi'an 710049 China Department of Mathematics and Statistics University of Victoria Victoria V8W3R4 BC Canada School of Computer Science and Engineering Xi'An University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an 710048 China Department of Construction and Information Engineering Guangxi Modern Vocational Technology College Hechi Guangxi 547000 China
The paper is mainly used to provide the equivalence of two algorithms of independent component analysis (ICA) based on the information bottleneck (IB). In the viewpoint of information theory, we attempt to explain the...
来源: 评论
An Energy-saving Algorithm for Wireless Sensor networks Based on network Coding and Compressed Sensing
收藏 引用
中国通信 2014年 第z1期11卷 171-178页
作者: QIN Tuanfa MENG Yunfan LI Liangliang WAN Haibin ZHANG Dongmei School of Computer and Electronic Information Guangxi University Nanning 530004 China Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi University Nanning 530004 China Information Security Center Beijing University of Posts and Telecommunications Beijing 100876 China National Engineering Laboratory for Disaster Backup and Recovery Beijing 100876 China
An energy-saving algorithm for wireless sensor networks based on network coding and compressed sensing (CS-NCES) is proposed in this paper. Along with considering the correlations of data spatial and temporal, the a... 详细信息
来源: 评论
Personal Attributes Extraction in Chinese Text Bakeoff in CLP 2014: Overview  3
Personal Attributes Extraction in Chinese Text Bakeoff in CL...
收藏 引用
3rd CIPS-SIGHAN Joint Conference on Chinese Language Processing, CLP 2014
作者: Xu, Ruifeng Wang, Shuai Shi, Feng Xu, Jian Key Laboratory of Network Oriented Intelligent Computation Harbin Institute of Technology Shenzhen Graduate School China Department of Computing Hong Kong Polytechnic University Hong Kong
This paper presents the overview of Personal Attributes Extraction in Chinese Text Bakeoff in CLP 2014. Personal attribute extraction plays an important role in information extraction, event tracking, entity disambigu... 详细信息
来源: 评论
Construction of Lightweight Certificate-Based Signature and Application in Cloud computing
Construction of Lightweight Certificate-Based Signature and ...
收藏 引用
7th China Conference of Wireless Sensor networks, CWSN 2013
作者: Shaohui, Wang Suqin, Chang College of Computer Nanjing University of Posts and Telecommunications Nanjing 210023 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210003 China Network and Data Security Key Laboratory of Sichuan Province United States
Certificate-based signature (CBS) scheme preserves advantages of certificate-based encryption, such as implicit certification and no private key escrow problem. In this paper, we propose a new short and efficient CBS ... 详细信息
来源: 评论
Emotion cause detection with linguistic construction in Chinese Weibo text  3
Emotion cause detection with linguistic construction in Chin...
收藏 引用
3rd CCF Conference on Natural Language Processing and Chinese computing, NLPCC 2014
作者: Gui, Lin Yuan, Li Xu, Ruifeng Liu, Bin Lu, Qin Zhou, Yu Key Laboratory of Network Oriented Intelligent Computation Shenzhen Graduate School Harbin Institute of Technology Shenzhen China Department of Computing The Hong Kong Polytechnic University Hong Kong
To identify the cause of emotion is a new challenge for researchers in nature language processing. Currently, there is no existing works on emotion cause detection from Chinese micro-blogging (Weibo) text. In this stu... 详细信息
来源: 评论
Group recommendation for Flickr images by 4-order tensor decomposition
收藏 引用
Journal of Computational Information Systems 2014年 第3期10卷 1315-1322页
作者: Wang, Xiaofang Ma, Jun Xu, Ming School of Computer Science and Technology Shandong University Jinan 250101 China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan 250022 China Shandong Dareway Computer Software Co. Ltd. Jinan 250101 China
Users in Flickr can upload images and share them with appropriate groups based on their interests. Sharing images with a group would promote the communication between users and expand their social networks, so Flickr ... 详细信息
来源: 评论