咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是3141-3150 订阅
排序:
Image Compression Algorithm Based On Reversible Integer Time-Domain Lapped Transform And Quadtree Partition
Image Compression Algorithm Based On Reversible Integer Time...
收藏 引用
2014 IEEE 7th Joint International Information technology and Artificial Intelligence Conference
作者: Xiuhua Ma Jiwen Dong Peilong Zhao Department of Computer Science and Technology Shandong Provincial Key Laboratory of Network based Intelligent Computing University of Jinan
A new image compression system based on quadtreepartition and reversible integer time-domain lapped transform(RTDLT) as core transform technology is proposed. The system obtained transformation region of different siz... 详细信息
来源: 评论
Traffic Labeller: Collecting Internet Traffic Samples with Accurate Application Information
收藏 引用
China Communications 2014年 第1期11卷 69-78页
作者: PENG Lizhi ZHANG Hongli YANG Bo CHEN Yuehui WU Tong School of Computer Science and Technology Harbin Institute of Technology Harbin 150002 China Provincial Key Laboratory for Network Based Intelligent Computing University of Jinan Jinan 250022 China School of Computer and Information Technology Beijing Jiaotong University Beijing 100044 China
Traffic classification research has been suffering from a trouble of collecting accurate samples with ground truth.A model named Traffic Labeller(TL) is proposed to solve this *** system captures all user socket calls... 详细信息
来源: 评论
An online multi-object tracking by detection approach based on particle filtering framework  14
An online multi-object tracking by detection approach based ...
收藏 引用
2014 Conference on Research in Adaptive and Convergent Systems, RACS 2014
作者: Wang, Zhenhai Hong, Kicheon Informatics School Linyi University Linyin Shandong China Shandong Provincial Key Laboratory of Network Intelligent Computing Technology China Dept. of Information and Telecommunications Engineering University of Suwon Bongdam-eup Hwaseong-si Gyeonggi-do Korea Republic of
In this paper, we address the problem of automatically detecting and tracking a variable number of persons in complex scenes using a monocular, potentially moving, uncalibrated camera. We propose a novel approach for ... 详细信息
来源: 评论
Parallelization using task parallel library with task-based programming model
Parallelization using task parallel library with task-based ...
收藏 引用
IEEE International Conference on Software Engineering and Service Sciences (ICSESS)
作者: Xinhong Hei Jinlong Zhang Bin Wang Haiyan Jin Nasser Giacaman School of Computer Science and Engineering Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an Shaanxi Province China Department of Electrical and Computer Engineering The University of Auckland Auckland New Zealand
In order to reduce the complexity of traditional multithreaded parallel programming, this paper explores a new task-based parallel programming using the Microsoft .NET Task Parallel Library (TPL). Firstly, this paper ... 详细信息
来源: 评论
Availability-Aware Virtual network Embedding for Multi-tier Applications in Cloud networks
Availability-Aware Virtual Network Embedding for Multi-tier ...
收藏 引用
IEEE International Conference on High Performance computing and Communications (HPCC)
作者: Meng Shen Xu Ke Fuliang Li Fan Li Liehuang Zhu Lei Guan Ministry of Education Key Laboratory of Computer Network and Information Integration (Southeast University) P. R. China Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications School of Computer Science Beijing Institute of Technology P. R. China Tsinghua University Beijing Beijing CN College of Information Science and Engineering Northeastern University P. R. China DNSLAB China Internet Network Iniormation Center Beijing P. R. China School of Management & Economics Beijing Institute of Technology P. R. China
There is a growing trend for service providers (SPs) to migrate their multi-tier applications from local clusters to public cloud networks. In the cloud environment, it is a great concern of SPs to improve the availab... 详细信息
来源: 评论
MF-PDP:MULTI-FUNCTION PROVABLE DATA POSSESSION SCHEME IN CLOUD computing
MF-PDP:MULTI-FUNCTION PROVABLE DATA POSSESSION SCHEME IN CLO...
收藏 引用
2014 IEEE 3rd International Conference on Cloud computing and Intelligence Systems
作者: Xiaojun Yu Qiaoyan Wen State key laboratory of networking and switching technology Beijing University of Posts and Telecommunications Beijing Topsec Network Security Technology Co.Ltd
This paper proposed a multi-function provable data possession(MF-PDP),which supports public verification,data dynamic,unlimited times verification and sampling *** detail design is provided and the theory analysis abo... 详细信息
来源: 评论
A secure self-destruction scheme with IBE for the internet content privacy
收藏 引用
Jisuanji Xuebao/Chinese Journal of Computers 2014年 第1期37卷 139-150页
作者: Xiong, Jin-Bo Yao, Zhi-Qiang Ma, Jian-Feng Li, Feng-Hua Liu, Xi-Meng Faculty of Software Fujian Normal University Fuzhou 350108 China School of Computer Science and Technology Xidian University Xi'an 710071 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an 710071 China
With the rapid emerging of novelty Web services and cloud services, privacy information and documents of users become increasingly easy to be exposed in the Internet. To tackle the issue of lifecycle security of the p... 详细信息
来源: 评论
Program Crash Analysis Based on Taint Analysis
Program Crash Analysis Based on Taint Analysis
收藏 引用
International Conference on P2P, Parallel, Grid, Cloud and Internet computing (3PGCIC)
作者: Zhang Puhan Wu Jianxiong Wang Xin Zehui Wu China Information Technology Security Evaluation Center Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Software exception analysis can not only improve software stability before putting into commercial, but also could optimize the priority of patch updates subsequently. We propose a more practical software exception an... 详细信息
来源: 评论
Improved OMP Selecting Sparse Representation Used with Face Recognition
Improved OMP Selecting Sparse Representation Used with Face ...
收藏 引用
2014 IEEE 5th International Conference on Software Engineering and Service Science
作者: Jian Zhang Ke Yan Zhenyu He Bio-computing Research Center Shenzhen Graduate SchoolHarbin Institute of Technology Key Laboratory of Network Oriented Intelligent Computation
With the worldwide strengthening of anti-terrorism and other identity verification,the products based on face recognition are used in real life more and *** recognition as an important ways has become the focus of aca... 详细信息
来源: 评论
Image Classification Using Sparse Coding and Spatial Pyramid Matching
Image Classification Using Sparse Coding and Spatial Pyramid...
收藏 引用
2014 International Conference on e-Education,e-Business and Information Management(ICEEIM 2014)
作者: Xiaofang Wang Jun Ma Ming Xu School of Computer Science and Technology Shandong University Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan
Recently,the Support Vector Machine(SVM) using Spatial Pyramid Matching(SPM) kernel has achieved remarkable successful in image classification. The classification accuracy can be improved further when combining the sp... 详细信息
来源: 评论