咨询与建议

限定检索结果

文献类型

  • 355 篇 会议
  • 253 篇 期刊文献

馆藏范围

  • 608 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 397 篇 工学
    • 321 篇 计算机科学与技术...
    • 262 篇 软件工程
    • 101 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 36 篇 生物工程
    • 26 篇 机械工程
    • 23 篇 生物医学工程(可授...
    • 20 篇 电气工程
    • 19 篇 电子科学与技术(可...
    • 16 篇 光学工程
    • 16 篇 仪器科学与技术
    • 14 篇 网络空间安全
    • 12 篇 动力工程及工程热...
    • 10 篇 交通运输工程
    • 7 篇 建筑学
    • 7 篇 土木工程
    • 7 篇 化学工程与技术
  • 161 篇 理学
    • 104 篇 数学
    • 36 篇 生物学
    • 25 篇 统计学(可授理学、...
    • 22 篇 物理学
    • 13 篇 系统科学
    • 9 篇 化学
  • 132 篇 管理学
    • 70 篇 管理科学与工程(可...
    • 63 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 16 篇 医学
    • 14 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 15 篇 法学
    • 14 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 31 篇 semantics
  • 19 篇 training
  • 16 篇 routing
  • 16 篇 machine learning
  • 16 篇 protocols
  • 15 篇 feature extracti...
  • 13 篇 clustering algor...
  • 11 篇 privacy
  • 10 篇 deep learning
  • 10 篇 network topology
  • 10 篇 educational inst...
  • 10 篇 estimation
  • 9 篇 peer to peer com...
  • 9 篇 big data
  • 9 篇 optimization
  • 9 篇 contrastive lear...
  • 9 篇 wireless sensor ...
  • 9 篇 benchmark testin...
  • 9 篇 accuracy
  • 9 篇 cloud computing

机构

  • 162 篇 school of comput...
  • 86 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 41 篇 school of comput...
  • 39 篇 key laboratory o...
  • 35 篇 key laboratory o...
  • 34 篇 school of cyber ...
  • 19 篇 key laboratory o...
  • 15 篇 ministry of educ...
  • 12 篇 school of cyber ...
  • 11 篇 school of comput...
  • 10 篇 guangxi collabor...
  • 10 篇 the school of co...
  • 10 篇 college of softw...
  • 9 篇 southeast univer...
  • 9 篇 purple mountain ...
  • 9 篇 national key lab...
  • 8 篇 the key laborato...
  • 8 篇 moe key laborato...
  • 8 篇 department of co...

作者

  • 36 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 21 篇 guang cheng
  • 18 篇 geng xin
  • 18 篇 wang yun
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 15 篇 sanfeng zhang
  • 13 篇 cheng guang
  • 12 篇 shu huazhong
  • 12 篇 li xiaoping
  • 12 篇 qi guilin
  • 11 篇 jia yuheng
  • 11 篇 kong youyong
  • 10 篇 wei tong
  • 10 篇 yang guanyu
  • 10 篇 yang peng
  • 9 篇 xiaoyan hu
  • 9 篇 gao zhiqiang

语言

  • 481 篇 英文
  • 101 篇 其他
  • 29 篇 中文
检索条件"机构=Key Library of Computer Network and Information Integration"
608 条 记 录,以下是411-420 订阅
排序:
Deep Age Distribution Learning for Apparent Age Estimation
Deep Age Distribution Learning for Apparent Age Estimation
收藏 引用
IEEE computer Society Conference on computer Vision and Pattern Recognition Workshops (CVPRW)
作者: Zengwei Huo Xu Yang Chao Xing Ying Zhou Peng Hou Jiaqi Lv Xin Geng Key Lab of Computer Network and Information Integration (Ministry of Education) Southeast University Nanjing China
Apparent age estimation has attracted more and more researchers since its potential applications in the real world. Apparent age estimation differs from chronological age estimation that in apparent age estimation eac... 详细信息
来源: 评论
Logistic Boosting Regression for Label Distribution Learning
Logistic Boosting Regression for Label Distribution Learning
收藏 引用
IEEE Conference on computer Vision and Pattern Recognition
作者: Chao Xing Xin Geng Hui Xue Key Lab of Computer Network and Information Integration (Ministry of Education) School of Computer Science and Engineering Southeast University
Label Distribution Learning (LDL) is a general learning framework which includes both single label and multi-label learning as its special cases. One of the main assumptions made in traditional LDL algorithms is the d... 详细信息
来源: 评论
Highly Compact Virtual Counters for Per-Flow Traffic Measurement through Register Sharing
Highly Compact Virtual Counters for Per-Flow Traffic Measure...
收藏 引用
IEEE Global Communications Conference
作者: You Zhou Yian Zhou Min Chen Qingjun Xiao Shigang Chen Department of Computer & Information Science & Engineering University of Florida Key Lab of Computer Network and Information Integration Southeast University Ministry of Education
Per-flow traffic measurement is a fundamental problem in the era of big network data, providing critical information for many practical applications including capacity planning, traffic engineering, data accounting, r... 详细信息
来源: 评论
Design and Implementation of Not So Cooperative Caching System
收藏 引用
China Communications 2015年 第7期12卷 31-46页
作者: HU Xiaoyan GONG Jian CHENG Guang ZHANG Weiwei Ahmad Jakalan School of Computer Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education
Not So Cooperative Caching(NSCC) considers a network comprised of selfish nodes; each is with caching capability and an objective of reducing its own access cost by fetching data from its local cache or from neighbori... 详细信息
来源: 评论
network-Interconnection-Oriented: a Scalable Routing Service Model
Network-Interconnection-Oriented: a Scalable Routing Service...
收藏 引用
IEEE International Conference on High Performance Computing and Communications
作者: Yi Wan Jun Shen Tao Han Zu-Qin Ji MOE Key Laboratory of Computer Network and Information Integration School of Computer Science and Engineering Southeast University Nanjing 210096 China
Aimed at improving poor performance of current network routing service in the way of scalability, a new scalable routing service model (SRSM) is proposed based on the core of network interconnection and principles of ... 详细信息
来源: 评论
A Description Method for network Architecture
A Description Method for Network Architecture
收藏 引用
IEEE International Conference on High Performance Computing and Communications
作者: Jun Shen Zuqin Ji Wen Gao Yi Wan Key Laboratory of Computer Network & Information Integration of Ministry of Education School of Computer Science & Engineering Southeast University Nanjing 210096 China
Due to lack of desired model for traditional network architecture, services which are newly deployed can't be analyzed and verified quickly or efficiently. To address this problem, this paper puts forward a descri... 详细信息
来源: 评论
Progress in Command and Control Server Finding Schemes of Botnet
Progress in Command and Control Server Finding Schemes of Bo...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Xiaojun Guo Guang Cheng Yifei Hu Mian Dai Southeast University Nanjing Jiangsu CN Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China
Botnets have become one of the most serious threats to current Internet and future network security. Only finding and connecting command and control(C&C) servers can bots join and work for botnet, hence how to fin... 详细信息
来源: 评论
Temporal inactivation enhances robustness in an evolving system
arXiv
收藏 引用
arXiv 2018年
作者: Ogushi, Fumiko Kertész, János Kaski, Kimmo Shimada, Takashi Kyoto University Institute for Advanced Study Kyoto University Yoshida Ushinomiya-cho Sakyo-ku Kyoto606-8501 Japan Center for Materials research by Information Integration National Institute for Materials Science 1-2-1 Sengen Tsukuba Ibaraki305-0047 Japan Department of Network and Data Science Central European University Budapest1051 Hungary Institute of Physics Budapest University of Technology and Economics Budapest1111 Hungary Department of Computer Science Aalto University School of Science P.O. Box 15500 Espoo Finland Alan Turing Institute British Library 96 Euston Road LondonNW1 2DB United Kingdom Mathematics and Informatics Center University of Tokyo Department of Systems Innovation Graduate School of Engineering University of Tokyo 7-3-1 Hongo Bunkyo-ku Tokyo113-8656 Japan
We study the robustness of an evolving system that is driven by successive inclusions of new elements or constituents with m random interactions to older ones. Each constitutive element in the model stays either activ... 详细信息
来源: 评论
Flow Scheduling Strategies for Minimizing Flow Completion Times in information-agnostic Data Center networks
Flow Scheduling Strategies for Minimizing Flow Completion Ti...
收藏 引用
作者: Peiyi Yu Chao Hu Bo Liu Changyou Xing College of Command Information Systems PLA University of Science and Technology Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education
Minimizing the flow completion time(FCT) is widely considered as an important optimization goal in designing data center networks. However, existing schemes either rely on the precondition that the size and deadline... 详细信息
来源: 评论
A Self-Similar Call Admission Control Algorithm in WiMAX
收藏 引用
International Journal of Communications, network and System Sciences 2016年 第5期9卷 168-176页
作者: Yongdong Hu Guoxin Wu School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China College of Information Science and Technology Nanjing Forestry University Nanjing China
Modelling WiMAX network traffic based on the self-similarity character is better than the traditional model based on the Poisson process, because the former can provide more accurate calculation for effective bandwidt... 详细信息
来源: 评论