咨询与建议

限定检索结果

文献类型

  • 355 篇 会议
  • 253 篇 期刊文献

馆藏范围

  • 608 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 397 篇 工学
    • 321 篇 计算机科学与技术...
    • 262 篇 软件工程
    • 101 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 36 篇 生物工程
    • 26 篇 机械工程
    • 23 篇 生物医学工程(可授...
    • 20 篇 电气工程
    • 19 篇 电子科学与技术(可...
    • 16 篇 光学工程
    • 16 篇 仪器科学与技术
    • 14 篇 网络空间安全
    • 12 篇 动力工程及工程热...
    • 10 篇 交通运输工程
    • 7 篇 建筑学
    • 7 篇 土木工程
    • 7 篇 化学工程与技术
  • 161 篇 理学
    • 104 篇 数学
    • 36 篇 生物学
    • 25 篇 统计学(可授理学、...
    • 22 篇 物理学
    • 13 篇 系统科学
    • 9 篇 化学
  • 132 篇 管理学
    • 70 篇 管理科学与工程(可...
    • 63 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 16 篇 医学
    • 14 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 15 篇 法学
    • 14 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 31 篇 semantics
  • 19 篇 training
  • 16 篇 routing
  • 16 篇 machine learning
  • 16 篇 protocols
  • 15 篇 feature extracti...
  • 13 篇 clustering algor...
  • 11 篇 privacy
  • 10 篇 deep learning
  • 10 篇 network topology
  • 10 篇 educational inst...
  • 10 篇 estimation
  • 9 篇 peer to peer com...
  • 9 篇 big data
  • 9 篇 optimization
  • 9 篇 contrastive lear...
  • 9 篇 wireless sensor ...
  • 9 篇 benchmark testin...
  • 9 篇 accuracy
  • 9 篇 cloud computing

机构

  • 162 篇 school of comput...
  • 86 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 41 篇 school of comput...
  • 39 篇 key laboratory o...
  • 35 篇 key laboratory o...
  • 34 篇 school of cyber ...
  • 19 篇 key laboratory o...
  • 15 篇 ministry of educ...
  • 12 篇 school of cyber ...
  • 11 篇 school of comput...
  • 10 篇 guangxi collabor...
  • 10 篇 the school of co...
  • 10 篇 college of softw...
  • 9 篇 southeast univer...
  • 9 篇 purple mountain ...
  • 9 篇 national key lab...
  • 8 篇 the key laborato...
  • 8 篇 moe key laborato...
  • 8 篇 department of co...

作者

  • 36 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 21 篇 guang cheng
  • 18 篇 geng xin
  • 18 篇 wang yun
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 15 篇 sanfeng zhang
  • 13 篇 cheng guang
  • 12 篇 shu huazhong
  • 12 篇 li xiaoping
  • 12 篇 qi guilin
  • 11 篇 jia yuheng
  • 11 篇 kong youyong
  • 10 篇 wei tong
  • 10 篇 yang guanyu
  • 10 篇 yang peng
  • 9 篇 xiaoyan hu
  • 9 篇 gao zhiqiang

语言

  • 481 篇 英文
  • 101 篇 其他
  • 29 篇 中文
检索条件"机构=Key Library of Computer Network and Information Integration"
608 条 记 录,以下是421-430 订阅
排序:
Towards QoE assessment of encrypted YouTube adaptive video streaming in mobile networks
Towards QoE assessment of encrypted YouTube adaptive video s...
收藏 引用
International Workshop on Quality of Service
作者: Wubin Pan Gaung Cheng Hua Wu Yongning Tang School of Computer Science and Engineering Southeast University China Ministry of Education Key Laboratory of Computer Network and Information Integration China School of Information Technology Illinois State University USA
Video streaming has become one of the most prevalent mobile applications, and takes a huge portion of the traffic on mobile networks today. YouTube is one of the most popular and volume-dominant video content provider... 详细信息
来源: 评论
Low-dose CBCT reconstruction via 3D dictionary learning
Low-dose CBCT reconstruction via 3D dictionary learning
收藏 引用
IEEE International Symposium on Biomedical Imaging
作者: Jin Liu Yang Chen Yining Hu Limin Luo Ministry of Education The Key Laboratory of Computer Network and Information Integration (Southeast University) China Centre de Rechercheen Information Biomedicale Sino-Francais (LIA CRIBs) Rennes France
Dictionary based regularization has shown its potential to improve the low-dose computed tomography (CT) imaging quality. In this paper, we developed a 3D dictionary learning (3D-DL) regularization approach for low-do... 详细信息
来源: 评论
Analysis of web traffic based on HTTP protocol
Analysis of web traffic based on HTTP protocol
收藏 引用
International Conference on Software, Telecommunications and computer networks (SoftCOM)
作者: Jiajia Chen Weiqing Cheng School of Computer Science & Technology Nanjing University of Posts and Telecommunications Nanjing China Ministry of Education Key Laboratory of Computer Network and Information Integration (Southeast University) Nanjing China
With the development of Internet, new applications are emerging in an endless stream, and traditional applications are constantly changing. Over the past decade, Internet applications develop rapidly, and great change... 详细信息
来源: 评论
Path selection and algorithm optimization of wireless sensor networks based on sink mobile distance-constraint
收藏 引用
Journal of Computational and Theoretical Nanoscience 2016年 第8期13卷 5156-5164页
作者: Wang, Honglin Shen, Jun School of Computer Science and Engineering Southeast University Jiangsu Nanjing211189 China Key Laboratory of Computer Network and Information Integration Southeast University Jiangsu Nanjing211189 China School of Electronic and Information Engineering of Nanjing University of Information Science and Technology Jiangsu Nanjing210044 China
In this paper, the authors have discussed the problem of longest network lifetime in the wireless sensor networks on the condition of limited sink moving distance. The optimal solution of integer linear programming mo... 详细信息
来源: 评论
Micro-Expression Recognition based on 2D Gabor Filter and Sparse Representation
收藏 引用
Journal of Physics: Conference Series 2017年 第1期787卷
作者: Hao Zheng Key Laboratory of Trusted Cloud Computing and Big Data Analysis School of Information Engineering Nanjing XiaoZhuang University Nanjing China MOE Key Laboratory of Computer Network and Information Integration School of Computer Science and Engineering Southeast University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Micro-expression recognition is always a challenging problem for its quick facial expression. This paper proposed a novel method named 2D Gabor filter and Sparse Representation (2DGSR) to deal with the recognition of ...
来源: 评论
Clustering algorithm design optimization and routing protocols based on leach
收藏 引用
Journal of Computational information Systems 2015年 第12期11卷 4343-4352页
作者: Wang, Honglin Shen, Jun School of Computer Science and Engineering of Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration of Southeast University Nanjing China School of Electronic & Information Engineering of Nanjing University of Information Science & Technology Nanjing China
Special long-distance communication environment, the standard protocol is optimized for Leach mine tunnel, an improved protocol TLeach base on Leach. Including: optimized clustering scheme, we propose a clustering met... 详细信息
来源: 评论
Efficient anonymous category-level joint Tag estimation
Efficient anonymous category-level joint Tag estimation
收藏 引用
International Conference on network Protocols
作者: Min Chen Jia Liu Shigang Chen Qingjun Xiao Department of Computer & Information Science & Engineering University of Florida Gainesville FL USA State Key Laboratory for Novel Software Technology Nanjing University P.R. China Key Laboratory of Computer Network & Information Integration Southeast University P.R. China
Radio-frequency identification (RFID) technologies have been widely used in many applications, including inventory management, supply chain, product tracking, transportation, logistics, etc. Tag estimation, which is t... 详细信息
来源: 评论
ESync: Energy synchronized mobile charging in rechargeable wireless sensor networks
ESync: Energy synchronized mobile charging in rechargeable w...
收藏 引用
作者: Fu, Lingkun He, Liang Cheng, Peng Gu, Yu Pan, Jianping Chen, Jiming State Key Laboratory of Industrial Control Technology Zhejiang University Hangzhou310027 China University of Michigan Ann ArborMI48109 United States Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Beijing100044 China Watson Health Cloud IBM Watson Health CambridgeMA02142 United States Department of Computer Science University of Victoria VictoriaBCV8P 5C2 Canada
Recent years have witnessed many new promising technologies to power wireless sensor networks, which motivate some fundamental topics to be revisited. Different from energy harvesting, which generates dynamic energy s... 详细信息
来源: 评论
Non-uniform spacing clustering interval multi-hop routing leach algorithms for wireless sensor network
收藏 引用
Journal of Computational information Systems 2015年 第10期11卷 3613-3622页
作者: Wang, Honglin Shen, Jun School of computer Science and Engineering of Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration of Southeast University Nanjing China School of Electronic & Information Engineering of Nanjing University of Information Science & Technology Nanjing China
For mine tunnel distances ribbon special communications environment, proposed a non-uniform spacing clustering multi-hop routing algorithm. The core idea is: to change the cluster head election strategy, considering t... 详细信息
来源: 评论
A data routing algorithm based on Markov model in underwater wireless sensor networks
A data routing algorithm based on Markov model in underwater...
收藏 引用
IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB)
作者: Dongwei Li JingLi Du LinFeng Liu Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China School of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing China Laboratory of Computer Network and Information Integration (Southeast University) Nanjing China
The underwater wireless sensor networks (UWSNs) composed of sensor nodes is deployed underwater for submarine data collection, underwater monitoring, disaster warning, navigation assistance and so on. Since the underw... 详细信息
来源: 评论