咨询与建议

限定检索结果

文献类型

  • 355 篇 会议
  • 253 篇 期刊文献

馆藏范围

  • 608 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 397 篇 工学
    • 321 篇 计算机科学与技术...
    • 262 篇 软件工程
    • 101 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 36 篇 生物工程
    • 26 篇 机械工程
    • 23 篇 生物医学工程(可授...
    • 20 篇 电气工程
    • 19 篇 电子科学与技术(可...
    • 16 篇 光学工程
    • 16 篇 仪器科学与技术
    • 14 篇 网络空间安全
    • 12 篇 动力工程及工程热...
    • 10 篇 交通运输工程
    • 7 篇 建筑学
    • 7 篇 土木工程
    • 7 篇 化学工程与技术
  • 161 篇 理学
    • 104 篇 数学
    • 36 篇 生物学
    • 25 篇 统计学(可授理学、...
    • 22 篇 物理学
    • 13 篇 系统科学
    • 9 篇 化学
  • 132 篇 管理学
    • 70 篇 管理科学与工程(可...
    • 63 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 16 篇 医学
    • 14 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 15 篇 法学
    • 14 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 军事学
  • 1 篇 教育学

主题

  • 31 篇 semantics
  • 19 篇 training
  • 16 篇 routing
  • 16 篇 machine learning
  • 16 篇 protocols
  • 15 篇 feature extracti...
  • 13 篇 clustering algor...
  • 11 篇 privacy
  • 10 篇 deep learning
  • 10 篇 network topology
  • 10 篇 educational inst...
  • 10 篇 estimation
  • 9 篇 peer to peer com...
  • 9 篇 big data
  • 9 篇 optimization
  • 9 篇 contrastive lear...
  • 9 篇 wireless sensor ...
  • 9 篇 benchmark testin...
  • 9 篇 accuracy
  • 9 篇 cloud computing

机构

  • 162 篇 school of comput...
  • 86 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 41 篇 school of comput...
  • 39 篇 key laboratory o...
  • 35 篇 key laboratory o...
  • 34 篇 school of cyber ...
  • 19 篇 key laboratory o...
  • 15 篇 ministry of educ...
  • 12 篇 school of cyber ...
  • 11 篇 school of comput...
  • 10 篇 guangxi collabor...
  • 10 篇 the school of co...
  • 10 篇 college of softw...
  • 9 篇 southeast univer...
  • 9 篇 purple mountain ...
  • 9 篇 national key lab...
  • 8 篇 the key laborato...
  • 8 篇 moe key laborato...
  • 8 篇 department of co...

作者

  • 36 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 21 篇 guang cheng
  • 18 篇 geng xin
  • 18 篇 wang yun
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 15 篇 sanfeng zhang
  • 13 篇 cheng guang
  • 12 篇 shu huazhong
  • 12 篇 li xiaoping
  • 12 篇 qi guilin
  • 11 篇 jia yuheng
  • 11 篇 kong youyong
  • 10 篇 wei tong
  • 10 篇 yang guanyu
  • 10 篇 yang peng
  • 9 篇 xiaoyan hu
  • 9 篇 gao zhiqiang

语言

  • 481 篇 英文
  • 101 篇 其他
  • 29 篇 中文
检索条件"机构=Key Library of Computer Network and Information Integration"
608 条 记 录,以下是461-470 订阅
排序:
Conflict Resolution in Partially Ordered OWL DL Ontologies  21
Conflict Resolution in Partially Ordered OWL DL Ontologies
收藏 引用
21st European Conference on Artificial Intelligence (ECAI)
作者: Ji, Qiu Gao, Zhiqiang Huang, Zhisheng School of Computer Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration China Department of Mathematics and Computer Science Vrije University Amsterdam Netherlands
Inconsistency handling in OWL DL ontologies is an important problem because an ontology can easily be inconsistent when it is generated or modified. Current approaches to dealing with inconsistent ontologies often ass... 详细信息
来源: 评论
Statistical error analysis of HTL algorithm via LTO and RO stability hypothesis
收藏 引用
Journal of information and Computational Science 2014年 第16期11卷 5765-5773页
作者: Wu, Jianzhang Yu, Xiao Gao, Wei School of Computer Science and Engineer Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China School of Continuing Education Southeast University Nanjing China School of Information Yunnan Normal University Kunming China
There are abundant parameters to estimate if training and testing samples are drawn from the different probability distribution in supervised machine learning algorithm setting. Hypothesis transfer learning is a trick... 详细信息
来源: 评论
Gradient compared ℓp-LMS algorithms for sparse system identification
Gradient compared ℓp-LMS algorithms for sparse system ident...
收藏 引用
Chinese Control and Decision Conference, CCDC
作者: Yong Feng Jiasong Wu Rui Zeng Limin Luo Huazhong Shu School of Biological Science and Medical Engineering Southeast University Nanjing China Laboratory of Image Science and Technology the Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China Laboratory of Image Science and Technology Southeast University Nanjing China
In this paper, we propose two novel p-norm penalty least mean square (ℓ p -LMS) algorithms as supplements of the conventional ℓ p -LMS algorithm established for sparse adaptive filtering recently. A gradient comparato... 详细信息
来源: 评论
Bilinear model for ontology mapping
收藏 引用
computer Modelling and New Technologies 2014年 第8期18卷 368-372页
作者: Wu, Jian-Zhang Xiao, Yu Gao, Wei School of Computer Science and Engineer Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China School of Continuing Education Southeast University Nanjing China School of Information Science and Technology Yunnan Normal University Kunming China
As a model of concept representation, ontology has widely applied to various disciplines. Ontology mapping is used to create the link between different ontologies. In this paper, we present a new ontology mapping algo... 详细信息
来源: 评论
Latency-aware routing with bandwidth assignment for Software Defined networks
Latency-aware routing with bandwidth assignment for Software...
收藏 引用
IEEE International Conference on Performance, Computing and Communications (IPCCC)
作者: Qiongyu Zhang Liehuang Zhu Meng Shen Mingzhong Wang Fan Li Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications Beijing Institute of Technology P. R. China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education P. R. China Faculty of Arts and Business University of the Sunshine Coast Queensland Australia
Reducing the flow latency is of great importance in traffic management, which benefits both service providers and end users. Routing design and flow scheduling are typical ways to improve the flow transmission efficie... 详细信息
来源: 评论
A Clustering-Based Similarity Measurement for Collaborative Filtering  2
A Clustering-Based Similarity Measurement for Collaborative ...
收藏 引用
2nd International Conference on Advanced Cloud and Big Data, CBD 2014
作者: Gu, Liang Yang, Peng Dong, Yongqiang School of Computer Science and Engineering Southeast University Nanjing211189 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing211189 China
Similarity measurement is a crucial process in collaborative filtering. User similarity is computed solely based on the numerical ratings of users. In this paper, we argue that the social information of users should b... 详细信息
来源: 评论
Self-adaptive anonymous communication scheme under SDN architecture
Self-adaptive anonymous communication scheme under SDN archi...
收藏 引用
IEEE International Conference on Performance, Computing and Communications (IPCCC)
作者: Tingting Zeng Meng Shen Mingzhong Wang Liehuang Zhu Fan Li Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications Beijing Institute of Technology P. R. China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education P. R. China Faculty of Arts and Business University of the Sunshine Coast Queensland Australia
Communication privacy and latency perceived by users have become great concerns for delay-sensitive Internet services. Existing anonymous communication systems either provide high anonymity at an expense of prolonged ... 详细信息
来源: 评论
Make your webpage carry abundant secret information unawarely
Make your webpage carry abundant secret information unawarel...
收藏 引用
15th IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 11th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2013
作者: Guo, Xiaojun Cheng, Guang Zhu, Chengang Zhou, Aiping Pan, Wubin Truong, Dinhtu School of Computer Science and Engineering Southeast University Nanjing 210096 China School of Information Engineering Tibet Nationalities Institute Xianyang 712082 China Key Laboratory of Computer Network and Information Integration Southeast University Nanjing 210096 China
How to embed more secret message into web page with keeping good imperceptibility simultaneously is a trade-off problem for information hiding schemes. This paper presents a novel web page information hiding method ba... 详细信息
来源: 评论
Webshell detection techniques in web applications  5
Webshell detection techniques in web applications
收藏 引用
5th International Conference on Computing Communication and networking Technologies, ICCCNT 2014
作者: Dinh Tu, Truong Guang, Cheng Xiaojun, Guo Wubin, Pan School of Computer Science and Engineering Southeast University Nanjing210096 China Department of Information Technology Tuyhoa Industrial College Phuyen620900 Viet Nam Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
With widely adoption of online services, malicious web sites have become a malignant tumor of the Internet. Through system vulnerabilities, attackers can upload malicious files (which are also called webshells) to web... 详细信息
来源: 评论
Availability-Aware Virtual network Embedding for Multi-tier Applications in Cloud networks
Availability-Aware Virtual Network Embedding for Multi-tier ...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Meng Shen Xu Ke Fuliang Li Fan Li Liehuang Zhu Lei Guan Ministry of Education Key Laboratory of Computer Network and Information Integration (Southeast University) P. R. China Beijing Engineering Research Center of High Volume Language Information Processing and Cloud Computing Applications School of Computer Science Beijing Institute of Technology P. R. China Tsinghua University Beijing Beijing CN College of Information Science and Engineering Northeastern University P. R. China DNSLAB China Internet Network Iniormation Center Beijing P. R. China School of Management & Economics Beijing Institute of Technology P. R. China
There is a growing trend for service providers (SPs) to migrate their multi-tier applications from local clusters to public cloud networks. In the cloud environment, it is a great concern of SPs to improve the availab... 详细信息
来源: 评论