咨询与建议

限定检索结果

文献类型

  • 358 篇 会议
  • 255 篇 期刊文献

馆藏范围

  • 613 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 400 篇 工学
    • 324 篇 计算机科学与技术...
    • 264 篇 软件工程
    • 102 篇 信息与通信工程
    • 43 篇 控制科学与工程
    • 36 篇 生物工程
    • 26 篇 机械工程
    • 23 篇 生物医学工程(可授...
    • 22 篇 电气工程
    • 20 篇 电子科学与技术(可...
    • 16 篇 光学工程
    • 16 篇 仪器科学与技术
    • 15 篇 网络空间安全
    • 12 篇 动力工程及工程热...
    • 11 篇 交通运输工程
    • 7 篇 建筑学
    • 7 篇 土木工程
    • 7 篇 化学工程与技术
  • 162 篇 理学
    • 104 篇 数学
    • 37 篇 生物学
    • 25 篇 统计学(可授理学、...
    • 22 篇 物理学
    • 13 篇 系统科学
    • 9 篇 化学
  • 133 篇 管理学
    • 71 篇 管理科学与工程(可...
    • 63 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 18 篇 医学
    • 16 篇 临床医学
    • 12 篇 基础医学(可授医学...
  • 15 篇 法学
    • 14 篇 社会学
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 6 篇 农学
  • 3 篇 文学
  • 3 篇 艺术学
  • 2 篇 教育学
  • 2 篇 军事学

主题

  • 31 篇 semantics
  • 19 篇 training
  • 16 篇 routing
  • 16 篇 feature extracti...
  • 16 篇 machine learning
  • 16 篇 protocols
  • 14 篇 clustering algor...
  • 12 篇 privacy
  • 10 篇 deep learning
  • 10 篇 network topology
  • 10 篇 educational inst...
  • 10 篇 estimation
  • 10 篇 accuracy
  • 9 篇 peer to peer com...
  • 9 篇 big data
  • 9 篇 optimization
  • 9 篇 contrastive lear...
  • 9 篇 wireless sensor ...
  • 9 篇 benchmark testin...
  • 9 篇 cloud computing

机构

  • 163 篇 school of comput...
  • 86 篇 key laboratory o...
  • 61 篇 key laboratory o...
  • 41 篇 school of comput...
  • 39 篇 key laboratory o...
  • 36 篇 school of cyber ...
  • 35 篇 key laboratory o...
  • 19 篇 key laboratory o...
  • 15 篇 ministry of educ...
  • 12 篇 school of cyber ...
  • 12 篇 school of comput...
  • 10 篇 guangxi collabor...
  • 10 篇 the school of co...
  • 10 篇 college of softw...
  • 9 篇 southeast univer...
  • 9 篇 purple mountain ...
  • 9 篇 national key lab...
  • 8 篇 the key laborato...
  • 8 篇 moe key laborato...
  • 8 篇 department of co...

作者

  • 36 篇 zhou deyu
  • 32 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 22 篇 guang cheng
  • 18 篇 geng xin
  • 18 篇 wang yun
  • 18 篇 xiaoping li
  • 17 篇 he yulan
  • 15 篇 sanfeng zhang
  • 13 篇 cheng guang
  • 12 篇 shu huazhong
  • 12 篇 li xiaoping
  • 12 篇 qi guilin
  • 11 篇 jia yuheng
  • 11 篇 kong youyong
  • 10 篇 xiaoyan hu
  • 10 篇 wei tong
  • 10 篇 yang guanyu
  • 10 篇 yang peng
  • 9 篇 gao zhiqiang

语言

  • 469 篇 英文
  • 118 篇 其他
  • 30 篇 中文
检索条件"机构=Key Library of Computer Network and Information Integration"
613 条 记 录,以下是551-560 订阅
排序:
A key management scheme for multicast based on layer 2 control
A key management scheme for multicast based on layer 2 contr...
收藏 引用
10th IEEE International Conference on computer and information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, 10th IEEE Int. Conf. Scalable Computing and Communications, ScalCom-2010
作者: Cao, Zheng Yin, Pengpeng Lu, Zhengjun School of Computer Science and Engineering Southeast University Nanjing 210096 China Key Laboratory of Computer Network Technology Jiangsu Province Nanjing 210096 China Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing 210096 China
This paper presents a key management scheme for multicast based on layer 2 control, which includes multicast authentication, secure multicast forwarding tree management, key distribution when users are initialized and... 详细信息
来源: 评论
Distance estimation by constructing the virtual ruler in anisotropic sensor networks
Distance estimation by constructing the virtual ruler in ani...
收藏 引用
IEEE INFOCOM 2010
作者: Wang, Yun Li, Kai Wu, Jie School of Computer Science and Engineering Southeast University Key Lab. of Computer Network and Information Integration Nanjing 210096 China Department of Computer and Information Sciences Temple University Philadelphia PA 119122 United States
Distance estimation is fundamental for many functionalities of wireless sensor networks and has been studied intensively in recent years. A critical challenge in distance estimation is handling anisotropic problems in... 详细信息
来源: 评论
A load adaptive IEEE 802.11e EDCA backoff scheme with enhanced service differentiation
A load adaptive IEEE 802.11e EDCA backoff scheme with enhanc...
收藏 引用
2010 IEEE 12th International Conference on Communication Technology, ICCT'2010
作者: Dong, Yongqiang Wang, Yun Xia, Qin School of Computer Science and Engineering Southeast University Nanjing 210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing 210096 China
In view of the disadvantages of IEEE 802.11e EDCA in QoS guarantee and collision avoidance, an enhanced EDCA scheme called SD-AEDCA is presented which dynamically adjusts two EDCA parameters, namely contention window ... 详细信息
来源: 评论
An effective heuristic for on-line tenant placement problem in SaaS
An effective heuristic for on-line tenant placement problem ...
收藏 引用
2010 IEEE 8th International Conference on Web Services, ICWS 2010
作者: Zhang, Yi Wang, Zhihu Gao, Bo Guo, Changjie Sun, Wei Li, Xiaoping School of Computer Science and Engineering Southeast University 210096 Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education China IBM Research-China 100096 Beijing China
As one of the key characteristics of Software as a Service (SaaS), multi-tenancy aims to support massive customers by sharing application instances and databases. To achieve the high economies of scale, one of the mos... 详细信息
来源: 评论
D-TDMA: An approach of dynamic TDMA scheduling for target tracking in wireless sensor networks
D-TDMA: An approach of dynamic TDMA scheduling for target tr...
收藏 引用
2010 IEEE/ACM International Conference on Green Computing and Communications, GreenCom 2010, 2010 IEEE/ACM International Conference on Cyber, Physical and Social Computing, CPSCom 2010
作者: Wang, Yun Shi, Peizhong Li, Kai Chen, Zhikui Department of Computer Science and Engineering Southeast University Key Lab. of Computer Network and Information Integration Nanjing 210096 China School of Software Technology Dalian University of Technology Dalian 116024 China
In the application of target tracking based on dynamic convey tree-based collaboration (DCTC) in wireless sensor networks, collisions and interferences among nodes pose a challenge for data aggregation. In this paper,... 详细信息
来源: 评论
A cooperative method for supervised learning in Spiking neural networks
A cooperative method for supervised learning in Spiking neur...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Hong, Shen Ning, Liu Xiaoping, Li Qian, Wang School of Computer Science and Engineering Southeast University Nanjing China School of Golden Audit Nanjing Audit University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
In Spiking neural networks, information is encoded in separate spike times. The traditional gradient descent based learning algorithm (SpikeProp) trends to be trapped in local optima and cannot converge if the negativ... 详细信息
来源: 评论
Static Channel Assignment with the Physical Interference Model for Maximum Capacity in Multiradio Multi-channel Wireless Mesh networks
Static Channel Assignment with the Physical Interference Mod...
收藏 引用
The Ninth International Conference on Grid and Cloud Computing(第九届网格与云计算国际学术会议 GCC 2010)
作者: Birui Shao Jun Tao Fangfang Wang Key Laboratory of Computer Network and Information Integration of Ministry of Education Southeast University Nanjing 210096 China
In this paper, a model for the static channel assignment in multi-radio multi-channel wireless mesh networks is proposed. We describe an interference model in wireless communication environment. The degree of detail i... 详细信息
来源: 评论
Search Using Semantic Inference in Unstructured P2P networks
Search Using Semantic Inference in Unstructured P2P Networks
收藏 引用
International Conference on Computational Intelligence and Software Engineering (CiSE)
作者: Ning Qian Guoxin Wu Key Laboratory of Computer Network and Information Integration Ministry of Education School of Computer Science and Engineering South-East University Nanjing China
Peer-to-Peer networks develop rapidly in the last few years. The search algorithm lies at the centre of these networks. Many search methods have been proposed for unstructured peer-to-peer networks, but complicated or... 详细信息
来源: 评论
A robust and secure overlay storage scheme based on erasure coding
A robust and secure overlay storage scheme based on erasure ...
收藏 引用
International Conference on Pervasive Computing and Applications (ICPCA)
作者: Chuanyou Li Yun Wang School of Computer Science and Engineering Ministry of Education Key Laboratory of Computer Network and Information Integration South-East University Nanjing China
Recently, in classical P2P overlay networks, with applying replication technique, a single peer is replaced by a cluster of peers in order to tolerant Byzantine failures. In this paper, a novel robust and secure schem... 详细信息
来源: 评论
A key Management Scheme for Multicast Based on Layer 2 Control
A Key Management Scheme for Multicast Based on Layer 2 Contr...
收藏 引用
International Conference on computer and information Technology (CIT)
作者: Cao Zheng Yin Pengpeng Lu Zhengjun School of Computer Science and Engineering South-East University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing China
This paper presents a key management scheme for multicast based on layer 2 control, which includes multicast authentication, secure multicast forwarding tree management, key distribution when users are initialized and... 详细信息
来源: 评论