咨询与建议

限定检索结果

文献类型

  • 148 篇 会议
  • 78 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 227 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 170 篇 工学
    • 138 篇 计算机科学与技术...
    • 114 篇 软件工程
    • 50 篇 信息与通信工程
    • 18 篇 控制科学与工程
    • 14 篇 机械工程
    • 12 篇 电气工程
    • 12 篇 电子科学与技术(可...
    • 9 篇 生物工程
    • 7 篇 生物医学工程(可授...
    • 7 篇 网络空间安全
    • 6 篇 交通运输工程
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 动力工程及工程热...
    • 5 篇 安全科学与工程
    • 3 篇 材料科学与工程(可...
  • 78 篇 理学
    • 57 篇 数学
    • 16 篇 物理学
    • 13 篇 统计学(可授理学、...
    • 9 篇 生物学
    • 5 篇 系统科学
  • 52 篇 管理学
    • 32 篇 图书情报与档案管...
    • 22 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 11 篇 法学
    • 10 篇 社会学
  • 9 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 3 篇 公共卫生与预防医...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
    • 3 篇 作物学
  • 2 篇 教育学
  • 1 篇 艺术学

主题

  • 9 篇 privacy
  • 9 篇 cryptography
  • 6 篇 authentication
  • 6 篇 semantics
  • 6 篇 training
  • 5 篇 wireless sensor ...
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 computational mo...
  • 4 篇 security
  • 4 篇 protocols
  • 4 篇 accuracy
  • 4 篇 adaptation model...
  • 3 篇 access control
  • 3 篇 support vector m...
  • 3 篇 big data
  • 3 篇 image segmentati...
  • 3 篇 ad hoc networks
  • 3 篇 optimization
  • 3 篇 real-time system...

机构

  • 8 篇 school of comput...
  • 8 篇 school of cyber ...
  • 8 篇 beijing key lab....
  • 8 篇 guangxi collabor...
  • 7 篇 college of infor...
  • 6 篇 school of comput...
  • 5 篇 shanghai key lab...
  • 5 篇 nanjing fenghuo ...
  • 4 篇 school of comput...
  • 4 篇 ministry of edu....
  • 4 篇 school of cyber ...
  • 4 篇 college of compu...
  • 4 篇 key lab. of comp...
  • 4 篇 school of comput...
  • 4 篇 key lab of compu...
  • 4 篇 purple mountain ...
  • 4 篇 key laboratory o...
  • 4 篇 key lab. of comp...
  • 4 篇 guangxi key lab ...
  • 4 篇 jiangsu high tec...

作者

  • 11 篇 wang yun
  • 9 篇 li hui
  • 8 篇 chunhe xia
  • 8 篇 tianbo wang
  • 8 篇 he jieyue
  • 7 篇 yun wang
  • 7 篇 shih timothy k.
  • 6 篇 chen chen
  • 6 篇 zhang min-ling
  • 5 篇 mi jiacong
  • 5 篇 feng yu
  • 5 篇 liu yongshan
  • 5 篇 zhang yu
  • 4 篇 fan kai
  • 4 篇 yong-zhen li
  • 4 篇 jinbin tu
  • 4 篇 xin geng
  • 4 篇 tu jinbin
  • 4 篇 ma wenping
  • 4 篇 wang yue

语言

  • 203 篇 英文
  • 13 篇 中文
  • 11 篇 其他
检索条件"机构=Lab. of Computer Network and Information Integration"
227 条 记 录,以下是91-100 订阅
排序:
Robust Multi-Exposure Image Fusion: A Structural Patch Decomposition Approach
Robust Multi-Exposure Image Fusion: A Structural Patch Decom...
收藏 引用
作者: Ma, Kede Li, Hui Yong, Hongwei Wang, Zhou Meng, Deyu Zhang, Lei Department of Electrical and Computer Engineering University of Waterloo WaterlooONN2L 3G1 Canada Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong Department of Computing. Hong Kong Polytechnic University Hong Kong Hong Kong Institute for Information and System Sciences and Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an710049 China Inst. for Info. and Syst. Sci. and Min. of Educ. Key Lab. of Intelligent Networks and Netwk. Secty. Xi'an Jiaotong University Xi'an710049 China
We propose a simple yet effective structural patch decomposition approach for multi-exposure image fusion (MEF) that is robust to ghosting effect. We decompose an image patch into three conceptually independent compon... 详细信息
来源: 评论
Multiple influence maximization in social networks  10
Multiple influence maximization in social networks
收藏 引用
10th International Conference on Ubiquitous information Management and Communication, IMCOM 2016
作者: Sun, Honglin Gao, Xiaofeng Chen, Guihai Gu, Jian Wang, Yongjian Shanghai Key Lab. of Scalable Computing and Systems Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Key Laboratory of Information Network Security of Ministry of Public Security Third Research Institute of Ministry of Public Security Shanghai China
Influence Maximization, a technique of social analysis to help marketers select a small group of users to promote their products with the goal of maximizing their influence spread, has been studied for a long time. Ho... 详细信息
来源: 评论
Chosen-ciphertext secure bidirectional proxy broadcast re-encryption schemes
收藏 引用
International Journal of information and Communication Technology 2016年 第4期8卷 405-419页
作者: Sun, Jin Hu, Yupu Department of Application Mathematics Xi'an University of Technology Xi'an710048 China Key Lab. of Computer Network and Information Security Xidian University Xi'an710071 China
A proxy re-encryption (PRE) scheme supports the delegation of decryption rights via a proxy, who makes the ciphertexts decryptable by the delegatee. However, how to structure a chosen-ciphertext secure proxy re-encryp... 详细信息
来源: 评论
AUV dead-reckoning navigation based on neural network using a single accelerometer  11
AUV dead-reckoning navigation based on neural network using ...
收藏 引用
11th ACM International Conference on Underwater networks and Systems, WUWNet 2016
作者: Xie, Yan-Xin Liu, Jun Hu, Cheng-Quan Cui, Jun-Hong Xu, Hongli State Key Laboratory of Robotics CAS No. 114 Nanta Street Shenhe District Shenyang China College of Computer Science and Technology Jilin University Changchun China Underwater Sensor Network Lab. University of Connecticut StorrsCT06269 United States Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai200240 China
The accuracy of the Autonomous Underwater Vehicles (AUVs) navigation system determines whether they can safely operate and return. Traditional Dead-reckoning (DR) relies on the inertial sensors such as gyroscope and a... 详细信息
来源: 评论
Temporally or spatially dispersed joint RFID estimation using snapshots of variable lengths  15
Temporally or spatially dispersed joint RFID estimation usin...
收藏 引用
16th ACM International Symposium on Mobile Ad Hoc networking and Computing, MobiHoc 2015
作者: Xiao, Qingjun Chen, Min Chen, Shigang Zhou, Yian Key Lab of Computer Network and Information Integration Southeast University Ministry of Education China Department of Computer and Information Science and Engineering University of Florida GainesvilleFL United States
Radio-frequency identification (RFID) technology has been widely used in applications such as inventory control, object tracking, supply chain management. An important research is to estimate the number of tags in a c... 详细信息
来源: 评论
Hyper-compact virtual estimators for big network data based on register sharing
Hyper-compact virtual estimators for big network data based ...
收藏 引用
ACM SIGMETRICS International Conference on Measurement and Modeling of computer Systems, SIGMETRICS 2015
作者: Xiao, Qingjun Chen, Shigang Chen, Min Ling, Yibei Department of Computer and Information Science and Engineering University of Florida GainesvilleFL United States Key Lab. of Computer Network and Information Integration Southeast University Ministry of Education China Telcordia Technologies and Applied Research Ericsson United States
Cardinality estimation over big network data consisting of numerous flows is a fundamental problem with many practical applications. Traditionally the research on this problem focused on using a small amount of memory... 详细信息
来源: 评论
The design and implementation of network attack and defense platform based on cloud desktop
收藏 引用
Journal of Physics: Conference Series 2017年 第1期887卷
作者: Zining Yan Yunhan Wang Shijiao Shao Boquan Li Embedded System Lab. College of Computer Science and Technology Harbin China Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences Key Laboratory of Network Assessment of Technology Chinese Academy of Sciences Beijing China
This paper discusses the cloud desktop technology, virtualization technology and penetration testing technology used in the network attack and defense training platform, and introduces the design and implementation pr...
来源: 评论
A simulator for swarm AUVs acoustic communication networking  11
A simulator for swarm AUVs acoustic communication networking
收藏 引用
11th ACM International Conference on Underwater networks and Systems, WUWNet 2016
作者: Li, Guannan Liu, Jun Wang, Xue Xu, Hongli Cui, Jun-Hong Shenyang Institute of Automation CAS University of Chinese Academy of Sciences No. 114 Nanta Street Shenhe District Shenyang China College of Computer Science and Technology Jilin University State Key Laboratory of Robotics Key Laboratory of System Control and Information Processing Ministry of Education of China Changchun China Shenyang Institute of Automation CAS Northeast University No. 114 Nanta Street Shenhe District Shenyang China Shenyang Institute of Automation CAS No. 114 Nanta Street Shenhe District Shenyang China College of Computer Science and Technology Jilin University Changchun China Underwater Sensor Network Lab. University of Connecticut StorrsCT06269 United States
This paper presents a simulator for swarm operations designed to verify algorithms for a swarm of autonomous underwater robots (AUVs), specifically for constructing an underwater communication network with AUVs carryi... 详细信息
来源: 评论
A novel community detection method based on discrete particle swarm optimization algorithms in complex networks
A novel community detection method based on discrete particl...
收藏 引用
Congress on Evolutionary Computation
作者: Cen Cao Qingjian Ni Yuqing Zhai School of Computer Science and Engineering Nanjing China Key Lab of Computer Network & Information Integration MOE P.R.China
The community structure is one of the most common and important attributes in complex networks. Community detection in complex networks has attracted much attention in recent years. As an effective evolutionary comput... 详细信息
来源: 评论
A novel PSO for portfolio optimization based on heterogeneous multiple population strategy
A novel PSO for portfolio optimization based on heterogeneou...
收藏 引用
Congress on Evolutionary Computation
作者: Xushan Yin Qingjian Ni Yuqing Zhai College of Software Engineering Southeast University Nanjing China MOE Key Lab of Computer Network & Information Integration P.R.China
The problem of portfolio selection in the field of financial engineering has received more attention in recent years. This paper presents a novel heterogeneous multiple population particle swarm optimization algorithm... 详细信息
来源: 评论