咨询与建议

限定检索结果

文献类型

  • 606 篇 会议
  • 179 篇 期刊文献

馆藏范围

  • 785 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 345 篇 工学
    • 272 篇 计算机科学与技术...
    • 230 篇 软件工程
    • 82 篇 信息与通信工程
    • 72 篇 电气工程
    • 42 篇 控制科学与工程
    • 27 篇 电子科学与技术(可...
    • 26 篇 生物工程
    • 26 篇 网络空间安全
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 19 篇 交通运输工程
    • 17 篇 安全科学与工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 9 篇 土木工程
    • 8 篇 建筑学
  • 159 篇 理学
    • 97 篇 数学
    • 39 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 25 篇 生物学
    • 10 篇 化学
    • 10 篇 系统科学
  • 81 篇 管理学
    • 50 篇 管理科学与工程(可...
    • 45 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 25 篇 法学
    • 15 篇 社会学
    • 12 篇 法学
  • 13 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 5 篇 教育学
  • 4 篇 经济学
  • 4 篇 军事学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 99 篇 feature extracti...
  • 93 篇 accuracy
  • 61 篇 federated learni...
  • 59 篇 computational mo...
  • 58 篇 semantics
  • 50 篇 data models
  • 44 篇 training
  • 35 篇 transformers
  • 33 篇 neural networks
  • 30 篇 deep learning
  • 30 篇 adaptation model...
  • 28 篇 robustness
  • 24 篇 privacy
  • 23 篇 data mining
  • 23 篇 predictive model...
  • 23 篇 attention mechan...
  • 21 篇 optimization
  • 21 篇 visualization
  • 21 篇 measurement
  • 20 篇 real-time system...

机构

  • 265 篇 key laboratory o...
  • 201 篇 shandong provinc...
  • 56 篇 shandong provinc...
  • 51 篇 shandong enginee...
  • 43 篇 shaanxi key labo...
  • 38 篇 school of comput...
  • 37 篇 school of comput...
  • 36 篇 shandong fundame...
  • 32 篇 shandong provinc...
  • 32 篇 shaanxi key labo...
  • 27 篇 qilu university ...
  • 15 篇 key laboratory o...
  • 15 篇 quan cheng labor...
  • 14 篇 key laboratory o...
  • 14 篇 faculty of data ...
  • 14 篇 tianjin key labo...
  • 14 篇 qilu university ...
  • 13 篇 key laboratory o...
  • 13 篇 key laboratory o...
  • 11 篇 xi'an university...

作者

  • 29 篇 yichuan wang
  • 24 篇 xiaoming wu
  • 24 篇 xinhong hei
  • 24 篇 wang yichuan
  • 19 篇 hei xinhong
  • 18 篇 xiangzhi liu
  • 15 篇 haiyan jin
  • 14 篇 li wei
  • 14 篇 aimin li
  • 13 篇 guohua lv
  • 13 篇 lianhai wang
  • 13 篇 xiaohui han
  • 13 篇 mingle zhou
  • 13 篇 jin haiyan
  • 12 篇 lu wenpeng
  • 12 篇 jing zhao
  • 12 篇 delong han
  • 12 篇 chunxiao wang
  • 12 篇 zhenyu yang
  • 12 篇 lei zhu

语言

  • 676 篇 英文
  • 107 篇 其他
  • 8 篇 中文
检索条件"机构=Laboratory for Network Computing and Security Technology"
785 条 记 录,以下是741-750 订阅
排序:
Smartphone Based Car-Searching System for Large Parking Lot
Smartphone Based Car-Searching System for Large Parking Lot
收藏 引用
IEEE Conference on Industrial Electronics and Applications
作者: Junhuai Li Yang An Rong Fei Huaijun Wang Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Xi'an China
Find a car in a large parking lot is a challenge in our daily life. In this paper, a novel car-searching approach based on smartphone for a large parking lot is presented. In the new approach, some QR codes are set up... 详细信息
来源: 评论
An Adaptively Disperse Centroids K-Means Algorithm Based on MapReduce Model
An Adaptively Disperse Centroids K-Means Algorithm Based on ...
收藏 引用
International Conference on Computational Intelligence and security
作者: Bin Wang Zheng Lv Jinwei Zhao Xiaofan Wang Tong Zhang Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China Faculty of Computer Science and Engineering
K-means is a clustering algorithm which is used widely. Its clustering results heavily depend on the initial centroids. An adaptive method for disperse centroids is proposed to improve the stability and accuracy of th... 详细信息
来源: 评论
Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity
Strongly average-case secure obfuscation: achieving input pr...
收藏 引用
作者: Zhang, Mingwu Mu, Yi Shen, Jian Huang, Xinyi School of Computer Science Hubei University of Technology Wuhan430068 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University China School of Computing and Information Technology University of Wollongong NSW2522 Australia
A program obfuscator is a compiling algorithm that takes a program/circuit as input and generates a new garbled circuit to implement the same functionality as before while obtaining hard-to-understand in some sense, t... 详细信息
来源: 评论
Performance analysis of parallel replica molecular dynamics
收藏 引用
AIP Conference Proceedings 2018年 第1期1978卷
作者: Boyao Zhang Jue Wang Yangde Feng Ji Xiang Lei Wang 1Computer Network Information Center Chinese Academy of Science Department of High Performance Computing Technology and Application Development Beijing China 2University of Chinese Academy of Sciences Beijing China 3State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China 4School of cybersecurity Chinese Academy of Sciences China
Molecular dynamics simulation is an important tool for studying materials microstructure evolution under radiation effects. It is difficult to simulate atomic diffusion in materials owing to the time-scale limitations...
来源: 评论
Learning to segment with image-level annotations
收藏 引用
Pattern Recognition 2016年 59卷 234-244页
作者: Wei, Yunchao Liang, Xiaodan Chen, Yunpeng Jie, Zequn Xiao, Yanhui Zhao, Yao Yan, Shuicheng Institute of information Science Beijing Jiaotong University Beijing 100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing 100044 China School of Advanced Computing Sun Yat-Sen University Guangzhou 510006 China Vision and Machine Learning Lab National University of Singapore 117583 Singapore People׳s Public Security University of China Beijing 100038 China
Recently, deep convolutional neural networks (DCNNs) have significantly promoted the development of semantic image segmentation. However, previous works on learning the segmentation network often rely on a large numbe... 详细信息
来源: 评论
An improved Fuzzy C-Means algorithm based on MapReduce
An improved Fuzzy C-Means algorithm based on MapReduce
收藏 引用
International Conference on BioMedical Engineering and Informatics (BMEI)
作者: Qing Yu Zhimin Ding Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology Tianjin China
In order to solve the problem that the Fuzzy C-Means algorithm is sensitive to the initial clustering center, we use the Canopy algorithm to carry out the quick and rough clustering. At the same time, to avoid the bli... 详细信息
来源: 评论
Paralleled Extraction Method for Content of Invoice Image Based on TPL
Paralleled Extraction Method for Content of Invoice Image Ba...
收藏 引用
2015 International Conference on Advanced Management Science and Information Engineering(AMSIE 2015)
作者: H.Y.Jin B.Xing X.H.Hei School of Computer Science & Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
The paper mainly uses a mixed strategy of data and task parallelism to realize parallel extraction date information of *** at the deficiency of ordinary pipeline mode for parallel extraction date information from invo... 详细信息
来源: 评论
Research on Storage and Retrieval Method of Mass Data for High-Speed Train
Research on Storage and Retrieval Method of Mass Data for Hi...
收藏 引用
International Conference on Computational Intelligence and security
作者: Bin Wang Fan Li Xinhong Hei Weigang Ma Lei Yu Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Xi'an China
In order to ensure the safeties of high-speed train, a lot of sensors are installed in the train to real-time monitor its operation status. These sensors collect amounts of data which may be several GBs for one time o... 详细信息
来源: 评论
A method of oversized image generation based on stitching JPEG file streams
International Journal of Signal Processing, Image Processing...
收藏 引用
International Journal of Signal Processing, Image Processing and Pattern Recognition 2015年 第8期8卷 159-168页
作者: Sun, Qindong Hua, Wu Tian, Minying Wang, Yan School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory of Network Computing and Security Xi’an University of Technology Xi’an China
Due to memory limitation, the displaying and processing of the oversized images have been a bottleneck for various applications, which is a hot research spot in the image processing field. The traditional methods are ... 详细信息
来源: 评论
Research on the design of the effective transmission scheduling algorithm based on the factory wireless sensor network
收藏 引用
Open Automation and Control Systems Journal 2014年 第1期6卷 1426-1434页
作者: Zhang, Yunyi Liu, Shuru Zhang, Ran Wei, Wei College of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology China
In order to make the sensing data in the monitoring equipment’s sensor nodes reach to the monitoring center as soon as possible and deal with the equipment which has some problems, the network time delay should be gu... 详细信息
来源: 评论