咨询与建议

限定检索结果

文献类型

  • 2,061 篇 期刊文献
  • 1,853 篇 会议
  • 1 册 图书

馆藏范围

  • 3,915 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,593 篇 工学
    • 1,673 篇 计算机科学与技术...
    • 1,354 篇 软件工程
    • 657 篇 信息与通信工程
    • 356 篇 电气工程
    • 293 篇 电子科学与技术(可...
    • 283 篇 生物工程
    • 280 篇 控制科学与工程
    • 254 篇 光学工程
    • 195 篇 机械工程
    • 186 篇 生物医学工程(可授...
    • 155 篇 化学工程与技术
    • 125 篇 仪器科学与技术
    • 87 篇 网络空间安全
    • 83 篇 动力工程及工程热...
    • 70 篇 交通运输工程
    • 65 篇 材料科学与工程(可...
    • 62 篇 安全科学与工程
    • 61 篇 建筑学
  • 1,496 篇 理学
    • 705 篇 数学
    • 562 篇 物理学
    • 310 篇 生物学
    • 222 篇 统计学(可授理学、...
    • 165 篇 化学
    • 100 篇 系统科学
  • 602 篇 管理学
    • 346 篇 管理科学与工程(可...
    • 269 篇 图书情报与档案管...
    • 115 篇 工商管理
  • 160 篇 医学
    • 128 篇 临床医学
    • 108 篇 基础医学(可授医学...
    • 67 篇 药学(可授医学、理...
  • 90 篇 法学
  • 45 篇 教育学
  • 41 篇 农学
  • 35 篇 经济学
  • 13 篇 军事学
  • 12 篇 文学
  • 11 篇 艺术学

主题

  • 129 篇 feature extracti...
  • 112 篇 semantics
  • 95 篇 deep learning
  • 80 篇 training
  • 79 篇 accuracy
  • 74 篇 computational mo...
  • 55 篇 neural networks
  • 53 篇 federated learni...
  • 50 篇 convolution
  • 48 篇 data mining
  • 48 篇 data models
  • 42 篇 object detection
  • 40 篇 image segmentati...
  • 40 篇 visualization
  • 39 篇 contrastive lear...
  • 38 篇 convolutional ne...
  • 37 篇 optimization
  • 37 篇 predictive model...
  • 37 篇 cryptography
  • 36 篇 machine learning

机构

  • 269 篇 iccub universita...
  • 269 篇 university of ch...
  • 265 篇 department of ph...
  • 263 篇 infn sezione di ...
  • 261 篇 universiteit maa...
  • 261 篇 school of physic...
  • 257 篇 infn sezione di ...
  • 257 篇 cavendish labora...
  • 257 篇 infn sezione di ...
  • 254 篇 h.h. wills physi...
  • 253 篇 van swinderen in...
  • 253 篇 infn sezione di ...
  • 250 篇 horia hulubei na...
  • 243 篇 department of ph...
  • 236 篇 imperial college...
  • 236 篇 institute of par...
  • 233 篇 stfc rutherford ...
  • 225 篇 shandong provinc...
  • 218 篇 infn sezione di ...
  • 207 篇 ds4ds la salle u...

作者

  • 181 篇 barter w.
  • 180 篇 brundu d.
  • 160 篇 aliouche z.
  • 160 篇 blake t.
  • 160 篇 betancourt c.
  • 160 篇 belin s.
  • 160 篇 amato s.
  • 159 篇 borsato m.
  • 159 篇 birch m.
  • 159 篇 boettcher t.
  • 158 篇 bellee v.
  • 158 篇 atzeni m.
  • 156 篇 cali s.
  • 153 篇 andreianov a.
  • 152 篇 boelhauve j.a.
  • 152 篇 beck a.
  • 151 篇 bowcock t.j.v.
  • 150 篇 barbetti m.
  • 150 篇 byczynski w.
  • 150 篇 bencivenni g.

语言

  • 3,497 篇 英文
  • 331 篇 其他
  • 94 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Technology Shaanxi Provincial Key Laboratory of Computer Networks"
3915 条 记 录,以下是3661-3670 订阅
排序:
DISTRIBUTED IN-NETWORK COOPERATIVE CACHING
DISTRIBUTED IN-NETWORK COOPERATIVE CACHING
收藏 引用
2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems
作者: Xiaoyan Hu Jian Gong School of Computer Science and Engineering Southeast University Jiangsu provincial computer network technology key laboratory
Named Data Networking (NDN) featuring in-network caching capability is a large effort that exemplifies information-centric approach to networking by shifting emphasis from hosts to data so as to meet growing demand on... 详细信息
来源: 评论
MOVE: A mobile personalized virtual computing environment
MOVE: A mobile personalized virtual computing environment
收藏 引用
作者: Bai, Yuebin Ju, Yanwen Beijing Key Laboratory of Network Technology School of Computer Science and Engineering Beihang University Beijing 100191 China Sci. and Technol. on Information Transmission and Dissemination in Communication Networks Laboratory Shijiazhuang 050081 China
In today's business and daily life, computers and networks are playing an increasingly important role both in the office and at home. It is desirable to individuals that any machines outside the workplace provide ... 详细信息
来源: 评论
Tele-AR system based on real-time camera tracking
Tele-AR system based on real-time camera tracking
收藏 引用
2012 International Conference on Virtual Reality and Visualization, ICVRV 2012
作者: Wang, Yanke Zhong, Fan Li, Chao Xiang, Hui Peng, Qunsheng Qin, Xueying School of Computer Science and Technology Shandong University Jinan China Shandong Provincial Key Laboratory of Network Based Intelligent Computing Jinan China State Key Lab. of CAD and CG Zhejiang University Hangzhou China
We propose a visual tele-AR system, which is a combination of tele-existence and AR techniques. By wearing a video see-through HMD and moving his head, a user in this system is able to tele-operate a remote pan-tilt p... 详细信息
来源: 评论
A Push/Pull scheduling algorithm in P2P VoD
A Push/Pull scheduling algorithm in P2P VoD
收藏 引用
International Conference on computer science and Network technology (ICCSNT)
作者: Yanqin Zhu Jianjun Bian Qijin Ji School of Computer Science and Technology Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China
Video-on-Demand (VoD), which is an important application in peer-to-peer (P2P) networks, attracts a lot of researchers' interest at present. Data scheduling is significant in P2P VoD applications to gain desirable... 详细信息
来源: 评论
Lowering error floors of irregular LDPC codes by combining construction and decoding
Lowering error floors of irregular LDPC codes by combining c...
收藏 引用
作者: Jiao, Xiaopeng Mu, Jianjun Fang, Fan Sun, Rong School of Computer Science and Technology Xidian University Xi'an 710071 China Key Laboratory of Information Coding and Transmission Southwest Jiaotong University Chengdu 610031 China State Key Laboratory of Integrated Service Networks Xidian University Xi'an 710071 China
Irregular low-density parity-check (LDPC) codes generally have good decoding performance in the waterfall region, but they exhibit higher error floors than regular ones. In this letter, we present a hybrid method, whi... 详细信息
来源: 评论
Study of medium access control protocol based on adaptive backoff window in wireless sensor network
Study of medium access control protocol based on adaptive ba...
收藏 引用
2012 International Symposium on Information Technologies in Medicine and Education, ITME 2012
作者: Qi, Lin Duan, Huichuan Xun, Jiao School of Information Science and Engineering Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Shandong Normal University Jinan China Basic Education Department Shandong Normal University Jinan China
Wireless sensor networks have been widely used in many areas, and the network channel allocation depends on the Medium Access Control (MAC) protocol, so, it is critical to the performance of wireless sensor networks (... 详细信息
来源: 评论
Deadlock prevention method for locomotive transportation dispatching system based on petri nets
Deadlock prevention method for locomotive transportation dis...
收藏 引用
International Conference on Automatic Control and Artificial Intelligence, ACAI 2012
作者: Lu, Yang Fang, Huan Wei, Zhen Xu, Wei School of Computer and Information Heifei Univerisity of Technology Hefei 230009 China College of Science Anhui Univerisity of Science and Technology Huainan 232001 China Anhui Provincial Key Laboratory of Mine IoT Mine Safety Supervisory Control Hefei 230088 China
As for the deadlock prevention problem of locomotive dispatching system, an improved dispatching rule is proposed based on former related work firstly. Then, the method of deadlock prevention based on Petri Nets for t... 详细信息
来源: 评论
Study on event correlation analysis in evidence chain structure
Study on event correlation analysis in evidence chain struct...
收藏 引用
2012 International Symposium on Information Technologies in Medicine and Education, ITME 2012
作者: Liu, Dong Wei, Yong-Qing School of Information Science and Engineering Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Shandong Normal University Jinan China Basic Education Department Shandong Police College Jinan China
computer forensics has limitations in representation formalism of the electronic evidence and data missing. A method in construction of electronic evidence chain was proposed on the basis of the study and analysis of ... 详细信息
来源: 评论
Application research of WebSocket technology on web tree component
Application research of WebSocket technology on web tree com...
收藏 引用
2012 International Symposium on Information Technologies in Medicine and Education, ITME 2012
作者: Jiang, Feng-Yan Duan, Hui-Chuan School of Information Science and Engineering Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Shandong Normal University Jinan China Basic Education Department Shandong Normal University Jinan China
In the development of information systems, Web tree component is an important way to show information, provide a convenient and intuitive information queries, which has become one of the essential features in the info... 详细信息
来源: 评论
A new one-bit diFFerence collision attack on HAVAL-128
收藏 引用
science China(Information sciences) 2012年 第11期55卷 2521-2529页
作者: ZHANG WenYing1,2,3,LI YanYan1 & WU Lei1 1school of Information science and Engineering,Shandong Normal University,Jinan 250014,China 2State key Lab of Information Security,Institute of Information Engineering,Chinese Academy of sciences,Beijing 100093,China 3Shandong provincial key laboratory for Novel Distributed computer Software technology,Jinan 250014,China 1. School of Information Science and Engineering Shandong Normal University Jinan 250014 China2. State Key Lab of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China3. Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 250014 China
In this paper,we give a new fast attack on *** attack includes many present methods of constructing hash ***,we present a neighborhood *** propose a new difference path different from the previous *** conclusion is th... 详细信息
来源: 评论