咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 77 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 149 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 51 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 13 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 8 篇 化学工程与技术
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 航空宇航科学与技...
  • 92 篇 理学
    • 43 篇 数学
    • 33 篇 物理学
    • 14 篇 生物学
    • 8 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 5 篇 系统科学
  • 47 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 6 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 steganography
  • 7 篇 cloud computing
  • 7 篇 cloud storage
  • 6 篇 wireless sensor ...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 cnn
  • 4 篇 convolutional ne...
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 outsourcing
  • 3 篇 target tracking
  • 3 篇 efficiency
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi

机构

  • 86 篇 school of comput...
  • 77 篇 jiangsu engineer...
  • 22 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 state key labora...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 8 篇 jiangsu engineer...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 5 篇 jiangsu engineer...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 35 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 18 篇 xingming sun
  • 17 篇 wei sun
  • 16 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 zhangjie fu
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 liu wenjie
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 liu qi

语言

  • 242 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=School of Computer and Software and Jiangsu Engineering Center of Network Monitoring"
246 条 记 录,以下是131-140 订阅
排序:
Privacy-preserving top-k query in two-tiered wireless sensor networks
收藏 引用
International Journal of Advancements in Computing Technology 2012年 第6期4卷 226-235页
作者: Yao, Yonglei Ma, Li Liu, Jingfa Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
In a two-tiered wireless sensor network, storage nodes act as an intermediate tier between sensors and the sink for storing data and processing queries. This architecture has been widely adopted because of the benefit... 详细信息
来源: 评论
An ACO-LB algorithm for task scheduling in the cloud environment
Journal of Software
收藏 引用
Journal of software 2014年 第2期9卷 466-473页
作者: Xue, Shengjun Li, Mengying Xu, Xiaolong Chen, Jingyi Nanjing University of Information Science and Technology School of Computer and Software Nanjing China Nanjing University of Information Science and Technology Jiangsu Engineering Center of Network Monitoring Nanjing China
In the face of a large number of task requests which are submitted by users, the cloud data centers need not only to finish these massive tasks but also to satisfy the user's service demand. How to allocate virtua... 详细信息
来源: 评论
An improved algorithm based on NSGA-II for cloud PDTs scheduling
Journal of Software
收藏 引用
Journal of software 2014年 第2期9卷 443-450页
作者: Xue, Shengjun Liu, Fei Xu, Xiaolong Nanjing University of Information Science and Technology School of Computer and Software Nanjing China Nanjing University of Information Science and Technology Jiangsu Engineering Center of Network Monitoring Nanjing China
Partly dependent tasks (PDTs) scheduling with multi-objective optimization in cloud computing is an NP-hard problem. Taking the quality of service (QoS) requirements of users that use cloud computing into account, we ... 详细信息
来源: 评论
Quantum Blockchain: A Decentralized, Encrypted and Distributed Database Based on Quantum Mechanics
收藏 引用
Journal of Quantum Computing 2019年 第2期1卷 49-63页
作者: Chuntang Li Yinsong Xu Jiahao Tang Wenjie Liu School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China
Quantum blockchain can be understood as a decentralized, encrypted anddistributed database based on quantum computation and quantum information *** the data is recorded in the quantum blockchain, it will not be malici... 详细信息
来源: 评论
A comparative study of quantum evolutionary algorithm and particle swarm optimization for numerical optimization problems
International Journal of Digital Content Technology and its ...
收藏 引用
International Journal of Digital Content Technology and its Applications 2011年 第7期5卷 182-190页
作者: Ma, Tinghuai Yan, Qiaoqiao Xuan, Wenxia Wang, Bin Jiangsu Engineering Center of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology China National Meteorological Information Centre Chinese Meteorological Administration China
Quantum evolutionary algorithm (QEA) and particle swarm optimization (PSO) are two different types of intelligent optimization algorithm. Many efforts on these two algorithms have progressed actively in recent years. ... 详细信息
来源: 评论
Privacy-preserving MAX/MIN aggregation in wireless sensor networks
收藏 引用
Advances in Information Sciences and Service Sciences 2012年 第6期4卷 272-280页
作者: Yao, Yonglei Ma, Li Liu, Jingfa Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
In-network data aggregation has been adopted widely to reduce communication overhead and improve efficiency in wireless sensor networks. On the other hand, security is another basic requirement for wireless sensor net... 详细信息
来源: 评论
An intelligent agent-based method for task allocation in competitive cloud environments
An intelligent agent-based method for task allocation in com...
收藏 引用
作者: Kong, Yan Zhang, Minjie Ye, Dayong Zhu, Jinxiu Choi, Junho Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing210044 China School of Computer Science and Software Engineering University of Wollongong Wollongong2522 Australia Research Institute of Ocean and offshore engineering Hohai Universtiy Nantong226300 China Division of Undeclared Majors Chosun University Gwangju61452 Korea Republic of
In market-based cloud environments, both resource consumers and providers are self-interested;additionally, they can come and leave the environment freely. Therefore, the environment is competitive and uncertain. Beca... 详细信息
来源: 评论
A Balanced Cloudlet Management Method for Wireless Metropolitan Area networks  13th
A Balanced Cloudlet Management Method for Wireless Metropoli...
收藏 引用
13th EAI International Conference on Testbeds and Research Infrastructures for the Development of networks and Communities, TridentCom 2018
作者: Xu, Xiaolong Chen, Yuhao Qi, Lianyong He, Jing Zhang, Xuyun School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Jiangsu Engineering Centre of Network Monitoring Nanjing University of Information Science and Technology Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Information Science and Engineering Qufu Normal University Jining China Department of Electrical and Computer Engineering University of Auckland Auckland New Zealand
With the rapid development of wireless communication technology, cloudlet-based wireless metropolitan area network, which provides people with more convenient network services, has become an effiective paradigm to mee... 详细信息
来源: 评论
Kernel-based motion-blurred target tracking
Kernel-based motion-blurred target tracking
收藏 引用
7th International Symposium on Visual Computing, ISVC 2011
作者: Wu, Yi Hu, Jing Li, Feng Cheng, Erkang Yu, Jingyi Ling, Haibin Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China Center for Information Science and Technology Computer and Information Science Department Temple University Philadelphia PA United States Department of Computer and Information Sciences University of Delaware Newark DE 19716 United States Network Center Nanjing University of Information Science and Technology Nanjing 210044 China
Motion blurs are pervasive in real captured video data, especially for hand-held cameras and smartphone cameras because of their low frame rate and material quality. This paper presents a novel Kernel-based motion-Blu... 详细信息
来源: 评论
Short text classification algorithm based on semi-supervised learning and SVM
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous engineering 2015年 第12期10卷 195-206页
作者: Yin, Chunyong Xiang, Jun Zhang, Hui Yin, Zhichao Wang, Jin Jiangsu Key Laboratory of Meteorological Observation and Information Processing School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China Nanjing No.1 Middle School NanjingJiangsu China
Short text is a popular text form, which is widely used in real-time network news, short commentary, micro-blog and many other fields. With the development of the application such as QQ, mobile phone text messages and... 详细信息
来源: 评论