咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 77 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 149 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 51 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 13 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 8 篇 化学工程与技术
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 航空宇航科学与技...
  • 92 篇 理学
    • 43 篇 数学
    • 33 篇 物理学
    • 14 篇 生物学
    • 8 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 5 篇 系统科学
  • 47 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 6 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 steganography
  • 7 篇 cloud computing
  • 7 篇 cloud storage
  • 6 篇 wireless sensor ...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 cnn
  • 4 篇 convolutional ne...
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 outsourcing
  • 3 篇 target tracking
  • 3 篇 efficiency
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi

机构

  • 86 篇 school of comput...
  • 77 篇 jiangsu engineer...
  • 22 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 state key labora...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 8 篇 jiangsu engineer...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 5 篇 jiangsu engineer...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 35 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 18 篇 xingming sun
  • 17 篇 wei sun
  • 16 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 zhangjie fu
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 liu wenjie
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 liu qi

语言

  • 242 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=School of Computer and Software and Jiangsu Engineering Center of Network Monitoring"
246 条 记 录,以下是141-150 订阅
排序:
A comparative study on routing protocols in underwater sensor networks
A comparative study on routing protocols in underwater senso...
收藏 引用
Advanced Technologies, Embedded and Multimedia for Human-Centric Computing, HumanCom and EMC 2013
作者: Shen, Jian Wang, Jin Zhang, Jianwei Wang, Shunfeng School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China College of Mathematics and Statistics Nanjing University of Information Science and Technology Nanjing 210044 China College of Bin Jiang Nanjing University of Information Science and Technology Nanjing 210044 China
Underwater sensor networks (UWSNs) are a class of emerging networks that experience variable and high propagation delays and limited available bandwidth. Because of the different environment under the ocean, the whole... 详细信息
来源: 评论
The Development and Application of Quantum Masking
收藏 引用
Journal of Quantum Computing 2020年 第3期2卷 151-156页
作者: Tao Chen Zhiguo Qu Yi Chen School of Computer&Software Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and TechnologyNanjing210044China
To solve the problem of hiding quantum information in simplified subsystems,Modi et al.[1]introduced the concept of quantum *** masking is the encoding of quantum information by composite quantum states in such a way ... 详细信息
来源: 评论
Real-time image carrier generation based on generative adversarial network and fast object detection
Real-time image carrier generation based on generative adver...
收藏 引用
作者: Li, Chuanlong Sun, Xingming Zhou, Zhili Yang, Yimin School of Computer and Software Nanjing University of Information Science and Technology Ning Liu Road No. 219 Nanjing210044 China Jiangsu Engineering Centre of Network Monitoring Ning Liu Road No. 219 Nanjing210044 China Department of Computer Science Lakehead University Thunder Bay Canada
Image steganography aims to conceal the secret information inside another carrier image. And by embedding the information into the carrier image, the carrier image may suffer certain image distortion. Thus, not only t... 详细信息
来源: 评论
A WiFi-aware method for mobile data offloading with deadline constraints
A WiFi-aware method for mobile data offloading with deadline...
收藏 引用
作者: Tang, Wenda Wu, Chaobing Qi, Lianyong Zhang, Xuyun Xu, Xiaolong Dou, Wanchun State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China School of Information Science and Engineering Chinese Academy of Education Big Data Qufu Normal University Rizhao China Department of Electrical and Computer Engineering The University of Auckland Auckland New Zealand Jiangsu Engineering Centre of Network Monitoring School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
With an increasing number of public WiFi hotspots have been constructed in metropolitan areas, citizens can leverage these WiFi hotspots to surf the Internet with their smart devices almost everywhere. Compared to cel... 详细信息
来源: 评论
Towards Efficient Content-aware Search over Encrypted Outsourced Data in Cloud
Towards Efficient Content-aware Search over Encrypted Outsou...
收藏 引用
Annual IEEE International Conference on computer Communications
作者: Zhangjie Fu Xingming Sun Sai Ji Guowu Xie College of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Department of Computer Science and Engineering University of California Riverside
With the increasing adoption of cloud computing, a growing number of users outsource their datasets into cloud. The datasets usually are encrypted before outsourcing to preserve the privacy. However, the common practi... 详细信息
来源: 评论
A feature selection algorithm towards efficient intrusion detection
International Journal of Multimedia and Ubiquitous Engineeri...
收藏 引用
International Journal of Multimedia and Ubiquitous engineering 2015年 第11期10卷 253-264页
作者: Yin, Chunyong Ma, Luyu Feng, Lu Yin, Zhichao Wang, Jin School of Computer and Software Jiangsu Key Laboratory of Meteorological Observation and Information Processing Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China Nanjing No.1 Middle School Nanjing China
Feature selection algorithm plays a crucial role in intrusion detection, data mining and pattern recognition. According to some evaluation criteria, it gets optimal feature subset by deleting unrelated and redundant f... 详细信息
来源: 评论
Study on information acquisition of Deep Web based on LRL
收藏 引用
Journal of Computational Information Systems 2011年 第15期7卷 5469-5475页
作者: Fang, Wei Wen, Xuezhi Pan, Wubin Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China
Deep Web information is heterogeneous and dynamic. How to make use of this information effectively is a challenging task. In order to obtain the newest content in the Deep Web, a data generative model of Deep Web has ... 详细信息
来源: 评论
Optimization of large scale of files transfer in meteorological grid
收藏 引用
International Journal of Grid and Distributed Computing 2013年 第1期6卷 25-34页
作者: Ma, Tinghuai Cao, Hao Wang, Jin Tian, Wei Dickson, Keddy Wornyo Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology China School of Computer and Software Nanjing University of Information Science and Technology China
This paper focuses on performance enhancement of large scale of small files transfer, which is critical to the performance of meteorological grid. GridFTP and compression techniques are used to optimize the efficiency...
来源: 评论
An improved algorithm based on ACO for cloud service PDTs scheduling
收藏 引用
Advances in Information Sciences and Service Sciences 2012年 第18期4卷 340-348页
作者: Xue, Shengjun Zhang, Jie Xu, Xiaolong Nanjing University of Information Science and Technology School of Computer and Software Nanjing 210044 China Nanjing University of Information Science and Technology Jiangsu Engineering Center of Network Monitoring Nanjing 210044 China
With the increasing popularity of cloud computing technology, a great many applications are submitted to the cloud platforms for execution. Faced with the low utilization efficiencies and high cost of resources, users... 详细信息
来源: 评论
Distributed dynamic sensor selection on energy balancing for target tracking in WSNs
收藏 引用
Journal of Computational Information Systems 2013年 第23期9卷 9645-9652页
作者: Zhang, Jian Li, Tao Wang, Baowei Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China
This paper presents a dynamic sensor selection for an energy-efficient target tracking procedure in distributed cluster-based wireless sensor networks, where sensors are randomly distributed to monitor one target. Sin... 详细信息
来源: 评论