咨询与建议

限定检索结果

文献类型

  • 169 篇 期刊文献
  • 77 篇 会议

馆藏范围

  • 246 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 149 篇 计算机科学与技术...
    • 98 篇 软件工程
    • 51 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 14 篇 机械工程
    • 13 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 12 篇 控制科学与工程
    • 8 篇 化学工程与技术
    • 6 篇 电气工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 光学工程
    • 5 篇 仪器科学与技术
    • 5 篇 网络空间安全
    • 4 篇 航空宇航科学与技...
  • 92 篇 理学
    • 43 篇 数学
    • 33 篇 物理学
    • 14 篇 生物学
    • 8 篇 化学
    • 8 篇 统计学(可授理学、...
    • 6 篇 大气科学
    • 5 篇 系统科学
  • 47 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 25 篇 图书情报与档案管...
    • 13 篇 工商管理
  • 9 篇 法学
    • 6 篇 法学
    • 3 篇 社会学
  • 8 篇 医学
    • 6 篇 临床医学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 3 篇 文学
    • 3 篇 外国语言文学
  • 2 篇 农学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 9 篇 steganography
  • 7 篇 cloud computing
  • 7 篇 cloud storage
  • 6 篇 wireless sensor ...
  • 5 篇 semantics
  • 5 篇 feature extracti...
  • 4 篇 deep learning
  • 4 篇 cnn
  • 4 篇 convolutional ne...
  • 4 篇 virtual surgery
  • 3 篇 object detection
  • 3 篇 access control
  • 3 篇 reinforcement le...
  • 3 篇 outsourcing
  • 3 篇 target tracking
  • 3 篇 efficiency
  • 3 篇 face recognition
  • 3 篇 convolution
  • 3 篇 data mining
  • 3 篇 roi

机构

  • 86 篇 school of comput...
  • 77 篇 jiangsu engineer...
  • 22 篇 jiangsu engineer...
  • 19 篇 jiangsu collabor...
  • 14 篇 school of comput...
  • 13 篇 school of comput...
  • 12 篇 wuxi research in...
  • 12 篇 jiangsu engineer...
  • 11 篇 engineering rese...
  • 11 篇 state key labora...
  • 9 篇 school of automa...
  • 8 篇 jiangsu engineer...
  • 8 篇 jiangsu engineer...
  • 7 篇 school of comput...
  • 6 篇 school of comput...
  • 6 篇 college of compu...
  • 5 篇 jiangsu engineer...
  • 5 篇 jiangsu engineer...
  • 5 篇 school of comput...
  • 5 篇 school of comput...

作者

  • 35 篇 wang jin
  • 26 篇 sun xingming
  • 18 篇 xiaorui zhang
  • 18 篇 xingming sun
  • 17 篇 wei sun
  • 16 篇 shen jian
  • 12 篇 xu xiaolong
  • 10 篇 zhangjie fu
  • 10 篇 xia zhihua
  • 10 篇 sunil kumar jha
  • 9 篇 wang baowei
  • 9 篇 wenjie liu
  • 9 篇 ma li
  • 8 篇 liu wenjie
  • 7 篇 jin wang
  • 7 篇 ma tinghuai
  • 7 篇 liu wen-jie
  • 6 篇 ruohan meng
  • 6 篇 qi cui
  • 6 篇 liu qi

语言

  • 242 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=School of Computer and Software and Jiangsu Engineering Center of Network Monitoring"
246 条 记 录,以下是181-190 订阅
排序:
Notice of Violation of IEEE Publication Principles: Data Access Control for Multi-authority Cloud Storage Systems
Notice of Violation of IEEE Publication Principles: Data Acc...
收藏 引用
International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP)
作者: Zhangjie Fu Lin Xin Jin Wang Xingming Sun School of Computer and Software & Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China
Notice of Violation of IEEE Publication Principles "Data Access Control for Multi-Authority Cloud Storage Systems" by Zhangjie Fu, Lin Xin, Jin Wang, Xingming Sun in the Proceedings of the Tenth Internationa...
来源: 评论
A new combination prediction model for short-term wind farm output power based on meteorological data collected by WSN
International Journal of Control and Automation
收藏 引用
International Journal of Control and Automation 2014年 第1期7卷 171-180页
作者: Ma, Li Li, Bo Yang, Zhen Bin Du, Jie Wang, Jin Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China Key Laboratory of Meteorological Disaster of Ministry of Education Nanjing University of Information Science and Technology Nanjing 210044 China CMA Public Meteorological Service Centre Beijing 100081 China
The prediction of wind farm output power is considered as an effective way to increase the wind power capacity and improve the safety and economy of power system. It is one of the hot research topics on wind power. Th... 详细信息
来源: 评论
A novel verifiably encrypted signature from weil pairing
A novel verifiably encrypted signature from weil pairing
收藏 引用
Advanced Technologies, Embedded and Multimedia for Human-Centric Computing, HumanCom and EMC 2013
作者: Shen, Jian Wang, Jin Zheng, Yuhui Zhang, Jianwei Wang, Shunfeng School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Mathematics and Statistics Nanjing University of Information Science and Technology Nanjing 210044 China College of Bin Jiang Nanjing University of Information Science and Technology Nanjing 210044 China
A novel efficient verifiably encrypted signature (VES) which makes use of the Weil pairing is presented in this paper. VES can be used in optimistic contract signing protocols to enable fair exchange. Compared with th... 详细信息
来源: 评论
Efficient key management scheme for SCADA system
Efficient key management scheme for SCADA system
收藏 引用
Advanced Technologies, Embedded and Multimedia for Human-Centric Computing, HumanCom and EMC 2013
作者: Shen, Jian Wang, Jin Ren, Yongjun Zhang, Jianwei Wang, Shunfeng School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Mathematics and Statistics Nanjing University of Information Science and Technology Nanjing 210044 China College of Bin Jiang Nanjing University of Information Science and Technology Nanjing 210044 China
Currently Supervisory Control And Data Acquisition (SCADA) system intends to be connected to the open operating environment. Thus, protecting SCADA systems from malicious attacks is getting more and more attention. A ... 详细信息
来源: 评论
Location-aware routing protocol for underwater sensor networks
Location-aware routing protocol for underwater sensor networ...
收藏 引用
Advanced Technologies, Embedded and Multimedia for Human-Centric Computing, HumanCom and EMC 2013
作者: Shen, Jian Wang, Jin Wang, Jingwei Zhang, Jianwei Wang, Shunfeng School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Mathematics and Statistics Nanjing University of Information Science and Technology Nanjing 210044 China College of Bin Jiang Nanjing University of Information Science and Technology Nanjing 210044 China
As the network communications technology developing, a new type of networks has appeared in the daily life which is named underwater sensor networks (UWSNs). Routing protocols in UWSNs should ensure the reliability of... 详细信息
来源: 评论
An ACO-LB algorithm for task scheduling in the cloud environment
Journal of Software
收藏 引用
Journal of software 2014年 第2期9卷 466-473页
作者: Xue, Shengjun Li, Mengying Xu, Xiaolong Chen, Jingyi Nanjing University of Information Science and Technology School of Computer and Software Nanjing China Nanjing University of Information Science and Technology Jiangsu Engineering Center of Network Monitoring Nanjing China
In the face of a large number of task requests which are submitted by users, the cloud data centers need not only to finish these massive tasks but also to satisfy the user's service demand. How to allocate virtua... 详细信息
来源: 评论
An improved algorithm based on NSGA-II for cloud PDTs scheduling
Journal of Software
收藏 引用
Journal of software 2014年 第2期9卷 443-450页
作者: Xue, Shengjun Liu, Fei Xu, Xiaolong Nanjing University of Information Science and Technology School of Computer and Software Nanjing China Nanjing University of Information Science and Technology Jiangsu Engineering Center of Network Monitoring Nanjing China
Partly dependent tasks (PDTs) scheduling with multi-objective optimization in cloud computing is an NP-hard problem. Taking the quality of service (QoS) requirements of users that use cloud computing into account, we ... 详细信息
来源: 评论
A comparative study on routing protocols in underwater sensor networks
A comparative study on routing protocols in underwater senso...
收藏 引用
Advanced Technologies, Embedded and Multimedia for Human-Centric Computing, HumanCom and EMC 2013
作者: Shen, Jian Wang, Jin Zhang, Jianwei Wang, Shunfeng School of Computer and Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China College of Mathematics and Statistics Nanjing University of Information Science and Technology Nanjing 210044 China College of Bin Jiang Nanjing University of Information Science and Technology Nanjing 210044 China
Underwater sensor networks (UWSNs) are a class of emerging networks that experience variable and high propagation delays and limited available bandwidth. Because of the different environment under the ocean, the whole... 详细信息
来源: 评论
Cooperative provable data possession with stateless verification in multicloud storage
收藏 引用
Journal of Computational Information Systems 2014年 第8期10卷 3403-3411页
作者: Sun, Xingming Chen, Lihong Xia, Zhihua Zhu, Yanling Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing 210044 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China
Provable Data Possession (PDP) is a probabilistic proof technique for checking the availability and integrity of files on untrusted storage servers without downloading the whole data files. Recently, Zhu et al. propos... 详细信息
来源: 评论
Wang-Landau sampling in face-centered-cubic hydrophobic-hydrophilic lattice model proteins
收藏 引用
Physical Review E 2014年 第4期90卷 042715-042715页
作者: Jingfa Liu Beibei Song Yonglei Yao Yu Xue Wenjie Liu Zhaoxia Liu Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology Nanjing 210044 China School of Computer & Software Nanjing University of Information Science & Technology Nanjing 210044 China Network Information Center Nanjing University of Information Science & Technology Nanjing 210044 China
Finding the global minimum-energy structure is one of the main problems of protein structure prediction. The face-centered-cubic (fcc) hydrophobic-hydrophilic (HP) lattice model can reach high approximation ratios of ... 详细信息
来源: 评论