咨询与建议

限定检索结果

文献类型

  • 803 篇 会议
  • 651 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 965 篇 工学
    • 522 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 369 篇 信息与通信工程
    • 244 篇 电子科学与技术(可...
    • 155 篇 电气工程
    • 104 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 77 篇 生物工程
    • 57 篇 机械工程
    • 50 篇 网络空间安全
    • 44 篇 动力工程及工程热...
    • 42 篇 安全科学与工程
    • 39 篇 化学工程与技术
    • 36 篇 材料科学与工程(可...
    • 32 篇 航空宇航科学与技...
    • 31 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 563 篇 理学
    • 280 篇 数学
    • 211 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 166 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 wen chao-kai

语言

  • 1,327 篇 英文
  • 92 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology of Communication and Information Security Control Laboratory"
1455 条 记 录,以下是1251-1260 订阅
排序:
Group establishing algorithm for strategic mobile scenario in manets
Group establishing algorithm for strategic mobile scenario i...
收藏 引用
2014 International Conference on information and communications Technologies, ICT 2014
作者: Xu, Xiaofeng Wang, Xiao Science and Technology on Communication Information Security Control Laboratory China Electronic Group Corporation No. 36 Institute Zhejiang Jinxing China School of Instrument Science and Opto-Electronics Engineering Beijing University of Aeronautics and Astronautics Beijing China
Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. In MANETS, the performance is significantly degraded as the scale of the network grows, which has lot... 详细信息
来源: 评论
Group establishing algorithm for strategic mobile scenario in manets
Group establishing algorithm for strategic mobile scenario i...
收藏 引用
2014 International Conference on information and communications Technologies, ICT 2014
作者: Xiaofeng, Xu Xiao, Wang Science and Technology on Communication Information Security Control Laboratory China Electronic Group Corporation No. 36 Institute Zhejiang Jinxing China School of Instrument Science and Opto-electronics Engineering Beijing University of Aeronautics and Astronautics Beijing China
Wireless communication network has such features as limited bandwidth, changeful channel and dynamic topology, etc. In MANETS, the performance is significantly degraded as the scale of the network grows, which has lot... 详细信息
来源: 评论
26th Annual Computational Neuroscience Meeting (CNS*2017): Part 3 Antwerp, Belgium. 15-20 July 2017 Abstracts
收藏 引用
BMC NEUROscience 2017年 第SUPPL 1期18卷 95-176页
作者: [Anonymous] Department of Neuroscience Yale University New Haven CT 06520 USA Department Physiology & Pharmacology SUNY Downstate Brooklyn NY 11203 USA NYU School of Engineering 6 MetroTech Center Brooklyn NY 11201 USA Departament de Matemàtica Aplicada Universitat Politècnica de Catalunya Barcelona 08028 Spain Institut de Neurobiologie de la Méditerrannée (INMED) INSERM UMR901 Aix-Marseille Univ Marseille France Center of Neural Science New York University New York NY USA Aix-Marseille Univ INSERM INS Inst Neurosci Syst Marseille France Laboratoire de Physique Théorique et Modélisation CNRS UMR 8089 Université de Cergy-Pontoise 95300 Cergy-Pontoise Cedex France Department of Mathematics and Computer Science ENSAT Abdelmalek Essaadi’s University Tangier Morocco Laboratory of Natural Computation Department of Information and Electrical Engineering and Applied Mathematics University of Salerno 84084 Fisciano SA Italy Department of Medicine University of Salerno 84083 Lancusi SA Italy Dipartimento di Fisica Università degli Studi Aldo Moro Bari and INFN Sezione Di Bari Italy Data Analysis Department Ghent University Ghent Belgium Coma Science Group University of Liège Liège Belgium Cruces Hospital and Ikerbasque Research Center Bilbao Spain BIOtech Department of Industrial Engineering University of Trento and IRCS-PAT FBK 38010 Trento Italy Department of Data Analysis Ghent University Ghent 9000 Belgium The Wellcome Trust Centre for Neuroimaging University College London London WC1N 3BG UK Department of Electronic Engineering NED University of Engineering and Technology Karachi Pakistan Blue Brain Project École Polytechnique Fédérale de Lausanne Lausanne Switzerland Departement of Mathematics Swansea University Swansea Wales UK Laboratory for Topology and Neuroscience at the Brain Mind Institute École polytechnique fédérale de Lausanne Lausanne Switzerland Institute of Mathematics University of Aberdeen Aberdeen Scotland UK Department of Integrativ
来源: 评论
Spectrum leasing and relay selection in multiuser cooperative cognitive radio networks
收藏 引用
Journal of communications 2014年 第3期9卷 198-207页
作者: Tang, Yi Grace, David Wang, Lijie College of Electronic Science and Engineering National University of Defense Technology Hunan 410073 China Science and Technology on Information System Security Laboratory China Department of Electronics University of York York YO10 5DD United Kingdom Beijing Aerospace Control Center Beijing China
In this paper, we consider multiple primary and multiple secondary users cooperative cognitive radio networks, in which the primary users (PUs) lease a portion of their spectrum to the secondary users (SUs) for some r... 详细信息
来源: 评论
Coordinated Attack Model with Multi-Nodes Based on the P2P Structure
Coordinated Attack Model with Multi-Nodes Based on the P2P S...
收藏 引用
2014 International Conference on Electrical and Electronic Engineering(EEE 2014)
作者: Wei WANG Wen-hong ZHAO Science and Technology on Communication Information Security Control Laboratory Jiangnan Electronic Communication Institute Nanhu College Jiaxing University
Based on the P2P structure,a coordinated attack model with multi-nodes is presented for introduction from link configuration,broadcast mechanism and attack *** P2P,Pure P2P and Super P2P are discussed in link configur... 详细信息
来源: 评论
Markov chain-based attack on the CSMA/CA mechanism
Markov chain-based attack on the CSMA/CA mechanism
收藏 引用
International Conference on Multimedia, communication and Computing Application(MCCA 2014)
作者: W.Wang W.H.Zhao Science and Technology on Communication Information Security Control Laboratory Jiangnan Electronic Communication Institute Nanhu College Jiaxing University
The CSMA/CA(Carrier Sense Multiple Access with Collision Avoidance) mechanism is formally modeled ***,based on the Markov Chain theory,the analysis of the attack on CSMA/CA is introduced from two aspects which are the... 详细信息
来源: 评论
Critical nodes selection based on trust evaluation in Ad Hoc networks
收藏 引用
Tongxin Xuebao/Journal on communications 2014年 35卷 213-219页
作者: Liu, Zhuo-Chao Yang, Li Jiang, Qi Wang, Wei Cao, Chun-Jie School of Computer Science and Technology Xidian University Xi'an710071 China Science and Technology on Communication Information Security Control Laboratory The 36th Research Institute of CETC Jiaxing314033 China College of Information Science and Technology Hainan University Haikou570228 China
There are some critical nodes in Ad Hoc networks, and the failure of these critical nodes can critically affect the performance of the network. For the aim of selecting the important and trusted critical nodes in Ad H... 详细信息
来源: 评论
A proper integral representation of Marcum Q-Function
A proper integral representation of Marcum Q-Function
收藏 引用
General Assembly and Scientific Symposium, URSI
作者: Hua Jun Science and Technology of Communication and Information Security Control Laboratory Jiaxing Zhejiang Province P.R. China
A new proper integral representation of the first order Marcum Q-function Q(a, b) is derived and proved in this article. The most special feature of this form is that it holds the same representation for any value of ... 详细信息
来源: 评论
Implemention of cyber security situation awareness based on knowledge discovery with trusted computer
Implemention of cyber security situation awareness based on ...
收藏 引用
APWeb 2014 Workshops: 1st International Workshop on Social Network Analysis, SNA 2014, 1st International Workshop on Network and information security, NIS 2014 and 1st International Workshop on Internet of Things Search, IOTS 2014
作者: Jiemei, Zeng Xuewei, Feng Dongxia, Wang Lan, Fang Beijing Aerospace Control Center Beijing 100296 China Beijing Institute of System Engineer National Key Laboratory of Science and Technology on Information System Security Beijing 100101 China
Situation awareness aims to provide the global security views of the cyberspace for administrators. In this paper, a novel framework of cyber security situation awareness is proposed. The framework is based on a trust... 详细信息
来源: 评论
Stochastic gradient descent based K-means algorithm on large scale data clustering
Stochastic gradient descent based K-means algorithm on large...
收藏 引用
2014 International Conference on Manufacturing technology and Electronics Applications, ICMTEA 2014
作者: Ding, Jie Zhu, Li Peng Hu, Bin Hang, Ren Long Sun, Yu Bao Sun, Yu Bao Information and Communication Department China Electric Power Research Institute Nanjing China School of Information and Control Nanjing University of Information Science and Technology Nanjing China Jiangsu Key Laboratory of Spectral Imaging and Intelligent sense Nanjing University of Science and Technology Nanjing China
With the rapid advance of data collection and storage technique, it is easy to acquire tens of millions or even billions of data sets. How to explore and exploit the useful or interesting information for human beings ... 详细信息
来源: 评论