咨询与建议

限定检索结果

文献类型

  • 1,069 篇 会议
  • 1,001 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,072 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,372 篇 工学
    • 902 篇 计算机科学与技术...
    • 694 篇 软件工程
    • 440 篇 信息与通信工程
    • 197 篇 电子科学与技术(可...
    • 182 篇 电气工程
    • 139 篇 控制科学与工程
    • 92 篇 光学工程
    • 82 篇 网络空间安全
    • 81 篇 生物工程
    • 77 篇 机械工程
    • 73 篇 仪器科学与技术
    • 59 篇 动力工程及工程热...
    • 41 篇 建筑学
    • 40 篇 生物医学工程(可授...
    • 38 篇 化学工程与技术
    • 36 篇 土木工程
    • 36 篇 交通运输工程
    • 35 篇 航空宇航科学与技...
  • 609 篇 理学
    • 386 篇 数学
    • 137 篇 物理学
    • 129 篇 统计学(可授理学、...
    • 91 篇 生物学
    • 45 篇 系统科学
    • 39 篇 化学
  • 365 篇 管理学
    • 213 篇 管理科学与工程(可...
    • 161 篇 图书情报与档案管...
    • 85 篇 工商管理
  • 56 篇 法学
    • 45 篇 社会学
  • 34 篇 医学
    • 31 篇 临床医学
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 16 篇 农学
  • 13 篇 军事学
  • 6 篇 文学
  • 5 篇 教育学
  • 4 篇 艺术学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 60 篇 accuracy
  • 51 篇 computational mo...
  • 48 篇 cryptography
  • 44 篇 protocols
  • 43 篇 training
  • 40 篇 wireless sensor ...
  • 37 篇 federated learni...
  • 36 篇 deep learning
  • 33 篇 privacy
  • 30 篇 servers
  • 30 篇 machine learning
  • 30 篇 data models
  • 29 篇 clustering algor...
  • 28 篇 computer network...
  • 27 篇 information secu...
  • 26 篇 data mining
  • 25 篇 laboratories
  • 24 篇 routing

机构

  • 216 篇 shandong provinc...
  • 164 篇 school of comput...
  • 160 篇 key laboratory o...
  • 85 篇 key laboratory o...
  • 71 篇 state key labora...
  • 62 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 53 篇 shandong fundame...
  • 45 篇 key laboratory o...
  • 42 篇 shandong enginee...
  • 42 篇 the key laborato...
  • 41 篇 state key labora...
  • 41 篇 state key labora...
  • 41 篇 school of comput...
  • 41 篇 key laboratory o...
  • 36 篇 key laboratory o...
  • 34 篇 school of inform...
  • 31 篇 school of cyber ...
  • 27 篇 state key labora...

作者

  • 43 篇 ren jiadong
  • 40 篇 guo hong
  • 37 篇 zhou deyu
  • 32 篇 jianfeng ma
  • 29 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 26 篇 ma jianfeng
  • 26 篇 hu yupu
  • 21 篇 yang yang
  • 20 篇 han zhu
  • 20 篇 zhang yichen
  • 20 篇 guang cheng
  • 18 篇 hui li
  • 18 篇 ma jian-feng
  • 17 篇 yu song
  • 17 篇 xiaoming wu
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 17 篇 huang chongwen
  • 16 篇 geng xin

语言

  • 1,814 篇 英文
  • 150 篇 其他
  • 111 篇 中文
检索条件"机构=The Key Laboratory for Computer Networks and Information Integration"
2072 条 记 录,以下是2001-2010 订阅
排序:
A kind of shape similarity measure methods and the performance evaluation
收藏 引用
Journal of Computational information Systems 2007年 第5期3卷 2057-2062页
作者: Hong, Zhiling Wang, Beizhan Jiang, Qingshan Wang, Shoujue Department of Computer Science Xiamen University Fujian 361005 China School of Software Xiamen University Fujian 361005 China Key Laboratory for Intelligent Information Technology Fujian 361005 China Lab. of Artificial Neural Networks Inst. of Semiconductors CAS Beijing 100083 China
Shape similarity measure is an important and difficult problem in computer vision and has been extensively studied for decades. In this paper, we propose a kind of shape similarity measure methods based on partition b... 详细信息
来源: 评论
One-way accumulators based group key agreement scheme for mobile ad hoc network
收藏 引用
Tongxin Xuebao/Journal on Communications 2007年 第SUPPL.期28卷 103-106页
作者: Feng, Tao Ma, Jian-Feng School of Computer and Communication Lanzhou University of Technology Lanzhou 730050 China Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China
A security, efficient group key management scheme was presented and its security was proved. The scheme was based on one-way accumulators. The dynamic event that external nodes joined the team or internal nodes exited... 详细信息
来源: 评论
Logical Mistakes in NTRU Compensation Algorithm and Improvement of Encryption Verification Algorithm
Logical Mistakes in NTRU Compensation Algorithm and Improvem...
收藏 引用
International Conference on Computational Intelligence and Security Workshops (CISW)
作者: Yining Quan Xinshe Li Yupu Hu Key Laboratory of Computer Networks & Information Security Ministry of Education Xidian University Xi'an China
The basic security of NTRU is based on the hardness of the shortest vector problem (SVP) of some lattice, named as CS lattice. Dealing with the decryption failure problem of NTRU is an important topic. The logical mis... 详细信息
来源: 评论
Hybrid Heuristic for Total Flowtime Minimization in No-wait Flow Shops
Hybrid Heuristic for Total Flowtime Minimization in No-wait ...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Xia Zhu Xiaoping Li Qian Wang School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education South-East University Nanjing China
In this paper, no-wait flow shop scheduling problem with total flowtime minimization is considered. A hybrid heuristic is proposed, which is based on PHI (p) (presented by Aldowaisan and Allahverdi, OMEGA, 2004). A co... 详细信息
来源: 评论
Efficient traitor tracing DRM scheme
收藏 引用
Tongxin Xuebao/Journal on Communications 2007年 第SUPPL.期28卷 78-81页
作者: Liu, Jing-Mei Zhao, Lin-Sen Wang, Xin-Mei Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China Telecom Department Xi'an Institute of Post and Telecommunications Xi'an 710061 China
A new traitor tracing scheme with revocation capability was proposed which can be used in digital right management. Only one key was held by each receiver and when traitors were found, their private keys can be revoke... 详细信息
来源: 评论
Web Service Based Method for Large Scale Flow Shops with Flowtime Minimization
Web Service Based Method for Large Scale Flow Shops with Flo...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yi Zhang Xiaoping Li Qian Wang Key Laboratory of Computer Network and Information Integration Ministry of Education South-East University Nanjing China Southeast University Nanjing Jiangsu CN
In this paper, a Web Service based method is presented to conduct parallelized operations in an algorithm on multiple computers. Parallelizable operations in a constructive heuristic for flow shop scheduling problem w... 详细信息
来源: 评论
Cost Optimization Method for Workflows with Deadline Constraints in Grids
Cost Optimization Method for Workflows with Deadline Constra...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yingchun Yuan Xiaoping Li Qian Wang Xia Zhu School of Computer Science and Engineering South-East University Nanjing China Faculty of Information Science Agricultural University of Hebei Baoding China Key Laboratory of Computer Network and Information Integration Ministry of Education South-East University Nanjing China School of Computer Science and Engineering Southeast University Nanjing 210096 P.R. China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education Nanjing 210096 P.R. China. qwang@*** Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education Nanjing 210096 P.R. China
Cost optimization for workflow applications with deadline constraints is fundamental and intractable in grids. In this paper, early tree is introduced to find an early feasible schedule for a workflow application. Acc... 详细信息
来源: 评论
MULTI-AGENT BASED FRAMEWORK FOR DYNAMIC SCHEDULING SYSTEM
MULTI-AGENT BASED FRAMEWORK FOR DYNAMIC SCHEDULING SYSTEM
收藏 引用
2007 International Conference on Machine Learning and Cybernetics(IEEE第六届机器学习与控制论国际会议)
作者: XIAO-DONG ZHANG QIAN WANG XIAO-PING LI School of Computer Science &Engineering Southeast University 210096 Nanjing P.R .China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education
Communication burden and security are important for agent-based scheduling architectures in uncertain and dynamic scheduling environments, which have not yet been fully solved in traditional *** this paper, a multi-ag... 详细信息
来源: 评论
Efficient Mediated Certificates Public-key Encryption Scheme without Pairings
Efficient Mediated Certificates Public-Key Encryption Scheme...
收藏 引用
International Conference on Advanced information Networking and Applications Workshops (AINAW)
作者: Chen Yang Furong Wang Xinmei Wang Ministry of Education Key Laboratory of Computer Networks and Information Security Xi'an China Department of Electronics & Information Engineering Zhong University of Science and Technology Wuhan China
It has always been a critical issue to find efficient methods for fast revocation of a user's identity in traditional ID-based crypto systems. In this paper, we present an efficient mediated certificateless public... 详细信息
来源: 评论
Design and Analysis of a Multiscale Active Queue Management Scheme
收藏 引用
Journal of computer Science & Technology 2006年 第6期21卷 1022-1030页
作者: 纪其进 董永强 School of Computer Science and Engineering Southeast University Nanjing 210096 P.R. China Key Laboratory of Computer Network and Information Integration of Ministry of Education Southeast University Nanjing 210096 P.R China
Since Internet is dominated by TCP-based applications, active queue management (AQM) is considered as an effective way for congestion control. However, most AQM schemes suffer obvious performance degradation with dy... 详细信息
来源: 评论