咨询与建议

限定检索结果

文献类型

  • 1,069 篇 会议
  • 1,001 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,072 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,372 篇 工学
    • 902 篇 计算机科学与技术...
    • 694 篇 软件工程
    • 440 篇 信息与通信工程
    • 197 篇 电子科学与技术(可...
    • 182 篇 电气工程
    • 139 篇 控制科学与工程
    • 92 篇 光学工程
    • 82 篇 网络空间安全
    • 81 篇 生物工程
    • 77 篇 机械工程
    • 73 篇 仪器科学与技术
    • 59 篇 动力工程及工程热...
    • 41 篇 建筑学
    • 40 篇 生物医学工程(可授...
    • 38 篇 化学工程与技术
    • 36 篇 土木工程
    • 36 篇 交通运输工程
    • 35 篇 航空宇航科学与技...
  • 609 篇 理学
    • 386 篇 数学
    • 137 篇 物理学
    • 129 篇 统计学(可授理学、...
    • 91 篇 生物学
    • 45 篇 系统科学
    • 39 篇 化学
  • 365 篇 管理学
    • 213 篇 管理科学与工程(可...
    • 161 篇 图书情报与档案管...
    • 85 篇 工商管理
  • 56 篇 法学
    • 45 篇 社会学
  • 34 篇 医学
    • 31 篇 临床医学
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 16 篇 农学
  • 13 篇 军事学
  • 6 篇 文学
  • 5 篇 教育学
  • 4 篇 艺术学

主题

  • 75 篇 feature extracti...
  • 65 篇 semantics
  • 60 篇 accuracy
  • 51 篇 computational mo...
  • 48 篇 cryptography
  • 44 篇 protocols
  • 43 篇 training
  • 40 篇 wireless sensor ...
  • 37 篇 federated learni...
  • 36 篇 deep learning
  • 33 篇 privacy
  • 30 篇 servers
  • 30 篇 machine learning
  • 30 篇 data models
  • 29 篇 clustering algor...
  • 28 篇 computer network...
  • 27 篇 information secu...
  • 26 篇 data mining
  • 25 篇 laboratories
  • 24 篇 routing

机构

  • 216 篇 shandong provinc...
  • 164 篇 school of comput...
  • 160 篇 key laboratory o...
  • 85 篇 key laboratory o...
  • 71 篇 state key labora...
  • 62 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 53 篇 shandong fundame...
  • 45 篇 key laboratory o...
  • 42 篇 shandong enginee...
  • 42 篇 the key laborato...
  • 41 篇 state key labora...
  • 41 篇 state key labora...
  • 41 篇 school of comput...
  • 41 篇 key laboratory o...
  • 36 篇 key laboratory o...
  • 34 篇 school of inform...
  • 31 篇 school of cyber ...
  • 27 篇 state key labora...

作者

  • 43 篇 ren jiadong
  • 40 篇 guo hong
  • 37 篇 zhou deyu
  • 32 篇 jianfeng ma
  • 29 篇 zhang min-ling
  • 28 篇 min-ling zhang
  • 26 篇 ma jianfeng
  • 26 篇 hu yupu
  • 21 篇 yang yang
  • 20 篇 han zhu
  • 20 篇 zhang yichen
  • 20 篇 guang cheng
  • 18 篇 hui li
  • 18 篇 ma jian-feng
  • 17 篇 yu song
  • 17 篇 xiaoming wu
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 17 篇 huang chongwen
  • 16 篇 geng xin

语言

  • 1,814 篇 英文
  • 150 篇 其他
  • 111 篇 中文
检索条件"机构=The Key Laboratory for Computer Networks and Information Integration"
2072 条 记 录,以下是2031-2040 订阅
排序:
Advanced algorithm to P2P semantic routing based on the topologically-aware clustering in self-organizing mode
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2006年 第2期17卷 339-348页
作者: Liu, Ye Yang, Peng Key Laboratory of Computer Network and Information Integration Southeast University Nanjing 210096 China
Structured P2P networks create a virtual topology on top of the physical topology. The only relation between the two layers is the hashing algorithm, which makes the node's logical ID independent of its physical l... 详细信息
来源: 评论
Network pricing mechanism based on the utility characteristics of transport control protocol
收藏 引用
Zhongshan Daxue Xuebao/Acta Scientiarum Natralium Universitatis Sunyatseni 2006年 第SUPPL.期45卷 54-58页
作者: Dong, Yong-Qiang Tu, Hao Key Laboratory of Computer Network and Information Integration College of Computer Science and Engineering Southeast University Nanjing 210096 China
Assuming a specific network service provider is in the position of natural monopolization, the pricing strategy most likely adopted by the provider is analyzed with the objective of profit maximization. The optimal pr... 详细信息
来源: 评论
OWL-based model for access control of ontology
收藏 引用
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications 2006年 第SUPPL.期29卷 29-33页
作者: Wang, Xin Wu, Yu-Hong Zhang, Gang-Shan Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China
Nowadays the ontology in the semantic web lacks the access control mechanism, it causes the loss of privacy protection for the ontology and eventually damages the stability of semantic web. To guarantee the effective ... 详细信息
来源: 评论
Tail-Biting Theory for Turbo Codes
Tail-Biting Theory for Turbo Codes
收藏 引用
IEEE Annual Conference on Wireless and Microwave Technology (WAMICON)
作者: Ying Wang Xinjun Du Hui Li Xiaoyan Zhu Key Laboratory of Computer Networks and Information Security Xidian University Xi'an Shaanxi China No. 50 Research Institute of China Electronics Technology Group Company Shanghai China
In this paper, we investigate the theory of using tail-biting recursive systematic convolutional (RSC) codes in turbo codes. Tail-biting is not always possible for a given RSC code with some length. The condition of t... 详细信息
来源: 评论
A Digital Right Management Model for Distribution of Digital Audiovisual Content
收藏 引用
Wuhan University Journal of Natural Sciences 2006年 第6期11卷 1877-1881页
作者: FAN Kefeng PEI Qingqi WANG Meihua MO Wei CAO Ling Key Laboratory of Computer Networks and Information Security Ministry of Education Xidian University Xi'an 710071 Shaanxi China Electronic Equipment and System Research Center China Electronics Standardization Institute Beijing 100007 China TRS Open Laboratory Beijing Information Technology Institute Beijing 100101 China
This paper presents a digital rights management model, which considers the integrated factors including legality, communication security, integrity of the content, and trading fairness. The architecture of the model, ... 详细信息
来源: 评论
Ternary Tree based Group key Management in Dynamic Peer networks
收藏 引用
International Conference on Computational Intelligence and Security
作者: Wei Wang Jianfeng Ma Sangjae Moon Key Laboratory of Computer Networks and Information Security Ministry ofEducation Xidian University Xi'an China Mobile Network Security Technology Research Center Kyungpook National University Daegu South Korea
For group-oriented applications, designing secure and efficient group key management schemes is a major problem. We present a group key management scheme for dynamic peer networks, which supports join, leave, merge an... 详细信息
来源: 评论
Efficient identity-based signcryption scheme
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2006年 第9期29卷 1641-1647页
作者: Li, Fa-Gen Hu, Yu-Pu Li, Gang Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 China
Signcryption is a cryptographic primitive that combines both the functions of digital signature and public key encryption in a logical single step, at lower computational costs and communication overheads than the tra... 详细信息
来源: 评论
Schedulability analysis algorithm for EDF-based end-to-end real-time systems
收藏 引用
Jisuanji Yanjiu yu Fazhan/computer Research and Development 2006年 第5期43卷 813-820页
作者: Shen, Zhuowei Wang, Yun Department of Computer Science and Engineering Southeast University Nanjing 210096 China Key Laboratory of Computer Network and Information Integration Nanjing 210096 China
An end-to-end real-time scheduling model can be used to describe many distributed real-time systems. An EDF-based end-to-end real-time scheduling model is proposed. According to the time demand analysis technique, a s... 详细信息
来源: 评论
FDEWS 2.0: A Web-GIS-Based Early Warning System for Fish Disease via Water Quality Management
FDEWS 2.0: A Web-GIS-Based Early Warning System for Fish Dis...
收藏 引用
World Congress on Intelligent Control and Automation (WCICA)
作者: Nan Li Zetian Fu Boqi Wang Xiaoshuan Zhang College of Engineering China Agricultural University Beijing China College of Resources and Environment China Agricultural University Beijing China Key Laboratory for Modern Precision Agriculture System Integration China Agricultural University Beijing China Key Laboratory for computer information management technology Suzhou University Jiangsu China
The water quality is the most vital factor in a successfully healthy aquaculture. After investigation by 415 fish disease cases and experiments, it is found that eutrophication and the pollutants of NH3, H2S as well a... 详细信息
来源: 评论
Joint-entropy-based anonymity metrics model with multi-property
收藏 引用
Jisuanji Yanjiu yu Fazhan/computer Research and Development 2006年 第7期43卷 1240-1245页
作者: Wu, Zhenqiang Ma, Jianfeng Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China College of Computer Science Shaanxi Normal University Xi'an 710062 China
An anonymity metrics model with three properties based on joint entropy is given in this paper. The three properties are identifiable, linkable and traceable respectively. According to randomness and fuzziness of anon... 详细信息
来源: 评论