咨询与建议

限定检索结果

文献类型

  • 1,067 篇 会议
  • 997 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,066 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,367 篇 工学
    • 895 篇 计算机科学与技术...
    • 697 篇 软件工程
    • 440 篇 信息与通信工程
    • 196 篇 电子科学与技术(可...
    • 181 篇 电气工程
    • 134 篇 控制科学与工程
    • 94 篇 光学工程
    • 82 篇 网络空间安全
    • 81 篇 生物工程
    • 78 篇 机械工程
    • 74 篇 仪器科学与技术
    • 59 篇 动力工程及工程热...
    • 41 篇 建筑学
    • 40 篇 生物医学工程(可授...
    • 38 篇 化学工程与技术
    • 37 篇 交通运输工程
    • 36 篇 土木工程
    • 35 篇 航空宇航科学与技...
  • 607 篇 理学
    • 385 篇 数学
    • 136 篇 物理学
    • 129 篇 统计学(可授理学、...
    • 91 篇 生物学
    • 45 篇 系统科学
    • 39 篇 化学
  • 364 篇 管理学
    • 212 篇 管理科学与工程(可...
    • 160 篇 图书情报与档案管...
    • 84 篇 工商管理
  • 56 篇 法学
    • 45 篇 社会学
  • 34 篇 医学
    • 31 篇 临床医学
  • 27 篇 经济学
    • 27 篇 应用经济学
  • 16 篇 农学
  • 13 篇 军事学
  • 6 篇 文学
  • 5 篇 教育学
  • 4 篇 艺术学

主题

  • 74 篇 feature extracti...
  • 65 篇 semantics
  • 60 篇 accuracy
  • 51 篇 computational mo...
  • 48 篇 cryptography
  • 44 篇 protocols
  • 43 篇 training
  • 40 篇 wireless sensor ...
  • 37 篇 federated learni...
  • 35 篇 deep learning
  • 33 篇 privacy
  • 30 篇 servers
  • 30 篇 machine learning
  • 30 篇 data models
  • 29 篇 clustering algor...
  • 28 篇 computer network...
  • 27 篇 information secu...
  • 26 篇 data mining
  • 25 篇 laboratories
  • 24 篇 routing

机构

  • 216 篇 shandong provinc...
  • 162 篇 school of comput...
  • 160 篇 key laboratory o...
  • 84 篇 key laboratory o...
  • 71 篇 state key labora...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 59 篇 key laboratory o...
  • 53 篇 shandong fundame...
  • 45 篇 key laboratory o...
  • 42 篇 shandong enginee...
  • 42 篇 the key laborato...
  • 41 篇 state key labora...
  • 41 篇 state key labora...
  • 41 篇 school of comput...
  • 41 篇 key laboratory o...
  • 35 篇 key laboratory o...
  • 33 篇 school of inform...
  • 30 篇 school of cyber ...
  • 27 篇 state key labora...

作者

  • 43 篇 ren jiadong
  • 40 篇 guo hong
  • 37 篇 zhou deyu
  • 32 篇 jianfeng ma
  • 28 篇 zhang min-ling
  • 27 篇 min-ling zhang
  • 26 篇 ma jianfeng
  • 26 篇 hu yupu
  • 21 篇 yang yang
  • 20 篇 han zhu
  • 20 篇 zhang yichen
  • 20 篇 guang cheng
  • 18 篇 hui li
  • 18 篇 ma jian-feng
  • 17 篇 yu song
  • 17 篇 xiaoming wu
  • 17 篇 xiaoping li
  • 17 篇 he yulan
  • 17 篇 huang chongwen
  • 16 篇 geng xin

语言

  • 1,817 篇 英文
  • 143 篇 其他
  • 110 篇 中文
检索条件"机构=The Key Laboratory for Computer Networks and Information Integration"
2066 条 记 录,以下是2051-2060 订阅
排序:
An enhanced application-level multicast protocol: a QoS perspective
An enhanced application-level multicast protocol: a QoS pers...
收藏 引用
International Symposium on Parallel Architectures, Algorithms and networks (ISPAN)
作者: Zi Chu Yin-yin Yang Key Laboratory of Computer Network and Information Integration Ministry of Education South-East University Nanjing China Southeast University Nanjing Jiangsu CN Dept. of Comput. Sci. & Eng. Southeast Univ. Nanjing China
Ubicast, an enhanced application-level multicast protocol, is presented in this paper. It is built upon Pastry, a robust and self-organizing peer-to-peer substrate overlay, and leverages its merits of reliable applica... 详细信息
来源: 评论
Availability analysis and comparison of different intrusion-tolerant systems
收藏 引用
Advanced Workshop on Content Computing, AWCC 2004
作者: Wang, Chao Ma, Jian-Feng Key Laboratory of Computer Networks and Information Security Xidian University Ministry of Education Xi’an710071 China
Based on the adopted redundancy techniques the intrusion-tolerant systems are classified into three kinds: resource redundancy based systems, complete information redundancy based systems, and partial information redu... 详细信息
来源: 评论
New method to determine algebraic expression of Rijndael S-box  04
New method to determine algebraic expression of Rijndael S-b...
收藏 引用
3rd International Conference on information Security, InfoSecu '04
作者: Jingmei, Liu Baodian, Wei Xinmei, Wang Key Laboratory of Computer Networks and Information Security Xidian Univ. Ministry of Education Xi'an 710071 China Information Science and Technology School Sun Yat-sen University China
By the discovered correlation between linear functions over GF(q n) and matrices over GF (q), a new scheme is presented to resolve the algebraic expression of Rijndael S-box in this paper. This new scheme has the adva... 详细信息
来源: 评论
Publicly verifiable auctions with minimal leakage
Publicly verifiable auctions with minimal leakage
收藏 引用
Proceedings of the 28th Annual International computer Software and Applications Conference, COMPSAC 2004
作者: Wu, Qianhong Wang, Changjie Chen, Xiaofeng Wang, Yumin State Key Laboratory of Integrated Service Networks Xidian University Xi'an 710071 China Department of Computer Science and Engineering Chinese University of Hong Kong Hong Kong Hong Kong School of Information Science and Technology Sun Yat-sen University Guangzhou 510275 China
Publicly verifiable sealed electronic auctions are proposed. The schemes enjoy the following advantages. They require no special trusted parties. After bid opening phase, only the winning price is revealed and the rel... 详细信息
来源: 评论
An intrusion-tolerant authorization and authentication scheme in distributed environments
收藏 引用
Operating Systems Review (ACM) 2004年 第4期38卷 45-51页
作者: Guo, Yuan-Bo Ma, Jian-Feng Ministry of Education Key Laboratory of Computer Networks and Information Security Xidian University Xi'an Shaanxi 710071 China School of Electronic Technology Information Engineering University of PLA Zhengzhou Henan 450004 China
In this paper, we introduce an intrusion-tolerant authorization and authentication scheme in distributed environments, by the utilization of a secure multi-party computation scheme by virtue of Feldman's (t+1, n) ... 详细信息
来源: 评论
Pseudorandom number generators based on evolutionary algorithm
Pseudorandom number generators based on evolutionary algorit...
收藏 引用
2003 Congress on Evolutionary Computation, CEC 2003
作者: Zeng, Yong Ma, Jian Feng Ministry of Education Key Laboratory of Computer Networks and Information Security Xidian University Xian 710071 China
A family of novel pseudorandom number generators is proposed based on an evolutionary algorithm. These pseudorandom number generators are expressed as EAPRNG. EAPRNGs are driven by some existed simple and unsafe gener... 详细信息
来源: 评论
Pseudorandom number generators based on evolutionary algorithm
Pseudorandom number generators based on evolutionary algorit...
收藏 引用
Congress on Evolutionary Computation
作者: Yong Zeng Jian Feng Ma The Ministry of Education Key Laboratory of Computer Networks and Information Security Xidian University Xi'an China
A family of novel pseudorandom number generators is proposed based on an evolutionary algorithm. These pseudorandom number generators are expressed as EAPRNG. EAPRNGs are driven by some existed simple and unsafe gener... 详细信息
来源: 评论
Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc networks
收藏 引用
Journal of Interconnection networks 2003年 第3期4卷 345-359页
作者: Jiandong Li Zygmunt J. Haas Min Sheng Yanhui Chen Xidian University State Key Lab. of Integrated Service Network Xi'an Shaanxi 710071 P. R. China Cornell University School of Electrical and Computer Engineering Wireless Networks Laboratory Ithaca NY 14853 USA Xidian University Information Science Institute Xi'an Shaanxi 710071 P. R. China
In this paper, the IEEE 802.11 multiple access control (MAC) protocol was modified for use in multi-channel, multi-hop ad hoc networks through the use of a new channel-status indicator. In particular, in the modified ... 详细信息
来源: 评论
Queue length based fair queueing in core-stateless networks  4th
Queue length based fair queueing in core-stateless networks
收藏 引用
4th IFIP/IEEE International Conference on Management of Multimedia networks and Services, MMNS 2001
作者: Zhai, Mingyu Gu, Guanqun Yuan, Yuan Department of Computer Science and Engineering Southeast University Nanjing210096 China The Key Laboratory for Computer Networks and Information Integration Ministry of Education China
In this paper, we present Queue Length based Fair Queueing (QLFQ), a scheme to approximate fair bandwidth allocation without per-flow state. We have evaluated QLFQ together with CSFQ and RFQ with several different con... 详细信息
来源: 评论
Achieving fair bandwidth allocation without per-flow state
Achieving fair bandwidth allocation without per-flow state
收藏 引用
International Conference on computer networks and Mobile Computing (ICCNMC)
作者: Zhai Mingyu Gu Guanqun Department of Computer Science and Engineering South-East University Nanjing China The Key Laboratory for Computer Networks and Information Integration Ministry of Education China
In this paper, we present Queue Length based Fair Queueing (QLFQ), a scheme to approximate fair bandwidth allocation without per flow state. Edge routers divide each flow into a set of layers using a linear encoding s... 详细信息
来源: 评论