咨询与建议

限定检索结果

文献类型

  • 694 篇 期刊文献
  • 346 篇 会议

馆藏范围

  • 1,040 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 896 篇 工学
    • 360 篇 计算机科学与技术...
    • 242 篇 信息与通信工程
    • 153 篇 电子科学与技术(可...
    • 146 篇 仪器科学与技术
    • 137 篇 软件工程
    • 127 篇 机械工程
    • 125 篇 控制科学与工程
    • 120 篇 电气工程
    • 120 篇 网络空间安全
    • 76 篇 材料科学与工程(可...
    • 38 篇 交通运输工程
    • 34 篇 地质资源与地质工...
    • 25 篇 光学工程
    • 25 篇 测绘科学与技术
    • 23 篇 航空宇航科学与技...
    • 20 篇 水利工程
    • 16 篇 土木工程
    • 15 篇 化学工程与技术
    • 15 篇 公安技术
  • 201 篇 理学
    • 69 篇 数学
    • 49 篇 物理学
    • 34 篇 系统科学
    • 24 篇 天文学
    • 19 篇 地理学
  • 126 篇 管理学
    • 92 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
  • 32 篇 经济学
    • 31 篇 应用经济学
  • 27 篇 教育学
    • 27 篇 教育学
  • 25 篇 农学
  • 24 篇 医学
  • 21 篇 军事学
    • 21 篇 军队指挥学
  • 17 篇 艺术学
    • 16 篇 设计学(可授艺术学...
  • 13 篇 法学
  • 6 篇 文学
  • 1 篇 历史学

主题

  • 24 篇 网络安全
  • 19 篇 计算机网络
  • 16 篇 internet
  • 13 篇 神经网络
  • 10 篇 卷积神经网络
  • 9 篇 无线传感器网络
  • 9 篇 neural network
  • 8 篇 信息技术
  • 8 篇 安全性
  • 8 篇 无线网络
  • 8 篇 qos
  • 8 篇 gis
  • 7 篇 地理信息系统
  • 7 篇 网络管理
  • 7 篇 network
  • 7 篇 网络
  • 7 篇 bp神经网络
  • 7 篇 防火墙
  • 6 篇 遗传算法
  • 6 篇 设计

机构

  • 12 篇 哈尔滨工业大学
  • 10 篇 南京邮电大学
  • 10 篇 西安电子科技大学
  • 9 篇 同济大学
  • 9 篇 南京大学
  • 9 篇 清华大学
  • 8 篇 南京邮电学院
  • 7 篇 北京交通大学
  • 7 篇 东南大学
  • 7 篇 苏州大学
  • 7 篇 成都信息工程大学
  • 7 篇 中山大学
  • 7 篇 中国科学院大学
  • 7 篇 山东科技大学
  • 6 篇 山西省交通信息通...
  • 6 篇 上海交通大学
  • 6 篇 湖南大学
  • 6 篇 北京邮电大学
  • 6 篇 济南大学
  • 5 篇 武汉理工大学

作者

  • 108 篇 china
  • 15 篇 beijing
  • 8 篇 王汝传
  • 7 篇 方滨兴
  • 7 篇 p.r.china
  • 6 篇 beijing universi...
  • 6 篇 胡铭曾
  • 6 篇 ministry of educ...
  • 5 篇 hangzhou
  • 5 篇 云晓春
  • 4 篇 shanghai
  • 4 篇 zhejiang univers...
  • 4 篇 p. r. china
  • 4 篇 hefei
  • 4 篇 杨晓元
  • 4 篇 wuhan
  • 4 篇 beijing 100876
  • 3 篇 zhengzhou
  • 3 篇 xuanwu zhou key ...
  • 3 篇 杨红娃

语言

  • 550 篇 英文
  • 490 篇 中文
检索条件"作者=2 Zhejiang Provincial Key Laboratory of Information Network Technology,Hangzhou 310027,China"
1040 条 记 录,以下是1-10 订阅
排序:
Energy-efficient spectrum-aware clustering for cognitive radio sensor networks
收藏 引用
Science Bulletin 2012年 第Z2期 3731-3739页
作者: ZHANG HuaZi 1,2,ZHANG ZhaoYang 1,2* & YUEN Chau 3 1 Department of information Science and Electronic Engineering,zhejiang University,hangzhou 310027,china 2 zhejiang provincial key laboratory of information network technology,hangzhou 310027,china 3 Singapore University of technology and Design,Singapore
As a smart combination of cognitive radio networks and wireless sensor networks,recently introduced cognitive radio sensor network(CRSN) poses new challenges to the design of topology maintenance techniques for dynami... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
POWER CONTROL STRATEGIES FOR MULTICHANNEL COGNITIVE WIRELESS networkS WITH OPPORTUNISTIC INTERFERENCE CANCELLATION
收藏 引用
Journal of Electronics(china) 2008年 第2期25卷 268-273页
作者: Tang Zhenzhou Hu Qian Yu Guanding College of Physics and Electronic information Wenzhou University Wenzhou 325000 China zhejiang provincial key laboratory of information network technology Zhejiang University Hangzhou 310027 China
In this letter,an Opportunistic Interference Cancellation(OIC) is first introduced as a rate control strategy for secondary user in cognitive wireless networks. Based on the OIC rate control method,an optimal power co... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Contourlet HMT model with directional feature
收藏 引用
Science china(information Sciences) 2012年 第7期55卷 1563-1578页
作者: WANG XiangHai 1,2,3 ,CHEN MingYing 1 ,SONG ChuanMing 1,2 ,XU MengChun 1 & FANG LingLing 3 1 College of Computer and information technology,Liaoning Normal University,Dalian 116029,china 2 State key laboratory for Novel Software technology,Nanjing University,Nanjing 210093,china 3 provincial key laboratory for Computer information Processing technology,Soochow University,Suzhou 215006,china College of Computer and information technology Liaoning Normal University Dalian China State key laboratory for Novel Software technology Nanjing University Nanjing China provincial key laboratory for Computer information Processing technology Soochow University Suzhou China
According to Shanno's information theory,the directional feature of texture is defined as the value of directional variable when an image signal attains a singularity of random *** terms of this definition,we calculat... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Threshold proxy quantum signature scheme with threshold shared verification
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第8期51卷 1079-1088页
作者: YANG YuGuang1,3,4 & WEN QiaoYan2 1 College of Computer Science and technology,Beijing University of technology,Beijing 100124,china 2 State key laboratory of networking and Switching technology,Beijing University of Posts and Tele-communications,Beijing 100876,china 3 State key laboratory of Integrated Services network,Xidian University,Xi’an 710071,china 4 State key laboratory of information Security(Graduate University of Chinese Academy of Sciences) ,Beijing 100049,china College of Computer Science and technology Beijing University of Technology Beijing China State key laboratory of Integrated Services network Xidian University Xi’an China State key laboratory of information Security (Graduate University of Chinese Academy of Sciences) Beijing China State key laboratory of networking and Switching technology Beijing University of Posts and Telecommunications Beijing China
A threshold proxy quantum signature scheme with threshold shared verification is proposed. An original signer could authorize a group as its proxy signers. Then only t or more of n persons in the proxy group can gener... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Quantum threshold group signature
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第10期51卷 1505-1514页
作者: YANG YuGuang1,2,3 & WEN QiaoYan4 1 College of Computer Science and technology, Beijing University of technology, Beijing 100124, china 2 State key laboratory of Integrated Services network, Xidian University, Xi’an 710071, china 3 State key laboratory of information Security (Graduate University of Chinese Academy of Sciences), Beijing 100049, china 4 State key laboratory of networking and Switching technology, Beijing University of Posts and Tele-communications, Beijing 100876, china College of Computer Science and technology Beijing University of Technology Beijing China State key laboratory of Integrated Services network Xidian University Xi’an China State key laboratory of information Security Graduate University of Chinese Academy of Sciences Beijing China State key laboratory of networking and Switching technology Beijing University of Posts and Telecommunications Beijing China
In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signatu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Threshold quantum secret sharing between multi-party and multi-party
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2008年 第9期51卷 1308-1315页
作者: YANG YuGuang1,2,3 & WEN QiaoYan4 1 College of Computer Science and technology,Beijing University of technology,Beijing 100124,china 2 State key laboratory of Integrated Services network,Xidian University,Xi’an 710071,china 3 State key laboratory of information Security (Graduate University of Chinese Academy of Sciences),Beijing 100049,china 4 State key laboratory of networking and Switching technology,Beijing University of Posts and Tele-communications,Beijing 100876,china College of Computer Science and technology Beijing University of Technology Beijing China State key laboratory of Integrated Services network Xidian University Xi’an China State key laboratory of information Security (Graduate University of Chinese Academy of Sciences) Beijing China State key laboratory of networking and Switching technology Beijing University of Posts and Telecommunications Beijing China
A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single photons,which is useful and efficient when the parties of communication are not all present.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
RST transforms resistant image watermarking based on centroid and sector-shaped partition
收藏 引用
Science china(information Sciences) 2012年 第3期55卷 650-662页
作者: ZHAO Yao1,2*, NI RongRong1,2* & ZHU ZhenFeng1,2* 1Institute of information Science, Beijing Jiaotong University, Beijing 100044, china 2Beijing key laboratory of Advanced information Science and network technology, Beijing 100044, china Institute of information Science Beijing Jiaotong University Beijing China Beijing key laboratory of Advanced information Science and network technology Beijing China
A novel digital watermarking scheme featuring centroid-based sectoring is proposed in this paper. To get higher robustness against geometric attacks, such as rotation, scaling, and translation (RST), a delicate synchr... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Data-aided synchronization algorithm dispensing with searching procedures for UWB communications
收藏 引用
Science china(information Sciences) 2012年 第4期55卷 778-788页
作者: REN ZhiYuan 1,JIANG Ting1,ZHONG Yi 2 & ZHAO ChengLin 1 1 key laboratory of Universal Wireless Communications,Ministry of Education of china Wireless network laboratory,Beijing University of Posts and Telecommunications,Beijing 100876,china 2 School of information Engineering,North china University of technology,Beijing 100041,china key laboratory of Universal Wireless Communications Ministry of Education of China Wireless network laboratory Beijing University of Posts and Telecommunications Beijing China School of information Engineering North China University of Technology Beijing China
Rapid and accurate synchronization constitutes a major challenge in deploying Ultra-Wideband impulse radio (UWB-IR) for indoor wireless *** paper develops a data-aided (DA) synchro-nization algorithm dispensing with s... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Secure network coding in the presence of eavesdroppers
收藏 引用
Science china(information Sciences) 2010年 第3期53卷 648-658页
作者: LUO MingXing1,2,3, YANG YiXian1,2,3, WANG LiCheng1,2,3 & NIU XinXin1,2,3 1information Security Center, State key laboratory of networking and Switching technology, Beijing University of Posts and Telecommunications, Beijing 100876, china 2key laboratory of network and information Attack and Defence technology of MOE, Beijing University of Posts and Telecommunications, Beijing 100876, china 3National Engineering laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, china information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China key laboratory of network and information Attack and Defence technology of MOE Beijing University of Posts and Telecommunications Beijing China National Engineering laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China
Our concern, in the paper, is to construct information-theoretic secure network coding in the presence of eavesdroppers. Based on the generalized attack model and all-or-nothing transformation, the security of network... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Communication network designing:Transmission capacity,cost and scalability
收藏 引用
Science china(information Sciences) 2012年 第11期55卷 2454-2465页
作者: ZHANG GuoQiang1,2,3 & ZHANG GuoQing1 1Institute of Computing technology,Chinese Academy of Sciences,Beijing 100190,china 2School of Computer Science and technology,Nanjing Normal University,Nanjing 210046,china 3provincial key laboratory for Computer information Processing technology,Soochow University,Suzhou 215000,china Institute of Computing technology Chinese Academy of Sciences Beijing China School of Computer Science and technology Nanjing Normal University Nanjing China provincial key laboratory for Computer information Processing technology Soochow University Suzhou China
Despite the growing number of works centering around the traffic dynamics on complex networks,these researches still have some common shortcomings,e.g.,too simple traffic flow model and lack of considerations for the ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论