咨询与建议

限定检索结果

文献类型

  • 624 篇 期刊文献
  • 356 篇 会议

馆藏范围

  • 980 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 824 篇 工学
    • 269 篇 计算机科学与技术...
    • 174 篇 信息与通信工程
    • 143 篇 仪器科学与技术
    • 131 篇 软件工程
    • 113 篇 电子科学与技术(可...
    • 107 篇 机械工程
    • 100 篇 控制科学与工程
    • 93 篇 网络空间安全
    • 30 篇 交通运输工程
    • 25 篇 地质资源与地质工...
    • 24 篇 电气工程
    • 23 篇 材料科学与工程(可...
    • 21 篇 光学工程
    • 20 篇 测绘科学与技术
    • 17 篇 航空宇航科学与技...
    • 13 篇 公安技术
    • 12 篇 水利工程
    • 9 篇 化学工程与技术
  • 211 篇 管理学
    • 189 篇 管理科学与工程(可...
    • 10 篇 公共管理
  • 147 篇 理学
    • 48 篇 数学
    • 35 篇 系统科学
    • 27 篇 物理学
    • 14 篇 地理学
    • 12 篇 大气科学
  • 26 篇 经济学
    • 25 篇 应用经济学
  • 24 篇 医学
    • 11 篇 临床医学
  • 22 篇 教育学
    • 22 篇 教育学
  • 22 篇 农学
  • 20 篇 军事学
    • 20 篇 军队指挥学
  • 18 篇 艺术学
    • 17 篇 设计学(可授艺术学...
  • 8 篇 法学
  • 4 篇 文学
  • 1 篇 历史学

主题

  • 21 篇 网络安全
  • 19 篇 计算机网络
  • 15 篇 internet
  • 12 篇 神经网络
  • 10 篇 卷积神经网络
  • 9 篇 gis
  • 9 篇 无线传感器网络
  • 9 篇 neural network
  • 8 篇 信息技术
  • 7 篇 网络管理
  • 7 篇 qos
  • 7 篇 bp神经网络
  • 7 篇 防火墙
  • 6 篇 遗传算法
  • 6 篇 network
  • 6 篇 设计
  • 6 篇 genetic algorith...
  • 6 篇 bp neural networ...
  • 6 篇 入侵检测
  • 6 篇 移动代理

机构

  • 12 篇 哈尔滨工业大学
  • 9 篇 南京大学
  • 9 篇 南京邮电大学
  • 9 篇 清华大学
  • 9 篇 西安电子科技大学
  • 8 篇 南京邮电学院
  • 8 篇 同济大学
  • 7 篇 北京交通大学
  • 7 篇 苏州大学
  • 7 篇 成都信息工程大学
  • 7 篇 中国科学院大学
  • 7 篇 山东科技大学
  • 6 篇 东南大学
  • 6 篇 上海交通大学
  • 6 篇 中山大学
  • 6 篇 湖南大学
  • 6 篇 北京邮电大学
  • 6 篇 济南大学
  • 5 篇 武汉理工大学
  • 5 篇 福州大学

作者

  • 113 篇 china
  • 16 篇 beijing
  • 8 篇 王汝传
  • 7 篇 方滨兴
  • 7 篇 p.r.china
  • 6 篇 beijing universi...
  • 6 篇 胡铭曾
  • 6 篇 ministry of educ...
  • 5 篇 shanghai
  • 5 篇 hangzhou
  • 5 篇 hefei
  • 5 篇 云晓春
  • 4 篇 zhejiang univers...
  • 4 篇 p. r. china
  • 4 篇 杨晓元
  • 4 篇 wuhan
  • 4 篇 beijing 100876
  • 3 篇 zhengzhou
  • 3 篇 xuanwu zhou key ...
  • 3 篇 韩益亮

语言

  • 544 篇 英文
  • 436 篇 中文
检索条件"作者=2 Zhejiang Provincial Key Laboratory of Information Network Technology,Hangzhou 310027,China"
980 条 记 录,以下是51-60 订阅
排序:
Local segment-shared protection based on source egress gateway selection for multi-domain optical mesh networks
收藏 引用
Science china(information Sciences) 2011年 第2期54卷 227-235页
作者: ZHANG ShengFeng1,3, PENG YunFeng1,2, DU Shu1, YANG XiaoLong1,2 & LONG KePing1,2 1Research Center for Optical Internet and Mobile information networks, University of Electronic Science and technology of china, Chengdu 611731, china 2Institute of Advanced network technology and New Serives (ANTS), University of Science and technology Beijing, Beijing 100083, china 3Research Center for Optical Internet networks, Chongqing University of Posts and Telecommunications, Chongqing 400065, china Research Center for Optical Internet and Mobile information networks University of Electronic Science and Technology of China Chengdu China Research Center for Optical Internet networks Chongqing University of Posts and Telecommunications Chongqing China Institute of Advanced network technology and New Serives (ANTS) University of Science and Technology Beijing Beijing China
Survivability for multi-domain optical networks is becoming a key parameter due to expanding network. In order to provide the shared-path-protected lightpath in multi-domain optical mesh networks, we propose a protect... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
The endocrine regulation network of growth hormone synthesis and secretion in fish: Emphasis on the signal integration in somatotropes
收藏 引用
Science china(Life Sciences) 2010年 第4期53卷 462-470页
作者: LI WenSheng & LIN HaoRan State key laboratory of Biocontrol, Institute of Aquatic Economic Animals and the Guangdong provincial key laboratory for Aquatic Economic Animals, School of Life Sciences, Sun Yat-sen University, Guangzhou 510275, china State key laboratory of Biocontrol Institute of Aquatic Economic Animals and the Guangdong Provincial Key Laboratory for Aquatic Economic Animals School of Life Sciences Sun Yat-sen University Guangzhou China
In teleosts, growth hormone (GH) production is governed by multiple neuroendocrine factors from the hypothalamus and other regulators from the pituitary and peripheral organs. Exploring the principles followed by pitu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Research of Double-threshold Energy Detection with Square-Law Combining over Nakagami Channel
Research of Double-threshold Energy Detection with Square-La...
收藏 引用
“智慧城市和绿色IT”2011年通信与信息技术新进展——第八届中国通信学会学术年会
作者: Peng SHI~1,Wanpei CHEN~1,Zhengquan LI~(1,2,3) 1 information Engineering College of Yangzhou University 2 zhejiang provincial key laboratory of information network technology 3 information Engineering College of china Jiliang University
In this paper a scheme of energy detection is proposed to improve performance of spectrum *** first, Nakagami channel is chosen to imitate wireless ***,double-threshold energy detection algorithm is used to settle the... 详细信息
来源: cnki会议 评论
Polling Algorithm Based on Traffic Burst Characteristics of Broadband Wireless Access Systems
收藏 引用
Journal of Shanghai Jiaotong university(Science) 2011年 第4期16卷 429-435页
作者: 李秀媛 李炜 吴晓娟 张云峰 School of Computer Science and technology Shandong Economy University School of information Science and Engineering Shandong University Shandong provincial key laboratory of Digital Media technology
In this paper,we propose a novel polling algorithm to decrease the number of idle slots and collission slots during the polling cycle by evaluating the bandwidth request of the subscribe stations(SSs) in the next poll... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Efficient DPCA SAR imaging with fast iterative spectrum reconstruction method
收藏 引用
Science china(information Sciences) 2012年 第8期55卷 1838-1851页
作者: FANG Jian1,ZENG JinShan1,XU ZongBen1&ZHAO Yao2 1M inistry of Education key Lab for Intelligent networks and network Security Xi'an Jiaotong University,Xi'an 710049,china 2N ational key laboratory of Science and technology on Microwave Imaging&Institute of Electronics,Chinese Academy of Sciences,Beijing 100049,china Ministry of Education key Lab for Intelligent networks and network Security Xi’an Jiaotong University Xi’an China National key laboratory of Science and technology on Microwave Imaging & Institute of Electronics Chinese Academy of Sciences Beijing China
The displaced phase center antenna(DPCA)technique is an effective strategy to achieve wide-swath synthetic aperture radar(SAR)imaging with high azimuth ***,traditionally,it requires strict limitation of the pulse repe... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Displacement residual based DDM matching algorithm
收藏 引用
Science china(information Sciences) 2012年 第9期55卷 2090-2101页
作者: ZHANG Lin 1,2,ZHOU Zhong 1,2,LIU Lin 1,2 & WU Wei 1,2 1 State key laboratory of Virtual Reality technology and Systems,Beihang University,Beijing 100191,china 2 School of Computer Science and Engineering,Beihang University,Beijing 100191,china State key laboratory of Virtual Reality technology and Systems Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China
High level architecture(HLA) is the prevailing standard for modeling and *** data distribution management(DDM) service of HLA is defined for reducing the delivery of irrelevant *** key in DDM implementation is the reg... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Self-healing routing: failure,modeling and analysis
收藏 引用
Science china(information Sciences) 2011年 第3期54卷 609-622页
作者: XU MingWei 1,2 , LI Qi 1,2 , YANG Yuan 1,2 , HOU MeiJia 1,2 & PAN LingTao 1,2 1 Department of Computer Science, Tsinghua University, Beijing 100084, china 2 Tsinghua National laboratory for information Science and technology (TNList), Beijing 100084, china Department of Computer Science Tsinghua University Beijing China Tsinghua National laboratory for information Science and technology (TNList) Beijing China
network failures occur frequently, and self-healing ability of existing routing protocols cannot guarantee fast route convergence under these failures without impacting packet forwarding. During routing convergence, n... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Preparation of nanocrystalline BaTiO_3 ceramics
收藏 引用
Science china(Technological Sciences) 2009年 第6期52卷 1730-1734页
作者: DENG XiangYun1,2,LI DeJun1,LI JianBao2,WANG XiaoHui3 & LI LongTu3 1 College of Physics and Electronic information,Tianjin Normal University,Tianjin 300387,china 2 Materials and Chemical Engineering Institute,key laboratory for Hainan Advantage Resources and Applied technology in Chemical Engineering Material of Ministry of Education,Hainan provincial key laboratory of Research on Utilization of Si-Zr-Ti,Hainan University,Haikou 570228,china 3 Department of Materials Science and Engineering,Tsinghua University,Beijing 100084,china College of Physics and Electronic information Tianjin Normal University Tianjin China Materials and Chemical Engineering Institute Key Laboratory for Hainan Advantage Resources and Applied Technology in Chemical Engineering Material of Ministry of Education Hainan Provincial Key Laboratory of Research on Utilization of Si-Zr-Ti Hainan University Haikou China Department of Materials Science and Engineering Tsinghua University Beijing China
The high-dense nanocrystalline BaTiO3(BT)ceramics with grain size smaller than 100nm have been successfully prepared by the two step sintering and the spark plasma sintering(SPS)*** successive transitions in nanograin... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A study on volunteer augmentation navigation technology
收藏 引用
Science china(Physics,Mechanics & Astronomy) 2011年 第6期54卷 1029-1034页
作者: WU HaiTao 1,2,LU XiaoChun 1,2,ZOU DeCai 1,2 & HAN Tao 1,2 1 National Time Service Center,Chinese Academy of Sciences,Xi’an 710600,china 2 key laboratory of Precision Navigation and Timing technology,Chinese Academy of Sciences,Xi’an 710600,china National Time Service Center Chinese Academy of Sciences Xi’an China key laboratory of Precision Navigation and Timing technology Chinese Academy of Sciences Xi’an China
Navigation augmentation technology is one of the most common methods to increase the continuity,reliability and integrity of the global satellite navigation *** concept of volunteer augmentation navigation (VNA) is pr... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Another ID-Based Proxy Signature Scheme and Its Extension
收藏 引用
Wuhan University Journal of Natural Sciences 2007年 第1期12卷 33-36页
作者: ZHANG Jianhong1,2 , ZOU Wei3 1. College of Science, North china University of technology, Beijing 100041,china 2. Institute of Software of Chinese Academy of Sciences /State key laboratory of information Security, Beijing 100080, china 3. Institute of Computer Science and technology, Peking University, Beijing 100871, china College of Science North China University of Technology Beijing China State key laboratory of information Security Institute of Software of Chinese Academy of Sciences Beijing China Institute of Computer Science and technology Peking University Beijing China
So fur, the security of many proxy signatures has seldom been considered in a formal way and most of them cannot satisfy nonepudiation. In this work, a novel ID-based (Identity-based) proxy signature scheme is propo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论