咨询与建议

限定检索结果

文献类型

  • 7,020 篇 期刊文献
  • 2,105 篇 会议

馆藏范围

  • 9,125 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,530 篇 工学
    • 3,705 篇 计算机科学与技术...
    • 2,272 篇 软件工程
    • 1,251 篇 机械工程
    • 950 篇 控制科学与工程
    • 935 篇 仪器科学与技术
    • 835 篇 信息与通信工程
    • 593 篇 电子科学与技术(可...
    • 492 篇 网络空间安全
    • 258 篇 材料科学与工程(可...
    • 140 篇 电气工程
    • 132 篇 建筑学
    • 129 篇 交通运输工程
    • 105 篇 光学工程
    • 95 篇 动力工程及工程热...
    • 74 篇 化学工程与技术
    • 70 篇 航空宇航科学与技...
    • 67 篇 土木工程
    • 58 篇 地质资源与地质工...
  • 2,218 篇 管理学
    • 2,070 篇 管理科学与工程(可...
    • 140 篇 工商管理
  • 1,200 篇 理学
    • 572 篇 数学
    • 311 篇 系统科学
    • 161 篇 物理学
    • 62 篇 生物学
    • 58 篇 化学
  • 312 篇 教育学
    • 276 篇 教育学
  • 267 篇 艺术学
    • 260 篇 设计学(可授艺术学...
  • 234 篇 经济学
    • 229 篇 应用经济学
  • 144 篇 医学
    • 87 篇 临床医学
  • 109 篇 军事学
    • 99 篇 军队指挥学
  • 72 篇 农学
  • 64 篇 文学
  • 28 篇 法学
  • 15 篇 哲学
  • 7 篇 历史学

主题

  • 171 篇 internet
  • 156 篇 设计
  • 120 篇 计算机
  • 108 篇 计算机网络
  • 97 篇 面向对象
  • 90 篇 xml
  • 74 篇 遗传算法
  • 73 篇 软件开发
  • 63 篇 cad
  • 54 篇 数据挖掘
  • 52 篇 simulation
  • 51 篇 电子商务
  • 41 篇 java
  • 41 篇 多媒体
  • 38 篇 专家系统
  • 37 篇 数据仓库
  • 37 篇 genetic algorith...
  • 37 篇 数据库
  • 36 篇 地理信息系统
  • 36 篇 关联规则

机构

  • 434 篇 华中科技大学
  • 224 篇 清华大学
  • 217 篇 中国科学技术大学
  • 161 篇 南京大学
  • 143 篇 北京科技大学
  • 140 篇 电子科技大学
  • 136 篇 国防科技大学
  • 132 篇 武汉理工大学
  • 129 篇 天津大学
  • 127 篇 山东大学
  • 123 篇 南京理工大学
  • 115 篇 华中理工大学
  • 94 篇 上海交通大学
  • 90 篇 中国科技大学
  • 88 篇 华南理工大学
  • 86 篇 苏州大学
  • 85 篇 南京邮电学院
  • 83 篇 北京邮电大学
  • 81 篇 山东科技大学
  • 70 篇 吉林大学

作者

  • 569 篇 china
  • 69 篇 p.r.china
  • 33 篇 王汝传
  • 32 篇 余胜生
  • 30 篇 china)
  • 27 篇 谢立
  • 27 篇 涂序彦
  • 25 篇 杨静宇
  • 20 篇 wuhan
  • 19 篇 beijing universi...
  • 18 篇 杨炳儒
  • 18 篇 beijing
  • 18 篇 周敬利
  • 17 篇 钟珞
  • 16 篇 hubei
  • 15 篇 周明天
  • 14 篇 tsinghua univers...
  • 14 篇 杨宗凯
  • 14 篇 李思昆
  • 13 篇 李涛

语言

  • 5,837 篇 中文
  • 3,288 篇 英文
检索条件"作者=3.School of Computer Science and Technology, {3. University of Posts and Telecommunications, {3. 100876, china"
9125 条 记 录,以下是121-130 订阅
排序:
Conjugate adjoining problem in braid groups and new design of braid-based signatures
收藏 引用
science china(Information sciences) 2010年 第3期53卷 524-536页
作者: WANG LiCheng1,2, WANG LiHua2, CAO ZhenFu3. YANG YiXian1 & NIU XinXin1 Information Security Center, State Key Laboratory of Networking and Switching technology, Beijing university of posts and {3., Beijing 100876, china 2National Institute of Information and Communications technology, Tokyo 184-8795, Japan 3.rusted Digital technology Laboratory, Shanghai Jiao Tong university, Shanghai 200240, china 1. Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing 100876 China2. National Institute of Information and Communications Technology Tokyo 184-8795 Japan3. Trusted Digital Technology Laboratory Shanghai Jiao Tong University Shanghai 200240 China
The development of quantum computation casts serious threats to the securities of most existing public-key cryptosystems. Braid-based cryptography is one of the alternatives that have potential advantages in resisting... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
P2P traffic optimization
收藏 引用
science china(Information sciences) 2012年 第7期55卷 1475-1492页
作者: ZHANG GuoQiang 1,2 ,TANG MingDong 3.,CHENG SuQi 2,4 ,ZHANG GuoQing 2 ,SONG HaiBin 5 ,CAO JiGuang 6 & YANG Jing 7 1 school of computer science and {3.,Nanjing Normal university,Nanjing 210046,china 2 Institute of Computing {3.,Chinese Academy of sciences,Beijing 100190,china 3.school of computer science and Engineering,Hunan university of science and {3.,Xiangtan 411201,china 4 Graduate university of Chinese Academy of sciences,Beijing 100190,china 5 Nanjing R&D Center,Huawei Technologies,Nanjing 210012,china 6 china Academy of Telecommunication Research of MIIT,Beijing 100191,china 7 china Mobile Research Institute,Beijing 100053.china 1. school of computer science and {3. Nanjing Normal University Nanjing 210046 China2. Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China3. School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan 411201 China4. Graduate University of Chinese Academy of Sciences Beijing 100190 China5. Nanjing R&D Center Huawei Technologies Nanjing 210012 China6. China Academy of Telecommunication Research of MIIT Beijing 100191 China7. China Mobile Research Institute Beijing 100053 China
Peer-to-peer (P2P) based content distribution systems have emerged as the main form for content distribution on the Internet,which can greatly reduce the distribution cost of content providers and improve the overall ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
The optimization of replica distribution in the unstructured overlays
收藏 引用
science china(Information sciences) 2012年 第3期55卷 714-722页
作者: FENG GuoFu1,2 , LI WenZhong2, LU SangLu2, CHEN DaoXu2 & BUYYA Rajkumar3.1school of Information science, Nanjing Audit university, Nanjing 210029,{3. 2State Key Laboratory of Novel Software technology, Nanjing university, Nanjing 210093.{3. 3.epartment of computer science and Software Engineering, The university of Melbourne, Victoria 3.10, Australia 1. school of Information science Nanjing Audit University Nanjing 210029 China2. State Key Laboratory of Novel Software Technology Nanjing University Nanjing 210093 China3. Department of Computer Science and Software Engineering The University of Melbourne Victoria 3010 Australia
Replication is a widely used technique in unstructured overlays to improve content availability or system performance. A fundamental question often addressed by previous work focused on: how many replicas ought to be ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Key technologies of new malicious code developments and defensive measures in communication networks
收藏 引用
The Journal of china Universities of posts and telecommunications 2010年 第4期17卷 69-73页
作者: LI Peng,WANG Ru-chuan ,ZHANG Wei College of computer,Nanjing university of posts and {3.,Nanjing 210003.china [a] College of computer Nanjing University of Posts telecommunications Nanjing 210003 China
This article is focused on analyzing the key technologies of new malicious code and corresponding defensive measures in the large-scale communication networks. Based on description of the concepts and development of t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A novel evolutionary algorithm for global numerical optimization with continuous variables
收藏 引用
Progress in Natural science:Materials International 2008年 第3期18卷 345-351页
作者: Wenhong Zhaoa,b, Wei Wang a, Yuping Wang a, a school of computer science and {3., Xidian university, Xi’an 710071, china b Faculty of science, Xidian university, Xi’an 710071, china school of computer science and {3. Xidian University Xi’an 710071 China Faculty of science Xidian University Xi’an 710071 China
Evolutionary algorithms (EAs) are a class of general optimization algorithms which are applicable to functions that are multimodal, non-differentiable, or even discontinuous. In this paper, a novel evolutionary algori... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Study of Cross-Media Topic Analysis Based on Visual Topic Model
Study of Cross-Media Topic Analysis Based on Visual Topic Mo...
收藏 引用
第24届中国控制与决策会议
作者: Yipeng Zhou 1,2 , Meiyu Liang 3., Junping Du 3.1. school of computer science and Information Engineering, Beijing {3. and Business university, Beijing, 100048, china2. school of Information, Renmin university of china, Beijing, 100872, china 3. Beijing Key Laboratory of Intelligent telecommunications Software and Multimedia, Beijing university of posts and telecommunications, Beijing, 100876, china
Research on cross-media topic analysis methods, which utilize semantic of multimedia data to describe topics of cross-media documents. As the emerge of food safety related multimedia data, topic analysis based on sing... 详细信息
来源: cnki会议 评论
EXIT analysis of M-algorithm based MIMO detectors and LDPC code design optimization
收藏 引用
science in china(Series F) 2009年 第12期52卷 2248-2258页
作者: YOU MingHou1,2, TAO XiaoFeng1,2, CUI QiMei1,2 & ZHANG Ping1,2 1 Wireless technology Innovation Institute, Beijing university of posts and {3., Beijing 100876, china 2 Key Laboratory of Universal Wireless Communications, (Beijing university of posts and {3.), Ministry of Education, Beijing 100876, china Wireless technology Innovation Institute Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Universal Wireless Communications (Beijing University of Posts and Telecommunications) Ministry of Education Beijing 100876 China
This paper investigates joint design and optimization of both low density parity check (LDPC) codes and M-algorithm based detectors including iterative tree search (ITS) and soft-output M-algorithm (SOMA) in mul... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Parameter identification theory of a complex model based on global optimization method
收藏 引用
science china(Physics,Mechanics & Astronomy) 2008年 第11期51卷 1722-1732页
作者: QU Jie1, JIN QuanLin2 & XU BingYe3.1 College of Automotive Engineering, South china university of technology, Guangzhou 510640, china 2 Beijing Research Institute of Mechanical and Electrical technology, Beijing 100083. china 3.Department of Engineering Mechanics, Tsinghua university, Beijing 100084, china 1. College of Automotive Engineering South China University of Technology Guangzhou 510640 China 2. Beijing Research Institute of Mechanical and Electrical technology Beijing 100083 China 3. Department of Engineering Mechanics Tsinghua University Beijing 100084 China
With the development of computer technology and numerical simulation technology, computer aided engineering (CAE) technology has been widely applied to many fields. One of the main obstacles, which hinder the further ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
SAR image despeckling based on edge detection and nonsubsampled second generation bandelets
收藏 引用
Journal of Systems Engineering and Electronics 2009年 第3期20卷 519-526页
作者: Zhang Wenge~(1,2),Liu Fang~(1,2),Jiao Licheng~(2,3.& Gao Xinbo~(2,3. 1.school of computer science and {3.,Xidian Univ.,Xi’an 710071,P.R.china 2.Key Lab.of Intelligent Perception and Image Understanding of Ministry of Education of china,Xi’an 710071,P.R.china 3.Inst,of Intelligent Information Processing,Xidian Univ.,Xi’an 710071,P.R.china school of computer science and {3. Xidian Univ. Xi'an 710071 P. R. China Key Lab. of Intelligent Perception and Image Understanding of Ministry of Education of china Xi'an 710071 P. R. China Key Lab. of Intelligent Perception and Image Understanding of Ministry of Education of china Xi'an 710071 P. R. China Inst. of Intelligent Information Processing Xidian Univ. Xi'an 710071 P. R. China
To preserve the sharp features and details of the synthetic aperture radar (SAR) image effectively when despeckling, a despeckling algorithm with edge detection in nonsubsampled second generation bandelet transform ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Study of Cross-Media Topic Analysis and Application
Study of Cross-Media Topic Analysis and Application
收藏 引用
第24届中国控制与决策会议
作者: Yipeng Zhou 1,2 , Yuehua Yang 3., Meiyu Liang 3., Junping Du 3.1. school of computer science and Information Engineering, Beijing {3. and Business university, Beijing, 100048, china2. school of Information, Renmin university of china, Beijing, 100872, china 3. Beijing Key Laboratory of Intelligent telecommunications Software and Multimedia, Beijing university of posts and telecommunications, Beijing, 100876, china
As the rapid development of SNS applications, a uniform topic analysis on different media data is very important for emergency management and decision-making. In this paper, a cross-media topic analysis framework is p... 详细信息
来源: cnki会议 评论