咨询与建议

限定检索结果

文献类型

  • 5,649 篇 期刊文献
  • 290 篇 会议

馆藏范围

  • 5,939 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,978 篇 工学
    • 2,866 篇 计算机科学与技术...
    • 1,463 篇 电气工程
    • 1,294 篇 控制科学与工程
    • 1,257 篇 材料科学与工程(可...
    • 1,216 篇 信息与通信工程
    • 1,147 篇 软件工程
    • 1,137 篇 电子科学与技术(可...
    • 910 篇 机械工程
    • 561 篇 网络空间安全
    • 534 篇 仪器科学与技术
    • 396 篇 力学(可授工学、理...
    • 390 篇 化学工程与技术
    • 242 篇 动力工程及工程热...
    • 219 篇 生物医学工程(可授...
    • 157 篇 航空宇航科学与技...
    • 152 篇 光学工程
    • 131 篇 环境科学与工程(可...
    • 130 篇 水利工程
    • 112 篇 交通运输工程
  • 3,640 篇 理学
    • 1,742 篇 数学
    • 1,185 篇 物理学
    • 521 篇 化学
    • 513 篇 天文学
    • 379 篇 生物学
    • 178 篇 系统科学
    • 172 篇 地球物理学
    • 119 篇 统计学(可授理学、...
  • 912 篇 管理学
    • 730 篇 管理科学与工程(可...
    • 202 篇 图书情报与档案管...
  • 320 篇 医学
    • 216 篇 临床医学
  • 180 篇 农学
  • 97 篇 军事学
  • 87 篇 法学
  • 85 篇 艺术学
  • 84 篇 经济学
  • 68 篇 文学
  • 57 篇 教育学
  • 13 篇 哲学
  • 3 篇 历史学

主题

  • 102 篇 deep learning
  • 72 篇 blockchain
  • 68 篇 computing
  • 41 篇 network
  • 38 篇 machine learning
  • 37 篇 neuromorphic com...
  • 35 篇 mobile edge comp...
  • 35 篇 cloud computing
  • 34 篇 optimization
  • 33 篇 quantum computin...
  • 33 篇 model
  • 32 篇 artificial intel...
  • 31 篇 memristor
  • 30 篇 cryptography
  • 27 篇 internet of thin...
  • 27 篇 reinforcement le...
  • 24 篇 image
  • 24 篇 and
  • 23 篇 simulation
  • 23 篇 method

机构

  • 172 篇 university of ch...
  • 81 篇 university of ch...
  • 56 篇 shanghai key lab...
  • 50 篇 ieee
  • 43 篇 state key labora...
  • 39 篇 state key labora...
  • 38 篇 shanghai key lab...
  • 37 篇 state key labora...
  • 37 篇 institute of com...
  • 30 篇 state key labora...
  • 25 篇 national astrono...
  • 25 篇 state key labora...
  • 23 篇 state key labora...
  • 23 篇 college of intel...
  • 20 篇 institute of com...
  • 19 篇 beijing academy ...
  • 17 篇 school of mathem...
  • 17 篇 school of comput...
  • 17 篇 trusted computin...
  • 16 篇 hubei key labora...

作者

  • 27 篇 wei li
  • 25 篇 wei wang
  • 23 篇 陈勇
  • 21 篇 fei-yue wang
  • 21 篇 qi liu
  • 18 篇 xin liu
  • 16 篇 xiangyang luo
  • 16 篇 lei zhang
  • 14 篇 wei liu
  • 14 篇 hai jin
  • 13 篇 qiang li
  • 13 篇 yuefei sui
  • 13 篇 lei wang
  • 12 篇 jun wang
  • 12 篇 徐平
  • 12 篇 曹刚
  • 12 篇 min chen
  • 12 篇 yi li
  • 11 篇 li zhang
  • 11 篇 shuiying xiang

语言

  • 5,713 篇 英文
  • 226 篇 中文
检索条件"机构=Key Laboratory of Pervasive Computing"
5939 条 记 录,以下是1-10 订阅
排序:
Qubit Mapping Based on Tabu Search
收藏 引用
Journal of Computer Science & Technology 2024年 第2期39卷 421-433页
作者: 蒋慧 邓玉欣 徐鸣 Shanghai key laboratory of Trustworthy computing East China Normal UniversityShanghai 200062China
The goal of qubit mapping is to map a logical circuit to a physical device by introducing additional gates as few as possible in an acceptable amount of *** present an effective approach called Tabu Search Based Adjus... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A proof system of the CaIT calculus
收藏 引用
Frontiers of Computer Science 2024年 第2期18卷 123-137页
作者: Ningning CHEN Huibiao ZHU Shanghai key laboratory of Trustworthy computing East China Normal UniversityShanghai 200062China
The Internet of Things(IoT)can realize the interconnection of people,machines,and things anytime,*** of the existing research mainly focuses on the practical applications of IoT,and there is a lack of research on mode... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Survey on Construction of Safety Case Arguments
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2024年 第9期35卷
作者: Chen, Ze-Zhong Deng, Yu-Xin Shanghai key laboratory of Trustworthy computing East China Normal University Shanghai 200062 China
Safety cases provide clear, comprehensive, and reliable arguments which mean that a system’s operation under a specific environment meets acceptable safety levels. In safety-critical sectors subject to regulations su... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
IP-Pealing: A Robust Network Flow Watermarking Method Based on IP Packet Sequence
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 694-707页
作者: Wangxin FENG Xiangyang LUO Tengyao LI Chunfang YANG State key laboratory of Mathematical Engineering and Advanced computing key laboratory of Cyberspace Situation Awareness of Henan Province
Network flow watermarking(NFW) is usually used for flow *** actively modulating some features of the carrier traffic,NFW can establish the correspondence between different network *** the face of strict demands of net... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
High spectral efficiency 4-mode 400-km transmission using hybrid probabilistically and geometrically shaped 128QAM
收藏 引用
Science China(Technological Sciences) 2024年 第5期67卷 1628-1630页
作者: DING JunJie YU JianJun WANG Chen LONG JianYu ZHU Min ZHANG Jiao pervasive Communication Research Center Purple Mountain LaboratoriesNanjing 211111China key laboratory for Information Science of Electromagnetic Waves(MoE) Fudan UniversityShanghai 200433China
Wavelength division multiplexing(WDM)and space division multiplexing(SDM)based on few-mode fiber(FMF)and multi-core fiber(MCF)have been vigorously developed to increase the transmission capacity of optical communicati... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Privacy Preserving Algorithm for Spectrum Sensing in Cognitive Vehicle Networks
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 30-42页
作者: Hongning LI Tonghui HU Jiexiong CHEN Xiuqiang WU Qingqi PEI Guangzhou Institute of Technology Xidian University Guangzhou CEPREI Shaanxi key laboratory of Blockchain and Secure computing
The scarcity of spectrum resources fails to meet the increasing throughput demands of vehicular networks. There is an urgent need to maximize the utilization of spectrum bands in mobile networks. To ascertain the avai... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
Integrating Neighborhood Geographic Distribution and Social Structure Influence for Social Media User Geolocation
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第9期140卷 2513-2532页
作者: Meng Zhang Xiangyang Luo Ningbo Huang key laboratory of Cyberspace Situation Awareness of Henan Province Zhengzhou450001China State key laboratory of Mathematical Engineering and Advanced computing Zhengzhou450001China
Geolocating social media users aims to discover the real geographical locations of users from their publicly available data,which can support online location-based applications such as disaster alerts and local conten... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Combo Packet:An Encryption Traffic Classification Method Based on Contextual Information
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1223-1243页
作者: Yuancong Chai Yuefei Zhu Wei Lin Ding Li State key laboratory of Mathematical Engineering and Advanced computing Information Engineering UniversityZhengzhou450001China
With the increasing proportion of encrypted traffic in cyberspace, the classification of encrypted traffic has becomea core key technology in network supervision. In recent years, many different solutions have emerged... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Active Deception Defense Model Based on Address Mutation and Fingerprint Camouflage
收藏 引用
China Communications 2024年 第7期21卷 212-223页
作者: Wang Shuo Chu Jiang Pei Qingqi Shao Feng Yuan Shuai Zhong Xiaoge State key laboratory of Astronautic Dynamics Xi’an Satellite Control CenterXi’an 710043China State key laboratory of Integrated Services Networks Xidian UniversityXi’an 710071China Shaanxi key laboratory of Blockchain and Secure computing Xidian UniversityXi’an 710071China
The static and predictable characteristics of cyber systems give attackers an asymmetric advantage in gathering useful information and launching *** reverse this asymmetric advantage,a new defense idea,called Moving T... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Chaotic CS Encryption:An Efficient Image Encryption Algorithm Based on Chebyshev Chaotic System and Compressive Sensing
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 2625-2646页
作者: Mingliang Sun Jie Yuan Xiaoyong Li Dongxiao Liu key laboratory of Trustworthy Distributed computing and Service(BUPT) Ministry of EducationBeijing University of Posts and TelecommunicationsBeijing100876China
Images are the most important carrier of human information. Moreover, how to safely transmit digital imagesthrough public channels has become an urgent problem. In this paper, we propose a novel image encryptionalgori... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论