咨询与建议

限定检索结果

文献类型

  • 7,637 篇 期刊文献
  • 1,033 篇 会议

馆藏范围

  • 8,670 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,611 篇 工学
    • 1,824 篇 计算机科学与技术...
    • 914 篇 软件工程
    • 748 篇 控制科学与工程
    • 535 篇 电子科学与技术(可...
    • 516 篇 仪器科学与技术
    • 448 篇 机械工程
    • 439 篇 信息与通信工程
    • 234 篇 网络空间安全
    • 183 篇 电气工程
    • 175 篇 交通运输工程
    • 164 篇 环境科学与工程(可...
    • 142 篇 地质资源与地质工...
    • 141 篇 航空宇航科学与技...
    • 132 篇 测绘科学与技术
    • 125 篇 水利工程
    • 114 篇 材料科学与工程(可...
  • 2,284 篇 管理学
    • 1,570 篇 管理科学与工程(可...
    • 410 篇 工商管理
    • 228 篇 公共管理
    • 203 篇 图书情报与档案管...
    • 124 篇 农林经济管理
  • 1,670 篇 理学
    • 747 篇 数学
    • 231 篇 系统科学
    • 158 篇 大气科学
    • 120 篇 生态学
    • 114 篇 物理学
  • 1,022 篇 经济学
    • 953 篇 应用经济学
  • 927 篇 医学
    • 719 篇 临床医学
  • 593 篇 农学
    • 273 篇 农业资源与环境
  • 198 篇 文学
  • 161 篇 教育学
    • 130 篇 教育学
  • 127 篇 法学
  • 79 篇 艺术学
  • 63 篇 军事学
  • 19 篇 哲学
  • 12 篇 历史学

主题

  • 166 篇 deep learning
  • 135 篇 management
  • 120 篇 system
  • 114 篇 information
  • 87 篇 machine learning
  • 81 篇 network
  • 77 篇 china
  • 71 篇 covid-19
  • 70 篇 internet of thin...
  • 65 篇 optimization
  • 64 篇 analysis
  • 60 篇 model
  • 57 篇 big data
  • 55 篇 simulation
  • 52 篇 of
  • 45 篇 clustering
  • 40 篇 data mining
  • 36 篇 security
  • 35 篇 modeling
  • 35 篇 technology

机构

  • 71 篇 university of ch...
  • 51 篇 college of infor...
  • 43 篇 school of inform...
  • 41 篇 ieee
  • 33 篇 university of ch...
  • 30 篇 school of inform...
  • 22 篇 school of econom...
  • 21 篇 school of econom...
  • 20 篇 academy of mathe...
  • 18 篇 school of inform...
  • 18 篇 college of manag...
  • 17 篇 jiangsu center f...
  • 17 篇 school of econom...
  • 16 篇 school of manage...
  • 15 篇 academy of mathe...
  • 15 篇 college of infor...
  • 14 篇 school of econom...
  • 14 篇 national enginee...
  • 14 篇 college of infor...
  • 13 篇 school of inform...

作者

  • 28 篇 fei-yue wang
  • 19 篇 tao zhang
  • 17 篇 wei li
  • 17 篇 yang yang
  • 17 篇 shouyang wang
  • 16 篇 wei liu
  • 13 篇 jun wang
  • 13 篇 li li
  • 13 篇 qi zhang
  • 13 篇 yan li
  • 12 篇 jing wang
  • 11 篇 li zhang
  • 11 篇 wei sun
  • 10 篇 wang jian
  • 10 篇 jing yang
  • 10 篇 ashit kumar dutt...
  • 10 篇 mohammad yamin
  • 10 篇 tong jiang
  • 9 篇 jian wang
  • 9 篇 meng wang

语言

  • 8,124 篇 英文
  • 546 篇 中文
检索条件"机构=SchooI of Information Management"
8670 条 记 录,以下是91-100 订阅
排序:
Extensive game analysis and improvement strategy of DPOS consensus mechanism
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2021年 第5期28卷 27-35,101页
作者: Wang Lei Zhu Qinghua Li Baozhen School of information management Nanjing UniversityNanjing 210023China School of information Engineering Nanjing Audit UniversityNanjing 211815China
Delegated proof-of-stake(DPOS) consensus mechanism is widely adopted in blockchain platforms, but problems exist in its current applications. In order to explore the security risks in the voting attack of the DPOS con... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Flocking behavior with multiple leaders and global trajectory
收藏 引用
Journal of Central South University 2014年 第6期21卷 2324-2333页
作者: 李猛 梁加红 李石磊 College of information System and management National University of Defense Technology Department of information Security College of Electronic EngineeringNaval University of Engineering
Aiming at the group of autonomous agents consisting of multiple leader agents and multiple follower ones,a flocking behavior method with multiple leaders and a global trajectory was *** this flocking method,the group ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A novel multisignature scheme for a special verifier group against clerk and rogue-key attacks
收藏 引用
Journal of Zhejiang University-Science C(Computers and Electronics) 2010年 第4期11卷 290-295页
作者: Jia-lun TSAI Tzong-chen WU Kuo-yu TSAI Department of information management National Taiwan University of Science and Technology Taiwan information Security Center National Taiwan University of Science and Technology
The digital signature is a very important subject for network *** multiple signers and multiple verifiers,Xie and Yu(2004) pointed out that the multisignature scheme of Laih and Yen(1996) is vulnerable to a harmful **... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Application of Component Technology to E-commerce System
收藏 引用
Geo-Spatial information Science 2004年 第4期7卷 308-310页
作者: ZHU Jianfeng ZHU Jianfeng, postgraduate, School of information management, Wuhan University, Luojia Hill, Wuhan 430072 Economic information management Department, Hubei Univisity of Economics, 33 Luoyu Road, Wuhan 430079, China. School of information management Wuhan University Economic information management Department Hubei Univisity of Economics
At present E-commerce system tends to become more complex, and traditional system designing methods can not fufil the need of E-commerce system, thus requiring an effective methodas solution. With this concern, this p... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
LCH:A local clustering H-index centrality measure for identifying and ranking influential nodes in complex networks
收藏 引用
Chinese Physics B 2021年 第8期30卷 566-574页
作者: Gui-Qiong Xu Lei Meng Deng-Qin Tu Ping-Le Yang Department of information management School of ManagementShanghai UniversityShanghai 200444China Business School University of Shanghai for Science and TechnologyShanghai 200093China School of Electrical and information Engineering Jiangsu University of Science and Technology Zhangjiagang 215600China
Identifying influential nodes in complex networks is one of the most significant and challenging issues,which may contribute to optimizing the network structure,controlling the process of epidemic spreading and accele... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A Bootstrapping-based Method to Automatically Identify Data-usage Statements in Publications
收藏 引用
Journal of Data and information Science 2016年 第1期1卷 69-85页
作者: Qiuzi Zhang Qikai Cheng Yong Huang Wei Lu School of information management Wuhan University
Purpose: Our study proposes a bootstrapping-based method to automatically extract data- usage statements from academic texts. Design/methodology/approach: The method for data-usage statements extraction starts with ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Predicting Future Rumours
收藏 引用
Chinese Journal of Electronics 2018年 第3期27卷 514-520页
作者: QIN Yumeng Dominik Wurzer TANG Cunchen School of Computer Science (International School of Software) Wuhan University School of information management Wuhan University
Recent uproar of fake news and misinformation on social media platforms has sparked the interest in the scientific community to automatically detect and refute them. The most popular research task to counteract misinf... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
How Users Search the Mobile Web:A Model for Understanding the Impact of Motivation and Context on Search Behaviors
收藏 引用
Journal of Data and information Science 2016年 第1期1卷 98-122页
作者: Dan Wu Man Zhu Aihua Ran School of information management Wuhan University
Purpose: This study explores how search motivation and context influence mobile Web search behaviors. Design/methodology/approach: We studied 30 experienced mobile Web users via questionnaires, semi-structured inter... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
A New Technique for Digital Image Watermarking
收藏 引用
Journal of Computer Science & Technology 2005年 第6期20卷 843-848页
作者: 伍祥生 information Engineering Department Guangdong Economics and Management College Guangzhou 510400 P.R. China
In this paper, a new technique is proposed for rotation, scaling and translation (RST) invariant image watermarking based on log-polar mappings (LPM) and phase-only filtering (POF). The watermark is embedded in ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
On the Depth Distribution of Constacyclic Codes over Z4 of Length 2e
收藏 引用
Chinese Journal of Electronics 2019年 第3期28卷 462-469页
作者: ZHU Shixin HUANG Shan LI Jin School of Mathematics Hefei University of Technology Departmaent of information management Anhui Vocational College of Police Officers
In this paper, we consider the depth distribution of constacyclic codes over Z4with length even prime power. The depth distribution of negacyclic codes over Z4of length 2eis completely ***, we determine the depth spec... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论