咨询与建议

限定检索结果

文献类型

  • 7,354 篇 会议
  • 93 篇 期刊文献
  • 60 册 图书

馆藏范围

  • 7,507 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,889 篇 工学
    • 3,952 篇 计算机科学与技术...
    • 3,115 篇 软件工程
    • 1,240 篇 信息与通信工程
    • 670 篇 控制科学与工程
    • 598 篇 机械工程
    • 528 篇 电子科学与技术(可...
    • 434 篇 电气工程
    • 410 篇 仪器科学与技术
    • 335 篇 生物工程
    • 267 篇 生物医学工程(可授...
    • 224 篇 化学工程与技术
    • 191 篇 动力工程及工程热...
    • 187 篇 光学工程
    • 164 篇 材料科学与工程(可...
    • 161 篇 网络空间安全
    • 156 篇 建筑学
    • 147 篇 交通运输工程
  • 2,216 篇 理学
    • 1,384 篇 数学
    • 410 篇 统计学(可授理学、...
    • 389 篇 物理学
    • 355 篇 生物学
    • 282 篇 系统科学
    • 197 篇 化学
  • 1,650 篇 管理学
    • 946 篇 管理科学与工程(可...
    • 746 篇 图书情报与档案管...
    • 347 篇 工商管理
  • 247 篇 教育学
    • 234 篇 教育学
  • 223 篇 法学
    • 180 篇 社会学
  • 216 篇 医学
    • 167 篇 临床医学
  • 188 篇 农学
  • 175 篇 经济学
    • 172 篇 应用经济学
  • 166 篇 文学
  • 53 篇 军事学
  • 32 篇 艺术学
  • 2 篇 历史学

主题

  • 106 篇 data mining
  • 98 篇 semantics
  • 93 篇 educational inst...
  • 90 篇 wireless sensor ...
  • 82 篇 feature extracti...
  • 76 篇 students
  • 75 篇 computers
  • 70 篇 vectors
  • 69 篇 cloud computing
  • 65 篇 classification (...
  • 62 篇 artificial intel...
  • 61 篇 routing
  • 60 篇 authentication
  • 60 篇 cryptography
  • 59 篇 image segmentati...
  • 59 篇 genetic algorith...
  • 59 篇 training
  • 58 篇 computational mo...
  • 57 篇 algorithm design...
  • 56 篇 servers

机构

  • 68 篇 department of co...
  • 47 篇 college of compu...
  • 40 篇 department of co...
  • 39 篇 school of comput...
  • 36 篇 institute of inf...
  • 34 篇 school of comput...
  • 28 篇 school of comput...
  • 27 篇 department of co...
  • 26 篇 department of co...
  • 26 篇 institute of inf...
  • 24 篇 school of inform...
  • 23 篇 department of co...
  • 22 篇 department of co...
  • 22 篇 college of compu...
  • 22 篇 school of comput...
  • 22 篇 tsinghua nationa...
  • 20 篇 school of comput...
  • 19 篇 graduate institu...
  • 19 篇 school of comput...
  • 18 篇 department of el...

作者

  • 17 篇 ma yan
  • 17 篇 park namje
  • 13 篇 guo li
  • 13 篇 tzung-pei hong
  • 13 篇 li-chen fu
  • 11 篇 zhang lei
  • 11 篇 yun unil
  • 11 篇 wang wei
  • 11 篇 wang ruchuan
  • 10 篇 chen li
  • 10 篇 li bo
  • 10 篇 li ming
  • 9 篇 wang jing
  • 9 篇 vincent s. tseng
  • 9 篇 chen gwo-dong
  • 9 篇 wang jianxin
  • 8 篇 noraziah a.
  • 8 篇 li li
  • 8 篇 jia yan
  • 8 篇 tseng vincent s.

语言

  • 7,446 篇 英文
  • 55 篇 中文
  • 5 篇 其他
  • 2 篇 法文
检索条件"任意字段=2012 National Conference on Information Technology and Computer Science, CITCS 2012"
7507 条 记 录,以下是1-10 订阅
排序:
Proceedings of the 2012 national conference on information technology and computer science, citcs 2012
Proceedings of the 2012 National Conference on Information T...
收藏 引用
2012 national conference on information technology and computer science, citcs 2012
The proceedings contain 271 papers. The topics discussed include: application of ant colony algorithm in fingerprint identification system based on Internet of things;research on lash-up maintenance technology of engi...
来源: 评论
A Compressive Memory-based Retrieval Approach for Event Argument Extraction  31
A Compressive Memory-based Retrieval Approach for Event Argu...
收藏 引用
31st International conference on Computational Linguistics, COLING 2025
作者: Liu, Wanlong Zhang, Enqi Cheng, Shaohuan Zhou, Li Zeng, Dingyi Zhang, Chen Zhang, Malu Chen, Wenyu University of Electronic Science and Technology of China China The Chinese University of Hong Kong Shenzhen China National University of Singapore Singapore
Recent works have demonstrated the effectiveness of retrieval augmentation in the Event Argument Extraction (EAE) task. However, existing retrieval-based EAE methods have two main limitations: (1) input length constra... 详细信息
来源: 评论
Hybrid Scalable Video Coding with Neural Compression and Enhancement for Streaming Media  31st
Hybrid Scalable Video Coding with Neural Compression and E...
收藏 引用
31st International conference on Multimedia Modeling, MMM 2025
作者: Ye, Yuyao Yang, Jiayu Zhao, Yang Gao, Mengping Cao, Hongbin Wang, Ronggang Guangdong Provincial Key Laboratory of Ultra High Definition Immersive Media Technology School of Electronic and Computer Engineering Peking University Shenzhen Graduate School Shenzhen China School of Computer and Information Hefei University of Technology Hefei China Bytedance Inc. Shenzhen China
Streaming media is important in modern information consumption industry. However the limited and varied computing resources and bandwidth of client devices pose challenges for video coding. To make a balance between s... 详细信息
来源: 评论
Characterizing the Influence of Topology on Graph Learning Tasks  29th
Characterizing the Influence of Topology on Graph Learning T...
收藏 引用
29th International conference on Database Systems for Advanced Applications (DASFAA)
作者: Wu, Kailong Xie, Yule Ding, Jiaxin Ren, Yuxiang Fu, Luoyi Wang, Xinbing Zhou, Chenghu Shanghai Jiao Tong Univ Shenzhen Shenzhen Guangdong Peoples R China Huawei Technol Shenzhen 2012 Labs Shenzhen Guangdong Peoples R China
Graph neural networks (GNN) have achieved remarkable success in a wide range of tasks by encoding features combined with topology to create effective representations. However, the fundamental problem of understanding ... 详细信息
来源: 评论
Sequential Indifferentiability of 7-Round Misty Structures
Sequential Indifferentiability of 7-Round Misty Structures
收藏 引用
Cryptographers’ Track at the RSA conference, CT-RSA 2025
作者: Ai, Jiayi Guo, Chun School of Cyber Science and Technology Shandong University Qingdao China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education Shandong University Shandong Qingdao266237 China Shandong Research Institute of Industrial Technology Shandong Jinan250102 China
We investigate the Misty structure with respect to the security notion of sequential indifferentiability of Mandal et al. (TCC 2012). As our main result, we prove sequential indifferentiability for 7-round Misty struc...
来源: 评论
Remote State Estimation and Blum–Shub–Smale Machines—A Computability Analysis With Applications to Virtual Twinning
收藏 引用
IEEE Transactions on Automatic Control 2025年 第5期70卷 3165-3180页
作者: Boche, Holger Bock, Yannik Deppe, Christian Fitzek, Frank H. P. Technical University of Munich Chair of Theoretical Information Technology MunichD-80290 Germany BMBF Research Hub 6G-Life D-80333 Munich Germany MunichD-80799 Germany MunichD-80807 Germany Technische Universität Braunschweig Institute for Communications Technology BraunschweigD-38106 Germany 5G Lab Germany DresdenD-01062 Germany
This article analyzes aspects of the problem of remote state estimation (RSE) via noisy communication channels for their Blum–Shub–Smale (BSS) computability, motivated by an exemplary application to a formal model o... 详细信息
来源: 评论
Insights into the High-Quality Development of Agriculture under the Wave of Digital Economy  20th
Insights into the High-Quality Development of Agriculture un...
收藏 引用
20th International conference on Metaverse, METAVERSE 2024, Held as Part of the Services conference Federation, SCF 2024
作者: ChaoYu, Liang XiangQiong, Wu Hui, Ou Shengping, Liang College of Information Engineering Capital Normal University Beijing100048 China College of Mathematics and Statistics Hunan Normal University Changsha410081 China China Forestry Group Corporation Beijing100026 China
Based on panel data from 30 provinces, autonomous regions, and municipalities in China from 2012 to 2021, this study conducted a quantitative analysis of the high-quality development of agriculture amidst the wave of ... 详细信息
来源: 评论
TBA-GNN: A Traffic Behavior Analysis Model with Graph Neural Networks for Malicious Traffic Detection  18th
TBA-GNN: A Traffic Behavior Analysis Model with Graph Neura...
收藏 引用
18th International conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Han, Xinbo Zhang, Meng Yang, Zheng Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China
Given the surge in network attack behavior, detecting malicious traffic has become a pivotal cybersecurity task. Many existing methods for malicious traffic detection rely on machine learning and deep learning, but th... 详细信息
来源: 评论
Remote Sensing Based Crop Monitoring Techniques: A Case Study for the Navajo Nation
Remote Sensing Based Crop Monitoring Techniques: A Case Stud...
收藏 引用
2024 Annual conference, ASPRS 2024
作者: Thangavel, Varatharajaperumal Nagarajan, Sudhagar Arockiasamy, Madasamy Khan, Md. Tarique Sklivanitis, George Department of Civil Environmental and Geomatics Engineering Florida Atlantic University FL United States School of Engineering Math & Technology Faculty Navajo Technical University CrownpointNM United States Department of Electrical Engineering and Computer Science Florida Atlantic University FL United States
Agriculture plays a major role in eradicating poverty, promoting prosperity, and nourishing a projected 10 billion people by 2050 globally. In a changing climate, achieving optimal agricultural yields requires a deepe... 详细信息
来源: 评论
Predicting Forex Trends: A Comprehensive Analysis of Supervised learning in Exchange Rate Prediction  1st
Predicting Forex Trends: A Comprehensive Analysis of Supervi...
收藏 引用
1st International conference on Machine Learning Algorithms, ICMLA 2024
作者: Nayak, Rudra Kalyan Sodha, Manan Mishra, Nilamadhab Tripathy, Santosh Kumar Tripathy, Ramamani Pradhan, Ashwini Kumar School of Computing Science and Engineering VIT Bhopal University Bhopal-Indore Highway Kothrikalan Madhya Pradesh Sehore466114 India Department of Computer Science and Engineering National Institute of Technology Patna Bihar Patna India Chitkara University School of Engineering & Technology Chitkara University Himachal Pradesh India Department of Computer Science Engineering Galgotias University U.P. Greater Noida India
This research examines the coherence between regression models and forex trading concentrating on the currency pairs EUR/INR, GBP/INR, and USD/INR. Investigating the ability to dissect and forecast data using machine ... 详细信息
来源: 评论