咨询与建议

限定检索结果

文献类型

  • 318,868 篇 会议
  • 155,661 篇 期刊文献
  • 3,749 册 图书
  • 2,841 篇 学位论文
  • 514 篇 专利
  • 141 篇 科技报告

馆藏范围

  • 481,769 篇 电子文献
  • 29 种 纸本馆藏

日期分布

学科分类号

  • 308,521 篇 工学
    • 222,378 篇 计算机科学与技术...
    • 148,623 篇 软件工程
    • 52,012 篇 电气工程
    • 44,494 篇 信息与通信工程
    • 31,705 篇 控制科学与工程
    • 27,511 篇 电子科学与技术(可...
    • 20,348 篇 机械工程
    • 16,231 篇 材料科学与工程(可...
    • 15,055 篇 化学工程与技术
    • 14,371 篇 生物工程
    • 12,417 篇 动力工程及工程热...
    • 12,039 篇 仪器科学与技术
    • 11,071 篇 生物医学工程(可授...
    • 10,690 篇 光学工程
    • 10,314 篇 力学(可授工学、理...
    • 9,943 篇 土木工程
    • 7,958 篇 建筑学
    • 6,576 篇 交通运输工程
    • 6,467 篇 安全科学与工程
  • 130,893 篇 理学
    • 65,277 篇 数学
    • 41,493 篇 物理学
    • 20,332 篇 生物学
    • 16,822 篇 化学
    • 14,205 篇 统计学(可授理学、...
    • 11,055 篇 系统科学
  • 59,193 篇 管理学
    • 40,296 篇 管理科学与工程(可...
    • 20,894 篇 图书情报与档案管...
    • 17,032 篇 工商管理
  • 16,626 篇 医学
    • 12,109 篇 临床医学
    • 8,209 篇 基础医学(可授医学...
  • 7,466 篇 法学
  • 6,843 篇 教育学
  • 6,328 篇 经济学
  • 5,724 篇 农学
  • 1,693 篇 文学
  • 885 篇 军事学
  • 643 篇 艺术学
  • 148 篇 哲学
  • 94 篇 历史学

主题

  • 27,531 篇 computer science
  • 19,620 篇 application soft...
  • 14,863 篇 software
  • 10,741 篇 computational mo...
  • 10,134 篇 computer archite...
  • 10,092 篇 software enginee...
  • 9,645 篇 hardware
  • 6,393 篇 costs
  • 6,380 篇 parallel process...
  • 6,181 篇 feature extracti...
  • 5,707 篇 testing
  • 5,656 篇 data mining
  • 5,599 篇 deep learning
  • 5,397 篇 educational inst...
  • 5,306 篇 algorithm design...
  • 5,247 篇 training
  • 5,116 篇 protocols
  • 5,106 篇 semantics
  • 4,963 篇 machine learning
  • 4,714 篇 concurrent compu...

机构

  • 3,537 篇 nanjing univ sta...
  • 2,513 篇 shenzhen univ co...
  • 1,605 篇 state key labora...
  • 1,571 篇 university of ch...
  • 1,355 篇 nanjing univ inf...
  • 1,178 篇 college of compu...
  • 1,173 篇 tsinghua univ sc...
  • 1,075 篇 department of co...
  • 1,071 篇 univ chinese aca...
  • 987 篇 chinese acad sci...
  • 968 篇 dalian univ tech...
  • 959 篇 norwegian univer...
  • 899 篇 chinese acad sci...
  • 853 篇 univ elect sci &...
  • 744 篇 shandong univ sc...
  • 735 篇 school of softwa...
  • 711 篇 beihang univ sta...
  • 700 篇 school of inform...
  • 667 篇 university of sc...
  • 641 篇 school of comput...

作者

  • 661 篇 wang wei
  • 465 篇 wang lei
  • 407 篇 liu yang
  • 381 篇 zhang lei
  • 323 篇 li li
  • 315 篇 yang yang
  • 278 篇 liu jie
  • 275 篇 liu wei
  • 273 篇 wang hao
  • 242 篇 zhang wei
  • 214 篇 chen chen
  • 210 篇 li bo
  • 207 篇 wang jian
  • 204 篇 gao yang
  • 199 篇 yin baocai
  • 197 篇 shen linlin
  • 193 篇 wang tao
  • 182 篇 wang qing
  • 177 篇 leung victor c. ...
  • 175 篇 li yang

语言

  • 463,015 篇 英文
  • 10,670 篇 其他
  • 6,700 篇 中文
  • 854 篇 日文
  • 349 篇 德文
  • 153 篇 法文
  • 61 篇 俄文
  • 56 篇 朝鲜文
  • 43 篇 西班牙文
  • 26 篇 意大利文
  • 20 篇 葡萄牙文
  • 12 篇 荷兰文
  • 10 篇 土耳其文
  • 7 篇 斯洛文尼亚文
  • 6 篇 波兰文
  • 6 篇 乌克兰文
  • 4 篇 阿拉伯文
  • 1 篇 拉托维亚文(列托)
检索条件"机构=(Laboratory of Parallel Software and Computational Science)"
481774 条 记 录,以下是411-420 订阅
排序:
Multi-Task Visual Semantic Embedding Network for Image-Text Retrieval
收藏 引用
Journal of Computer science & Technology 2024年 第4期39卷 811-826页
作者: Xue-Yang Qin Li-Shuang Li Jing-Yao Tang Fei Hao Mei-Ling Ge Guang-Yao Pang School of Computer Science and Technology Dalian University of TechnologyDalian 116024China School of Computer Science Shaanxi Normal UniversityXi’an 710119China School of Computer Engineering Weifang UniversityWeifang 261061China Guangxi Colleges and Universities Key Laboratory of Intelligent Industry Software Wuzhou UniversityWuzhou 543002 China
Image-text retrieval aims to capture the semantic correspondence between images and texts,which serves as a foundation and crucial component in multi-modal recommendations,search systems,and online *** mainstream meth... 详细信息
来源: 评论
Organoids revealed:morphological analysis of the profound next generation in-vitro model with artificial intelligence
收藏 引用
Bio-Design and Manufacturing 2023年 第3期6卷 319-339页
作者: Xuan Du Zaozao Chen Qiwei Li Sheng Yang Lincao Jiang Yi Yang Yanhui Li Zhongze Gu State Key Laboratory of Bioelectronics School of Biological Science and Medical EngineeringSoutheast UniversityNanjing 210096China State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210008China Key Laboratory of Environmental Medicine Engineering Ministry of EducationSchool of Public HealthSoutheast UniversityNanjing 210009China
In modern terminology,“organoids”refer to cells that grow in a specific three-dimensional(3D)environment in vitro,sharing similar structures with their source organs or *** themorphology or growth characteristics of... 详细信息
来源: 评论
Pressure-induced phase transition in transition metal trifluorides
收藏 引用
Chinese Physics B 2022年 第10期31卷 102-106页
作者: Peng Liu Meiling Xu Jian Lv Pengyue Gao Chengxi Huang Yinwei Li Jianyun Wang Yanchao Wang Mi Zhou State Key Laboratory of Superhard Materials&International Center for Computational Method and Software College of PhysicsJilin UniversityChangchun 130012China Laboratory of Quantum Functional Materials Design and Application School of Physics and Electronic EngineeringJiangsu Normal UniversityXuzhou 221116China MIIT Key Laboratory of Semiconductor Microstructure and Quantum Sensing Nanjing University of Science and TechnologyNanjing 210094China
As a fundamental thermodynamic variable, pressure can alter the bonding patterns and drive phase transitions leading to the creation of new high-pressure phases with exotic properties that are inaccessible at ambient ... 详细信息
来源: 评论
Bayesian Network Reconstruction and Iterative Divergence Problem Solving Method Based on Norm Minimization
收藏 引用
Computer Modeling in Engineering & sciences 2025年 第4期143卷 617-637页
作者: Kuo Li Aimin Wang Limin Wang Yuetan Zhao Xinyu Zhu Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin UniversityChangchun130012China College of Software Jilin UniversityChangchun130012China
A Bayesian network reconstruction method based on norm minimization is proposed to address the sparsity and iterative divergence issues in network reconstruction caused by noise and missing *** method achieves precise... 详细信息
来源: 评论
Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query
收藏 引用
Frontiers of Computer science 2024年 第1期18卷 187-198页
作者: Xingxin LI Youwen ZHU Rui XU Jian WANG Yushu ZHANG College of Computer Science and Technology Nanjing University of Aeronautics and AstronauticsNanjing 210016China Department of Mathematical Informatics University of TokyoTokyo 113-8654Japan Guangxi Key Laboratory of Trusted Software Guilin University of Electronic TechnologyGuilin 541004China School of Computer Science China University of GeosciencesWuhan 430074China
Secure k-Nearest Neighbor(k-NN)query aims to find k nearest data of a given query from an encrypted database in a cloud server without revealing privacy to the untrusted cloud and has wide applications in many areas,s... 详细信息
来源: 评论
MG+: Towards Efficient Context Inconsistency Detection by Minimized Link Generation
MG+: Towards Efficient Context Inconsistency Detection by Mi...
收藏 引用
作者: Chen, Chuyang Wang, Huiyan Zhang, Lingyu Xu, Chang Yu, Ping State Key Laboratory for Novel Software Technology Nanjing University Jiangsu Nanjing China School of Computer Science Nanjing University Jiangsu Nanjing China Software Institute Nanjing University Jiangsu Nanjing China
Self-adaptive applications are becoming increasingly attractive, with the ability to smartly understand their runtime environments (or contexts) and deliver adaptive services, for example, location-aware navigation or... 详细信息
来源: 评论
Unsigned Road Incidents Detection Using Improved RESNET From Driver-View Images
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第5期6卷 1203-1216页
作者: Li, Changping Wang, Bingshu Zheng, Jiangbin Zhang, Yongjun Chen, C.L. Philip Northwestern Polytechnical University School of Software Xi’an710129 China Shenzhen University Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen518060 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China South China University of Technology School of Computer Science and Engineering Guangzhou510641 China
Frequent road incidents cause significant physical harm and economic losses globally. The key to ensuring road safety lies in accurately perceiving surrounding road incidents. However, the highly dynamic nature o... 详细信息
来源: 评论
Partially-hiding functional encryption for degree-2 polynomials with fine-grained access control
收藏 引用
Frontiers of Computer science 2024年 第3期18卷 231-233页
作者: Haifeng QIAN Cheng LIN Qiaohan CHU Jie CHEN Shanghai Key Laboratory of Trustworthy Computing Software Engineering InstituteEast China Normal UniversityShanghai 200062China
1 Introduction Boneh et al.[1]first systematically introduce the concept of Functional Encryption(FE)which overcomes all-or-nothing limitation of traditional public key ***,FE hides a potential problem:even if the sec... 详细信息
来源: 评论
Decentralized Machine Learning over the Internet  41
Decentralized Machine Learning over the Internet
收藏 引用
第41届中国控制会议
作者: Duoyu Zhu Jie Peng School of Computer Science and Engineering and Guangdong Provincial Key Laboratory of Computational Science Sun Yat-Sen University
Decentralized machine learning has attracted extensive research interest in recent *** to its centralized counterpart that relies on a server to collect and disseminate messages,decentralized machine learning relies o... 详细信息
来源: 评论
Network Traffic Anomaly Detection Based on DGBi-SA Model
收藏 引用
Engineering Letters 2025年 第3期33卷 612-619页
作者: Wang, Xin Dai, Hong Huang, Zheng Han, Yue University of Science and Technology Liaoning Liaoning CO Anshan114051 China School of Computer Science and Software Engineering University of Science and Technology Liaoning Liaoning CO Anshan114051 China
Network traffic anomaly detection plays a crucial role in today's network security and performance management. In response to the challenges in current network traffic data processing, such as insufficient structu... 详细信息
来源: 评论