咨询与建议

限定检索结果

文献类型

  • 319,861 篇 会议
  • 156,548 篇 期刊文献
  • 3,758 册 图书
  • 2,841 篇 学位论文
  • 514 篇 专利
  • 141 篇 科技报告

馆藏范围

  • 483,658 篇 电子文献
  • 30 种 纸本馆藏

日期分布

学科分类号

  • 310,053 篇 工学
    • 223,427 篇 计算机科学与技术...
    • 149,140 篇 软件工程
    • 52,233 篇 电气工程
    • 44,712 篇 信息与通信工程
    • 32,248 篇 控制科学与工程
    • 27,672 篇 电子科学与技术(可...
    • 20,455 篇 机械工程
    • 16,395 篇 材料科学与工程(可...
    • 15,165 篇 化学工程与技术
    • 14,400 篇 生物工程
    • 12,469 篇 动力工程及工程热...
    • 12,088 篇 仪器科学与技术
    • 11,099 篇 生物医学工程(可授...
    • 10,725 篇 光学工程
    • 10,373 篇 力学(可授工学、理...
    • 10,031 篇 土木工程
    • 8,032 篇 建筑学
    • 6,641 篇 交通运输工程
    • 6,489 篇 安全科学与工程
  • 131,381 篇 理学
    • 65,408 篇 数学
    • 41,665 篇 物理学
    • 20,393 篇 生物学
    • 16,933 篇 化学
    • 14,237 篇 统计学(可授理学、...
    • 11,072 篇 系统科学
  • 59,351 篇 管理学
    • 40,395 篇 管理科学与工程(可...
    • 20,958 篇 图书情报与档案管...
    • 17,066 篇 工商管理
  • 16,719 篇 医学
    • 12,167 篇 临床医学
    • 8,267 篇 基础医学(可授医学...
  • 7,476 篇 法学
  • 6,863 篇 教育学
  • 6,333 篇 经济学
  • 5,753 篇 农学
  • 1,693 篇 文学
  • 887 篇 军事学
  • 646 篇 艺术学
  • 147 篇 哲学
  • 95 篇 历史学

主题

  • 27,545 篇 computer science
  • 19,620 篇 application soft...
  • 14,962 篇 software
  • 10,769 篇 computational mo...
  • 10,187 篇 software enginee...
  • 10,152 篇 computer archite...
  • 9,648 篇 hardware
  • 6,407 篇 costs
  • 6,387 篇 parallel process...
  • 6,230 篇 feature extracti...
  • 5,724 篇 testing
  • 5,692 篇 data mining
  • 5,672 篇 deep learning
  • 5,398 篇 educational inst...
  • 5,316 篇 training
  • 5,306 篇 algorithm design...
  • 5,144 篇 protocols
  • 5,125 篇 semantics
  • 5,005 篇 machine learning
  • 4,714 篇 concurrent compu...

机构

  • 3,546 篇 nanjing univ sta...
  • 2,522 篇 shenzhen univ co...
  • 1,624 篇 state key labora...
  • 1,612 篇 university of ch...
  • 1,353 篇 nanjing univ inf...
  • 1,222 篇 college of compu...
  • 1,175 篇 tsinghua univ sc...
  • 1,081 篇 department of co...
  • 1,072 篇 univ chinese aca...
  • 976 篇 chinese acad sci...
  • 960 篇 norwegian univer...
  • 956 篇 dalian univ tech...
  • 899 篇 chinese acad sci...
  • 857 篇 univ elect sci &...
  • 750 篇 shandong univ sc...
  • 740 篇 school of softwa...
  • 711 篇 school of inform...
  • 711 篇 beihang univ sta...
  • 678 篇 university of sc...
  • 647 篇 school of comput...

作者

  • 663 篇 wang wei
  • 468 篇 wang lei
  • 410 篇 liu yang
  • 387 篇 zhang lei
  • 327 篇 li li
  • 320 篇 yang yang
  • 280 篇 liu jie
  • 273 篇 wang hao
  • 269 篇 liu wei
  • 254 篇 zhang wei
  • 213 篇 chen chen
  • 212 篇 li bo
  • 210 篇 wang jian
  • 205 篇 gao yang
  • 204 篇 shen linlin
  • 199 篇 yin baocai
  • 193 篇 wang tao
  • 184 篇 wang qing
  • 179 篇 leung victor c. ...
  • 175 篇 li yang

语言

  • 460,646 篇 英文
  • 14,664 篇 其他
  • 6,867 篇 中文
  • 860 篇 日文
  • 293 篇 德文
  • 80 篇 法文
  • 65 篇 俄文
  • 59 篇 朝鲜文
  • 45 篇 西班牙文
  • 20 篇 葡萄牙文
  • 15 篇 意大利文
  • 10 篇 荷兰文
  • 10 篇 土耳其文
  • 8 篇 阿拉伯文
  • 8 篇 斯洛文尼亚文
  • 6 篇 乌克兰文
  • 1 篇 拉托维亚文(列托)
  • 1 篇 波兰文
检索条件"机构=(Laboratory of Parallel Software and Computational Science)"
483663 条 记 录,以下是4231-4240 订阅
排序:
BCT: An Efficient and Fault Tolerance Blockchain Consensus Transform Mechanism for IoT
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2023年 第14期10卷 12055-12065页
作者: Fu, Jintian Zhang, Lupeng Wang, Leixin Li, Fengqi Dalian Univ Technol Key Lab Ubiquitous Network & Serv Software Liaonin Dalian 116620 Peoples R China Dalian Univ Technol Sch Software Technol Dalian 116620 Peoples R China Dalian Jiaotong Univ Software Inst Dalian 116028 Peoples R China
With the vigorous development of 5G communication technology, massive Internet of Things (IoT) devices generate data incrementally. Different data owners control different private domains of the IoT through edge devic... 详细信息
来源: 评论
Application of Physical Unclonable Function for Lightweight Authentication in Internet of Things
收藏 引用
Computers, Materials & Continua 2023年 第4期75卷 1901-1918页
作者: Ahmad O.Aseeri Sajjad Hussain Chauhdary Mohammed Saeed Alkatheiri Mohammed A.Alqarni Yu Zhuang Department of Computer Science College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAl-Kharj11942Saudi Arabia Department of Computer Science and Artificial Intelligence College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Cybersecurity College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Software Engineering College of Computer Science and EngineeringUniversity of JeddahJeddahSaudi Arabia Department of Computer Science Texas Tech UniversityLubbockUSA
IoT devices rely on authentication mechanisms to render secure message *** data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT *** ... 详细信息
来源: 评论
Smart Healthcare Using Data-Driven Prediction of Immunization Defaulters in Expanded Program on Immunization (EPI)
收藏 引用
Computers, Materials & Continua 2021年 第1期66卷 589-602页
作者: Sadaf Qazi Muhammad Usman Azhar Mahmood Aaqif Afzaal Abbasi Muhammad Attique Yunyoung Nam Predicitive Analytics Laboratory Shaheed Zulfikar Ali Bhutto Institute of Science and TechnologyIslamabad44000Pakistan Department of Software Engineering Foundation University IslamabadIslamabad44000Pakistan Department of Software Sejong UniversitySeoul05006Korea Department of Computer Science and Engineering Soonchunhyang UniversityAsan31538Korea
Immunization is a noteworthy and proven tool for eliminating lifethreating infectious diseases,child mortality and *** Program on Immunization(EPI)is a nation-wide program in Pakistan to implement immunization activit... 详细信息
来源: 评论
A cluster of 1D quadratic chaotic map and its applications in image encryption
收藏 引用
MATHEMATICS AND COMPUTERS IN SIMULATION 2023年 204卷 89-114页
作者: Liu, Lingfeng Wang, Jie Nanchang Univ Sch Software Nanchang 330029 Peoples R China
Chaotic systems are widely used in designing encryption algorithms for their ideal dynamical performances. One-dimensional (1D) chaotic maps have the highest efficiency in implementation and have achieved great attent... 详细信息
来源: 评论
Proving Mutual Authentication Property of RCIA Protocol in RFID Based on Logic of Events
收藏 引用
Chinese Journal of Electronics 2022年 第1期31卷 79-88页
作者: ZHONG Xiaomei XIAO Meihua ZHANG Tong YANG Ke LUO Yunxian School of Software East China Jiaotong University
The increasing commercialization and massive deployment of radio frequency identification(RFID) systems has raised many security related issues which in return evokes the need of security protocols. Logic of events th... 详细信息
来源: 评论
Humanizing Machine-Generated Content: Evading AI-Text Detection through Adversarial Attack
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ying He, Ben Sun, Le University of Chinese Academy of Sciences Beijing China Chinese Information Processing Laboratory Institute of Software Chinese Academy of Sciences Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China
With the development of large language models (LLMs), detecting whether text is generated by a machine becomes increasingly challenging in the face of malicious use cases like the spread of false information, protecti... 详细信息
来源: 评论
Rigorous Simulation-based Testing for Autonomous Driving Systems – Targeting the Achilles’ Heel of Four Open Autopilots
arXiv
收藏 引用
arXiv 2024年
作者: Li, Changwen Sifakis, Joseph Yan, Rongjie Zhang, Jian Key Laboratory of System Software Chinese Academy of Sciences State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences China Univ. Grenoble Alpes CNRS Grenoble INP VERIMAG and SUSTECH RITAS France
Simulation-based testing remains the main approach for validating Autonomous Driving Systems. We propose a rigorous test method based on breaking down scenarios into simple ones, taking into account the fact that auto... 详细信息
来源: 评论
A Low-complexity DOA Estimation Method for Nested Array via Root-MUSIC  24
A Low-complexity DOA Estimation Method for Nested Array via ...
收藏 引用
8th International Conference on Electronic Information Technology and Computer Engineering, EITCE 2024
作者: Huang, Juntan Xu, Shufang College of Electrical and Power Engineering Hohai University Jiangsu Nanjing China College of Computer Science and Software Engineering Hohai University Jiangsu Nanjing China
The nested array results in a hole-free difference coarray (DCA) after virtualization, enhancing the utilization of virtual array elements. MUSIC algorithm is an algorithm with high estimation accuracy, but the angle ... 详细信息
来源: 评论
Designing Behavior Change Support Systems Targeting Blood Donation Behavior
收藏 引用
BUSINESS & INFORMATION SYSTEMS ENGINEERING 2024年 第3期66卷 299-319页
作者: Mueller, Helena M. Reuter-Oppermann, Melanie Tech Univ Darmstadt Informat Syst Software & Digital Business Darmstadt Germany
While blood is crucial for many surgeries and patient treatments worldwide, it cannot be produced artificially. Fulfilling the demand for blood products on average days is already a major challenge in countries like S... 详细信息
来源: 评论
Comparative Analysis of Two Gradient-Based Approaches to Inverse Problem of Ultrasound Tomography
Comparative Analysis of Two Gradient-Based Approaches to Inv...
收藏 引用
2024 International Conference Days on Diffraction, DD 2024
作者: Novikov, Nikita S. Shishlenin, Maxim A. Kluchinskiy, Dmitry V. Institute of Computational Mathematics and Mathematical Geophysics Novosibirsk Russia
In the article, we made a comparative analysis of gradient methods for solving the coefficient inverse problem of 2D acoustic tomography. The nonlinear inverse problem is reduced to minimizing the cost functional by t...
来源: 评论