咨询与建议

限定检索结果

文献类型

  • 318,868 篇 会议
  • 155,661 篇 期刊文献
  • 3,749 册 图书
  • 2,841 篇 学位论文
  • 514 篇 专利
  • 141 篇 科技报告

馆藏范围

  • 481,769 篇 电子文献
  • 29 种 纸本馆藏

日期分布

学科分类号

  • 308,521 篇 工学
    • 222,378 篇 计算机科学与技术...
    • 148,623 篇 软件工程
    • 52,012 篇 电气工程
    • 44,494 篇 信息与通信工程
    • 31,705 篇 控制科学与工程
    • 27,511 篇 电子科学与技术(可...
    • 20,348 篇 机械工程
    • 16,231 篇 材料科学与工程(可...
    • 15,055 篇 化学工程与技术
    • 14,371 篇 生物工程
    • 12,417 篇 动力工程及工程热...
    • 12,039 篇 仪器科学与技术
    • 11,071 篇 生物医学工程(可授...
    • 10,690 篇 光学工程
    • 10,314 篇 力学(可授工学、理...
    • 9,943 篇 土木工程
    • 7,958 篇 建筑学
    • 6,576 篇 交通运输工程
    • 6,467 篇 安全科学与工程
  • 130,893 篇 理学
    • 65,277 篇 数学
    • 41,493 篇 物理学
    • 20,332 篇 生物学
    • 16,822 篇 化学
    • 14,205 篇 统计学(可授理学、...
    • 11,055 篇 系统科学
  • 59,193 篇 管理学
    • 40,296 篇 管理科学与工程(可...
    • 20,894 篇 图书情报与档案管...
    • 17,032 篇 工商管理
  • 16,626 篇 医学
    • 12,109 篇 临床医学
    • 8,209 篇 基础医学(可授医学...
  • 7,466 篇 法学
  • 6,843 篇 教育学
  • 6,328 篇 经济学
  • 5,724 篇 农学
  • 1,693 篇 文学
  • 885 篇 军事学
  • 643 篇 艺术学
  • 148 篇 哲学
  • 94 篇 历史学

主题

  • 27,531 篇 computer science
  • 19,620 篇 application soft...
  • 14,863 篇 software
  • 10,741 篇 computational mo...
  • 10,134 篇 computer archite...
  • 10,092 篇 software enginee...
  • 9,645 篇 hardware
  • 6,393 篇 costs
  • 6,380 篇 parallel process...
  • 6,181 篇 feature extracti...
  • 5,707 篇 testing
  • 5,656 篇 data mining
  • 5,599 篇 deep learning
  • 5,397 篇 educational inst...
  • 5,306 篇 algorithm design...
  • 5,247 篇 training
  • 5,116 篇 protocols
  • 5,106 篇 semantics
  • 4,963 篇 machine learning
  • 4,714 篇 concurrent compu...

机构

  • 3,537 篇 nanjing univ sta...
  • 2,513 篇 shenzhen univ co...
  • 1,605 篇 state key labora...
  • 1,571 篇 university of ch...
  • 1,355 篇 nanjing univ inf...
  • 1,178 篇 college of compu...
  • 1,173 篇 tsinghua univ sc...
  • 1,075 篇 department of co...
  • 1,071 篇 univ chinese aca...
  • 987 篇 chinese acad sci...
  • 968 篇 dalian univ tech...
  • 959 篇 norwegian univer...
  • 899 篇 chinese acad sci...
  • 853 篇 univ elect sci &...
  • 744 篇 shandong univ sc...
  • 735 篇 school of softwa...
  • 711 篇 beihang univ sta...
  • 700 篇 school of inform...
  • 667 篇 university of sc...
  • 641 篇 school of comput...

作者

  • 661 篇 wang wei
  • 465 篇 wang lei
  • 407 篇 liu yang
  • 381 篇 zhang lei
  • 323 篇 li li
  • 315 篇 yang yang
  • 278 篇 liu jie
  • 275 篇 liu wei
  • 273 篇 wang hao
  • 242 篇 zhang wei
  • 214 篇 chen chen
  • 210 篇 li bo
  • 207 篇 wang jian
  • 204 篇 gao yang
  • 199 篇 yin baocai
  • 197 篇 shen linlin
  • 193 篇 wang tao
  • 182 篇 wang qing
  • 177 篇 leung victor c. ...
  • 175 篇 li yang

语言

  • 463,015 篇 英文
  • 10,670 篇 其他
  • 6,700 篇 中文
  • 854 篇 日文
  • 349 篇 德文
  • 153 篇 法文
  • 61 篇 俄文
  • 56 篇 朝鲜文
  • 43 篇 西班牙文
  • 26 篇 意大利文
  • 20 篇 葡萄牙文
  • 12 篇 荷兰文
  • 10 篇 土耳其文
  • 7 篇 斯洛文尼亚文
  • 6 篇 波兰文
  • 6 篇 乌克兰文
  • 4 篇 阿拉伯文
  • 1 篇 拉托维亚文(列托)
检索条件"机构=(Laboratory of Parallel Software and Computational Science)"
481774 条 记 录,以下是4571-4580 订阅
排序:
Knowledge-Graph-Based IoTs Entity Discovery Middleware for Nonsmart Sensor
收藏 引用
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS 2024年 第2期20卷 2551-2563页
作者: Zeng, Zuoying Xie, Cheng Tao, Wenbiao Zhu, Yini Cai, Hongming Yunnan Univ Sch Software Kunming 650504 Peoples R China Broadvis Engn Consultants Co Ltd Kunming 650299 Peoples R China Shanghai Jiao Tong Univ Sch Software Shanghai 200240 Peoples R China
Internet-of-Things (IoTs) entity discovery plays an important role in the Industrial IoTs, especially with the rapidly increasing and updating of IoT sensors in the industrial environment driven by the era of Industry... 详细信息
来源: 评论
Identifying Misinformation Spreaders: A Graph-Based Semi-Supervised Learning Approach
Identifying Misinformation Spreaders: A Graph-Based Semi-Sup...
收藏 引用
2022 MediaEval Workshop, MediaEval 2022
作者: Ullah, Atta Abbasi, Rabeeh Ayaz Khattak, Akmal Saeed Said, Anwar Department of Computer Science Quaid-i-Azam University Islamabad Pakistan Institute for Software Integrated Systems Department of Computer Science Vanderbilt University United States
In this paper we proposed a Graph-Based conspiracy source detection method for the MediaEval task 2022 FakeNews: Corona Virus and Conspiracies Multimedia Analysis Task. The goal of this study was to apply SOTA graph n... 详细信息
来源: 评论
A many objective based feature selection model for software defect prediction
收藏 引用
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 2024年 第19期36卷 e8153-e8153页
作者: Mao, Qi Zhang, Jingbo Zhao, Tianhao Cai, Xingjuan Taiyuan Univ Sci & Technol Shanxi Key Lab Big Data Anal & Parallel Comp Taiyuan Peoples R China Nanjing Univ State Key Lab Novel Software Technol Nanjing Peoples R China
Given the escalating magnitude and intricacy of software systems, software measurement data often contains irrelevant and redundant features, resulting in significant resource and storage requirements for software def... 详细信息
来源: 评论
A 3D Designed Portable Programmable Device Using Gas Sensors for Air Quality Checking and Predicting the Concentration of Oxygen in Coal Mining Areas  5th
A 3D Designed Portable Programmable Device Using Gas Sensors...
收藏 引用
5th International Conference on Soft Computing and Signal Processing, ICSCSP 2022
作者: Aslamiya, M. Saleena, T.S. Haque, A. K. M. Bahalul Ilyas, P. Muhamed Department of Computer Science Al Jamia Arts and Science College Perinthalmanna India Department of Computer Science Sullamussalam Science College Areekode India Software Engineering LENS LUT University Lappeenranta Finland Sullamussalam Science College Areekode673639 India
Air pollution has become one of the most dreadful threats to the whole living thing. There are numerous global researches giving lots of attention to the impact of air pollution on health and the environment. One of t... 详细信息
来源: 评论
GLPanoDepth: Global-to-Local Panoramic Depth Estimation
收藏 引用
IEEE TRANSACTIONS ON IMAGE PROCESSING 2024年 33卷 2936-2949页
作者: Bai, Jiayang Qin, Haoyu Lai, Shuichang Guo, Jie Guo, Yanwen Nanjing Univ State Key Lab Novel Software Technol Nanjing 210023 Peoples R China
Depth estimation is a fundamental task in many vision applications. With the popularity of omnidirectional cameras, it becomes a new trend to tackle this problem in the spherical space. In this paper, we propose a lea... 详细信息
来源: 评论
computational study and validation of a novel passive hand tremor attenuator
收藏 引用
Journal of Medical Engineering and Technology 2023年 第3期47卷 157-164页
作者: Shah, Manthan Goode, Dylan Mohammadi, Hadi The Heart Valve Performance Laboratory School of Engineering Faculty of Applied Science University of British Columbia Kelowna Canada
Tremors are a prevalent movement disorder due to a nervous system condition that leads to involuntary muscle movements observed in patients. This paper converts the tremorous anatomical human arm model to a single deg... 详细信息
来源: 评论
ACRL-10K: A Dataset for Air Conditioner Refrigerant Leak Smoke Detection
ACRL-10K: A Dataset for Air Conditioner Refrigerant Leak Smo...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Jiang, Yuhan Wang, Zhongyuan Hua, Jie Liang, Jinbi Xu, Zengmin National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin China
In this paper, we introduce a new dataset for air conditioner refrigerant leak smoke detection, called ACRL-10K. The dataset is designed to develop algorithms for detecting refrigerant leak smoke faults during air con... 详细信息
来源: 评论
DGPrompt: Dual-guidance prompts generation for vision-language models
收藏 引用
NEURAL NETWORKS 2025年 188卷
作者: Zheng, Tai Chen, Zhen-Duo Zhang, Zi-Chao Ma, Zhen-Xiang Zhao, Li-Jun Zhang, Chong-Yu Luo, Xin Xu, Xin-Shun Shandong Univ Sch Software 1500 Shunhua Rd Jinan 250101 Peoples R China
Introducing learnable prompts into CLIP and fine-tuning them have demonstrated excellent performance across many downstream tasks. However, existing methods have insufficient interaction between modalities and neglect... 详细信息
来源: 评论
Secret Sharing Based Key Agreement Protocol for Body Area Networks  18th
Secret Sharing Based Key Agreement Protocol for Body Area N...
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Sheng, Weihong Cai, Bin Hu, Chunqiang Li, Ruinian School of Big Data and Software Engineering Chongqing University Chongqing China Computer Science Department Bowling Green State University Bowling Green United States
In order to provide more comprehensive medical services and personalized health monitoring according to individual needs, Body Area Networks (BANs) have been extensively studied by many researchers. As BANs involve th... 详细信息
来源: 评论
Secure Searchable Encryption Based on Local Differential Privacy  10
Secure Searchable Encryption Based on Local Differential Pri...
收藏 引用
10th International Symposium on System Security, Safety, and Reliability, ISSSR 2024
作者: Liang, Xiaoyan He, Jingsha Zhu, Nafei Beijing University of Technology School of Software Beijing China Software Technology and Network Security Lab Beijing China
In the cloud server, ranked searchable encryption allows the cloud server to search for the first k most relevant documents based on the correlation scores between the query keyword and the document. OPE (Orderpreserv... 详细信息
来源: 评论