咨询与建议

限定检索结果

文献类型

  • 318,859 篇 会议
  • 155,373 篇 期刊文献
  • 3,753 册 图书
  • 2,841 篇 学位论文
  • 514 篇 专利
  • 141 篇 科技报告

馆藏范围

  • 481,476 篇 电子文献
  • 29 种 纸本馆藏

日期分布

学科分类号

  • 308,294 篇 工学
    • 222,297 篇 计算机科学与技术...
    • 148,536 篇 软件工程
    • 51,969 篇 电气工程
    • 44,482 篇 信息与通信工程
    • 31,683 篇 控制科学与工程
    • 27,471 篇 电子科学与技术(可...
    • 20,322 篇 机械工程
    • 16,202 篇 材料科学与工程(可...
    • 15,012 篇 化学工程与技术
    • 14,359 篇 生物工程
    • 12,384 篇 动力工程及工程热...
    • 12,024 篇 仪器科学与技术
    • 11,052 篇 生物医学工程(可授...
    • 10,655 篇 光学工程
    • 10,296 篇 力学(可授工学、理...
    • 9,916 篇 土木工程
    • 7,937 篇 建筑学
    • 6,568 篇 交通运输工程
    • 6,444 篇 安全科学与工程
  • 130,725 篇 理学
    • 65,226 篇 数学
    • 41,417 篇 物理学
    • 20,297 篇 生物学
    • 16,770 篇 化学
    • 14,187 篇 统计学(可授理学、...
    • 11,053 篇 系统科学
  • 59,141 篇 管理学
    • 40,264 篇 管理科学与工程(可...
    • 20,883 篇 图书情报与档案管...
    • 17,007 篇 工商管理
  • 16,558 篇 医学
    • 12,061 篇 临床医学
    • 8,183 篇 基础医学(可授医学...
  • 7,446 篇 法学
  • 6,819 篇 教育学
  • 6,321 篇 经济学
  • 5,722 篇 农学
  • 1,690 篇 文学
  • 885 篇 军事学
  • 641 篇 艺术学
  • 146 篇 哲学
  • 94 篇 历史学

主题

  • 27,533 篇 computer science
  • 19,620 篇 application soft...
  • 14,865 篇 software
  • 10,746 篇 computational mo...
  • 10,135 篇 computer archite...
  • 10,092 篇 software enginee...
  • 9,645 篇 hardware
  • 6,394 篇 costs
  • 6,381 篇 parallel process...
  • 6,186 篇 feature extracti...
  • 5,705 篇 testing
  • 5,661 篇 data mining
  • 5,598 篇 deep learning
  • 5,397 篇 educational inst...
  • 5,306 篇 algorithm design...
  • 5,271 篇 training
  • 5,126 篇 protocols
  • 5,108 篇 semantics
  • 4,961 篇 machine learning
  • 4,714 篇 concurrent compu...

机构

  • 3,543 篇 nanjing univ sta...
  • 2,520 篇 shenzhen univ co...
  • 1,599 篇 state key labora...
  • 1,574 篇 university of ch...
  • 1,353 篇 nanjing univ inf...
  • 1,175 篇 tsinghua univ sc...
  • 1,174 篇 college of compu...
  • 1,073 篇 department of co...
  • 1,072 篇 univ chinese aca...
  • 989 篇 chinese acad sci...
  • 967 篇 dalian univ tech...
  • 959 篇 norwegian univer...
  • 901 篇 chinese acad sci...
  • 856 篇 univ elect sci &...
  • 746 篇 shandong univ sc...
  • 735 篇 school of softwa...
  • 711 篇 beihang univ sta...
  • 696 篇 school of inform...
  • 667 篇 university of sc...
  • 639 篇 school of comput...

作者

  • 659 篇 wang wei
  • 463 篇 wang lei
  • 407 篇 liu yang
  • 381 篇 zhang lei
  • 323 篇 li li
  • 315 篇 yang yang
  • 278 篇 liu jie
  • 275 篇 liu wei
  • 273 篇 wang hao
  • 244 篇 zhang wei
  • 212 篇 chen chen
  • 210 篇 li bo
  • 207 篇 wang jian
  • 204 篇 gao yang
  • 199 篇 yin baocai
  • 197 篇 shen linlin
  • 193 篇 wang tao
  • 182 篇 wang qing
  • 177 篇 leung victor c. ...
  • 175 篇 li yang

语言

  • 462,763 篇 英文
  • 10,634 篇 其他
  • 6,700 篇 中文
  • 858 篇 日文
  • 349 篇 德文
  • 153 篇 法文
  • 61 篇 俄文
  • 56 篇 朝鲜文
  • 43 篇 西班牙文
  • 26 篇 意大利文
  • 20 篇 葡萄牙文
  • 12 篇 荷兰文
  • 10 篇 土耳其文
  • 7 篇 斯洛文尼亚文
  • 6 篇 波兰文
  • 6 篇 乌克兰文
  • 4 篇 阿拉伯文
  • 1 篇 拉托维亚文(列托)
检索条件"机构=(Laboratory of Parallel Software and Computational Science)"
481481 条 记 录,以下是4581-4590 订阅
排序:
Secure Searchable Encryption Based on Local Differential Privacy  10
Secure Searchable Encryption Based on Local Differential Pri...
收藏 引用
10th International Symposium on System Security, Safety, and Reliability, ISSSR 2024
作者: Liang, Xiaoyan He, Jingsha Zhu, Nafei Beijing University of Technology School of Software Beijing China Software Technology and Network Security Lab Beijing China
In the cloud server, ranked searchable encryption allows the cloud server to search for the first k most relevant documents based on the correlation scores between the query keyword and the document. OPE (Orderpreserv... 详细信息
来源: 评论
Optimization-Inspired Graph Neural Network for Cellular Network Optimization
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 6446-6459页
作者: He, Pengcheng Tang, Yijia Xu, Fan Shi, Qingjiang Tongji University School of Computer Science and Technology Shanghai China Shenzhen Research Institute of Big Data Shenzhen China Tongji University School of Software Engineering Shanghai China Tongji University School of Electronic and Information Engineering Shanghai China
The rapid development of wireless communications have driven the need for careful optimization of network parameters to improve network performance and reduce operational cost. Traditional methods, however, struggle w... 详细信息
来源: 评论
Detecting Spoofed Noisy Speeches via Activation-Based Residual Blocks for Embedded Systems
收藏 引用
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS 2024年 第11期43卷 3985-3996页
作者: Zhan, Jinyu Peng, Suidi Jiang, Wei Wang, Xiang Liu, Jiarui Univ Elect Sci & Technol China Sch Informat & Software Engn Chengdu Peoples R China
Spoofed noisy speeches seriously threaten the speech-based embedded systems, such as smartphones and intelligent assistants. Consequently, we present an anti-spoofing detection model with activation-based residual blo... 详细信息
来源: 评论
Heterogeneous signcryption scheme with equality test from CLC to PKI for IoV
收藏 引用
COMPUTER COMMUNICATIONS 2024年 220卷 149-159页
作者: Jin, Chunhua Qin, Wenyu Chen, Zhiwei Sun, Kaijun Chen, Guanhua Shan, Jinsong Chen, Liqing Huaiyin Inst Technol Fac Comp & Software Engn Huaian 233002 Jiangsu Peoples R China
Data confidentiality and availability in an open network environment are essential for Internet of Vehicles (IoV). Encryption technology can only ensure user privacy, but impedes the optimal use of vehicular data. As ... 详细信息
来源: 评论
Effective Cyber Threat Hunting: Where and how does it fit?  21
Effective Cyber Threat Hunting: Where and how does it fit?
收藏 引用
21st European Conference on Cyber Warfare and Security, ECCWS 2022
作者: Ntingi, Nombeko Duvenage, Petrus du Toit, Jaco von Solms, Sebastian Academy of Computer Science and Software Engineering University of Johannesburg South Africa
Traditionally threat detection in organisations is reactive through pre-defined and preconfigured rules that are embedded in automated tools such as firewalls, anti-virus software, security information and event manag... 详细信息
来源: 评论
Understanding and Remediating Open-Source License Incompatibilities in the PyPI Ecosystem
arXiv
收藏 引用
arXiv 2023年
作者: Xu, Weiwei He, Hao Gao, Kai Zhou, Minghui School of Computer Science School of Software & Microelectronics Peking University Beijing China Key Laboratory of High Confidence Software Technologies Ministry of Education China
The reuse and distribution of open-source software must be in compliance with its accompanying open-source license. In modern packaging ecosystems, maintaining such compliance is challenging because a package may have... 详细信息
来源: 评论
Tobias: A Random CNN Sees Objects
收藏 引用
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE 2024年 第2期46卷 1290-1304页
作者: Cao, Yun-Hao Wu, Jianxin Nanjing Univ State Key Lab Novel Software Technol Nanjing 210023 Peoples R China
This paper starts by revealing a surprising finding: without any learning, a randomly initialized CNN can localize objects surprisingly well. That is, a CNN has an inductive bias to naturally focus on objects, named a... 详细信息
来源: 评论
Two Stages Segmentation Algorithm of Breast Tumor in DCE-MRI Based on Multi-Scale Feature and Boundary Attention Mechanism
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 1543-1561页
作者: Bing Li Liangyu Wang Xia Liu Hongbin Fan Bo Wang Shoudi Tong School of Automation Harbin University of Science and TechnologyHarbin150080China Heilongjiang Provincial Key Laboratory of Complex Intelligent System and Integration Harbin150080China School of Computer Engineering Technology Guangdong Institute of Science and TechnologyZhuhai519090China
Nuclearmagnetic resonance imaging of breasts often presents complex *** tumors exhibit varying sizes,uneven intensity,and indistinct *** characteristics can lead to challenges such as low accuracy and incorrect segmen... 详细信息
来源: 评论
Channel exchange network model for house price prediction  2
Channel exchange network model for house price prediction
收藏 引用
2nd International Conference on Machine Learning and Intelligent Systems Engineering, MLISE 2022
作者: Li, Yuantao Zhang, Ruizhi Wang, Jie Shi, Jiahao University Of Science And Technology Of China School Of Software Engineering Hefei China
As an important indicator of economic development, house price prediction is a hot issue in the field of business and research in urban computing. However, due to a variety of influencing factors and sparse transactio... 详细信息
来源: 评论
Application of a class of density peak clustering algorithm in short-term smart grid  8
Application of a class of density peak clustering algorithm ...
收藏 引用
8th International Conference on Energy System, Electricity, and Power, ESEP 2023
作者: Wang, Chenyu Zhang, Zhao Zhu, Zhipeng Zhou, Hongyan School of Computer Science and Software Engineering University of Science and Technology Liaoning 185 Qianshanzhong Road Liaoning Anshan114051 China School of Electronic and Information Engineering University of Science and Technology Liaoning 185 Qianshanzhong Road Liaoning Anshan114051 China
The classification of short-term power load data by clustering algorithm can lay a good foundation for the subsequent power load forecasting work and provide a more efficient, safe and reliable direction for the opera... 详细信息
来源: 评论