咨询与建议

限定检索结果

文献类型

  • 5,051 篇 期刊文献
  • 1,219 篇 会议
  • 15 册 图书

馆藏范围

  • 6,285 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,165 篇 理学
    • 2,362 篇 物理学
    • 1,049 篇 数学
    • 1,037 篇 地球物理学
    • 656 篇 生物学
    • 512 篇 化学
    • 462 篇 统计学(可授理学、...
  • 3,706 篇 工学
    • 1,669 篇 计算机科学与技术...
    • 1,346 篇 软件工程
    • 708 篇 电子科学与技术(可...
    • 693 篇 电气工程
    • 639 篇 信息与通信工程
    • 518 篇 光学工程
    • 447 篇 生物工程
    • 423 篇 仪器科学与技术
    • 388 篇 生物医学工程(可授...
    • 373 篇 化学工程与技术
    • 260 篇 控制科学与工程
    • 251 篇 材料科学与工程(可...
    • 176 篇 动力工程及工程热...
    • 161 篇 机械工程
    • 158 篇 力学(可授工学、理...
    • 148 篇 核科学与技术
    • 147 篇 航空宇航科学与技...
  • 654 篇 管理学
    • 347 篇 管理科学与工程(可...
    • 287 篇 图书情报与档案管...
    • 188 篇 工商管理
  • 476 篇 医学
    • 368 篇 临床医学
    • 286 篇 基础医学(可授医学...
    • 151 篇 药学(可授医学、理...
    • 146 篇 公共卫生与预防医...
  • 132 篇 农学
  • 109 篇 法学
  • 74 篇 经济学
  • 53 篇 教育学
  • 15 篇 文学
  • 7 篇 艺术学
  • 6 篇 军事学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 173 篇 galaxies
  • 107 篇 deep learning
  • 100 篇 hadron colliders
  • 99 篇 hadrons
  • 98 篇 machine learning
  • 88 篇 cosmology
  • 87 篇 supernovae
  • 75 篇 surveys
  • 66 篇 stars
  • 60 篇 polarization
  • 54 篇 gamma rays
  • 49 篇 hadronic decays
  • 45 篇 artificial intel...
  • 42 篇 bottom mesons
  • 41 篇 relativistic hea...
  • 38 篇 forecasting
  • 36 篇 cosmological par...
  • 36 篇 branching fracti...
  • 35 篇 dark energy
  • 34 篇 particle decays

机构

  • 434 篇 department of ph...
  • 389 篇 iccub universita...
  • 329 篇 cavendish labora...
  • 325 篇 oliver lodge lab...
  • 322 篇 horia hulubei na...
  • 319 篇 physikalisches i...
  • 314 篇 h.h. wills physi...
  • 303 篇 van swinderen in...
  • 296 篇 department of ph...
  • 295 篇 nikhef national ...
  • 293 篇 school of physic...
  • 291 篇 center for high ...
  • 290 篇 university of ch...
  • 289 篇 school of physic...
  • 289 篇 physik-institut ...
  • 288 篇 imperial college...
  • 285 篇 stfc rutherford ...
  • 284 篇 institute of par...
  • 280 篇 henryk niewodnic...
  • 279 篇 school of physic...

作者

  • 226 篇 beiter a.
  • 209 篇 barter w.
  • 199 篇 bellee v.
  • 191 篇 casse g.
  • 187 篇 bowcock t.j.v.
  • 174 篇 blake t.
  • 169 篇 brundu d.
  • 164 篇 borsato m.
  • 160 篇 betancourt c.
  • 151 篇 bediaga i.
  • 148 篇 amato s.
  • 148 篇 boettcher t.
  • 144 篇 baryshnikov f.
  • 144 篇 braun s.
  • 144 篇 borisyak m.
  • 142 篇 bizzeti a.
  • 140 篇 bencivenni g.
  • 140 篇 cattaneo m.
  • 138 篇 bursche a.
  • 136 篇 back j.j.

语言

  • 5,907 篇 英文
  • 332 篇 其他
  • 35 篇 中文
  • 10 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"机构=1Department of Computer Science and Data Science Research Center"
6285 条 记 录,以下是1-10 订阅
排序:
Soft-GNN:towards robust graph neural networks via self-adaptive data utilization
收藏 引用
Frontiers of computer science 2025年 第4期19卷 1-12页
作者: Yao WU Hong HUANG Yu SONG Hai JIN National Engineering Research Center for Big Data Technology and System Service Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China College of Information and Communication National University of Defense TechnologyWuhan 430019China Department of Computer Science and Operations Research Universitéde MontréalMontreal H3C 3J7Canada
Graph neural networks(GNNs)have gained traction and have been applied to various graph-based data analysis tasks due to their high ***,a major concern is their robustness,particularly when faced with graph data that h... 详细信息
来源: 评论
MOCBOA:Multi-Objective Chef-Based Optimization Algorithm Using Hybrid Dominance Relations for Solving Engineering Design Problems
收藏 引用
computer Modeling in Engineering & sciences 2025年 第4期143卷 967-1008页
作者: Nour Elhouda Chalabi Abdelouahab Attia Abdulaziz S.Almazyad Ali Wagdy Mohamed Frank Werner Pradeep Jangir Mohammad Shokouhifar Computer Science Department University of M’silaIchebiliaM’sila28000Algeria Computer ScienceDepartment Mohamed El Bachir El IbrahimiUniversity of Bordj BouArreridjBordj BouArreridj34000Algeria Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia Operations Research Department Faculty of Graduate Studies for Statistical ResearchCairo UniversityGiza12613Egypt Applied Science Research Center Applied Science Private UniversityAmman11931Jordan Faculty of Mathematics Otto-von-Guericke UniversityMagdeburg39016Germany University Centre for Research and Development Chandigarh UniversityMohali140413India Department of Electrical and Computer Engineering Shahid Beheshti UniversityTehran14399Iran DTU AI and Data Science Hub(DAIDASH) Duy Tan UniversityDa Nang550000Vietnam
Multi-objective optimization is critical for problem-solving in engineering,economics,and *** study introduces the Multi-Objective Chef-Based Optimization Algorithm(MOCBOA),an upgraded version of the Chef-Based Optimi... 详细信息
来源: 评论
Gupacker: Generalized Unpacking Framework for Android Malware
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4338-4352页
作者: Zheng, Tao Hou, Qiyu Chen, Xingshu Ren, Hao Li, Meng Li, Hongwei Shen, Changxiang Sichuan University School of Cyber Science and Engineering Chengdu610065 China Sichuan University School of Cyber Science and Engineering Cyber Science Research Institute Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data Ministry of Education Intelligent Interconnected Systems Laboratory of Anhui Province School of Computer Science and Information Engineering Hefei230002 China University of Padua Department of Mathematics HIT Center Padua35131 Italy University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Sichuan University Cyber Science Research Institute Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China
Android malware authors often use packers to evade analysis. Although many unpacking tools have been proposed, they face two significant challenges: 1) They are easily impeded by anti-analysis techniques employed by p... 详细信息
来源: 评论
Network intrusion detection based on feature fusion of attack dimension
收藏 引用
Journal of Supercomputing 2025年 第6期81卷 1-33页
作者: Sun, Xiaolong Gu, Zhengyao Zhang, Hao Gu, Jason Liu, Yanhua Dong, Chen Ye, Junwei College of Computer and Data Science Fuzhou University Fuzhou350116 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350116 China Engineering Research Center of Big Data Intelligence Chinese Ministry of Education Fuzhou350116 China Department of Electrical and Computer Engineering Dalhousie University HalifaxNSB3J 1Z1 Canada
Network traffic anomaly detection involves the rapid identification of intrusions within a network through the detection, analysis, and classification of network traffic data. The variety of cyberattacks encompasses d... 详细信息
来源: 评论
A Lightweight Authentication Protocol for RFID-Assisted Supply Chain Management System
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 12845-12852页
作者: Tariq, Tayyaba Kuo, Wen-Chung Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Alenazi, Mohammed J. F. National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Department of Computer Science and Information Engineering Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Korea University College of Informatics Department of Computer Science and Engineering Seoul02841 Korea Republic of King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11451 Saudi Arabia
In the evolving landscape of supply chain management, the integration of radio-frequency identification (RFID) technology has marked a significant milestone. This development has led to the emergence of a new system i... 详细信息
来源: 评论
Modeling Local Demand for Mobile Spectrum: An Interpretable Machine Learning Approach
IEEE Open Journal of the Communications Society
收藏 引用
IEEE Open Journal of the Communications Society 2025年 6卷 4063-4082页
作者: Parekh, Janaki Yackoboski, Elizabeth Ghasemi, Amir Yanikomeroglu, Halim Communications Research Centre Canada Department of Data Science OttawaONK2H 8S2 Canada Carleton University Department of Systems and Computer Engineering OttawaONK1S 5B6 Canada
With the expansion of 5G networks and the ongoing development of future 6G networks, the demand for mobile spectrum is expected to continue to grow, particularly at a local level. In response, spectrum regulators glob... 详细信息
来源: 评论
Encrypting Images Using the Sum of Functions of a Real Variable
收藏 引用
IEEE Access 2025年 13卷 70872-70881页
作者: Avramenko, Viktor V. Watada, Junzo Bondarenko, Mykyta O. Kalashnykova, Nataliya Hasan, Mohd Hilmi Department of Computer Science Sumy40007 Ukraine Shimonoseki City University Department of Data Science Yamaguchi Shimonoseki751-8510 Japan Waseda University IPS Research Center Shinjuku City169-8050 Japan Department of Physics and Mathematics Nuevo León San Nicolás de los Garza66455 Mexico Universiti Teknologi PETRONAS Department of Computer and Information Sciences Seri Iskandar32610 Malaysia
A combined cryptosystem with symmetric keys for encrypting messages is proposed. Its unique feature is the use of functions of a real variable as keys instead of natural numbers. Eight key functions correspond to the ... 详细信息
来源: 评论
On Error-Based Step Size Control for Discontinuous Galerkin Methods for Compressible Fluid Dynamics
收藏 引用
应用数学与计算数学学报 2025年 第1期7卷 3-39页
作者: Hendrik Ranocha Andrew R.Winters Hugo Guillermo Castro Lisandro Dalcin Michael Schlottke-Lakemper Gregor J.Gassner Matteo Parsani Applied Mathematics University of HamburgBundesstr.5520146 HamburgGermany Department of Mathematics Applied Mathematics Linköping UniversityLinköpingSweden Extreme Computing Research Center(ECRC) Computer Electrical and Mathematical Science and Engineering Division(CEMSE)King Abdullah University of Science and Technology(KAUST)Thuwal 23955-6900Saudi Arabia Applied and Computational Mathematics RWTH Aachen UniversityAachenGermany High-Performance Computing Center Stuttgart University of StuttgartStuttgartGermany Department of Mathematics and Computer Science University of CologneCologneGermany Center for Data and Simulation Science University of CologneCologneGermany Extreme Computing Research Center(ECRC) Computer Electrical and Mathematical Science and Engineering Division(CEMSE)King Abdullah University of Science and Technology(KAUST)Thuwal 23955-6900Saudi Arabia Physical Science and Engineering Division(PSE) King Abdullah University of Science and Technology(KAUST)Thuwal 23955-6900Saudi Arabia
We study a temporal step size control of explicit Runge-Kutta(RK)methods for com-pressible computational fluid dynamics(CFD),including the Navier-Stokes equations and hyperbolic systems of conservation laws such as th... 详细信息
来源: 评论
Seer: Accelerating Block chain Transaction Execution by Fine-Grained Branch Prediction  51st
Seer: Accelerating Block chain Transaction Execution by Fine...
收藏 引用
51st International Conference on Very Large data Bases, VLDB 2025
作者: Zhang, Shijie Cheng, Ru Liu, Xinpeng Xiao, Jiang Jin, Hai Li, Bo National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong
Increasingly popular decentralized applications (dApps) with complex application logic incur significant overhead for executing smart contract transactions, which greatly limits public block chain performance. Pre-exe...
来源: 评论
Advancements in Liver Tumor Detection:A Comprehensive Review of Various Deep Learning Models
收藏 引用
computer Modeling in Engineering & sciences 2025年 第1期142卷 91-122页
作者: Shanmugasundaram Hariharan D.Anandan Murugaperumal Krishnamoorthy Vinay Kukreja Nitin Goyal Shih-Yu Chen Deptartment of Artificial Intelligence and Data Science Vardhaman College of EngineeringHyderabad501218India Deptartment of CSE V.S.B College of EngineeringKarur639111India Deptartment of Electrical and Electronics Engineering Vardhaman College of EngineeringHyderabad501218India Centre for Research Impact&Outcome Chitkara UniversityRajpura140401PunjabIndia Department of Computer Science and Engineering School of Engineering and TechnologyCentral University of HaryanaMahendergarh123031HaryanaIndia Department of Computer Science and Information Engineering National Yunlin University of Science and TechnologyYunlin64002Taiwan Intelligence Recognition Industry Service Research Center National Yunlin University of Science and TechnologyYunlin64002Taiwan
Liver cancer remains a leading cause of mortality worldwide,and precise diagnostic tools are essential for effective treatment *** Tumors(LTs)vary significantly in size,shape,and location,and can present with tissues ... 详细信息
来源: 评论