咨询与建议

限定检索结果

文献类型

  • 994 篇 期刊文献
  • 641 篇 会议

馆藏范围

  • 1,635 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,027 篇 工学
    • 673 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 237 篇 信息与通信工程
    • 139 篇 电气工程
    • 100 篇 生物工程
    • 98 篇 电子科学与技术(可...
    • 90 篇 控制科学与工程
    • 73 篇 化学工程与技术
    • 70 篇 光学工程
    • 50 篇 仪器科学与技术
    • 49 篇 生物医学工程(可授...
    • 47 篇 机械工程
    • 47 篇 网络空间安全
    • 34 篇 材料科学与工程(可...
    • 31 篇 动力工程及工程热...
    • 29 篇 安全科学与工程
  • 619 篇 理学
    • 236 篇 数学
    • 222 篇 物理学
    • 139 篇 生物学
    • 86 篇 统计学(可授理学、...
    • 54 篇 地球物理学
    • 52 篇 化学
    • 31 篇 系统科学
  • 283 篇 管理学
    • 165 篇 图书情报与档案管...
    • 126 篇 管理科学与工程(可...
    • 45 篇 工商管理
  • 104 篇 医学
    • 72 篇 临床医学
    • 46 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 46 篇 农学
    • 27 篇 作物学
  • 40 篇 法学
  • 25 篇 经济学
  • 12 篇 文学
  • 10 篇 军事学
  • 6 篇 教育学
  • 2 篇 艺术学

主题

  • 70 篇 semantics
  • 47 篇 deep learning
  • 46 篇 feature extracti...
  • 41 篇 training
  • 39 篇 accuracy
  • 32 篇 quantum cryptogr...
  • 31 篇 computational mo...
  • 30 篇 federated learni...
  • 24 篇 privacy
  • 23 篇 neural networks
  • 20 篇 image segmentati...
  • 20 篇 forecasting
  • 20 篇 data models
  • 19 篇 graph neural net...
  • 19 篇 information retr...
  • 18 篇 generative adver...
  • 18 篇 knowledge graph
  • 18 篇 data mining
  • 16 篇 machine learning
  • 16 篇 correlation

机构

  • 204 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 71 篇 shandong provinc...
  • 63 篇 cas key laborato...
  • 63 篇 key laboratory o...
  • 51 篇 school of comput...
  • 49 篇 network and data...
  • 47 篇 tianjin key labo...
  • 46 篇 shandong enginee...
  • 43 篇 college of compu...
  • 40 篇 cas key laborato...
  • 34 篇 college of cyber...
  • 34 篇 school of comput...
  • 30 篇 cas center for e...
  • 30 篇 shaanxi key labo...
  • 29 篇 hefei national l...
  • 26 篇 anhui province k...
  • 26 篇 cas key lab of n...
  • 25 篇 school of comput...
  • 24 篇 shaanxi key labo...

作者

  • 190 篇 cheng xueqi
  • 146 篇 guo jiafeng
  • 49 篇 zhang ruqing
  • 47 篇 fan yixing
  • 43 篇 shen huawei
  • 43 篇 lan yanyan
  • 32 篇 jin xiaolong
  • 28 篇 pang liang
  • 25 篇 guo guang-can
  • 24 篇 bi keping
  • 21 篇 de rijke maarten
  • 21 篇 wang zhongmin
  • 21 篇 cao qi
  • 20 篇 chen yanping
  • 18 篇 xu jun
  • 18 篇 jie tian
  • 17 篇 xueqi cheng
  • 17 篇 chen wei
  • 16 篇 qin zhen
  • 16 篇 liu jun

语言

  • 1,493 篇 英文
  • 108 篇 其他
  • 36 篇 中文
检索条件"机构=CAS Key Laboratory of Network Data Science and Technology"
1635 条 记 录,以下是321-330 订阅
Quantum Lovász local lemma: Shearer’s bound is tight  2019
Quantum Lovász local lemma: Shearer’s bound is tight
收藏 引用
51st Annual ACM SIGACT Symposium on Theory of Computing, STOC 2019
作者: He, Kun Li, Qian Sun, Xiaoming Zhang, Jiapeng CAS Key Lab of Network Data Science and Technology Institute of Computing Technology CAS Beijing China University of Chinese Academy of Sciences Beijing China Shenzhen Institute of Computing Sciences Shenzhen University China University of California San DiegoCA United States
Lovász Local Lemma (LLL) is a very powerful tool in combinatorics and probability theory to show the possibility of avoiding all "bad" events under some "weakly dependent" condition. Over the ... 详细信息
来源: 评论
Fsh-Pc-Sce complex mediates active transcription of Cubitus interruptus (Ci)
收藏 引用
Journal of Molecular Cell Biology 2018年 第5期10卷 437-447页
作者: Xiangdong Lv Hao Chen Shuo Zhang Zhao Zhang Chenyu Pan Yuanxin Xia Jialin Fan Wenqing Wu Yi Lu Lei Zhang Hailong Wu Yun Zhao State Key Laboratory of Cell Biology CAS Center for Excellence in Molecular Cell Science Innovation Center for Cell Signaling Network Shanghai Institute of Biochemistry and Cell Biology Chinese Academy of Sciences University of Chinese Academy of Sciences Shanghai 200031 China School of Life Science and Technology ShanghaiTech University Shanghai 201210 China
The Hedgehog (Hh) signaling pathway plays important roles in both embryonic development and adult tissue homeostasis. Such biological functions are mediated by the transcription factor Cubitus interruptus (Ci). Ye... 详细信息
来源: 评论
ICTNET at Federated Web Search Track 2014  23
ICTNET at Federated Web Search Track 2014
收藏 引用
23rd Text REtrieval Conference, TREC 2014
作者: Guan, Feng Zhang, Shuiyuan Liu, Chunmei Yu, Xiaoming Liu, Yue Cheng, Xueqi Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China Key Laboratory of Web Data Science and Technology CAS China University of Chinese Academy of Sciences Beijing100190 China
来源: 评论
AUCSeg: AUC-oriented Pixel-level Long-tail Semantic Segmentation  38
AUCSeg: AUC-oriented Pixel-level Long-tail Semantic Segmenta...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Han, Boyu Xu, Qianqian Yang, Zhiyong Bao, Shilong Wen, Peisong Jiang, Yangbangyan Huang, Qingming Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China School of Computer Science and Tech. University of Chinese Academy of Sciences China Peng Cheng Laboratory China Key Laboratory of Big Data Mining and Knowledge Management CAS China
The Area Under the ROC Curve (AUC) is a well-known metric for evaluating instance-level long-tail learning problems. In the past two decades, many AUC optimization methods have been proposed to improve model performan...
来源: 评论
Correction: A scale-adaptive estimation for mixed geographically and temporally weighted regression models
收藏 引用
Journal of Geographical Systems 2025年 第2期27卷 337-337页
作者: Hong, Zhimin Wang, Zhiwen Wang, Huhu Wang, Ruoxuan Department of Mathematics School of Science Inner Mongolia University of Technology Hohhot China Statistics Inner Mongolia Key Laboratory of Statistical Analysis Theory for Life Data and Neural Network Modeling Hohhot China Institute for Infectious Disease and Endemic Disease Control Inner Mongolia Autonomous Region Center for Disease Control and Prevention Hohhot China
来源: 评论
Probabilistic Reliability via Subsystem Structures of Arrangement Graph networks
收藏 引用
IEEE Transactions on Reliability 2024年 第1期73卷 279-289页
作者: Huang, Yanze Lin, Limei Xu, Li Hsieh, Sun-Yuan Fujian University of Technology Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Computer Science and Mathematics Fuzhou350118 China Fujian Normal University College of Computer and Cyber Security Key Laboratory of Network Security and Cryptology Fuzhou350117 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr... 详细信息
来源: 评论
Exploration of Teaching Method of Students’ Independent Proposition
Exploration of Teaching Method of Students’ Independent Pro...
收藏 引用
International Conference on Guidance, Navigation and Control, ICGNC 2020
作者: Zhang, Jin Wang, Lizhi Quan, Weihong Li, Haoran Gong, Xiaoli College of Computer Science Nankai University Tianjin China College of Cyber Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China
Aiming at obsolescence and deficiencies of the question bank in the current teaching of computer major courses, we propose a teaching method of student independent proposition, which can not only enrich the question b... 详细信息
来源: 评论
Design and Implementation of Rumor Governance System Based on Blockchain  2
Design and Implementation of Rumor Governance System Based o...
收藏 引用
2nd International Conference on Computer science and Blockchain, CCSB 2022
作者: Li, Yutong Song, Jiazhen Wang, Jingrong Lu, Haori Nie, Peng College of Cyber Science Nankai University Tianjin300350 China Nankai University College of Cyber Science Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China
Nowadays, the network rumor is constantly breeding and spreading. It becomes a big difficulty to trace the source and refute the rumors with high efficiency. For this, we designed and implemented an intelligent rumor ... 详细信息
来源: 评论
Frequency-hiding order-preserving encryption with small client storage  47th
Frequency-hiding order-preserving encryption with small clie...
收藏 引用
47th International Conference on Very Large data Bases, VLDB 2021
作者: Li, Dongjie Lv, Siyi Huang, Yanyu Liu, Yijing Li, Tong Liu, Zheli Guo, Liang College of Cyber Science Nankai University China Tianjin Key Laboratory of Network and Data Security Technology Nankai University China Huawei Technology Co. Ltd Shenzhen China
The range query on encrypted databases is usually implemented using the order-preserving encryption (OPE) technique which preserves the order of plaintexts. Since the frequency leakage of plaintexts makes OPE vulnerab... 详细信息
来源: 评论
Aggregation-based dual heterogeneous task allocation in spatial crowdsourcing
收藏 引用
Frontiers of Computer science 2024年 第6期18卷 215-227页
作者: Xiaochuan LIN Kaimin WEI Zhetao LI Jinpeng CHEN Tingrui PEI College of Information Science and Technology&Cyberspace Security Jinan UniversityGuangzhou 510632China National&Local Joint Engineering Research Center of Network Security Detection and Protection Technology Guangzhou 510632China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou 510632China School of Computer Science Beijing University of Posts and TelecommunicationsBeijing 100876China
Spatial crowdsourcing(SC)is a popular data collection paradigm for numerous *** the increment of tasks and workers in SC,heterogeneity becomes an unavoidable difficulty in task *** researches only focus on the single-... 详细信息
来源: 评论