咨询与建议

限定检索结果

文献类型

  • 21,659 篇 会议
  • 19,842 篇 期刊文献
  • 235 册 图书

馆藏范围

  • 41,736 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 25,446 篇 工学
    • 15,243 篇 计算机科学与技术...
    • 12,235 篇 软件工程
    • 4,943 篇 信息与通信工程
    • 3,681 篇 电子科学与技术(可...
    • 3,467 篇 电气工程
    • 3,012 篇 控制科学与工程
    • 2,891 篇 生物工程
    • 2,848 篇 光学工程
    • 2,293 篇 生物医学工程(可授...
    • 1,847 篇 化学工程与技术
    • 1,768 篇 机械工程
    • 1,532 篇 材料科学与工程(可...
    • 1,500 篇 仪器科学与技术
    • 1,112 篇 动力工程及工程热...
    • 792 篇 力学(可授工学、理...
  • 17,255 篇 理学
    • 8,058 篇 物理学
    • 6,719 篇 数学
    • 3,392 篇 生物学
    • 2,329 篇 统计学(可授理学、...
    • 2,100 篇 化学
    • 1,243 篇 系统科学
    • 910 篇 地球物理学
  • 5,944 篇 管理学
    • 3,589 篇 管理科学与工程(可...
    • 2,508 篇 图书情报与档案管...
    • 1,440 篇 工商管理
  • 2,234 篇 医学
    • 1,843 篇 临床医学
    • 1,494 篇 基础医学(可授医学...
    • 938 篇 药学(可授医学、理...
    • 670 篇 公共卫生与预防医...
  • 943 篇 法学
    • 757 篇 社会学
  • 575 篇 农学
  • 518 篇 经济学
  • 461 篇 教育学
  • 168 篇 文学
  • 92 篇 军事学
  • 79 篇 艺术学
  • 8 篇 历史学
  • 7 篇 哲学

主题

  • 982 篇 computer science
  • 707 篇 feature extracti...
  • 692 篇 deep learning
  • 545 篇 computational mo...
  • 534 篇 training
  • 518 篇 machine learning
  • 460 篇 semantics
  • 442 篇 accuracy
  • 287 篇 data mining
  • 275 篇 support vector m...
  • 261 篇 data models
  • 246 篇 image segmentati...
  • 244 篇 internet of thin...
  • 228 篇 artificial intel...
  • 220 篇 computer archite...
  • 217 篇 reinforcement le...
  • 215 篇 predictive model...
  • 211 篇 routing
  • 206 篇 optimization
  • 205 篇 neural networks

机构

  • 1,080 篇 cavendish labora...
  • 1,008 篇 department of ph...
  • 959 篇 oliver lodge lab...
  • 951 篇 physikalisches i...
  • 788 篇 university of ch...
  • 609 篇 infn laboratori ...
  • 596 篇 infn sezione di ...
  • 571 篇 infn sezione di ...
  • 556 篇 fakultät physik ...
  • 551 篇 school of physic...
  • 551 篇 infn sezione di ...
  • 518 篇 horia hulubei na...
  • 506 篇 school of physic...
  • 503 篇 iccub universita...
  • 494 篇 department of ph...
  • 493 篇 imperial college...
  • 487 篇 h.h. wills physi...
  • 485 篇 center for high ...
  • 482 篇 nikhef national ...
  • 479 篇 stfc rutherford ...

作者

  • 254 篇 beiter a.
  • 252 篇 barter w.
  • 251 篇 a. gomes
  • 243 篇 bellee v.
  • 235 篇 c. alexa
  • 232 篇 j. m. izen
  • 230 篇 s. chen
  • 226 篇 c. amelung
  • 225 篇 g. bella
  • 225 篇 j. strandberg
  • 225 篇 d. calvet
  • 218 篇 g. spigo
  • 217 篇 j. wang
  • 216 篇 f. siegert
  • 215 篇 bowcock t.j.v.
  • 214 篇 brundu d.
  • 214 篇 blake t.
  • 208 篇 amato s.
  • 207 篇 r. ströhmer
  • 204 篇 betancourt c.

语言

  • 39,677 篇 英文
  • 1,367 篇 其他
  • 664 篇 中文
  • 34 篇 日文
  • 5 篇 德文
  • 5 篇 俄文
  • 4 篇 法文
  • 3 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Center of Computer Science and Technology"
41736 条 记 录,以下是21-30 订阅
排序:
Event-triggered tracking control for a class of nonholonomic systems in chained form
收藏 引用
science China(Information sciences) 2023年 第7期66卷 147-161页
作者: Liang XU Youfeng SU He CAI Center for Discrete Mathematics and Theoretical Computer Science Fuzhou University College of Computer and Data Science Fuzhou University School of Automation Science and Engineering South China University of Technology
In this study, the event-triggered asymptotic tracking control problem is considered for a class of nonholonomic systems in chained form for the time-varying reference input. First, to eliminate the ripple phenomenon ... 详细信息
来源: 评论
Towards Privacy in Decentralized IoT:A Blockchain-Based Dual Response DP Mechanism
收藏 引用
Big Data Mining and Analytics 2024年 第3期7卷 699-717页
作者: Kai Zhang Pei-Wei Tsai Jiao Tian Wenyu Zhao Xinyi Cai Longxiang Gao Jinjun Chen Department of Computing Technologies Swinburne University of TechnologyMelbourne 3122Australia School of Computer Science and Technology Xinjiang UniversityUrumchi 830000China Shandong Computer Science Center(National Supercomputer Center in Jinan) Qilu University of Technology(Shandong Academy of Sciences)Jinan 250000China
Differential Privacy(DP)stands as a secure and efficient mechanism for privacy preservation,offering enhanced data utility without compromising computational *** adaptability is evidenced by its integration into block... 详细信息
来源: 评论
Answering reachability queries with ordered label constraints over labeled graphs
收藏 引用
Frontiers of computer science 2024年 第1期18卷 105-117页
作者: Daoliang HE Pingpeng YUAN Hai JIN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science&TechnologyHuazhong University of Science and TechnologyWuhan 430074China
Reachability query plays a vital role in many graph analysis *** researches proposed many methods to efficiently answer reachability queries between vertex *** many real graphs are labeled graph,it highly demands Labe... 详细信息
来源: 评论
Learning continuous network emerging dynamics from scarce observations via data-adaptive stochastic processes
收藏 引用
science China(Information sciences) 2024年 第12期67卷 240-255页
作者: Jiaxu CUI Qipeng WANG Bingyi SUN Jiming LIU Bo YANG College of Computer Science and Technology Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Public Computer Education and Research Center Jilin University Department of Computer Science Hong Kong Baptist University
Learning network dynamics from the empirical structure and spatio-temporal observation data is crucial to revealing the interaction mechanisms of complex networks in a wide range of domains. However,most existing meth... 详细信息
来源: 评论
A Generative Image Steganography Based on Disentangled Attribute Feature Transformation and Invertible Mapping Rule
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1149-1171页
作者: Xiang Zhang Shenyan Han Wenbin Huang Daoyong Fu School of Computer Science Nanjing University of Information Science and TechnologyNanjing210044China Engineering Research Center of Digital Forensics Nanjing University of Information Science and TechnologyMinistry of EducationNanjing210044China
Generative image steganography is a technique that directly generates stego images from secret *** traditional methods,it theoretically resists steganalysis because there is no cover ***,the existing generative image ... 详细信息
来源: 评论
Mode Competition of Low Voltage Backward Wave Oscillator near 500 GHz with Parallel Multi-Beam
收藏 引用
Chinese Journal of Electronics 2024年 第2期33卷 488-495页
作者: Xiaoyan ZHAO Jincheng HU Haoran ZHANG Sidou GUO Yuming FENG Lin TANG Kaichun ZHANG Diwei LIU THz Center School of Electronic Science and Engineering University of Electronic Science and Technology of China School of Computer Science Southwest Petroleum University
A backward wave oscillator with parallel multiple beams and multi-pin slow-wave structure(SWS)operating at the frequency above 500 GHz is studied. Both the cold-cavity dispersion characteristics and CST Particle Studi... 详细信息
来源: 评论
A State-Migration Particle Swarm Optimizer for Adaptive Latent Factor Analysis of High-Dimensional and Incomplete Data
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第11期11卷 2220-2235页
作者: Jiufang Chen Kechen Liu Xin Luo Ye Yuan Khaled Sedraoui Yusuf Al-Turki MengChu Zhou IEEE the College of Computer Science and Technology Chongqing University of Posts and Telecommunications the Department of Computer Science Columbia University the College of Computer and Information Science Southwest University the Department of Electrical and Computer Engineering Faculty of Engineeringand also with K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University the Center of Research Excellence in Renewable Energy and Power Systems the Department of Electrical and Computer EngineeringFaculty of Engineeringand also with K.A.CARE Energy Research and Innovation CenterKing Abdulaziz University the Department of Electrical and Computer Engineering New Jersey Institute of Technology
High-dimensional and incomplete(HDI) matrices are primarily generated in all kinds of big-data-related practical applications. A latent factor analysis(LFA) model is capable of conducting efficient representation lear... 详细信息
来源: 评论
Towards real-time ML-based DDoS detection via cost-efficient window-based feature extraction
收藏 引用
science China(Information sciences) 2023年 第5期66卷 114-129页
作者: Haibin LI Yi ZHAO Wenbing YAO Ke XU Qi LI Department of Computer Science and Technology Tsinghua University Beijing National Research Center for Information Science and Technology (BNRist) Institute for Network Sciences and Cyberspace Tsinghua University
Distributed denial of service(DDoS) detection is still an open and challenging problem. In particular, sophisticated attacks, e.g., attacks that disguise attack packets as benign traffic always appear, which can easil... 详细信息
来源: 评论
rafPS:A shapley-based visual analytics approach to interpret traffic
收藏 引用
Computational Visual Media 2024年 第6期10卷 1101-1119页
作者: Zezheng Feng Yifan Jiang Hongjun Wang Zipei Fan Yuxin Ma Shuang-Hua Yang Huamin Qu Xuan Song Department of Computer Science and Engineering Southern University of Science and TechnologyShenzhen 18055China Department of Computer Science and Engineering Hong Kong University of Science and TechnologyHong KongChina Department of Computer Science University of ReadingBerkshire RG66AHUK Center for Spatial Information Science the University of TokyoTokyo 113-00331Japan Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet Southern University of Science and TechnologyShenzhen 518055China
Recent achievements in deep learning(DL)have demonstrated its potential in predicting traffic *** predictions are beneficial for understanding the situation and making traffic control ***,most state-of-the-art DL mode... 详细信息
来源: 评论
Multi-Scale Time Series Segmentation Network Based on Eddy Current Testing for Detecting Surface Metal Defects
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第3期12卷 528-538页
作者: Xiaorui Li Xiaojuan Ban Haoran Qiao Zhaolin Yuan Hong-Ning Dai Chao Yao Yu Guo Mohammad S.Obaidat George Q.Huang the School of Intelligence Science and Technology University of Science and Technology Beijing the Beijing Advanced Innovation Center for Materials Genome Engineering the Key Laboratory of Intelligent Bionic Unmanned Systems and the Institute of Materials Intelligent Technology Liaoning Academy of Materials IEEE the Department of Computer Science Hong Kong Baptist University the School of Computer and Communication Engineering Key Laboratory of Advanced Materials and Devices for Post-Moore Chips Ministry of Education University of Science and Technology Beijing the Beijing Advanced Innovation Center for Materials Genome Engineering University of Science and Technology Beijing the School of Computer and Communication Engineering University of Science and Technology Beijing the King Abdullah Ⅱ School of Information Technology The University of Jordan the Department of Computational Intelligence the School of Computing SRM University the School of Engineering The Amity University The Hong Kong Polytechnic University
In high-risk industrial environments like nuclear power plants, precise defect identification and localization are essential for maintaining production stability and safety. However, the complexity of such a harsh env... 详细信息
来源: 评论