咨询与建议

限定检索结果

文献类型

  • 21,659 篇 会议
  • 19,842 篇 期刊文献
  • 235 册 图书

馆藏范围

  • 41,736 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 25,446 篇 工学
    • 15,243 篇 计算机科学与技术...
    • 12,235 篇 软件工程
    • 4,943 篇 信息与通信工程
    • 3,681 篇 电子科学与技术(可...
    • 3,467 篇 电气工程
    • 3,012 篇 控制科学与工程
    • 2,891 篇 生物工程
    • 2,848 篇 光学工程
    • 2,293 篇 生物医学工程(可授...
    • 1,847 篇 化学工程与技术
    • 1,768 篇 机械工程
    • 1,532 篇 材料科学与工程(可...
    • 1,500 篇 仪器科学与技术
    • 1,112 篇 动力工程及工程热...
    • 792 篇 力学(可授工学、理...
  • 17,255 篇 理学
    • 8,058 篇 物理学
    • 6,719 篇 数学
    • 3,392 篇 生物学
    • 2,329 篇 统计学(可授理学、...
    • 2,100 篇 化学
    • 1,243 篇 系统科学
    • 910 篇 地球物理学
  • 5,944 篇 管理学
    • 3,589 篇 管理科学与工程(可...
    • 2,508 篇 图书情报与档案管...
    • 1,440 篇 工商管理
  • 2,234 篇 医学
    • 1,843 篇 临床医学
    • 1,494 篇 基础医学(可授医学...
    • 938 篇 药学(可授医学、理...
    • 670 篇 公共卫生与预防医...
  • 943 篇 法学
    • 757 篇 社会学
  • 575 篇 农学
  • 518 篇 经济学
  • 461 篇 教育学
  • 168 篇 文学
  • 92 篇 军事学
  • 79 篇 艺术学
  • 8 篇 历史学
  • 7 篇 哲学

主题

  • 982 篇 computer science
  • 707 篇 feature extracti...
  • 692 篇 deep learning
  • 545 篇 computational mo...
  • 534 篇 training
  • 518 篇 machine learning
  • 460 篇 semantics
  • 442 篇 accuracy
  • 287 篇 data mining
  • 275 篇 support vector m...
  • 261 篇 data models
  • 246 篇 image segmentati...
  • 244 篇 internet of thin...
  • 228 篇 artificial intel...
  • 220 篇 computer archite...
  • 217 篇 reinforcement le...
  • 215 篇 predictive model...
  • 211 篇 routing
  • 206 篇 optimization
  • 205 篇 neural networks

机构

  • 1,080 篇 cavendish labora...
  • 1,008 篇 department of ph...
  • 959 篇 oliver lodge lab...
  • 951 篇 physikalisches i...
  • 788 篇 university of ch...
  • 609 篇 infn laboratori ...
  • 596 篇 infn sezione di ...
  • 571 篇 infn sezione di ...
  • 556 篇 fakultät physik ...
  • 551 篇 school of physic...
  • 551 篇 infn sezione di ...
  • 518 篇 horia hulubei na...
  • 506 篇 school of physic...
  • 503 篇 iccub universita...
  • 494 篇 department of ph...
  • 493 篇 imperial college...
  • 487 篇 h.h. wills physi...
  • 485 篇 center for high ...
  • 482 篇 nikhef national ...
  • 479 篇 stfc rutherford ...

作者

  • 254 篇 beiter a.
  • 252 篇 barter w.
  • 251 篇 a. gomes
  • 243 篇 bellee v.
  • 235 篇 c. alexa
  • 232 篇 j. m. izen
  • 230 篇 s. chen
  • 226 篇 c. amelung
  • 225 篇 g. bella
  • 225 篇 j. strandberg
  • 225 篇 d. calvet
  • 218 篇 g. spigo
  • 217 篇 j. wang
  • 216 篇 f. siegert
  • 215 篇 bowcock t.j.v.
  • 214 篇 brundu d.
  • 214 篇 blake t.
  • 208 篇 amato s.
  • 207 篇 r. ströhmer
  • 204 篇 betancourt c.

语言

  • 39,677 篇 英文
  • 1,367 篇 其他
  • 664 篇 中文
  • 34 篇 日文
  • 5 篇 德文
  • 5 篇 俄文
  • 4 篇 法文
  • 3 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 葡萄牙文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Center of Computer Science and Technology"
41736 条 记 录,以下是81-90 订阅
排序:
A globally shared resource paradigm for encoded storage systems in the public cloud
收藏 引用
Fundamental Research 2024年 第3期4卷 642-650页
作者: Zhiyue Li Guangyan Zhang Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China Beijing National Research Center for Information Science and Technology Tsinghua UniversityBeijing 100084China
Public clouds favor sharing of storage resources,in which many tenants acquire bandwidth and storage capacity from a shared storage *** provide high availability,data are often encoded to provide fault tolerance with ... 详细信息
来源: 评论
Modelling the dynamics of information warfare: an attacker-defender scenario using Lotka-Volterra equations
收藏 引用
International Journal of Information technology (Singapore) 2025年 第3期17卷 1407-1418页
作者: Pandey, Rashmikiran Pandey, Mrinal Nazarov, Alexey Nikolaevich Faculty of Radio and Computer Technology Moscow Institute of Physics & Technology Moscow 141701 Russian Federation Federal Research Center “Computer Science and Control” Russian Academy of Science Moscow 119333 Russian Federation
The dynamics of information warfare in an attacker-defender scenario pose significant challenges in today’s digital age. To address these challenges, this research models the dynamics of information warfare using mod... 详细信息
来源: 评论
Fixed-point quantum continuous search algorithm with optimal query complexity
收藏 引用
science China(Physics,Mechanics & Astronomy) 2025年 第6期Mechanics & Astronomy) .卷 84-95页
作者: Shan Jin Yuhan Huang Shaojun Wu Guanyu Zhou Chang-Ling Zou Luyan Sun Xiaoting Wang Institute of Fundamental and Frontier Sciences University of Electronic Science and Technology of China Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology Key Laboratory of Quantum Information CAS University of Science and Technology of China Hefei National Laboratory Center for Quantum Information Institute for Interdisciplinary Information Sciences Tsinghua University
Continuous search problems(CSPs), which involve finding solutions within a continuous domain, frequently arise in fields such as optimization, physics, and engineering. Unlike discrete search problems, CSPs require na... 详细信息
来源: 评论
Unsupervised Video Object Segmentation via Weak User Interaction and Temporal Modulation
收藏 引用
Chinese Journal of Electronics 2023年 第3期32卷 507-518页
作者: FAN Jiaqing ZHANG Kaihua ZHAO Yaqian LIU Qingshan College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics College of Computer and Software Nanjing University of Information Science and Technology Engineering Research Center of Digital Forensics Ministry of Education Inspur Suzhou Intelligent Technology Corporation
In unsupervised video object segmentation(UVOS), the whole video might segment the wrong target due to the lack of initial prior information. Also, in semi-supervised video object segmentation(SVOS), the initial video... 详细信息
来源: 评论
Privacy-Preserving Federated Deep Learning Diagnostic Method for Multi-Stage Diseases
收藏 引用
computer Modeling in Engineering & sciences 2024年 第6期139卷 3085-3099页
作者: Jinbo Yang Hai Huang Lailai Yin Jiaxing Qu Wanjuan Xie School of Computer Science and Technology Harbin University of Science and TechnologyHarbin150080China Shanghai Futures Information Technology Co. Ltd.Shanghai201201China Heilongjiang Province Cyberspace Research Center Harbin150001China Information Network Engineering and Research Center South China University of TechnologyGuangzhou510641China
Diagnosing multi-stage diseases typically requires doctors to consider multiple data sources,including clinical symptoms,physical signs,biochemical test results,imaging findings,pathological examination data,and even ... 详细信息
来源: 评论
A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 1867-1888页
作者: Qussai M.Yaseen Monther Aldwairi Ahmad Manasrah Artificial Intelligence Research Center(AIRC) College of Engineering and Information TechnologyAjman UniversityAjman346United Arab Emirates Department of Computer Information Systems Faculty of Computer and Information TechnologyJordan University of Science and TechnologyIrbid22110Jordan College of Technological Innovation Zayed UniversityAbu Dhabi144534United Arab Emirates Faculty of Information Technology and Computer Science Yarmouk UniversityIrbid21163Jordan Computer Information Systems Higher Colleges of TechnologySharjah341214United Arab Emirates
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their ***,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN *** paper proposes an enh... 详细信息
来源: 评论
Unsupervised multiplex graph diffusion networks with multi-level canonical correlation analysis for multiplex graph representation learning
收藏 引用
science China(Information sciences) 2025年 第3期68卷 66-79页
作者: Sichao FU Qinmu PENG Yange HE Baokun DU Bin ZOU Xiao-Yuan JING Xinge YOU School of Electronic Information and Communications Huazhong University of Science and Technology Platform Operation and Marketing Center JD Retail Faculty of Mathematics and Statistics Hubei Key Laboratory of Applied Mathematics Hubei University School of Computer Science Wuhan University
In recent years, unsupervised multiplex graph representation learning(UMGRL) has received increasing research interest, which aims to learn discriminative node features from the multiplex graphs supervised by data wit... 详细信息
来源: 评论
Neighborhood Combination Search for Single-Machine Scheduling with Sequence-Dependent Setup Time
收藏 引用
Journal of computer science & technology 2024年 第3期39卷 737-752页
作者: 刘晓路 徐宏云 陈嘉铭 苏宙行 吕志鹏 丁俊文 College of System Engineering National University of Defense TechnologyChangsha 410015China School of Artificial Intelligence Jianghan UniversityWuhan 430056China Xi’an Satellite Control Center Xi’an 710043China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China CCF
In a local search algorithm,one of its most important features is the definition of its neighborhood which is crucial to the algorithm's *** this paper,we present an analysis of neighborhood combination search for... 详细信息
来源: 评论
Ubiquitous WiFi and Acoustic Sensing:Principles,Technologies,and Applications
收藏 引用
Journal of computer science & technology 2023年 第1期38卷 25-63页
作者: 黄佳玲 王云舒 邹永攀 伍楷舜 倪明选 The IoT Research Center College of Computer Science and Software EngineeringShenzhen UniversityShenzhen 518060 China The Hong Kong University of Science and Technology(Guangzhou) Guangzhou 511455China The Hong Kong University of Science and Technology Hong KongChina
With the increasing pervasiveness of mobile devices such as smartphones,smart TVs,and wearables,smart sensing,transforming the physical world into digital information based on various sensing medias,has drawn research... 详细信息
来源: 评论
KGNN: Combining KAN Networks and Graph Neural Networks for APT Attack Detection  6
KGNN: Combining KAN Networks and Graph Neural Networks for A...
收藏 引用
6th International Conference on Frontier Technologies of Information and computer, ICFTIC 2024
作者: Du, Yazhou Hong, Yu Ren, Weiwu Changchun University of Science and Technology School of Computer Science and Technology Changchun China Changchun University of Science and Technology Jilin Branch National Computer Network Emergency Response Center Changchun China
Advanced Persistent Threats are a sophisticated and persistent form of cyberattack that pose significant threats to the information security of enterprises and governments. Traditional APT detection methods struggle t... 详细信息
来源: 评论