咨询与建议

限定检索结果

文献类型

  • 2,096 篇 会议
  • 2,021 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 4,122 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,782 篇 工学
    • 1,508 篇 计算机科学与技术...
    • 1,179 篇 软件工程
    • 468 篇 信息与通信工程
    • 388 篇 化学工程与技术
    • 379 篇 电气工程
    • 318 篇 电子科学与技术(可...
    • 308 篇 控制科学与工程
    • 290 篇 材料科学与工程(可...
    • 237 篇 生物工程
    • 235 篇 机械工程
    • 191 篇 动力工程及工程热...
    • 170 篇 光学工程
    • 165 篇 生物医学工程(可授...
    • 121 篇 仪器科学与技术
    • 115 篇 冶金工程
    • 110 篇 力学(可授工学、理...
    • 106 篇 土木工程
    • 101 篇 建筑学
    • 101 篇 交通运输工程
  • 1,819 篇 理学
    • 767 篇 数学
    • 734 篇 物理学
    • 356 篇 化学
    • 279 篇 生物学
    • 182 篇 统计学(可授理学、...
    • 148 篇 系统科学
  • 624 篇 管理学
    • 423 篇 管理科学与工程(可...
    • 226 篇 图书情报与档案管...
    • 135 篇 工商管理
  • 128 篇 医学
    • 100 篇 临床医学
    • 89 篇 基础医学(可授医学...
  • 74 篇 法学
  • 62 篇 经济学
  • 50 篇 农学
  • 21 篇 教育学
  • 12 篇 文学
  • 8 篇 军事学
  • 5 篇 艺术学

主题

  • 75 篇 feature extracti...
  • 57 篇 educational inst...
  • 53 篇 deep learning
  • 49 篇 hadrons
  • 48 篇 semantics
  • 46 篇 training
  • 44 篇 neural networks
  • 43 篇 computational mo...
  • 37 篇 data models
  • 33 篇 accuracy
  • 33 篇 robustness
  • 32 篇 computer science
  • 32 篇 machine learning
  • 31 篇 cloud computing
  • 31 篇 web services
  • 30 篇 clustering algor...
  • 29 篇 quality of servi...
  • 29 篇 authentication
  • 29 篇 blockchain
  • 29 篇 forecasting

机构

  • 512 篇 college of compu...
  • 358 篇 university of ch...
  • 344 篇 iccub universita...
  • 339 篇 infn sezione di ...
  • 337 篇 department of ph...
  • 336 篇 school of physic...
  • 334 篇 infn sezione di ...
  • 333 篇 infn sezione di ...
  • 332 篇 infn sezione di ...
  • 331 篇 cavendish labora...
  • 328 篇 imperial college...
  • 326 篇 universiteit maa...
  • 326 篇 department of ph...
  • 323 篇 horia hulubei na...
  • 322 篇 van swinderen in...
  • 321 篇 h.h. wills physi...
  • 321 篇 institute of par...
  • 318 篇 stfc rutherford ...
  • 296 篇 infn sezione di ...
  • 287 篇 infn sezione di ...

作者

  • 230 篇 barter w.
  • 229 篇 brundu d.
  • 204 篇 bellee v.
  • 201 篇 blake t.
  • 201 篇 betancourt c.
  • 200 篇 borsato m.
  • 200 篇 belin s.
  • 199 篇 aliouche z.
  • 199 篇 amato s.
  • 198 篇 birch m.
  • 198 篇 boettcher t.
  • 198 篇 atzeni m.
  • 196 篇 cali s.
  • 195 篇 andreianov a.
  • 193 篇 bencivenni g.
  • 191 篇 bowcock t.j.v.
  • 191 篇 byczynski w.
  • 190 篇 boelhauve j.a.
  • 188 篇 borsuk j.t.
  • 185 篇 capelli s.

语言

  • 3,879 篇 英文
  • 130 篇 中文
  • 113 篇 其他
  • 2 篇 德文
  • 2 篇 法文
检索条件"机构=College of Computer Science and Engineering Hunan University of Science and Technology Xiangtan"
4122 条 记 录,以下是4021-4030 订阅
排序:
Moore: An Extendable Peer-to-Peer Network Based on Incomplete Kautz Digraph with Constant Degree
Moore: An Extendable Peer-to-Peer Network Based on Incomplet...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: D. Guo J. Wu H. Chen X. Luo Key Laboratory of CISR Technology College of Information Systems and Management National University of Defense Technology Changsha Hunan China Department of Computer Science and Engineering Florida Atlantic University Boca Raton FL USA
The topological properties of peer-to-peer overlay networks are critical factors that dominate the performance of these systems. Several non-constant and constant degree interconnection networks have been used as topo... 详细信息
来源: 评论
Quadratic Trigonometric Spline Curves with Multiple Shape Parameters
Quadratic Trigonometric Spline Curves with Multiple Shape Pa...
收藏 引用
10th IEEE International Conference on computer Aided Design and computer Graphics(第十届CAO/Graphics国际会议)
作者: Xiaoqin Wu Xuli Han Shanmin Luo School of Mathematical Science & Computing Technology Central South UniversityChangsha 410083P.R.C School of Mathematical Science & Computing Technology Central South UniversityChangsha 410083P.R.C School of Mechanical Engineering Hunan University of Science & TechnologyXiangtan 411201P.R.China
Quadratic trigonometric spline curves with multiple shape parameters are presented in this *** to the cubic B-spline curves, each trigonometric spline curve segment is generated by four consecutive control points. The... 详细信息
来源: 评论
New Boost matrix converter and its control strategy
收藏 引用
Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South university (science and technology) 2007年 第3期38卷 517-522页
作者: Zhang, Xiao-Ping Tang, Hua-Ping Zhu, Jian-Lin Yue, Zhou Liu, Sha-Sha School of Mechanical and Electrical Engineering Central South University Changsha 410083 China College of Information and Electrical Engineering Hunan University of Science and Technology Xiangtan 411201 China College of Information Engineering Xiangtan University Xiangtan 411105 China
Based on the low voltage transfer ratio of conventional matrix converter, a new matrix converter referred to as a Boost matrix converter was proposed. The basic configuration of this new topology and its fundamental w... 详细信息
来源: 评论
A Stern-based Collusion-Secure Software Watermarking Algorithm and Its Implementation
A Stern-based Collusion-Secure Software Watermarking Algorit...
收藏 引用
International Conference on Multimedia and Ubiquitous engineering (MUE)
作者: Jieqing Ai Xingming Sun Yunhao Liu Ingemar J. Cox Guang Sun Yi Luo School of Computer and Communication Hunan University Changsha China UCL Adastral Park Campus University College London UK Hong Kong University of Science and Technology Hong Kong China Hunan College of Financial and Economics Changsha China
Stem algorithm is a robust static software watermarking scheme. It can resist many common attacks except collusive attacks. In this paper we propose an improved Stern algorithm, make it has the ability of resisting co... 详细信息
来源: 评论
Microstructure and properties of a titanium alloy by metal injection molding
Beijing Keji Daxue Xuebao/Journal of University of Science a...
收藏 引用
Beijing Keji Daxue Xuebao/Journal of university of science and technology Beijing 2007年 第7期29卷 721-724页
作者: Guo, Shibo Zhang, Houan Zhang, Rongfa He, Xinbo Qin, Mingli Qu, Xuanhui College of Electromechanical Engineering Hunan University of Science and Engineering Xiangtan 411201 China Jiangxi Key Laboratory of Surface Engineering Jiangxi Science and Technology Normal University Nanchang 330013 China Materials Science and Engineering School University of Science and Technology of Beijing Beijing 100083 China
Titanium alloy parts were prepared by metal injection molding, binder was removed from the parts by solvent debinding process, and the brown parts were densified in vacuum atmosphere. The as-sintered specimens were tr... 详细信息
来源: 评论
RUNTIME SOFTWARE ARCHITECTURE MODEL BASED ON DESIGN HIERARCHY
RUNTIME SOFTWARE ARCHITECTURE MODEL BASED ON DESIGN HIERARCH...
收藏 引用
2007 International Conference on Machine Learning and Cybernetics(IEEE第六届机器学习与控制论国际会议)
作者: CHANG-SHENG LIU CHANG-YUN LI JING-TIAN TANG YING CHENG School of Info-physics and Geomatics Engineering Central South University Hunan ChangSha 410083Ch Department of Computer Science & Technology Zhuzhou Institute of Technology Zhuzhou 412008 China School of Info-physics and Geomatics Engineering Central South University Hunan ChangSha 410083Ch ChangSha Aeronautical Vocational and Technical College Hunan ChangSha 410014China
On line system is hard to evolve dynamically because its runtime SA (Software Architecture) exists implicitly.A model of runtime SA based on design space is put forward, in the model runtime SA is expressed explicitly... 详细信息
来源: 评论
A Role-Based Semantic Authorization Framework for Workflow Management Systems
收藏 引用
电子学报(英文版) 2006年 第1期15卷 55-59页
作者: LIU Jianxun CHEN Haiyan TANG Mingdong Hunan Knowledge Grid Laboratory Hunan University of Science and Technology Xiangtan 411201 China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan 411201 China
Authorization is an essential part in Workflow management systems (WfMS) and the role-based authorization model is commonly adopted in most commercial and research workflow systems. However, role-based model alone is ... 详细信息
来源: 评论
Microstructure and physical properties of Sn-20Bi-X lead-free solders
Hunan Daxue Xuebao/Journal of Hunan University Natural Scien...
收藏 引用
hunan Daxue Xuebao/Journal of hunan university Natural sciences 2007年 第3期34卷 49-52页
作者: Yang, Shi-Qiang Lei, Xiao-Juan Li, Yuan-Shan Chen, Zhen-Hua College of Materials Science and Engineering Hunan Univ. Changsha 410082 China School of Computer Science National Defense Univ. of Science and Technology Changsha 410073 China
Sn-20Bi lead-free solders were studied in alloying method. Adding alloy element Ag, In, Ga or Sb into Sn-20Bi, the influences of the change of Ag, In, Ga or Sb contents on their microstructure and physical properties ... 详细信息
来源: 评论
Study on statistical analysis attacks and countermeasures in anonymity systems
Hunan Daxue Xuebao/Journal of Hunan University Natural Scien...
收藏 引用
hunan Daxue Xuebao/Journal of hunan university Natural sciences 2007年 第7期34卷 73-77页
作者: Xu, Hong-Yun Jiang, Li Peng, Shu-Guang Zhang, Tao College of Computer and Communications Hunan Univ. Changsha 410082 China College of Computer Science and Engineering South China Univ. of Technology Guangzhou 510640 China
This paper focused on the effects of the fixed-rerouting path scheme and the variable-rerouting path scheme upon the anonymity degree in anonymity system based on rerouting. The probability method was adopted to prove... 详细信息
来源: 评论
Novel admission control algorithm for wireless/mobile networks
Hunan Daxue Xuebao/Journal of Hunan University Natural Scien...
收藏 引用
hunan Daxue Xuebao/Journal of hunan university Natural sciences 2007年 第3期34卷 71-74页
作者: Duan, Zheng-Hua Wu, Ren-Yong Zhu, Guang-Xi College of Computer and Communication Hunan Univ. Changsha 410082 China Dept. of Electronics and Information Engineering Huazhong Univ. of Science and Technology Wuhan 430074 China
A measurement-based call admission control (CAC) algorithm was presented. The scheme measures the state parameters of cellular system, i.e., the number of handoff-dropping calls and the handoff-dropping probability at... 详细信息
来源: 评论