咨询与建议

限定检索结果

文献类型

  • 628 篇 期刊文献
  • 73 篇 会议

馆藏范围

  • 701 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 502 篇 理学
    • 377 篇 物理学
    • 79 篇 数学
    • 64 篇 化学
    • 45 篇 生物学
    • 44 篇 统计学(可授理学、...
    • 19 篇 地球物理学
    • 13 篇 大气科学
  • 257 篇 工学
    • 64 篇 计算机科学与技术...
    • 62 篇 化学工程与技术
    • 54 篇 软件工程
    • 46 篇 核科学与技术
    • 29 篇 生物医学工程(可授...
    • 23 篇 电气工程
    • 23 篇 生物工程
    • 20 篇 光学工程
    • 20 篇 电子科学与技术(可...
    • 19 篇 力学(可授工学、理...
    • 15 篇 仪器科学与技术
    • 12 篇 冶金工程
    • 12 篇 信息与通信工程
    • 12 篇 控制科学与工程
    • 8 篇 机械工程
    • 8 篇 航空宇航科学与技...
    • 7 篇 动力工程及工程热...
  • 45 篇 医学
    • 36 篇 临床医学
    • 25 篇 基础医学(可授医学...
    • 17 篇 药学(可授医学、理...
    • 10 篇 公共卫生与预防医...
  • 29 篇 管理学
    • 16 篇 管理科学与工程(可...
    • 12 篇 图书情报与档案管...
  • 8 篇 农学
  • 3 篇 教育学
  • 2 篇 经济学
  • 2 篇 法学
  • 1 篇 文学

主题

  • 74 篇 hadrons
  • 50 篇 hadron colliders
  • 46 篇 hadronic decays
  • 38 篇 bottom mesons
  • 34 篇 branching fracti...
  • 30 篇 particle decays
  • 26 篇 leptonic, semile...
  • 25 篇 flavor changing ...
  • 21 篇 bosons
  • 21 篇 charmed mesons
  • 18 篇 quark model
  • 17 篇 cp violation
  • 15 篇 supersymmetry
  • 15 篇 rare decays
  • 14 篇 tellurium compou...
  • 14 篇 electroweak inte...
  • 13 篇 quantum chromody...
  • 13 篇 particle product...
  • 13 篇 mass spectrometr...
  • 12 篇 bottom baryons

机构

  • 426 篇 department of ph...
  • 414 篇 school of physic...
  • 411 篇 horia hulubei na...
  • 407 篇 van swinderen in...
  • 407 篇 cavendish labora...
  • 407 篇 department of ph...
  • 405 篇 center for high ...
  • 404 篇 imperial college...
  • 401 篇 iccub universita...
  • 401 篇 stfc rutherford ...
  • 399 篇 h.h. wills physi...
  • 399 篇 nikhef national ...
  • 395 篇 institute of par...
  • 391 篇 henryk niewodnic...
  • 387 篇 yandex school of...
  • 387 篇 physik-institut ...
  • 386 篇 oliver lodge lab...
  • 385 篇 school of physic...
  • 383 篇 university of ch...
  • 376 篇 departamento de ...

作者

  • 252 篇 barter w.
  • 247 篇 bellee v.
  • 241 篇 beiter a.
  • 227 篇 bowcock t.j.v.
  • 227 篇 casse g.
  • 217 篇 blake t.
  • 216 篇 borsato m.
  • 216 篇 betancourt c.
  • 216 篇 bediaga i.
  • 216 篇 amato s.
  • 214 篇 braun s.
  • 213 篇 boettcher t.
  • 213 篇 borisyak m.
  • 212 篇 baryshnikov f.
  • 212 篇 bizzeti a.
  • 211 篇 bencivenni g.
  • 209 篇 brundu d.
  • 208 篇 back j.j.
  • 207 篇 bay a.
  • 205 篇 bursche a.

语言

  • 682 篇 英文
  • 12 篇 其他
  • 8 篇 中文
检索条件"机构=College of Science Center for Data analysis and Algorithm Technology"
701 条 记 录,以下是41-50 订阅
排序:
A Fine-Grained Anomaly Detection Method Fusing Isolation Forest and Knowledge Graph Reasoning  19th
A Fine-Grained Anomaly Detection Method Fusing Isolation For...
收藏 引用
19th International Conference on Web Information Systems and Applications, WISA 2022
作者: Xu, Jie Zhou, Jiantao College of Computer Science Engineering Research Center of Ecological Big Data Ministry of Education National and Local Joint Engineering Research Center of Mongolian Intelligent Information Processing Technology Inner Mongolia Cloud Computing and Service Software Engineering Laboratory Inner Mongolia Social Computing and Data Processing Key Laboratory Inner Mongolia Discipline Inspection and Supervision Big Data Key Laboratory Inner Mongolia Big Data Analysis Technology Engineering Laboratory Inner Mongolia University Hohhot China
Anomaly detection aims to find outliers data that do not conform to expected behaviors in a specific scenario, which is indispensable and critical in current safety environments related studies. However, when performi... 详细信息
来源: 评论
An Explicit MDD-Based Method for Common-Cause Failure analysis in Phased-Mission Systems
An Explicit MDD-Based Method for Common-Cause Failure Analys...
收藏 引用
2019 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering, QR2MSE 2019
作者: Wang, Chaonan Xing, Liudong Jinan University Guangzhou College of Information Science and Technology Guangdong510632 China Guangdong Gene Data Analysis and Processing Engineering Research Center Guangzhou Guangdong510632 China University of Massachusetts Electrical Computer Engineering Department DartmouthMA02747 United States
In this paper, an explicit approach based on multivalued decision diagrams is suggested for reliability analysis of phased-mission systems undergoing common-cause failures. The approach addresses dynamic system struct... 详细信息
来源: 评论
DFGET: Displacement-Field Assisted Graph Energy Transmitter for Gland Instance Segmentation  17
DFGET: Displacement-Field Assisted Graph Energy Transmitter ...
收藏 引用
17th IEEE International Conference on Signal Processing, ICSP 2024
作者: Jian, Caiqing Qin, Yongbin Wang, Lihui Ye, Chen Cheng, Xinyu Guizhou University Engineering Research Center of Text Computing & Cognitive Intelligence Ministry of Education Key Laboratory of Intelligent Medical Image Analysis and Precise Diagnosis of Guizhou Province State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang China
Gland instance segmentation is an essential but challenging task in the diagnosis of adenocarcinoma. The existing models usually achieve gland instance segmentation through multi-task learning and boundary loss constr... 详细信息
来源: 评论
BMDP:Blockchain-Based Multi-Cloud Storage data Provenance  26
BMDP:Blockchain-Based Multi-Cloud Storage Data Provenance
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Wang, Feiyu Zhou, Jian-Tao Guo, Xu Inner Mongolia University College of Computer Science Inner Mongolia Hohhot China Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Engineering Research Center of Ecological Big Data Ministry of Education Natl. Loc. Jt. Eng. Research Center of Intelligent Information Processing Technology for Mongolian Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software China
In a multi-cloud storage system, provenance data records all operations and ownership during its lifecycle, which is critical for data security and audibility. However, recording provenance data also poses some challe... 详细信息
来源: 评论
Blockchain-Based Multi-Cloud data Storage System Disaster Recovery
Blockchain-Based Multi-Cloud Data Storage System Disaster Re...
收藏 引用
2023 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2023
作者: Wang, Feiyu Zhou, Jian-Tao College of Computer Science Inner Mongolia University Inner Mongolia Hohhot China Engineering Research Center of Ecological Big Data Ministry of Education Natl. Loc. Jt. Eng. Research Center of Intelligent Information Processing Technology for Mongolian Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology China
Cloud storage services have been used by most businesses and individual users. However, data loss, service interruptions and cyber attacks often lead to cloud storage services not being provided properly, and these in...
来源: 评论
A Green Paradigm for Internet of Things: Ambient Backscatter Communications
收藏 引用
China Communications 2019年 第7期16卷 109-119页
作者: Wei Zhang Yao Qin Wenjing Zhao Minzheng Jia Qiang Liu Ruisi He Bo Ai Science and Technology on Information Systems Engineering Laboratory National University of Defense Technology and also with Institute of Telecommunication Satellites China Academy of Space Technology (CAST) Beijing Key Lab of Transportation Data Analysis and Mining Beijing Engineering Research Center of High-Speed Railway Broadband Mobile Communications School of Computer and Information Technology Beijing Jiaotong University Beijing 100044 China Department of Information Engineering Beijing Polytechnic College Beijing 100042 China State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing 100044 China
Internet of Things (IoT) has attracted extensive interest from both academia and industries, and is recognized as an ultimate infrastructure to connect everything at anytime and anywhere. The implementation of IoT gen... 详细信息
来源: 评论
Exploring Patent Transformation Event: Forecasting Patent Transfer Time  26
Exploring Patent Transformation Event: Forecasting Patent Tr...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Huo, Jinchen Liu, Weidong Li, Yang Cao, Yan Institute of Scientific and Technical Information of China China College of Computer Science Inner Mongolia University China Natl. Loc. Jt. Eng. Research Center of Intelligent Information Processing Technology for Mongolian China Inner Mongolia Key Laboratory of Social Computing and Data Processing China Inner Mongolia Engineering Laboratory for Big Data Analysis Technology China
As the largest source of technical information around the world, patents are regarded as an essential crystallization and carrier of knowledge and technological innovation. Patent transformation is conducive not only ... 详细信息
来源: 评论
Research on patent recommendation method based on graph neural network  26
Research on patent recommendation method based on graph neur...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Zhang, Enchao Liu, Weidong Liu, Shi Cao, Yan Institute of Scientific and Technical Information of China China College of Computer Science Inner Mongolia University China Natl. Loc. Jt. Eng. Research Center of Intelligent Information Processing Technology for Mongolian China Inner Mongolia Key Laboratory of Social Computing and Data Processing China Inner Mongolia Engineering Laboratory for Big Data Analysis Technology China
Intellectual property transactions have shown a strong growth momentum in recent years, but the patent transaction market has been plagued by the matching degree of consumers and sellers, resulting in frequent problem... 详细信息
来源: 评论
A Stepwise Path Selection Scheme Based on Multiple QoS Parameters Evaluation in SDN  17th
A Stepwise Path Selection Scheme Based on Multiple QoS Param...
收藏 引用
17th EAI International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2021
作者: Liu, Lin Zhou, Jian-Tao Xing, Hai-Feng Guo, Xiao-Yong College of Computer Science Ecological Big Data Engineering Research Center of the Ministry of Education Cloud Computing and Service Software Engineering Laboratory of Inner Mongolia Autonomous Region National and Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Social Computing and Data Processing Key Laboratory of Inner Mongolia Autonomous Region Big Data Analysis Technology Engineering Research Center of Inner Mongolia Autonomous Region Inner Mongolia University Inner Mongolia Hohhot China College of Computer Science and Technology Inner Mongolia Normal University Inner Mongolia Hohhot China College of Computer Information and Management Inner Mongolia University of Finance and Economics Inner Mongolia Hohhot China
Nowadays, the best-effort service can not guarantee the quality of service (QoS) for all kinds of services. QoS routing is an important method to guarantee QoS requirements. It involves path selection for flows based ... 详细信息
来源: 评论
Using Rough Sets to Improve the High-dimensional data Anomaly Detection Method Based on Extended Isolation Forest  26
Using Rough Sets to Improve the High-dimensional Data Anomal...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Liu, Hanlin Zhou, Jiantao Li, Hua Inner Mongolia University College of Computer Science Hohhot China Natl. Loc. Jt. Eng. Research Center of Intelligent Information Processing Technology for Mongolian Engineering Research Center of Ecological Big Data Ministry of Education Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
Anomaly detection refers to the identification of data objects that deviate from the general data distribution. One of the important challenges in anomaly detection is handling high-dimensional data, especially when i... 详细信息
来源: 评论