咨询与建议

限定检索结果

文献类型

  • 2,263 篇 会议
  • 1,855 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 4,128 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,667 篇 工学
    • 1,802 篇 计算机科学与技术...
    • 1,426 篇 软件工程
    • 760 篇 信息与通信工程
    • 380 篇 电气工程
    • 322 篇 电子科学与技术(可...
    • 273 篇 控制科学与工程
    • 243 篇 生物工程
    • 162 篇 机械工程
    • 160 篇 光学工程
    • 146 篇 仪器科学与技术
    • 134 篇 生物医学工程(可授...
    • 118 篇 网络空间安全
    • 94 篇 动力工程及工程热...
    • 89 篇 化学工程与技术
    • 78 篇 核科学与技术
    • 73 篇 交通运输工程
    • 64 篇 安全科学与工程
  • 1,316 篇 理学
    • 633 篇 数学
    • 425 篇 物理学
    • 266 篇 生物学
    • 194 篇 统计学(可授理学、...
    • 120 篇 系统科学
    • 98 篇 化学
  • 670 篇 管理学
    • 399 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 155 篇 工商管理
  • 110 篇 医学
    • 87 篇 临床医学
    • 73 篇 基础医学(可授医学...
  • 107 篇 法学
    • 69 篇 社会学
  • 64 篇 经济学
    • 63 篇 应用经济学
  • 31 篇 农学
  • 21 篇 军事学
  • 15 篇 文学
  • 11 篇 教育学
  • 9 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 105 篇 computer network...
  • 100 篇 semantics
  • 96 篇 feature extracti...
  • 82 篇 laboratories
  • 82 篇 protocols
  • 73 篇 computational mo...
  • 71 篇 bandwidth
  • 66 篇 deep learning
  • 65 篇 accuracy
  • 63 篇 computer science
  • 60 篇 quality of servi...
  • 60 篇 training
  • 57 篇 wireless sensor ...
  • 55 篇 security
  • 49 篇 routing
  • 48 篇 cryptography
  • 47 篇 computer archite...
  • 47 篇 network topology
  • 45 篇 authentication

机构

  • 162 篇 school of comput...
  • 150 篇 centro brasileir...
  • 149 篇 national and kap...
  • 149 篇 istanbul technic...
  • 148 篇 university of sp...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 146 篇 academy of scien...
  • 145 篇 brunel universit...
  • 145 篇 indian institute...
  • 145 篇 charles universi...
  • 141 篇 university of de...
  • 140 篇 department of ph...
  • 139 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 137 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 130 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,749 篇 英文
  • 263 篇 其他
  • 127 篇 中文
检索条件"机构=Computer Engineering and Network Laboratory"
4128 条 记 录,以下是101-110 订阅
排序:
Research on Stop-Adjustable Control Mechanism for Classified Secondary User Packets  8
Research on Stop-Adjustable Control Mechanism for Classified...
收藏 引用
8th International Conference on Electrical, Mechanical and computer engineering, ICEMCE 2024
作者: Zhao, Yuan Yuan, Shuangshuang Northeastern University at Qinhuangdao School of Computer and Communication Engineering Qinhuangdao China Northeastern University at Qinhuangdao Hebei Key Laboratory of Marine Perception Network and Data Processing Qinhuangdao China
In cognitive radio network, considering that secondary user (SU) packets waiting in the cache will stop waiting and exit the system because of impatience, a dynamic stop-adjustable control mechanism is proposed in a s... 详细信息
来源: 评论
Long-Tail Learning with Foundation Model: Heavy Fine-Tuning Hurts  41
Long-Tail Learning with Foundation Model: Heavy Fine-Tuning ...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Shi, Jiang-Xin Wei, Tong Zhou, Zhi Shao, Jie-Jing Han, Xin-Yan Li, Yu-Feng National Key Laboratory for Novel Software Technology Nanjing University China School of Artificial Intelligence Nanjing University China School of Computer Science and Engineering Southeast University China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
The fine-tuning paradigm in addressing long-tail learning tasks has sparked significant interest since the emergence of foundation models. Nonetheless, how fine-tuning impacts performance in long-tail learning was not... 详细信息
来源: 评论
Improving Multimodal Rumor Detection via Dynamic Graph Modeling  27th
Improving Multimodal Rumor Detection via Dynamic Graph Model...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Wu, Xinyu Hu, Xiaoxu Qin, Xugong Zhang, Peng Zeng, Gangyan Guo, Yu Zhao, Runbo Huang, Xinjian School of Cyber Science and Engineering Nanjing University of Science and Technology Nanjing China National Computer Network Response Technical Team/Coordination Center Technology Beijing China Laboratory for Advanced Computing and Intelligence Engineering Wuxi China
Due to the proliferation of rumors in social networks, automatic rumor detection has evoked increasing attention in recent years. Despite great progress achieved by exploiting multimodal features, existing works suffe... 详细信息
来源: 评论
Large-scale Satellite Optical network Simulation Architecture and Performance Evaluation
Large-scale Satellite Optical Network Simulation Architectur...
收藏 引用
2024 Asia Communications and Photonics Conference, ACP 2024 and International Conference on Information Photonics and Optical Communications, IPOC 2024
作者: Wang, Xinjun Zhang, Zhenrong Zhu, Kangqi Hua, Nan School of Computer Electronic and Information Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi University Nanning China Department of Electronic Engineering Tsinghua University Beijing China
We evaluate the accuracy and performance of different simulation modes in MegaStarSim, analyze end-to-end routing strategies in large-scale satellite optical networks, and assess link quality across various inter-sate... 详细信息
来源: 评论
Competitive Swarm Optimizer Based on Individual Learning Mechanism  5
Competitive Swarm Optimizer Based on Individual Learning Mec...
收藏 引用
5th International Conference on High Performance Big Data and Intelligent Systems, HDIS 2023
作者: Tang, JingQi Li, Wei Wang, Lei School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
In view of the disadvantages of the traditional competitive swarm optimizer (CSO), such as falling into local minimization or poor convergence accuracy, this paper proposed an enhanced CSO algorithm called competitive... 详细信息
来源: 评论
A Positive Influence Maximization Algorithm in Signed Social networks
收藏 引用
computers, Materials & Continua 2023年 第8期76卷 1977-1994页
作者: Wenlong Zhu Yang Huang Shuangshuang Yang Yu Miao Chongyuan Peng College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqihar161006China College of Teacher Education Qiqihar UniversityQiqihar161006China
The influence maximization(IM)problem aims to find a set of seed nodes that maximizes the spread of their influence in a social *** positive influence maximization(PIM)problem is an extension of the IM problem,which c... 详细信息
来源: 评论
Fast Crop Pest Detection Using Lightweight Feature Extraction and Knowledge Distillation
Fast Crop Pest Detection Using Lightweight Feature Extractio...
收藏 引用
2023 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2023
作者: Yang, Ze Jiang, Xianliang Jin, Guang Huang, Junkai Bai, Jie Yu, Dingxin Ningbo University Faculty of Electrical Engineering and Computer Science Ningbo China Zhejiang Key Laboratory of Mobile Network Application Technology Ningbo China
Pest detection is critical for achieving effective pest control. However, the current deep learning-based pest detection algorithm is unsuitable for deployment on resource-limited edge devices due to its extensive com... 详细信息
来源: 评论
A Trusted Privacy-Preserving Model for Cross-Chain Transactions Based on zk_SNARKs
A Trusted Privacy-Preserving Model for Cross-Chain Transacti...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Wang, Yichuan Tie, Jianhuan Hei, Xinhong Zhao, Li Zhang, Xiaohui School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technolog Xi'an China
Currently, the privacy protection technology of blockchain is not mature enough, such as user data leakage and lack of anonymity exist, and these problems are especially serious when conducting cross-chain transaction... 详细信息
来源: 评论
A numerical magnitude aware multi-channel hierarchical encoding network for math word problem solving
收藏 引用
Neural Computing and Applications 2025年 第3期37卷 1651-1672页
作者: Xu, Junjie Chen, Yuzhong Xiao, Lingsheng Liao, Hongmiao Zhong, Jiayuan Dong, Chen College of Computer and Data Science Fuzhou University Fujian Province Fuzhou350108 China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fujian Province Fuzhou350108 China
Math word problem (MWP) represents a critical research area within reading comprehension, where accurate comprehension of math problem text is crucial for generating math expressions. However, current approaches still... 详细信息
来源: 评论
Maximizing Influence in Temporal Social networks:A Node Feature-Aware Voting Algorithm
收藏 引用
computers, Materials & Continua 2023年 第12期77卷 3095-3117页
作者: Wenlong Zhu Yu Miao Shuangshuang Yang Zuozheng Lian Lianhe Cui College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqihar161006China College of Teacher Education Qiqihar UniversityQiqihar161006China
Influence Maximization(IM)aims to select a seed set of size k in a social network so that information can be spread most widely under a specific information propagation model through this set of ***,most existing stud... 详细信息
来源: 评论