咨询与建议

限定检索结果

文献类型

  • 2,263 篇 会议
  • 1,855 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 4,128 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,667 篇 工学
    • 1,802 篇 计算机科学与技术...
    • 1,426 篇 软件工程
    • 760 篇 信息与通信工程
    • 380 篇 电气工程
    • 322 篇 电子科学与技术(可...
    • 273 篇 控制科学与工程
    • 243 篇 生物工程
    • 162 篇 机械工程
    • 160 篇 光学工程
    • 146 篇 仪器科学与技术
    • 134 篇 生物医学工程(可授...
    • 118 篇 网络空间安全
    • 94 篇 动力工程及工程热...
    • 89 篇 化学工程与技术
    • 78 篇 核科学与技术
    • 73 篇 交通运输工程
    • 64 篇 安全科学与工程
  • 1,316 篇 理学
    • 633 篇 数学
    • 425 篇 物理学
    • 266 篇 生物学
    • 194 篇 统计学(可授理学、...
    • 120 篇 系统科学
    • 98 篇 化学
  • 670 篇 管理学
    • 399 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 155 篇 工商管理
  • 110 篇 医学
    • 87 篇 临床医学
    • 73 篇 基础医学(可授医学...
  • 107 篇 法学
    • 69 篇 社会学
  • 64 篇 经济学
    • 63 篇 应用经济学
  • 31 篇 农学
  • 21 篇 军事学
  • 15 篇 文学
  • 11 篇 教育学
  • 9 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 105 篇 computer network...
  • 100 篇 semantics
  • 96 篇 feature extracti...
  • 82 篇 laboratories
  • 82 篇 protocols
  • 73 篇 computational mo...
  • 71 篇 bandwidth
  • 66 篇 deep learning
  • 65 篇 accuracy
  • 63 篇 computer science
  • 60 篇 quality of servi...
  • 60 篇 training
  • 57 篇 wireless sensor ...
  • 55 篇 security
  • 49 篇 routing
  • 48 篇 cryptography
  • 47 篇 computer archite...
  • 47 篇 network topology
  • 45 篇 authentication

机构

  • 162 篇 school of comput...
  • 150 篇 centro brasileir...
  • 149 篇 national and kap...
  • 149 篇 istanbul technic...
  • 148 篇 university of sp...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 146 篇 academy of scien...
  • 145 篇 brunel universit...
  • 145 篇 indian institute...
  • 145 篇 charles universi...
  • 141 篇 university of de...
  • 140 篇 department of ph...
  • 139 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 137 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 130 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,749 篇 英文
  • 263 篇 其他
  • 127 篇 中文
检索条件"机构=Computer Engineering and Network Laboratory"
4128 条 记 录,以下是11-20 订阅
排序:
SEED: Accelerating Reasoning Tree Construction via Scheduled Speculative Decoding  31
SEED: Accelerating Reasoning Tree Construction via Scheduled...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Wang, Zhenglin Wu, Jialong Lai, Yilong Zhang, Congzhi Zhou, Deyu School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China
Large Language Models (LLMs) demonstrate remarkable emergent abilities across various tasks, yet fall short of complex reasoning and planning tasks. The tree-search-based reasoning methods address this by encouraging ... 详细信息
来源: 评论
Reliability Assessment of a New General Matching Composed network
收藏 引用
China Communications 2024年 第2期21卷 245-257页
作者: Zhengyuan Liang Junbin Liang Guoxuan Zhong Guangxi Key Laboratory of Multimedia Communications and Network Technology School of ComputerElectronics and InformationGuangxi UniversityNanning 530004China Jiangxi Engineering Laboratory of IoT Technologies for Crop Growth Ji’an 343000China
The reliability of a network is an important indicator for maintaining communication and ensuring its stable operation. Therefore, the assessment of reliability in underlying interconnection networks has become an inc... 详细信息
来源: 评论
A New Encrypted Traffic Identification Model Based on VAE-LSTM-DRN
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 569-588页
作者: Haizhen Wang Jinying Yan Na Jia College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqiharChina
Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured *** extraction of encrypted traffic attributes and their subsequ... 详细信息
来源: 评论
Adaptive VDI Session Placement via User Logoff Prediction
收藏 引用
Machine Intelligence Research 2025年 第1期22卷 189-200页
作者: Wenping Fan Puhui Meng Yu Tian Min-Ling Zhang Yao Zhang School of Computer Science and Engineering Southeast UniversityNanjing210096China VMware Information Technology(China)Limited Beijing100190China Key Laboratory of Computer Network and Information Integration(Southeast University) Ministry of EducationNanjing210096China
After the global pandemic,DaaS(desktop as a service)has become the first choice of many companies’remote working *** the desktops are usually deployed in the public cloud when using DaaS,customers are more cost-sensi... 详细信息
来源: 评论
PROMIPL: A Probabilistic Generative Model for Multi-Instance Partial-Label Learning  24
PROMIPL: A Probabilistic Generative Model for Multi-Instance...
收藏 引用
24th IEEE International Conference on Data Mining, ICDM 2024
作者: Yang, Yin-Fang Tang, Wei Zhang, Min-Ling School of Computer Science and Engineering Southeast University Nanjing China Ministry of Education Key Laboratory of Computer Network China
Multi-instance partial-label learning (MIPL) tackles scenarios where each training sample is represented as a multiinstance bag associated with a candidate label set. This set contains one true label and several false... 详细信息
来源: 评论
A DDoS Identification Method for Unbalanced Data CVWGG
收藏 引用
computers, Materials & Continua 2024年 第12期81卷 3825-3851页
作者: Haizhen Wang Na Jia Yang He Pan Tan College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqihar161006China
As the popularity and dependence on the Internet increase,DDoS(distributed denial of service)attacks seriously threaten network *** accurately distinguishing between different types of DDoS attacks,targeted defense st... 详细信息
来源: 评论
Recommendation System Based on Perceptron and Graph Convolution network
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 3939-3954页
作者: Zuozheng Lian Yongchao Yin Haizhen Wang College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqihar161006China
The relationship between users and items,which cannot be recovered by traditional techniques,can be extracted by the recommendation algorithm based on the graph convolution *** current simple linear combination of the... 详细信息
来源: 评论
Modeling and Performance Analysis of UAV-Aided Millimeter Wave Cellular networks with Stochastic Geometry
收藏 引用
China Communications 2024年 第6期21卷 146-162页
作者: Li Junruo Wang Yuanjie Cui Qimei Hou Yanzhao Tao Xiaofeng National Engineering Laboratory for Mobile Network Technologies Beijing University of Posts and TelecommunicationsBeijing 100876China National Computer Network Emergency Response Technical Team/Coordination Center of China(CNCERT/CC) Beijing 100029China Department of Broadband Communication Peng Cheng LaboratoryShenzhen 518055China
UAV-aided cellular networks,millimeter wave(mm-wave) communications and multi-antenna techniques are viewed as promising components of the solution for beyond-5G(B5G) and even 6G *** leveraging the power of stochastic... 详细信息
来源: 评论
Dual-Mode Resonant Sectorial Monopole Antenna with Stable Backfire Gain
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1478-1486页
作者: Feiyan JI Heng ZHANG Xiuqiong XING Wenjun LU Lei ZHU Jiangsu Key Laboratory of Wireless Communications Nanjing University of Posts and Telecommunications Key Laboratory of Wireless Sensor Network & Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Department of Electrical and Computer Engineering Faculty of Science and Technology University of Macau
A novel design approach to wideband, dual-mode resonant monopole antenna with stable, enhanced backfire gain is advanced. The sectorial monopole evolves from a linear, 0.75-wavelength electric prototype monopole under... 详细信息
来源: 评论
A Robust Indoor Vehicle Localization Strategy Based on UWB and INS
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 7292-7302页
作者: Cheng, Long Cui, Chen Zhang, Hao Northeastern University Department of Computer and Communication Engineering Qinhuangdao066004 China Northeastern University Hebei Key Laboratory of Marine Perception Network and Data Processing Qinhuangdao066004 China
High-precision indoor vehicle localization technology has recently been a research hotspot for indoor location services. This paper investigate the indoor combined positioning technology based on Ultra wide band (UWB)... 详细信息
来源: 评论