咨询与建议

限定检索结果

文献类型

  • 2,263 篇 会议
  • 1,855 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 4,128 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,667 篇 工学
    • 1,802 篇 计算机科学与技术...
    • 1,426 篇 软件工程
    • 760 篇 信息与通信工程
    • 380 篇 电气工程
    • 322 篇 电子科学与技术(可...
    • 273 篇 控制科学与工程
    • 243 篇 生物工程
    • 162 篇 机械工程
    • 160 篇 光学工程
    • 146 篇 仪器科学与技术
    • 134 篇 生物医学工程(可授...
    • 118 篇 网络空间安全
    • 94 篇 动力工程及工程热...
    • 89 篇 化学工程与技术
    • 78 篇 核科学与技术
    • 73 篇 交通运输工程
    • 64 篇 安全科学与工程
  • 1,316 篇 理学
    • 633 篇 数学
    • 425 篇 物理学
    • 266 篇 生物学
    • 194 篇 统计学(可授理学、...
    • 120 篇 系统科学
    • 98 篇 化学
  • 670 篇 管理学
    • 399 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 155 篇 工商管理
  • 110 篇 医学
    • 87 篇 临床医学
    • 73 篇 基础医学(可授医学...
  • 107 篇 法学
    • 69 篇 社会学
  • 64 篇 经济学
    • 63 篇 应用经济学
  • 31 篇 农学
  • 21 篇 军事学
  • 15 篇 文学
  • 11 篇 教育学
  • 9 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 105 篇 computer network...
  • 100 篇 semantics
  • 96 篇 feature extracti...
  • 82 篇 laboratories
  • 82 篇 protocols
  • 73 篇 computational mo...
  • 71 篇 bandwidth
  • 66 篇 deep learning
  • 65 篇 accuracy
  • 63 篇 computer science
  • 60 篇 quality of servi...
  • 60 篇 training
  • 57 篇 wireless sensor ...
  • 55 篇 security
  • 49 篇 routing
  • 48 篇 cryptography
  • 47 篇 computer archite...
  • 47 篇 network topology
  • 45 篇 authentication

机构

  • 162 篇 school of comput...
  • 150 篇 centro brasileir...
  • 149 篇 national and kap...
  • 149 篇 istanbul technic...
  • 148 篇 university of sp...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 146 篇 academy of scien...
  • 145 篇 brunel universit...
  • 145 篇 indian institute...
  • 145 篇 charles universi...
  • 141 篇 university of de...
  • 140 篇 department of ph...
  • 139 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 137 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 130 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,749 篇 英文
  • 263 篇 其他
  • 127 篇 中文
检索条件"机构=Computer Engineering and Network Laboratory"
4128 条 记 录,以下是271-280 订阅
排序:
A Framework for Formal Transformation and Analysis of Smart Contract Code  9
A Framework for Formal Transformation and Analysis of Smart ...
收藏 引用
9th International Conference on Dependable Systems and Their Applications, DSA 2022
作者: Dong, Hanjie He, Yaqiong Tao, Hongwei Duan, Qianheng College of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China Henan Key Laboratory of Network Cryptography Technology Zhengzhou China
The smart contract technology has drawn extensive attention in recent years. However, attributing to the immutability of blockchain, a smart contract cannot be altered once deployed on chain. Even a simple flaw in a s... 详细信息
来源: 评论
Multimodal Multi-objective Particle Swarm Optimization Algorithm Based on Multi-directional Guidance  4
Multimodal Multi-objective Particle Swarm Optimization Algor...
收藏 引用
4th International Conference on High Performance Big Data and Intelligent Systems, HDIS 2022
作者: Li, Wei Gao, Yetong Wang, Lei School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
In multimodal multi-objective optimization, the key issue is to find as many Pareto optimal solutions as possible and select promising solutions in the environmental selection. This paper proposes a multimodal multi-o... 详细信息
来源: 评论
An Efficient Direct Downlink Sensing Method Using 5G NR SSB Signals in Perceptive Mobile networks
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 15360-15369页
作者: Li, Hang Xiang, Yang Guo, Qinghua Liu, Lizhe Huang, Xiaojing Cheng, Zhiqun Pang, Yashan Hangzhou Dianzi University School of Electronics and Information Hangzhou310018 China Academy of Network and Communications of CETC National Key Laboratory of Advanced Communication Networks Hebei Shijiazhuang050081 China University of Wollongong School of Electrical Computer and Telecommunications Engineering WollongongNSW2522 Australia University of Technology Sydney Global Big Data Technologies Centre UltimoNSW2007 Australia
In perceptive mobile networks (PMNs), using 5G new radio (NR) signals for direct sensing poses a significant challenge to practical implementation due to the high computational complexity involved in estimating sensin... 详细信息
来源: 评论
TRNet: Two-Tier Recursion network for Co-Salient Object Detection
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年 第6期35卷 5844-5857页
作者: Cong, Runmin Yang, Ning Liu, Hongyu Zhang, Dingwen Huang, Qingming Kwong, Sam Zhang, Wei Shandong University School of Control Science and Engineering Jinan250061 China Ministry of Education Key Laboratory of Machine Intelligence and System Control Jinan250061 China Beijing Jiaotong University Institute of Information Science Beijing100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China Northwestern Polytechnical University Brain and Artificial Intelligence Laboratory School of Automation Xi'an710129 China University of Chinese Academy of Sciences School of Computer Science and Technology Beijing101408 China Lingnan University Hong Kong
Co-salient object detection (CoSOD) is to find the salient and recurring objects from a series of relevant images, where modeling inter-image relationships plays a crucial role. Different from the commonly used direct... 详细信息
来源: 评论
Block-Streaming Service Loading Optimization of Android Dalvik Executable File for Cloud-End Collaboration
Block-Streaming Service Loading Optimization of Android Dalv...
收藏 引用
2022 International Conference on networking and network Applications, NaNA 2022
作者: Wang, Yichuan Feng, Yanhua Du, Yanning Hei, Xinhong Tian, Yuying Cui, Xiangjie School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
In recent years, dynamic loading technologies of Android applications have emerged in an endless stream. At present, the existing Android application loading method is to load the entire Android Dalvik Executable (DEX... 详细信息
来源: 评论
Smartphone-based colorimetric detection of formaldehyde in the air
收藏 引用
Building Simulation 2024年 第11期17卷 2007-2015页
作者: Meng Yang Jin Ye Tao Yu Ying Song Hua Qian Tianyi Liu Yang Chen Junqi Wang Shi-jie Cao Cong Liu School of Energy and Environment Southeast UniversityNanjing210096China School of Energy and Power Jiangsu University of Science and TechnologyZhenjiangJiangsu212100China Wuhan Second Ship Design and Research Institute Wuhan430205China Hubei Provincial Engineering and Technology Research Center for Food Quality and Safety Test Hubei Provincial Institute for Food Supervision and TestWuhan430075China Laboratory of Image Science and Technology the School of Computer Science and EngineeringSoutheast UniversityNanjingChina Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing Southeast UniversityNanjingChina School of Cyber Science and Engineering Southeast UniversityNanjingChina Key Laboratory of Computer Network and Information Integration Southeast UniversityMinistry of EducationNanjingChina School of Architecture Southeast UniversityNanjingChina Jiangsu Province Engineering Research Center of Urban Heat and Pollution Control Southeast UniversityNanjingChina Global Centre for Clean Air Research(GCARE) University of SurreyGuildfordUK
Adverse impacts of exposure to formaldehyde on human health significantly increases attention in monitoring formaldehyde concentrations in the *** formaldehyde detection methods typically rely on large and costly inst... 详细信息
来源: 评论
Research on active defense decision-making method for cloud boundary networks based on reinforcement learning of intelligent agent
收藏 引用
High-Confidence Computing 2024年 第2期4卷 50-61页
作者: Huan Wang Yunlong Tang Yan Wang Ning Wei Junyi Deng Zhiyan Bin Weilong Li School of Computer Science and Technology Guangxi University of Science and TechnologyLiuzhou 545000China Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Liuzhou 545000China Guangxi Education System Network Security Monitoring Center Liuzhou 545000China Center of Graphics and Information Guangxi ECO-Engineering Vocational&Technical CollegeLiuzhou 545004China
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environ... 详细信息
来源: 评论
A Two-Stage Chinese Medical Video Retrieval Framework with LLM  12th
A Two-Stage Chinese Medical Video Retrieval Framework with ...
收藏 引用
12th National CCF Conference on Natural Language Processing and Chinese Computing, NLPCC 2023
作者: Lei, Ningjie Cai, Jinxiang Qian, Yixin Zheng, Zhilong Han, Chao Liu, Zhiyue Huang, Qingbao School of Electrical Engineering Guangxi University Guangxi Nanning China School of Computer Electronics and Information Guangxi University Guangxi Nanning China Guangxi Key Laboratory of Multimedia Communications and Network Technology Nanning China
With the increasing popularity of online videos, research on video corpus retrieval (VCR) has made significant progress. However, existing VCR models have not performed well in the medical field due to the unique char... 详细信息
来源: 评论
Visible Light Positioning Method for Indoor Line-of-Sight Scene Based on Time Series Coding  9
Visible Light Positioning Method for Indoor Line-of-Sight Sc...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Yu, Yonghao Guo, Yongde Zhao, Dawei Fu, Kexue Tang, Yongwei Wang, Qinyuan City University of Macau Faculty of Data Science China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong University School of Mechanical Engineering Key Laboratory of High Efficiency and Clean Mechanical Manufacture Ministry of Education Jinan China
Existing indoor visible light positioning methods, such as those based on fingerprint database algorithms, are complex to construct and consume significant resources. In response to this issue, the text proposes an en... 详细信息
来源: 评论
Holistic WCRT Analysis for Global Fixed-Priority Preemptive Multiprocessor Scheduling  23
Holistic WCRT Analysis for Global Fixed-Priority Preemptive ...
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Guoqi Xie Chenglai Xiong Wei Wu Renfa Li Wanli Chang Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan University China.
Many embedded applications demand both resource efficiency and timing guarantee. However, resource sharing naturally complicates the analysis that extracts the worst-case scenario out of contention. Global Fixed-Prior...
来源: 评论