咨询与建议

限定检索结果

文献类型

  • 2,260 篇 会议
  • 1,842 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 4,112 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,652 篇 工学
    • 1,787 篇 计算机科学与技术...
    • 1,427 篇 软件工程
    • 755 篇 信息与通信工程
    • 378 篇 电气工程
    • 320 篇 电子科学与技术(可...
    • 261 篇 控制科学与工程
    • 243 篇 生物工程
    • 166 篇 光学工程
    • 162 篇 机械工程
    • 146 篇 仪器科学与技术
    • 136 篇 生物医学工程(可授...
    • 115 篇 网络空间安全
    • 93 篇 动力工程及工程热...
    • 89 篇 化学工程与技术
    • 78 篇 核科学与技术
    • 73 篇 交通运输工程
    • 64 篇 安全科学与工程
  • 1,316 篇 理学
    • 632 篇 数学
    • 425 篇 物理学
    • 267 篇 生物学
    • 193 篇 统计学(可授理学、...
    • 119 篇 系统科学
    • 95 篇 化学
  • 669 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 155 篇 工商管理
  • 109 篇 医学
    • 86 篇 临床医学
    • 73 篇 基础医学(可授医学...
  • 108 篇 法学
    • 70 篇 社会学
  • 64 篇 经济学
    • 63 篇 应用经济学
  • 31 篇 农学
  • 21 篇 军事学
  • 15 篇 文学
  • 12 篇 教育学
  • 8 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 105 篇 computer network...
  • 99 篇 semantics
  • 96 篇 feature extracti...
  • 82 篇 laboratories
  • 82 篇 protocols
  • 73 篇 computational mo...
  • 70 篇 bandwidth
  • 65 篇 accuracy
  • 63 篇 computer science
  • 63 篇 deep learning
  • 60 篇 quality of servi...
  • 59 篇 training
  • 57 篇 wireless sensor ...
  • 53 篇 security
  • 49 篇 routing
  • 48 篇 cryptography
  • 47 篇 network topology
  • 46 篇 computer archite...
  • 45 篇 authentication

机构

  • 159 篇 school of comput...
  • 150 篇 centro brasileir...
  • 149 篇 national and kap...
  • 149 篇 istanbul technic...
  • 148 篇 university of sp...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 146 篇 academy of scien...
  • 145 篇 brunel universit...
  • 145 篇 indian institute...
  • 145 篇 charles universi...
  • 141 篇 university of de...
  • 140 篇 department of ph...
  • 139 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 137 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 130 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,751 篇 英文
  • 247 篇 其他
  • 125 篇 中文
检索条件"机构=Computer Engineering and Network Laboratory"
4112 条 记 录,以下是331-340 订阅
排序:
Probability analysis of system vulnerability distribution based on the matroid theory
Probability analysis of system vulnerability distribution ba...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Yichuan Wang Peipei Li Xin Song Yeqiu Xiao Xiaoxue Liu School of computer science and engineering Xi’an University of technology Xi’an China Shanxi Key Laboratory for Network Computing and Security Technology
In recent years, system vulnerability mining techniques have emerged in an endless stream. At present, the existing vulnerability mining techniques are mainly to analyze the source code or monitor and analyze the beha... 详细信息
来源: 评论
A Dual-View Fusion network for Automatic Spinal Keypoint Detection in Biplane X-ray Images
A Dual-View Fusion Network for Automatic Spinal Keypoint Det...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Zhou, Dandan Guo, Lijun Zhang, Rong He, Xiuchao Wang, Qiang Wang, Jianhua Ningbo University The Faculty of Electrical Engineering and Computer Science Ningbo China The Zhejiang Key Laboratory of Mobile Network Application Technology Ningbo China The Affiliated Hospital of Medicine School of Ningbo University The Department of Radiology Ningbo China
Accurate keypoint detection in medical images of the spine is critical for the assessment, diagnosis, treatment planning, and clinical investigation of spinal deformities. However, due to severe occlusions of spinal s... 详细信息
来源: 评论
IIESC-Net: Incorporating Implicit and Explicit Structural Constraints for Hip Joint Landmark Detection in pelvic X-ray
IIESC-Net: Incorporating Implicit and Explicit Structural Co...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Zhang, Jing Guo, Lijun Ni, Lixin He, Xiuchao Wang, Jianhua Zhang, Rong Ningbo University The Faculty of Electrical Engineering and Computer Science Ningbo China The Zhejiang Key Laboratory of Mobile Network Application Technology Ningbo China The Affiliated Hospital of Medicine School of Ningbo University The Department of Radiology Ningbo China
The hip joint, a vital weight-bearing joint in the human body, is susceptible to various hip-related diseases. The accurate identification of anatomical landmarks in the hip joint is essential for both disease diagnos... 详细信息
来源: 评论
Hyperspectral Band Selection Based on Classification Reward Adjustment
Hyperspectral Band Selection Based on Classification Reward ...
收藏 引用
IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS)
作者: Jing Hu Jiawei Liang Yunfei Ju Minghua Zhao Shaanxi Key Laboratory for Network Computing and Security Technology School of Computer Science and Engineering Xi'an University of Technology Xi'an China
Hyperspectral image band selection is a crucial link in image processing. It is necessary to screen out bands with rich information and low correlation, to achieve data dimensionality reduction and retain key informat... 详细信息
来源: 评论
Boosting Consistency in Dual Training for Long-Tailed Semi-Supervised Learning
arXiv
收藏 引用
arXiv 2024年
作者: Gan, Kai Wei, Tong Zhang, Min-Ling The School of Computer Science and Engineering Southeast University Nanjing210096 China The Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
While long-tailed semi-supervised learning (LTSSL) has received tremendous attention in many real-world classification problems, existing LTSSL algorithms typically assume that the class distributions of labeled and u... 详细信息
来源: 评论
Research on Code Virtualization Methods for Cloud Applications
Research on Code Virtualization Methods for Cloud Applicatio...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Zhoukai Wang Zuoyan Xu Yaling Zhang Xin Song Yichuan Wang School of computer science and engineering Xi’an University of technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology
With the vigorous development of technologies such as the Internet, mobile devices, and the Internet of Things, cloud services have gained a crucial position in our life and have become an essential part of daily oper... 详细信息
来源: 评论
A Rolling Bearing Fault Diagnosis Method Using Multi-Sensor Data and Periodic Sampling
A Rolling Bearing Fault Diagnosis Method Using Multi-Sensor ...
收藏 引用
2022 IEEE International Conference on Multimedia and Expo, ICME 2022
作者: Zheng, Jianbo Yang, Chao Zheng, Fangrong Jiang, Bin College of Computer Science and Electronic Engineering Hunan University China Key Laboratory for Embedded and Network Computing of Hunan Province China School of Computational Science and Electronics Hunan Institute of Engineering China
In recent years, bearing fault diagnosis based on deep learning has gradually become the mainstream. However, the existing studies still have some defects, such as unreasonable sampling and incomplete utilization of b... 详细信息
来源: 评论
Innovations in Machine Learning for Flight Delay Prediction: A Targeted Overview
Innovations in Machine Learning for Flight Delay Prediction:...
收藏 引用
computers and Artificial Intelligence Technologies (CAIT), International Conference on
作者: Wei Wei Chenchen Yu Zhao Yang Fu Bo School of Computer Science and Engineering and the Shaanxi Key Laboratory for Network Computing and Security Xi'an University Of Technology Xi’an China School of Computer Science and Engineering Xi'an University Of Technology Xi’an China
Artificial intelligence technology is increasingly being applied to air traffic flow forecasting. Based on the core data of Web of Science, this study uses bibliometrics and content review methods to investigate the c... 详细信息
来源: 评论
RDGFuzz: A directed greybox fuzzing optimization method based on Rich-Branch nodes  6
RDGFuzz: A directed greybox fuzzing optimization method base...
收藏 引用
6th International Conference on Electronic Information Technology and computer engineering, EITCE 2022
作者: Wu, Zejun Lu, Li Jia, Qiong Chen, Zhihao State Key Laboratory of Mathematical Engineering and advanced Computing Zheng zhou China National Local Joint Engineering Laboratory of Network Space Security Technology Zheng zhou China Beijing Institute of Computer Technology and Application BeiJing China
Directed fuzzing technology is one of the key technologies to quickly reach a specific location of software, and to conduct targeted testing or bug recurrence. However, directed fuzzing technology has some problems, s... 详细信息
来源: 评论
Don’t Abandon the Primary Key: A High-Synchronization and Robust Virtual Primary Key Scheme for Watermarking Relational Databases  26th
Don’t Abandon the Primary Key: A High-Synchronization and...
收藏 引用
26th International Conference on Information and Communications Security, ICICS 2024
作者: Yang, Ke Yuan, Shuguang Yu, Jing Wang, Yuyang Yang, Tengfei Chen, Chi Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Cyberspace Security Defense Beijing China National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
A relational database is an infrastructure that manages and shares structured data. To safeguard the copyrights of data within such databases, database watermarking is an effective technique. Most watermarking schemes... 详细信息
来源: 评论