咨询与建议

限定检索结果

文献类型

  • 2,260 篇 会议
  • 1,842 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 4,112 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,652 篇 工学
    • 1,787 篇 计算机科学与技术...
    • 1,427 篇 软件工程
    • 755 篇 信息与通信工程
    • 378 篇 电气工程
    • 320 篇 电子科学与技术(可...
    • 261 篇 控制科学与工程
    • 243 篇 生物工程
    • 166 篇 光学工程
    • 162 篇 机械工程
    • 146 篇 仪器科学与技术
    • 136 篇 生物医学工程(可授...
    • 115 篇 网络空间安全
    • 93 篇 动力工程及工程热...
    • 89 篇 化学工程与技术
    • 78 篇 核科学与技术
    • 73 篇 交通运输工程
    • 64 篇 安全科学与工程
  • 1,316 篇 理学
    • 632 篇 数学
    • 425 篇 物理学
    • 267 篇 生物学
    • 193 篇 统计学(可授理学、...
    • 119 篇 系统科学
    • 95 篇 化学
  • 669 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 155 篇 工商管理
  • 109 篇 医学
    • 86 篇 临床医学
    • 73 篇 基础医学(可授医学...
  • 108 篇 法学
    • 70 篇 社会学
  • 64 篇 经济学
    • 63 篇 应用经济学
  • 31 篇 农学
  • 21 篇 军事学
  • 15 篇 文学
  • 12 篇 教育学
  • 8 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 105 篇 computer network...
  • 99 篇 semantics
  • 96 篇 feature extracti...
  • 82 篇 laboratories
  • 82 篇 protocols
  • 73 篇 computational mo...
  • 70 篇 bandwidth
  • 65 篇 accuracy
  • 63 篇 computer science
  • 63 篇 deep learning
  • 60 篇 quality of servi...
  • 59 篇 training
  • 57 篇 wireless sensor ...
  • 53 篇 security
  • 49 篇 routing
  • 48 篇 cryptography
  • 47 篇 network topology
  • 46 篇 computer archite...
  • 45 篇 authentication

机构

  • 159 篇 school of comput...
  • 150 篇 centro brasileir...
  • 149 篇 national and kap...
  • 149 篇 istanbul technic...
  • 148 篇 university of sp...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 146 篇 academy of scien...
  • 145 篇 brunel universit...
  • 145 篇 indian institute...
  • 145 篇 charles universi...
  • 141 篇 university of de...
  • 140 篇 department of ph...
  • 139 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 137 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 130 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,751 篇 英文
  • 247 篇 其他
  • 125 篇 中文
检索条件"机构=Computer Engineering and Network Laboratory"
4112 条 记 录,以下是351-360 订阅
排序:
Classification of Zhuang Dialect combined with Bert and SimAM
Classification of Zhuang Dialect combined with Bert and SimA...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Min Huang Xuejun Zhang Wenkang Chen School of Computer Electronics and Information Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi University Nanning China School of Electrical Engineering Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi University Nanning China
Language recognition refers to the automatic recognition of the language type of the given speech segments. Zhuang is an important language in Southeast Asia, with more than 16 million native speakers. Due to the scar... 详细信息
来源: 评论
GAF-GAN: Gated Attention Feature Fusion Image Inpainting network Based on Generative Adversarial network  29
GAF-GAN: Gated Attention Feature Fusion Image Inpainting Net...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Qiu, Ran Liang, Hu Liu, Yuchen Zhao, Shengrong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Qilu University of Technology Shandong Academy of Sciences Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Image inpainting, which aims to reconstruct reasonably clear and realistic images from known pixel information, is one of the core problems in computer vision. However, due to the complexity and variability of the und... 详细信息
来源: 评论
TPMARL-MSS Thought-Perception Multi-Agent Reinforcement Learning Meeting Scheduling System  25
TPMARL-MSS Thought-Perception Multi-Agent Reinforcement Lear...
收藏 引用
25th IEEE International Conferences on High Performance Computing and Communications, 9th International Conference on Data Science and Systems, 21st IEEE International Conference on Smart City and 9th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Zhang, Jinsong Mao, Xiaoxuan Li, Lu Wu, Hanqian Joint Graduate School Southeast University Nanjing China College of Software Engineering Southeast University Nanjing China School of Cyber Science and Engineering Southeast University Nanjing China School of Cyber Science and Engineering Southeast University Key Laboratory of Computer Network and Information Integration of Ministry of Education Nanjing China
In today's evolving society, the increasing complexity and frequency of meetings necessitate advanced scheduling systems. Traditional methods are constrained by rigid prede-fined strategies, lack intelligent negot... 详细信息
来源: 评论
50-km Weakly-coupled Transmission with L-band 4-LP-mode FM-EDFA
50-km Weakly-coupled Transmission with L-band 4-LP-mode FM-E...
收藏 引用
2024 Asia Communications and Photonics Conference, ACP 2024 and International Conference on Information Photonics and Optical Communications, IPOC 2024
作者: Huang, Shuailuo Zhu, Baolong Qiao, Gang Gao, Yuyang Zuo, Mingqing Shen, Shikui Wang, Zelin He, Yongqi Chen, Zhangyuan Li, Juhao Chen, Zhangyuan Li, Juhao China Unicom Research Institute Beijing China State Key Laboratory of Advanced Optical Communication Systems and Networks Peking University Beijing China School of Computer and Communication Engineering University of Science and Technology Beijing Beijing China Department of Fundamental Network Technology China Mobile Research Institute Beijing China Pengcheng National Laboratory Shenzhen China
50-km weakly-coupled transmission based on a L-band 4-LP-mode FM-EDFA is experimentally demonstrated only adopting 2×2 or 4×4 MIMO-DSP. © 2024 IEEE.
来源: 评论
Fine-grainedly Synthesize Streaming Data Based On Large Language Models With Graph Structure Understanding For Data Sparsity
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Xin Zhang, Linhai Zhou, Deyu Xu, Guoqiang School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China SANY Group Co. Ltd China
Due to the sparsity of user data, sentiment analysis on user reviews in e-commerce platforms often suffers from poor performance, especially when faced with extremely sparse user data or long-tail labels. Recently, th... 详细信息
来源: 评论
RTISM: Real-Time Inter-VM Communication Based on Shared Memory for Mixed-Criticality Flows  44
RTISM: Real-Time Inter-VM Communication Based on Shared Memo...
收藏 引用
44th IEEE Real-Time Systems Symposium, RTSS 2023
作者: Li, Zonghong Xie, Guoqi Ma, Wenhong Xiao, Xiongren Xie, Yong Ren, Wei Chang, Wanli College of Computer Science and Electronic Engineering Hunan University Key Laboratory for Embedded and Network Computing of Hunan Province China Research Institute of Hunan University Chongqing China Nanjing University of Posts and Telecommunications China Huawei Technologies China
Virtual machines (VMs) have been increasingly deployed in real-time systems to enhance heterogeneous resource sharing. Despite being isolated for security and prevention of failure propagation, VMs need to communicate... 详细信息
来源: 评论
Dual-Domain Multi-Model GAN Fingerprint Restoration for Compressed Fake Face Attribution
Dual-Domain Multi-Model GAN Fingerprint Restoration for Comp...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Chengxiang Fan Aohong Shen Zhen Han Cai Tong Zhongyuan Wang Dekang Yi National Engineering Research Center for Multimedia Software and Hubei Key Laboratory of Multimedia and Network Communication Engineering School of Computer Science Wuhan University Wuhan China
Recent advances in GAN fingerprint have shown increasing success in fake face attribution. However, the fake faces are usually compressed during network transmission, which causes the degradation of GAN fingerprint an... 详细信息
来源: 评论
Zero-Csc: Low-Light Image Enhancement with Zero-Reference Color Self-Calibration
SSRN
收藏 引用
SSRN 2024年
作者: Jin, Haiyan Chen, Yujia Zuo, Fengyuan Su, Haonan Zhang, YuanLin Department of Computer Science and Engineering Xi’an University of Technology Xi’an 710048 China Shaanxi Key Laboratory for Network Computing and Security Technology
Zero-reference low-light image enhancement (LLIE) techniques mainly focus on grey-scale inhomogeneities, and few approaches consider how to explicitly recover a given dark scene for achieving color and holistic illumi... 详细信息
来源: 评论
LAORA: Location-Aware Orientation Adjustment for MIMO Magnetic Wireless Charging System  21
LAORA: Location-Aware Orientation Adjustment for MIMO Magnet...
收藏 引用
21st Annual IEEE International Conference on Sensing, Communication, and networking, SECON 2024
作者: Kong, Lingchang Wang, Xinyu Zhou, Hao Zhou, Fengyu Jiang, Shenyao Zhu, Peide Song, Qi Liu, Zhi LINKE Lab School of Computer Science and Technology University of Science and Technology of China China CAS Key Laboratory of Wireless-Optical Communications University of Science and Technology of China China Department of Computer Science City University of Hong Kong Hong Kong School of Mathematics and Statistics Fujian Normal University Fuzhou China Department of Computer and Network Engineering The University of Electro-Communications Tokyo182-8585 Japan
Wireless power transfer (WPT) systems using magnetic resonant coupling (MRC) have made significant progress recently, leading to various optimization methods in scenarios involving multiple-input multiple-output (MIMO... 详细信息
来源: 评论
Key Management and Authentication Scheme Forward Trusted Pervasive Container Computing
Key Management and Authentication Scheme Forward Trusted Per...
收藏 引用
Big Data and Privacy Computing (BDPC), International Conference on
作者: XinHong Hei YuZhan Xue YiChuan Wang YiFan Liu Chen Peng Xiang Sun School of computer science and engineering Xi'an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology School of computer science and engineering Xi'an University of Technology Xi’an China
Cloud computing technology is an internet-based computing model that provides high reliability and security measures, including data backup, secure access control, etc. As Docker containers play a increasingly importa... 详细信息
来源: 评论