咨询与建议

限定检索结果

文献类型

  • 2,260 篇 会议
  • 1,842 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 4,112 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,652 篇 工学
    • 1,787 篇 计算机科学与技术...
    • 1,427 篇 软件工程
    • 755 篇 信息与通信工程
    • 378 篇 电气工程
    • 320 篇 电子科学与技术(可...
    • 261 篇 控制科学与工程
    • 243 篇 生物工程
    • 166 篇 光学工程
    • 162 篇 机械工程
    • 146 篇 仪器科学与技术
    • 136 篇 生物医学工程(可授...
    • 115 篇 网络空间安全
    • 93 篇 动力工程及工程热...
    • 89 篇 化学工程与技术
    • 78 篇 核科学与技术
    • 73 篇 交通运输工程
    • 64 篇 安全科学与工程
  • 1,316 篇 理学
    • 632 篇 数学
    • 425 篇 物理学
    • 267 篇 生物学
    • 193 篇 统计学(可授理学、...
    • 119 篇 系统科学
    • 95 篇 化学
  • 669 篇 管理学
    • 398 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 155 篇 工商管理
  • 109 篇 医学
    • 86 篇 临床医学
    • 73 篇 基础医学(可授医学...
  • 108 篇 法学
    • 70 篇 社会学
  • 64 篇 经济学
    • 63 篇 应用经济学
  • 31 篇 农学
  • 21 篇 军事学
  • 15 篇 文学
  • 12 篇 教育学
  • 8 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 105 篇 computer network...
  • 99 篇 semantics
  • 96 篇 feature extracti...
  • 82 篇 laboratories
  • 82 篇 protocols
  • 73 篇 computational mo...
  • 70 篇 bandwidth
  • 65 篇 accuracy
  • 63 篇 computer science
  • 63 篇 deep learning
  • 60 篇 quality of servi...
  • 59 篇 training
  • 57 篇 wireless sensor ...
  • 53 篇 security
  • 49 篇 routing
  • 48 篇 cryptography
  • 47 篇 network topology
  • 46 篇 computer archite...
  • 45 篇 authentication

机构

  • 159 篇 school of comput...
  • 150 篇 centro brasileir...
  • 149 篇 national and kap...
  • 149 篇 istanbul technic...
  • 148 篇 university of sp...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 146 篇 academy of scien...
  • 145 篇 brunel universit...
  • 145 篇 indian institute...
  • 145 篇 charles universi...
  • 141 篇 university of de...
  • 140 篇 department of ph...
  • 139 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 137 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 130 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,751 篇 英文
  • 247 篇 其他
  • 125 篇 中文
检索条件"机构=Computer Engineering and Network Laboratory"
4112 条 记 录,以下是391-400 订阅
排序:
Color Correction Meets Cross-Spectral Refinement: A Distribution-Aware Diffusion for Underwater Image Restoration
arXiv
收藏 引用
arXiv 2025年
作者: Chang, Laibin Wang, Yunke Du, Bo Xu, Chang The School of Computer Science Institute of Artificial Intelligence National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China The School of Computer Science The University of Sydney Australia
Underwater imaging often suffers from significant visual degradation, which limits its suitability for subsequent applications. While recent underwater image enhancement (UIE) methods rely on the current advances in d... 详细信息
来源: 评论
Mixed Color Channels (MCC): A Universal Module for Mixed Sample Data Augmentation Methods
Mixed Color Channels (MCC): A Universal Module for Mixed Sam...
收藏 引用
2022 IEEE International Conference on Multimedia and Expo, ICME 2022
作者: Wei, Yang Ma, Jianfeng Jiang, Zhongyuan Xiao, Bin School of Cyber Engineering Xidian University China Shaanxi Key Laboratory of Network and System Security China School of Computer Science and Technology Chongqing University of Posts and Telecommunication China
Color invariance is critical for computer vision systems since it significantly increases the robustness and effectiveness of the system. MSDA approaches (e.g., FMix and CutMix) have attracted considerable attention i... 详细信息
来源: 评论
Modeling of unsupervised knowledge graph of events based on mutual information among neighbor domains and sparse representation
收藏 引用
Defence Technology(防务技术) 2022年 第12期18卷 2150-2159页
作者: Jing-Tao Sun Jing-Ming Li Qiu-Yu Zhang School of Computer Science and Technology Xi'an University of Posts and TelecommunicationsXi'anShaanxi710121China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an University of Posts and TelecommunicationsXi'anShaanxi710121China School of Management Science and Engineering Anhui University of Finance and EconomicsBengbuAnhui230030China School of Computer and Communication Lanzhou University of TechnologyLanzhouGansu730050China
Text event mining,as an indispensable method of text mining processing,has attracted the extensive attention of researchers.A modeling method for knowledge graph of events based on mutual information among neighbor do... 详细信息
来源: 评论
Wrong-of-Thought: An Integrated Reasoning Framework with Multi-Perspective Verification and Wrong Information
Wrong-of-Thought: An Integrated Reasoning Framework with Mul...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Zhang, Yongheng Chen, Qiguang Zhou, Jingxuan Wang, Peng Si, Jiasheng Wang, Jin Lu, Wenpeng Qin, Libo School of Computer Science and Engineering Central South University China Research Center for SCIR Harbin Institute of Technology Harbin China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China Yunnan University Kunming China
Chain-of-Thought (CoT) has become a vital technique for enhancing the performance of Large Language Models (LLMs), attracting increasing attention from researchers. One stream of approaches focuses on the iterative en...
来源: 评论
MICABAC: Multidimensional Industrial Control Attribute-Based Access Control Model
MICABAC: Multidimensional Industrial Control Attribute-Based...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Wang, Hangyu Lv, Fei Chen, Yuqi Si, Shuaizong Pan, Zhiwen Sun, Degang Sun, Limin Institute of Information Engineering Cas Beijing Key Laboratory of Iot Information Security Technology Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Shanghai Tech University Shanghai China Computer Network Information Center Chinese Academy of Sciences Beijing China
As the Industrial Control System (ICS) increasingly merges with the Internet, the security threats have been increasing from internal users and external hackers. These challenges are further intensified by the facts: ... 详细信息
来源: 评论
Application of Improved Canny Algorithm in Image Edge Detection
Application of Improved Canny Algorithm in Image Edge Detect...
收藏 引用
International Conference on computers, Communications, and Systems (ICCCS)
作者: Siyang Xu Peng Zhang Xin Song Runfeng Zhang Hebei Key Laboratory of Marine Perception Network and Data Processing School of Computer and Communication Engineering Northeastern University at Qinhuangdao Qinhuangdao China School of Computer and Communication Engineering Northeastern University at Qinhuangdao Qinhuangdao China
To solve the problems of poor denoising effect and limited threshold accuracy in traditional Canny algorithm, an improved Canny algorithm is proposed in this paper. Firstly, an image preprocessing method based on hybr... 详细信息
来源: 评论
Entity Disambiguation Based on UCL Knowledge Space
Entity Disambiguation Based on UCL Knowledge Space
收藏 引用
2021 IEEE International Conference on Artificial Intelligence and Industrial Design, AIID 2021
作者: Xinchen, Chang Peng, Yang School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
Named entity disambiguation is an important task in the process of knowledge space construction and improvement, which builds a bridge between entities in text and entities in knowledge space. However, the existing en... 详细信息
来源: 评论
SQAT-LD: SPeech Quality Assessment Transformer Utilizing Listener Dependent Modeling for Zero-Shot Out-of-Domain MOS Prediction
SQAT-LD: SPeech Quality Assessment Transformer Utilizing Lis...
收藏 引用
IEEE Workshop on Automatic Speech Recognition and Understanding
作者: Kailai Shen Diqun Yan Li Dong Ying Ren Xiaoxun Wu Jing Hu Faculty of Electrical Engineering and Computer Science Ningbo University Zhejiang Key Laboratory of Mobile Network Application Technology
In this paper, we propose the speech quality assessment transformer utilizing listener dependent modeling (SQAT-LD) mean opinion score (MOS) prediction system, which was submitted to the 2023 VoiceMOS Challenge. The s...
来源: 评论
Low Light RGB and IR Image Fusion with Selective CNN-Transformer network
Low Light RGB and IR Image Fusion with Selective CNN-Transfo...
收藏 引用
IEEE International Conference on Image Processing
作者: Haiyan Jin Yue Yang Haonan Su Zhaolin Xiao Bin Wang School of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In low-light images, contrast and brightness are corrupted, making it difficult to accurately percept detail and edge information with the naked eye. Because of the development of multi sensor imaging, RGB-IR image fu...
来源: 评论
YOLOv8-GR: Gesture Recognition by Improving of YOLOv8 Algorithm
YOLOv8-GR: Gesture Recognition by Improving of YOLOv8 Algori...
收藏 引用
International Conference on Advanced Cloud and Big Data (CBD)
作者: Yi Ding Naixuan Guo Haitao Meng School of Information Engineering Yancheng Institute of Technology Yancheng China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education
Gesture recognition has been widely used in many situations, such as human-computer interaction, virtual reality and smart home. To meet the current demands for accuracy and speed in gesture recognition, this paper pr... 详细信息
来源: 评论