咨询与建议

限定检索结果

文献类型

  • 2,278 篇 会议
  • 1,828 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 4,116 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,649 篇 工学
    • 1,772 篇 计算机科学与技术...
    • 1,412 篇 软件工程
    • 744 篇 信息与通信工程
    • 368 篇 电气工程
    • 321 篇 电子科学与技术(可...
    • 256 篇 控制科学与工程
    • 240 篇 生物工程
    • 163 篇 光学工程
    • 162 篇 机械工程
    • 147 篇 仪器科学与技术
    • 133 篇 生物医学工程(可授...
    • 114 篇 网络空间安全
    • 91 篇 动力工程及工程热...
    • 91 篇 核科学与技术
    • 90 篇 化学工程与技术
    • 73 篇 交通运输工程
    • 65 篇 安全科学与工程
  • 1,305 篇 理学
    • 627 篇 数学
    • 424 篇 物理学
    • 264 篇 生物学
    • 192 篇 统计学(可授理学、...
    • 117 篇 系统科学
    • 96 篇 化学
  • 659 篇 管理学
    • 391 篇 管理科学与工程(可...
    • 281 篇 图书情报与档案管...
    • 153 篇 工商管理
  • 106 篇 法学
    • 70 篇 社会学
  • 105 篇 医学
    • 83 篇 临床医学
    • 72 篇 基础医学(可授医学...
  • 63 篇 经济学
    • 62 篇 应用经济学
  • 31 篇 农学
  • 21 篇 军事学
  • 15 篇 文学
  • 12 篇 教育学
  • 8 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 103 篇 semantics
  • 103 篇 computer network...
  • 102 篇 feature extracti...
  • 84 篇 protocols
  • 82 篇 laboratories
  • 77 篇 computational mo...
  • 75 篇 accuracy
  • 70 篇 bandwidth
  • 66 篇 training
  • 62 篇 computer science
  • 61 篇 deep learning
  • 60 篇 quality of servi...
  • 56 篇 wireless sensor ...
  • 56 篇 security
  • 49 篇 cryptography
  • 48 篇 routing
  • 48 篇 computer archite...
  • 46 篇 authentication
  • 46 篇 telecommunicatio...

机构

  • 150 篇 school of comput...
  • 149 篇 centro brasileir...
  • 148 篇 national and kap...
  • 148 篇 istanbul technic...
  • 147 篇 yerevan physics ...
  • 146 篇 universidad iber...
  • 146 篇 university of sp...
  • 145 篇 academy of scien...
  • 144 篇 brunel universit...
  • 144 篇 indian institute...
  • 143 篇 charles universi...
  • 140 篇 university of de...
  • 138 篇 rwth aachen univ...
  • 138 篇 department of ph...
  • 137 篇 università di to...
  • 137 篇 imperial college...
  • 134 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 130 篇 indian institute...
  • 129 篇 department of ph...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,572 篇 英文
  • 438 篇 其他
  • 122 篇 中文
检索条件"机构=Computer Engineering and Network Laboratory"
4116 条 记 录,以下是401-410 订阅
排序:
MICABAC: Multidimensional Industrial Control Attribute-Based Access Control Model
MICABAC: Multidimensional Industrial Control Attribute-Based...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Wang, Hangyu Lv, Fei Chen, Yuqi Si, Shuaizong Pan, Zhiwen Sun, Degang Sun, Limin Institute of Information Engineering Cas Beijing Key Laboratory of Iot Information Security Technology Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Shanghai Tech University Shanghai China Computer Network Information Center Chinese Academy of Sciences Beijing China
As the Industrial Control System (ICS) increasingly merges with the Internet, the security threats have been increasing from internal users and external hackers. These challenges are further intensified by the facts: ... 详细信息
来源: 评论
Modeling of unsupervised knowledge graph of events based on mutual information among neighbor domains and sparse representation
收藏 引用
Defence Technology(防务技术) 2022年 第12期18卷 2150-2159页
作者: Jing-Tao Sun Jing-Ming Li Qiu-Yu Zhang School of Computer Science and Technology Xi'an University of Posts and TelecommunicationsXi'anShaanxi710121China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an University of Posts and TelecommunicationsXi'anShaanxi710121China School of Management Science and Engineering Anhui University of Finance and EconomicsBengbuAnhui230030China School of Computer and Communication Lanzhou University of TechnologyLanzhouGansu730050China
Text event mining,as an indispensable method of text mining processing,has attracted the extensive attention of researchers.A modeling method for knowledge graph of events based on mutual information among neighbor do... 详细信息
来源: 评论
Application of Improved Canny Algorithm in Image Edge Detection
Application of Improved Canny Algorithm in Image Edge Detect...
收藏 引用
International Conference on computers, Communications, and Systems (ICCCS)
作者: Siyang Xu Peng Zhang Xin Song Runfeng Zhang Hebei Key Laboratory of Marine Perception Network and Data Processing School of Computer and Communication Engineering Northeastern University at Qinhuangdao Qinhuangdao China School of Computer and Communication Engineering Northeastern University at Qinhuangdao Qinhuangdao China
To solve the problems of poor denoising effect and limited threshold accuracy in traditional Canny algorithm, an improved Canny algorithm is proposed in this paper. Firstly, an image preprocessing method based on hybr... 详细信息
来源: 评论
Entity Disambiguation Based on UCL Knowledge Space
Entity Disambiguation Based on UCL Knowledge Space
收藏 引用
2021 IEEE International Conference on Artificial Intelligence and Industrial Design, AIID 2021
作者: Xinchen, Chang Peng, Yang School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
Named entity disambiguation is an important task in the process of knowledge space construction and improvement, which builds a bridge between entities in text and entities in knowledge space. However, the existing en... 详细信息
来源: 评论
SQAT-LD: SPeech Quality Assessment Transformer Utilizing Listener Dependent Modeling for Zero-Shot Out-of-Domain MOS Prediction
SQAT-LD: SPeech Quality Assessment Transformer Utilizing Lis...
收藏 引用
IEEE Workshop on Automatic Speech Recognition and Understanding
作者: Kailai Shen Diqun Yan Li Dong Ying Ren Xiaoxun Wu Jing Hu Faculty of Electrical Engineering and Computer Science Ningbo University Zhejiang Key Laboratory of Mobile Network Application Technology
In this paper, we propose the speech quality assessment transformer utilizing listener dependent modeling (SQAT-LD) mean opinion score (MOS) prediction system, which was submitted to the 2023 VoiceMOS Challenge. The s...
来源: 评论
Low Light RGB and IR Image Fusion with Selective CNN-Transformer network
Low Light RGB and IR Image Fusion with Selective CNN-Transfo...
收藏 引用
IEEE International Conference on Image Processing
作者: Haiyan Jin Yue Yang Haonan Su Zhaolin Xiao Bin Wang School of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In low-light images, contrast and brightness are corrupted, making it difficult to accurately percept detail and edge information with the naked eye. Because of the development of multi sensor imaging, RGB-IR image fu...
来源: 评论
YOLOv8-GR: Gesture Recognition by Improving of YOLOv8 Algorithm
YOLOv8-GR: Gesture Recognition by Improving of YOLOv8 Algori...
收藏 引用
International Conference on Advanced Cloud and Big Data (CBD)
作者: Yi Ding Naixuan Guo Haitao Meng School of Information Engineering Yancheng Institute of Technology Yancheng China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education
Gesture recognition has been widely used in many situations, such as human-computer interaction, virtual reality and smart home. To meet the current demands for accuracy and speed in gesture recognition, this paper pr... 详细信息
来源: 评论
UDT:U-shaped deformable transformer for subarachnoid haemorrhage image segmentation
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第3期9卷 756-768页
作者: Wei Xie Lianghao Jin Shiqi Hua Hao Sun Bo Sun Zhigang Tu Jun Liu Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning Central China Normal UniversityWuhanChina School of Computer Science Central China Normal UniversityWuhanChina National Language Resources Monitoring and Research Center for Network Media Central China Normal UniversityWuhanChina The First Affiliated Hospital of Dalian Medical University DalianChina State Key Laboratory of Information Engineering in Surveying Mapping and Remote SensingWuhan UniversityWuhanChina Information Systems Technology and Design Pillar Singapore University of Technology and DesignSingaporeSingapore
Subarachnoid haemorrhage(SAH),mostly caused by the rupture of intracranial aneu-rysm,is a common disease with a high fatality *** lesions are generally diffusely distributed,showing a variety of scales with irregular ... 详细信息
来源: 评论
Task Offloading Strategy with Emergency Handling and Blockchain Security in SDN-Empowered and Fog-Assisted Healthcare IoT
收藏 引用
Tsinghua Science and Technology 2022年 第4期27卷 760-776页
作者: Junyu Ren Jinze Li Huaxing Liu Tuanfa Qin School of Electronic and Information Engineering South China University of TechnologyGuangzhou 510640China Guangxi University Xingjian College of Science and Liberal Arts Nanning 530004China Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi UniversityNanning 530004China Guangxi Key Laboratory of Multimedia Communications and Network Technology School of ComputerElectronics and InformationGuangxi UniversityNanning 530004China Faculty of Earth Sciences&Geography Trinity CollegeUniversity of CambridgeCambridgeCB21TNUK
With the rapid advancement of the Internet of Things(IoT),the typical application of wireless body area networks(WBANs)based smart healthcare has drawn wide attention from all sectors of *** alleviate the pressing cha... 详细信息
来源: 评论
Code obfuscation protection strategies for program running states
Code obfuscation protection strategies for program running s...
收藏 引用
International Conference on networking and network Applications (NaNA)
作者: Xin Song Haonan Wang Yichuan Wang Xinhong Hei Wenjiang Ji School of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China
To enhance the security, complexity, and applicability of cloud node programs, effectively hinder attackers from reverse engineering, and reduce the ability of detailed analysis and vulnerability discovery of applicat... 详细信息
来源: 评论