咨询与建议

限定检索结果

文献类型

  • 2,291 篇 会议
  • 1,869 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 4,170 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,688 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,442 篇 软件工程
    • 769 篇 信息与通信工程
    • 408 篇 电气工程
    • 330 篇 电子科学与技术(可...
    • 278 篇 控制科学与工程
    • 241 篇 生物工程
    • 169 篇 光学工程
    • 167 篇 机械工程
    • 149 篇 仪器科学与技术
    • 133 篇 生物医学工程(可授...
    • 131 篇 网络空间安全
    • 93 篇 动力工程及工程热...
    • 92 篇 化学工程与技术
    • 82 篇 交通运输工程
    • 78 篇 核科学与技术
    • 74 篇 安全科学与工程
  • 1,314 篇 理学
    • 630 篇 数学
    • 428 篇 物理学
    • 266 篇 生物学
    • 192 篇 统计学(可授理学、...
    • 117 篇 系统科学
    • 99 篇 化学
  • 676 篇 管理学
    • 403 篇 管理科学与工程(可...
    • 285 篇 图书情报与档案管...
    • 155 篇 工商管理
  • 111 篇 医学
    • 88 篇 临床医学
    • 73 篇 基础医学(可授医学...
  • 106 篇 法学
    • 70 篇 社会学
  • 64 篇 经济学
    • 63 篇 应用经济学
  • 31 篇 农学
  • 21 篇 军事学
  • 15 篇 文学
  • 13 篇 教育学
  • 8 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 104 篇 feature extracti...
  • 104 篇 computer network...
  • 103 篇 semantics
  • 83 篇 protocols
  • 82 篇 laboratories
  • 78 篇 computational mo...
  • 76 篇 accuracy
  • 70 篇 bandwidth
  • 66 篇 training
  • 62 篇 computer science
  • 62 篇 deep learning
  • 60 篇 quality of servi...
  • 56 篇 wireless sensor ...
  • 56 篇 security
  • 50 篇 cryptography
  • 48 篇 routing
  • 47 篇 computer archite...
  • 46 篇 authentication
  • 46 篇 telecommunicatio...

机构

  • 155 篇 school of comput...
  • 149 篇 centro brasileir...
  • 148 篇 national and kap...
  • 148 篇 istanbul technic...
  • 147 篇 university of sp...
  • 147 篇 yerevan physics ...
  • 146 篇 universidad iber...
  • 145 篇 academy of scien...
  • 144 篇 brunel universit...
  • 144 篇 indian institute...
  • 144 篇 charles universi...
  • 140 篇 university of de...
  • 139 篇 department of ph...
  • 138 篇 rwth aachen univ...
  • 137 篇 università di to...
  • 137 篇 imperial college...
  • 134 篇 infn sezione di ...
  • 132 篇 zhejiang univers...
  • 129 篇 department of ph...
  • 129 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,484 篇 英文
  • 578 篇 其他
  • 126 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 俄文
检索条件"机构=Computer Engineering and Network Laboratory"
4170 条 记 录,以下是441-450 订阅
排序:
Wrong-of-Thought: An Integrated Reasoning Framework with Multi-Perspective Verification and Wrong Information
Wrong-of-Thought: An Integrated Reasoning Framework with Mul...
收藏 引用
2024 Findings of the Association for Computational Linguistics, EMNLP 2024
作者: Zhang, Yongheng Chen, Qiguang Zhou, Jingxuan Wang, Peng Si, Jiasheng Wang, Jin Lu, Wenpeng Qin, Libo School of Computer Science and Engineering Central South University China Research Center for SCIR Harbin Institute of Technology Harbin China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China Yunnan University Kunming China
Chain-of-Thought (CoT) has become a vital technique for enhancing the performance of Large Language Models (LLMs), attracting increasing attention from researchers. One stream of approaches focuses on the iterative en...
来源: 评论
Application of Improved Canny Algorithm in Image Edge Detection
Application of Improved Canny Algorithm in Image Edge Detect...
收藏 引用
International Conference on computers, Communications, and Systems (ICCCS)
作者: Siyang Xu Peng Zhang Xin Song Runfeng Zhang Hebei Key Laboratory of Marine Perception Network and Data Processing School of Computer and Communication Engineering Northeastern University at Qinhuangdao Qinhuangdao China School of Computer and Communication Engineering Northeastern University at Qinhuangdao Qinhuangdao China
To solve the problems of poor denoising effect and limited threshold accuracy in traditional Canny algorithm, an improved Canny algorithm is proposed in this paper. Firstly, an image preprocessing method based on hybr... 详细信息
来源: 评论
Entity Disambiguation Based on UCL Knowledge Space
Entity Disambiguation Based on UCL Knowledge Space
收藏 引用
2021 IEEE International Conference on Artificial Intelligence and Industrial Design, AIID 2021
作者: Xinchen, Chang Peng, Yang School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China
Named entity disambiguation is an important task in the process of knowledge space construction and improvement, which builds a bridge between entities in text and entities in knowledge space. However, the existing en... 详细信息
来源: 评论
SQAT-LD: SPeech Quality Assessment Transformer Utilizing Listener Dependent Modeling for Zero-Shot Out-of-Domain MOS Prediction
SQAT-LD: SPeech Quality Assessment Transformer Utilizing Lis...
收藏 引用
IEEE Workshop on Automatic Speech Recognition and Understanding
作者: Kailai Shen Diqun Yan Li Dong Ying Ren Xiaoxun Wu Jing Hu Faculty of Electrical Engineering and Computer Science Ningbo University Zhejiang Key Laboratory of Mobile Network Application Technology
In this paper, we propose the speech quality assessment transformer utilizing listener dependent modeling (SQAT-LD) mean opinion score (MOS) prediction system, which was submitted to the 2023 VoiceMOS Challenge. The s...
来源: 评论
Low Light RGB and IR Image Fusion with Selective CNN-Transformer network
Low Light RGB and IR Image Fusion with Selective CNN-Transfo...
收藏 引用
IEEE International Conference on Image Processing
作者: Haiyan Jin Yue Yang Haonan Su Zhaolin Xiao Bin Wang School of Computer Science and Engineering Xi’an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology
In low-light images, contrast and brightness are corrupted, making it difficult to accurately percept detail and edge information with the naked eye. Because of the development of multi sensor imaging, RGB-IR image fu...
来源: 评论
YOLOv8-GR: Gesture Recognition by Improving of YOLOv8 Algorithm
YOLOv8-GR: Gesture Recognition by Improving of YOLOv8 Algori...
收藏 引用
International Conference on Advanced Cloud and Big Data (CBD)
作者: Yi Ding Naixuan Guo Haitao Meng School of Information Engineering Yancheng Institute of Technology Yancheng China Key Laboratory of Computer Network and Information Integration (Southeast University) Ministry of Education
Gesture recognition has been widely used in many situations, such as human-computer interaction, virtual reality and smart home. To meet the current demands for accuracy and speed in gesture recognition, this paper pr... 详细信息
来源: 评论
Logical Relation Modeling and Mining in Hyperbolic Space for Recommendation  40
Logical Relation Modeling and Mining in Hyperbolic Space for...
收藏 引用
40th IEEE International Conference on Data engineering, ICDE 2024
作者: Tan, Yanchao Lv, Hang Zhou, Zihao Guo, Wenzhong Xiong, Bo Liu, Weiming Chen, Chaochao Wang, Shiping Yang, Carl College of Computer and Data Science Fuzhou University Fuzhou China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Institute for Artificial Intelligence University of Stuttgart Stuttgart Germany College of Computer Science Zhejiang University Hangzhou China Emory University Department of Computer Science Atlanta United States
The sparse interactions between users and items have aggravated the difficulty of their representations in recommender systems. Existing methods leverage tags to alleviate the sparsity problem but ignore prevalent log... 详细信息
来源: 评论
Efficient Short Video Identification Attack for Scenarios with Hybrid Transmission Modes and Preloading Mechanism
Efficient Short Video Identification Attack for Scenarios wi...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor networks, MSN
作者: Jingwen Quan Jiajia Du Hua Wu Guang Cheng Xiaoyan Hu School of Cyber Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing Jiangsu
To protect user privacy, video traffic is usually encrypted during transmission. Some research has been con-ducted to implement video identification attacks by analyzing the features of video traffic. However, short v... 详细信息
来源: 评论
Task Offloading Strategy with Emergency Handling and Blockchain Security in SDN-Empowered and Fog-Assisted Healthcare IoT
收藏 引用
Tsinghua Science and Technology 2022年 第4期27卷 760-776页
作者: Junyu Ren Jinze Li Huaxing Liu Tuanfa Qin School of Electronic and Information Engineering South China University of TechnologyGuangzhou 510640China Guangxi University Xingjian College of Science and Liberal Arts Nanning 530004China Guangxi Key Laboratory of Multimedia Communications and Network Technology Guangxi UniversityNanning 530004China Guangxi Key Laboratory of Multimedia Communications and Network Technology School of ComputerElectronics and InformationGuangxi UniversityNanning 530004China Faculty of Earth Sciences&Geography Trinity CollegeUniversity of CambridgeCambridgeCB21TNUK
With the rapid advancement of the Internet of Things(IoT),the typical application of wireless body area networks(WBANs)based smart healthcare has drawn wide attention from all sectors of *** alleviate the pressing cha... 详细信息
来源: 评论
UDT:U-shaped deformable transformer for subarachnoid haemorrhage image segmentation
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第3期9卷 756-768页
作者: Wei Xie Lianghao Jin Shiqi Hua Hao Sun Bo Sun Zhigang Tu Jun Liu Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning Central China Normal UniversityWuhanChina School of Computer Science Central China Normal UniversityWuhanChina National Language Resources Monitoring and Research Center for Network Media Central China Normal UniversityWuhanChina The First Affiliated Hospital of Dalian Medical University DalianChina State Key Laboratory of Information Engineering in Surveying Mapping and Remote SensingWuhan UniversityWuhanChina Information Systems Technology and Design Pillar Singapore University of Technology and DesignSingaporeSingapore
Subarachnoid haemorrhage(SAH),mostly caused by the rupture of intracranial aneu-rysm,is a common disease with a high fatality *** lesions are generally diffusely distributed,showing a variety of scales with irregular ... 详细信息
来源: 评论