咨询与建议

限定检索结果

文献类型

  • 2,263 篇 会议
  • 1,855 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 4,128 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,667 篇 工学
    • 1,802 篇 计算机科学与技术...
    • 1,426 篇 软件工程
    • 760 篇 信息与通信工程
    • 380 篇 电气工程
    • 322 篇 电子科学与技术(可...
    • 273 篇 控制科学与工程
    • 243 篇 生物工程
    • 162 篇 机械工程
    • 160 篇 光学工程
    • 146 篇 仪器科学与技术
    • 134 篇 生物医学工程(可授...
    • 118 篇 网络空间安全
    • 94 篇 动力工程及工程热...
    • 89 篇 化学工程与技术
    • 78 篇 核科学与技术
    • 73 篇 交通运输工程
    • 64 篇 安全科学与工程
  • 1,316 篇 理学
    • 633 篇 数学
    • 425 篇 物理学
    • 266 篇 生物学
    • 194 篇 统计学(可授理学、...
    • 120 篇 系统科学
    • 98 篇 化学
  • 670 篇 管理学
    • 399 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 155 篇 工商管理
  • 110 篇 医学
    • 87 篇 临床医学
    • 73 篇 基础医学(可授医学...
  • 107 篇 法学
    • 69 篇 社会学
  • 64 篇 经济学
    • 63 篇 应用经济学
  • 31 篇 农学
  • 21 篇 军事学
  • 15 篇 文学
  • 11 篇 教育学
  • 9 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 105 篇 computer network...
  • 100 篇 semantics
  • 96 篇 feature extracti...
  • 82 篇 laboratories
  • 82 篇 protocols
  • 73 篇 computational mo...
  • 71 篇 bandwidth
  • 66 篇 deep learning
  • 65 篇 accuracy
  • 63 篇 computer science
  • 60 篇 quality of servi...
  • 60 篇 training
  • 57 篇 wireless sensor ...
  • 55 篇 security
  • 49 篇 routing
  • 48 篇 cryptography
  • 47 篇 computer archite...
  • 47 篇 network topology
  • 45 篇 authentication

机构

  • 162 篇 school of comput...
  • 150 篇 centro brasileir...
  • 149 篇 national and kap...
  • 149 篇 istanbul technic...
  • 148 篇 university of sp...
  • 148 篇 yerevan physics ...
  • 147 篇 universidad iber...
  • 146 篇 academy of scien...
  • 145 篇 brunel universit...
  • 145 篇 indian institute...
  • 145 篇 charles universi...
  • 141 篇 university of de...
  • 140 篇 department of ph...
  • 139 篇 rwth aachen univ...
  • 138 篇 università di to...
  • 137 篇 imperial college...
  • 135 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 130 篇 department of ph...
  • 130 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,749 篇 英文
  • 263 篇 其他
  • 127 篇 中文
检索条件"机构=Computer Engineering and Network Laboratory"
4128 条 记 录,以下是41-50 订阅
排序:
Double-branch fusion network with a parallel attention selection mechanism for camouflaged object detection
收藏 引用
Science China(Information Sciences) 2023年 第6期66卷 258-266页
作者: Junjiang XIANG Qing PAN Zhengrong ZHANG Songnian FU Yuwen QIN Advanced Institute of Photonics Technology School of Information EngineeringGuangdong University of Technology Guangdong Provincial Key Laboratory of Photonics Information Technology Guangdong University of Technology Guangxi Key Laboratory of Multimedia Communications and Network Technology School of Computer Electronics and InformationGuangxi University
To meet the challenge of camouflaged object detection (COD),which has a high degree of intrinsic similarity between the object and background,this paper proposes a double-branch fusion network(DBFN)with a parallel... 详细信息
来源: 评论
NNVISR: Bring Neural network Video Interpolation and Super Resolution into Video Processing Framework  24
NNVISR: Bring Neural Network Video Interpolation and Super R...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Tong, Yuan Hu, Mengshun Wang, Zheng National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering School of Computer Science Wuhan University Wuhan China
We present NNVISR - an open-source filter plugin for the VapourSynth video processing framework, which facilitates the application of neural networks for various kinds of video enhancing tasks, including denoising, su... 详细信息
来源: 评论
Key Management and Authentication Scheme Forward Trusted Pervasive Container Computing  2
Key Management and Authentication Scheme Forward Trusted Per...
收藏 引用
2nd International Conference on Big Data and Privacy Computing, BDPC 2024
作者: Hei, XinHong Xue, YuZhan Wang, YiChuan Liu, YiFan Peng, Chen Sun, Xiang School of Computer Science and Engineering Xi'an University of Technology Xi'an China School of Computer Science and Engineering Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
Cloud computing technology is an internet-based computing model that provides high reliability and security measures, including data backup, secure access control, etc. As Docker containers play a increasingly importa... 详细信息
来源: 评论
AN EFFICIENT AND INTERPRETABLE SPEECH ENHANCEMENT network VIA DEEP DICTIONARY LEARNING  49
AN EFFICIENT AND INTERPRETABLE SPEECH ENHANCEMENT NETWORK VI...
收藏 引用
2024 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2024
作者: Xu, Xinmeng Zhang, Yiqun Tu, Weiping Yang, Yuhong NERCMS School of Computer Science Wuhan University China Hubei Luojia Laboratory China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China
Speech enhancement is a vital and highly ill-posed problem for many speech downstream tasks. While currently existing deep learning based speech enhancement methods have held state-of-the-art results, they still posse... 详细信息
来源: 评论
A bitcoin service community classification method based on Random Forest and improved KNN algorithm
IET Blockchain
收藏 引用
IET Blockchain 2024年 第3期4卷 276-286页
作者: Gao, Muyun Lin, Shenwen Tian, Xin He, Xi He, Ketai Chen, Shifeng School of Mechanical Engineering University of Science and Technology Beijing Beijing China Internet Financial Security Technology Key Laboratory National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
There are service communities with different functions in the Bitcoin transactions system. Identifying community categories helps to further understand the Bitcoin transactions system and facilitates targeted regulati... 详细信息
来源: 评论
Stochastic and Distributed Optimal Energy Management of Active Distribution networks Within Integrated Office Buildings
收藏 引用
CSEE Journal of Power and Energy Systems 2024年 第2期10卷 504-517页
作者: Zening Li Su Su Xiaolong Jin Mingchao Xia Qifang Chen Koji Yamashita National Active Distribution Network Technology Research Center Beijing Jiaotong UniversityBeijing 100044China Key Laboratory of Smart Grid of Ministry of Education Tianjin UniversityTianjin 300072China Electrical and Computer Engineering University of California RiversideCA92521USA.
This paper proposes a stochastic and distributed optimal energy management approach for active distribution networks(ADNs)within office *** proposed approach aims at scheduling office buildings fitted with heating ven... 详细信息
来源: 评论
Discriminative feature encoding for intrinsic image decomposition
收藏 引用
Computational Visual Media 2023年 第3期9卷 597-618页
作者: Zongji Wang Yunfei Liu Feng Lu Key Laboratory of Network Information System Technology(NIST) Aerospace Information Research InstituteChinese Academy of SciencesBeijing 100190China State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and EngineeringBeihang UniversityBeijing 100191China Peng Cheng Laboratory Shenzhen 518000China
Intrinsic image decomposition is an important and long-standing computer vision *** an input image,recovering the physical scene properties is *** physically motivated priors have been used to restrict the solution sp... 详细信息
来源: 评论
Endogenous Security of FQn networks: Adaptive System-Level Fault Self-Diagnosis
收藏 引用
IEEE Transactions on Reliability 2024年 第3期73卷 1659-1668页
作者: Lin, Yuhang Lin, Limei Huang, Yanze Xu, Li Hsieh, Sun-Yuan Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
Endogenous security has the ability to discover, eliminate, and solve internal security problems and hidden dangers within the network, and is a superior technology to ensure future network security. The t/k-diagnosis... 详细信息
来源: 评论
Semantic-Aware Pseudo-Labeling for Unsupervised Meta-Learning
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 第7期47卷 5475-5488页
作者: Ouyang, Tianran Dong, Xingping Ye, Mang Du, Bo Shao, Ling Shen, Jianbing Wuhan University School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan430072 China University of Chinese Academy of Sciences UCAS-Terminus AI Lab Beijing101408 China University of Macau State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science 314100 China
In unsupervised meta-learning, the clustering-based pseudo-labeling approach is an attractive framework, since it is model-agnostic, allowing it to synergize with supervised algorithms to learn from unlabeled data. Ho... 详细信息
来源: 评论
Online Queue-Aware Service Migration and Resource Allocation in Mobile Edge Computing
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 8063-8078页
作者: Du, An Jia, Jie Chen, Jian Wang, Xingwei Huang, Min Northeastern University School of Computer Science and Engineering The Engineering Research Center of Security Technology of Complex Network System Shenyang110819 China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Northeastern University College of Information Science and Engineering State Key Laboratory of Synthetical Automation for Process Industries Shenyang110819 China
Mobile edge computing (MEC) integrated with network Functions Virtualization (NFV) helps run a wide range of services implemented by Virtual network Functions (VNFs) deployed at MEC networks. This emerging paradigm of... 详细信息
来源: 评论