咨询与建议

限定检索结果

文献类型

  • 2,278 篇 会议
  • 1,834 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 4,122 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,643 篇 工学
    • 1,772 篇 计算机科学与技术...
    • 1,412 篇 软件工程
    • 744 篇 信息与通信工程
    • 368 篇 电气工程
    • 321 篇 电子科学与技术(可...
    • 256 篇 控制科学与工程
    • 240 篇 生物工程
    • 163 篇 光学工程
    • 162 篇 机械工程
    • 147 篇 仪器科学与技术
    • 133 篇 生物医学工程(可授...
    • 114 篇 网络空间安全
    • 91 篇 动力工程及工程热...
    • 90 篇 化学工程与技术
    • 85 篇 核科学与技术
    • 73 篇 交通运输工程
    • 65 篇 安全科学与工程
  • 1,305 篇 理学
    • 627 篇 数学
    • 424 篇 物理学
    • 264 篇 生物学
    • 192 篇 统计学(可授理学、...
    • 117 篇 系统科学
    • 96 篇 化学
  • 659 篇 管理学
    • 391 篇 管理科学与工程(可...
    • 281 篇 图书情报与档案管...
    • 153 篇 工商管理
  • 106 篇 法学
    • 70 篇 社会学
  • 105 篇 医学
    • 83 篇 临床医学
    • 72 篇 基础医学(可授医学...
  • 63 篇 经济学
    • 62 篇 应用经济学
  • 31 篇 农学
  • 21 篇 军事学
  • 15 篇 文学
  • 12 篇 教育学
  • 8 篇 艺术学

主题

  • 106 篇 hadron colliders
  • 103 篇 semantics
  • 103 篇 computer network...
  • 102 篇 feature extracti...
  • 83 篇 protocols
  • 82 篇 laboratories
  • 77 篇 computational mo...
  • 75 篇 accuracy
  • 70 篇 bandwidth
  • 66 篇 training
  • 62 篇 computer science
  • 61 篇 deep learning
  • 60 篇 quality of servi...
  • 56 篇 wireless sensor ...
  • 56 篇 security
  • 49 篇 cryptography
  • 48 篇 routing
  • 47 篇 computer archite...
  • 46 篇 authentication
  • 46 篇 telecommunicatio...

机构

  • 154 篇 school of comput...
  • 149 篇 centro brasileir...
  • 148 篇 national and kap...
  • 148 篇 istanbul technic...
  • 147 篇 university of sp...
  • 147 篇 yerevan physics ...
  • 146 篇 universidad iber...
  • 145 篇 academy of scien...
  • 144 篇 brunel universit...
  • 144 篇 indian institute...
  • 144 篇 charles universi...
  • 140 篇 university of de...
  • 139 篇 department of ph...
  • 138 篇 rwth aachen univ...
  • 137 篇 università di to...
  • 137 篇 imperial college...
  • 134 篇 infn sezione di ...
  • 133 篇 zhejiang univers...
  • 129 篇 department of ph...
  • 129 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 112 篇 e. migliore
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 3,578 篇 英文
  • 438 篇 其他
  • 122 篇 中文
检索条件"机构=Computer Engineering and Network Laboratory"
4122 条 记 录,以下是641-650 订阅
排序:
Local Fault Diagnosis Analysis Based on Block Pattern of Regular Diagnosable networks
收藏 引用
IEEE/ACM Transactions on networking 2024年
作者: Lin, Limei Guan, Kaineng Huang, Yanze Hsieh, Sun-Yuan Chen, Gaolin Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fujian Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
Fault diagnosability can reflect the actual self diagnosing capability of a multiprocessor system better. However, people usually focus on the overall information and neglect the important local information. In order ... 详细信息
来源: 评论
Task Offloading and Resource Allocation with Privacy Constraints in End-Edge-Cloud Environment  17th
Task Offloading and Resource Allocation with Privacy Constra...
收藏 引用
17th CCF Conference on computer Supported Cooperative Work and Social Computing, ChineseCSCW 2022
作者: Zhu, Xia Sun, Wei Li, Xiaoping School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University Nanjing China School of Cyber Science and Engineering Southeast University Nanjing China
The end-edge-cloud architecture brings an efficient solution to the big data processing problem caused by massive IoT devices. The characteristics of this architecture, such as massive devices, heterogeneous resources... 详细信息
来源: 评论
Incentive Sharing: A Consumer-Data Privacy Trusted Sharing Paradigm Via Proximal Policy Optimization in Industry 5.0
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Cai, Ting Hu, Ying Li, Xiang Chen, Wuhui Wu, Yuxin Ye, Zhiwei Zheng, Zibin Hubei University of Technology China China Hubei University of Technology School of Computer Science The Provincial Key Laboratory of Green Intelligent Computing Network Wuhan430068 China Sun Yat-sen University China Pengcheng Laboratory China Hubei University of Arts and Science School of Computer Engineering Xiangyang441053 China Sun Yat-sen University School of Software Engineering Zhuhai519000 China
Industry 5.0 emphasizes consumer data sharing to drive data-driven innovation and enhance user experiences in consumer electronics. Blockchain-integrated federated learning (blockchained FL) has recently emerged as a ... 详细信息
来源: 评论
On the Impact of Spatial Mode Dispersion for Strongly-Coupled Multicore Fiber Submarine Transmission
On the Impact of Spatial Mode Dispersion for Strongly-Couple...
收藏 引用
2023 Optical Fiber Communications Conference and Exhibition, OFC 2023
作者: Sun, Lin Chen, Bin Liu, Gordon Ning Cai, Yi Li, Zhaohui Lu, Chao Shen, Gangxiang Soochow University Suzhou Key Laboratory of Advanced Optical Communication Network Technology School of Electronic and Information Engineering Suzhou215006 China Hefei University of Technology School of Computer Science and Information Engineering Hefei China Sun Yat-Sen University Guangdong Provincial Key Laboratory of Optoelectronic Information Processing Chips School of Electronics and Information Technology Guangzhou511400 China The Hong Kong Polytechnic University Photonics Research Center Department of Electrical and Information Engineering Kowloon Hung Hom Hong Kong
Strongly-coupled multicore fibers exhibit the improved tolerance to fiber non-linearity. Their potentials in optical submarine communications are investigated with considering the coupling length and spatial mode disp... 详细信息
来源: 评论
SyntaxBridge: Protocol Description Transformer for Enhanced Formal Analysis of Security Protocols
SyntaxBridge: Protocol Description Transformer for Enhanced ...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Liujia Cai Tong Yu Yumeng Li Siqi Lu Hanjie Dong Guangying Cai Guangong Li Yongjuan Wang Henan Key Laboratory of Network Cryptography Technology Information Engineering University Zhengzhou China School of Information and Communication Engineering Hainan University Haikou China School of Computer Science and Artificial Intelligence Zhengzhou University Zhengzhou China
Currently, formal analysis of security protocols under the symbolic model has become a crucial approach in the field of protocol analysis, owing to its intuitiveness and universality. However, researchers using variou... 详细信息
来源: 评论
Multi-Channel Hypergraph Convolution Group Recommendation with Member Information Enhancement  25
Multi-Channel Hypergraph Convolution Group Recommendation wi...
收藏 引用
25th IEEE International Conferences on High Performance Computing and Communications, 9th International Conference on Data Science and Systems, 21st IEEE International Conference on Smart City and 9th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Chen, Tianhao Gao, Qian Fan, Jun Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Shandong Jinan250014 China Qilu University of Technology Shandong Academy of Sciences Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Shandong Jinan250353 China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Shandong Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd Shandong Jinan250101 China
Group recommendation involves comprehensively considering various aspects, including members and items, to predict the overall interests of a group and recommend suitable items through a recommendation system. With th... 详细信息
来源: 评论
TextIM: Part-aware Interactive Motion Synthesis from Text
arXiv
收藏 引用
arXiv 2024年
作者: Fan, Siyuan Du, Bo Cai, Xiantao Peng, Bo Sun, Longling National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China Institute of Artificial Intelligence Wuhan University China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China
In this work, we propose TextIM, a novel framework for synthesizing TEXT-driven human Interactive Motions, with a focus on the precise alignment of part-level semantics. Existing methods often overlook the critical ro... 详细信息
来源: 评论
SyntaxBridge: Protocol Description Transformer for Enhanced Formal Analysis of Security Protocols  23
SyntaxBridge: Protocol Description Transformer for Enhanced ...
收藏 引用
23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024
作者: Cai, Liujia Yu, Tong Li, Yumeng Lu, Siqi Dong, Hanjie Cai, Guangying Li, Guangong Wang, Yongjuan Information Engineering University Henan Key Laboratory of Network Cryptography Technology Zhengzhou China Hainan University School of Information and Communication Engineering Haikou China Zhengzhou University School of Computer Science and Artificial Intelligence Zhengzhou China
Currently, formal analysis of security protocols under the symbolic model has become a crucial approach in the field of protocol analysis, owing to its intuitiveness and universality. However, researchers using variou... 详细信息
来源: 评论
Topology Uncertainty Modeling For Imbalanced Node Classification on Graphs
Topology Uncertainty Modeling For Imbalanced Node Classifica...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Jiayi Gao Jiaxing Li Ke Zhang Youyong Kong Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering Southeast University Nanjing China Ministry of Education Key Laboratory of Computer Network and Information Integration Southeast University Nanjing China
Most existing graph neural networks work under a class-balanced assumption, while ignoring class-imbalanced scenarios that widely exist in real-world graphs. Although there are many methods in other fields that can al... 详细信息
来源: 评论
Spatio-Temporal Context Modeling for Road Obstacle Detection  1
收藏 引用
4th International Conference on Machine Learning for Cyber Security, ML4CS 2022
作者: Wu, Xiuen Wang, Tao Liang, Lingyu Li, Zuoyong Ching, Fum Yew College of Computer and Data Science Fuzhou University Fuzhou350108 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou350108 China The Key Laboratory of Cognitive Computing and Intelligent Information Processing of Fujian Education Institutions Wuyi University Wuyishan354300 China School of Electronic and Information Engineering South China University of Technology Guangzhou510641 China Ministry of Education Key Laboratory of Computer Network and Information Integration Southeast University Nanjing211189 China Guangzhou510320 China Penang11800 Malaysia
Road obstacle detection is an important problem for vehicle driving safety. In this paper, we aim to obtain robust road obstacle detection based on spatio-temporal context modeling. Firstly, a data-driven spatial cont... 详细信息
来源: 评论