咨询与建议

限定检索结果

文献类型

  • 34,458 篇 会议
  • 27,200 篇 期刊文献
  • 363 册 图书

馆藏范围

  • 62,021 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 36,821 篇 工学
    • 20,894 篇 计算机科学与技术...
    • 16,237 篇 软件工程
    • 6,780 篇 信息与通信工程
    • 5,890 篇 电气工程
    • 5,890 篇 电子科学与技术(可...
    • 4,877 篇 控制科学与工程
    • 3,603 篇 光学工程
    • 3,421 篇 生物工程
    • 2,798 篇 生物医学工程(可授...
    • 2,697 篇 材料科学与工程(可...
    • 2,503 篇 化学工程与技术
    • 2,395 篇 机械工程
    • 2,085 篇 仪器科学与技术
    • 1,592 篇 动力工程及工程热...
    • 1,190 篇 力学(可授工学、理...
    • 916 篇 土木工程
  • 24,759 篇 理学
    • 10,812 篇 物理学
    • 10,635 篇 数学
    • 4,235 篇 生物学
    • 3,390 篇 统计学(可授理学、...
    • 2,934 篇 化学
    • 2,217 篇 系统科学
    • 1,136 篇 地球物理学
  • 7,352 篇 管理学
    • 4,408 篇 管理科学与工程(可...
    • 3,137 篇 图书情报与档案管...
    • 1,903 篇 工商管理
  • 2,666 篇 医学
    • 2,200 篇 临床医学
    • 1,737 篇 基础医学(可授医学...
    • 1,139 篇 药学(可授医学、理...
  • 1,092 篇 法学
    • 926 篇 社会学
  • 610 篇 农学
  • 608 篇 经济学
  • 395 篇 教育学
  • 193 篇 文学
  • 128 篇 军事学
  • 112 篇 艺术学
  • 27 篇 哲学
  • 13 篇 历史学

主题

  • 3,343 篇 computer science
  • 3,099 篇 laboratories
  • 1,108 篇 computational mo...
  • 878 篇 application soft...
  • 707 篇 computer archite...
  • 608 篇 bandwidth
  • 607 篇 feature extracti...
  • 569 篇 testing
  • 567 篇 artificial intel...
  • 554 篇 costs
  • 548 篇 data mining
  • 542 篇 machine learning
  • 527 篇 semantics
  • 525 篇 delay
  • 523 篇 protocols
  • 500 篇 algorithm design...
  • 484 篇 hardware
  • 464 篇 robustness
  • 461 篇 deep learning
  • 443 篇 control systems

机构

  • 1,109 篇 cavendish labora...
  • 1,036 篇 department of ph...
  • 980 篇 oliver lodge lab...
  • 970 篇 physikalisches i...
  • 807 篇 university of ch...
  • 641 篇 infn laboratori ...
  • 620 篇 infn sezione di ...
  • 605 篇 infn sezione di ...
  • 604 篇 department of co...
  • 581 篇 fakultät physik ...
  • 575 篇 infn sezione di ...
  • 561 篇 school of physic...
  • 540 篇 horia hulubei na...
  • 529 篇 school of physic...
  • 528 篇 department of ph...
  • 518 篇 imperial college...
  • 514 篇 h.h. wills physi...
  • 513 篇 iccub universita...
  • 506 篇 stfc rutherford ...
  • 505 篇 nikhef national ...

作者

  • 272 篇 barter w.
  • 244 篇 a. gomes
  • 242 篇 beiter a.
  • 235 篇 blake t.
  • 233 篇 c. alexa
  • 233 篇 bellee v.
  • 230 篇 j. m. izen
  • 227 篇 brundu d.
  • 225 篇 c. amelung
  • 224 篇 amato s.
  • 223 篇 g. bella
  • 223 篇 j. strandberg
  • 223 篇 d. calvet
  • 222 篇 bowcock t.j.v.
  • 222 篇 betancourt c.
  • 220 篇 g. spigo
  • 220 篇 borsato m.
  • 220 篇 boettcher t.
  • 220 篇 s. chen
  • 219 篇 bencivenni g.

语言

  • 56,065 篇 英文
  • 5,210 篇 其他
  • 737 篇 中文
  • 17 篇 德文
  • 15 篇 俄文
  • 13 篇 法文
  • 9 篇 日文
  • 5 篇 斯洛文尼亚文
  • 3 篇 西班牙文
  • 1 篇 阿拉伯文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Graphics Laboratory Department of Computer Science"
62021 条 记 录,以下是991-1000 订阅
排序:
Secure RFID-Assisted Authentication Protocol for Vehicular Cloud Computing Environment
收藏 引用
IEEE Transactions on Intelligent Transportation Systems 2024年 第9期25卷 12528-12537页
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Tariq, Tayyaba Alenazi, Mohammed J. F. Das, Ashok Kumar University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China Institute for Cyber Security School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China Sichuan University Key Laboratory of Data Protection and Intelligent Management Ministry of Education Chengdu610065 China Shenzhen Institute for Advanced Study University of Electronic Science and Technology of China Shenzhen518000 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Yunlin Douliu64002 Taiwan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500032 India
Vehicular network technology has made substantial advancements in recent years in the field of Intelligent Transportation Systems. Vehicular Cloud Computing (VCC) has emerged as a novel paradigm with a substantial inc... 详细信息
来源: 评论
Fast wireless sensor for anomaly detection based on data stream in an edge-computing-enabled smart greenhouse
收藏 引用
Digital Communications and Networks 2022年 第4期8卷 498-507页
作者: Yihong Yang Sheng Ding Yuwen Liu Shunmei Meng Xiaoxiao Chi Rui Ma Chao Yan School of Computer Science Qufu Normal UniversityRizhao276826China Shandong Provincial University Laboratory for Protected Horticulture Weifang University of Science and TechnologyShouguangWeifang262700China Department of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing210000China General Education Department Shandong First Medical University(Shandong Academy Of Medical Sciences)Taian271000China
Edge-computing-enabled smart greenhouses are a representative application of the Internet of Things(IoT)technology,which can monitor the environmental information in real-time and employ the information to contribute ... 详细信息
来源: 评论
A label noise filtering and label missing supplement framework based on game theory
收藏 引用
Digital Communications and Networks 2023年 第4期9卷 887-895页
作者: Yuwen Liu Rongju Yao Song Jia Fan Wang Ruili Wang Rui Ma Lianyong Qi College of Computer Science and Technology China University of Petroleum(East China)Qingdao 266580China Weifang Key Laboratory of Blockchain on Agricultural Vegetables Weifang University of Science and TechnologyShouguangChina China Unicom Taian Branch China School of Natural and Computational Sciences Massey UniversityNew Zealand General Education Department Shandong First Medical UniversityShandong Academy of Medical SciencesTai'an271000China College of Computer Science and Technology Zhejiang UniversityHangzhouChina
Labeled data is widely used in various classification ***,there is a huge challenge that labels are often added *** labels added by malicious users will affect the training effect of the *** unreliability of labeled d... 详细信息
来源: 评论
Cooperative Multi-Agent Deep Reinforcement Learning for Adaptive Decentralized Emergency Voltage Control
Cooperative Multi-Agent Deep Reinforcement Learning for Adap...
收藏 引用
2024 IEEE Power and Energy Society Innovative Smart Grid Technologies Conference, ISGT 2024
作者: Zhang, Ying Yue, Meng Montana State University Department of Electrical and Computer Engineering BozemanMT United States Brookhaven National Laboratory Interdisciplinary Science Department UptonNY United States
Under voltage load shedding (UVLS) for power grid emergency control builds the last defensive perimeter to prevent cascade outages and blackouts in case of contingencies. This letter proposes a novel cooperative multi... 详细信息
来源: 评论
Intelligent Predetermination of Generator Tripping Scheme: Knowledge Fusion-based Deep Reinforcement Learning Framework
收藏 引用
CSEE Journal of Power and Energy Systems 2024年 第1期10卷 66-75页
作者: Lingkang Zeng Wei Yao Ze Hu Hang Shuai Zhouping Li Jinyu Wen Shijie Cheng State Key Laboratory of Advanced Electromagnetic Engineering and Technology School of Electrical and Electronics EngineeringHuazhong University of Science and TechnologyWuhan 430074China Dispatching and Control Center Central China Branch of State Grid Corporation of ChinaWuhan 430077China. Department of Electrical Engineering and Computer Science University of TennesseeKnoxvilleTN 37996USA
Generator tripping scheme(GTS)is the most commonly used scheme to prevent power systems from losing safety and ***,GTS is composed of offline predetermination and real-time scenario ***,it is extremely time-consuming ... 详细信息
来源: 评论
Morocco's COVID-19 instance as a potential epidemiological scenario  3
Morocco's COVID-19 instance as a potential epidemiological s...
收藏 引用
3rd International Conference on Innovative Research in Applied science, Engineering and Technology, IRASET 2023
作者: Chouit, El Mehdi Rachdi, Mohamed Bellafkih, Mostafa Raouyane, Brahim Raiss Laboratory Department of Mathematics and Computer Science Rabat Morocco Ben m'Sik Ensad Hassan Ii University Tim Laboratory Faculty of Sciences Casablanca Morocco Ain Chock University Hassan Ii Faculty of Sciences Department of Mathematics and Computer Science Casablanca Morocco
Machine learning is widely used in all industries. In order to speed up decision-making on the most likely course of action, machine learning have shown their effectiveness in analyzing perioperative effects. In sever... 详细信息
来源: 评论
Stereo Conversion with Disparity-Aware Warping, Compositing and Inpainting
Stereo Conversion with Disparity-Aware Warping, Compositing ...
收藏 引用
IEEE Workshop on Applications of computer Vision (WACV)
作者: Lukas Mehl Andrés Bruhn Markus Gross Christopher Schroers Institute for Visualization and Interactive Systems University of Stuttgart Department of Computer Science Computer Graphics Lab ETH Zurich DisneyResearch|Studios Switzerland
Despite of exciting advances in image-based rendering and novel view synthesis, it is still challenging to achieve high-resolution results that can reach production-level quality when applying such methods to the task...
来源: 评论
Cyber Deception Using NLP
收藏 引用
Journal of Information Security 2024年 第2期15卷 279-297页
作者: Igor Godefroy Kouam Kamdem Marcellin Nkenlifack Department of Mathematics and Computer Science URIFIA Laboratory Faculty of Science University of Dschang Dschang Cameroon
Cyber security addresses the protection of information systems in cyberspace. These systems face multiple attacks on a daily basis, with the level of complication getting increasingly challenging. Despite the existenc... 详细信息
来源: 评论
Worst-Case Integrity Attacks and Resilient State Estimation With Partially Secured Measurements
收藏 引用
IEEE Transactions on Control of Network Systems 2025年 第2期12卷 1769-1779页
作者: Zhou, Jing Shang, Jun Chen, Tongwen University of Alberta Department of Electrical and Computer Engineering EdmontonABT6G 1H9 Canada Tongji University Department of Control Science and Engineering Shanghai Institute of Intelligent Science and Technology National Key Laboratory of Autonomous Intelligent Unmanned Systems Frontiers Science Center for Intelligent Autonomous Systems Shanghai200092 China
This paper examines the problem of optimal deception attacks against state estimation with partially secured measurements, where smart sensors transmit innovation sequences to the remote end for information fusion. Du... 详细信息
来源: 评论
An Enhanced Authentication Protocol Suitable for Constrained RFID Systems
收藏 引用
IEEE Access 2024年 12卷 61610-61628页
作者: Hosseinzadeh, Mehdi Servati, Mohammad Reza Rahmani, Amir Masoud Safkhani, Masoumeh Lansky, Jan Janoscova, Renata Ahmed, Omed Hassan Tanveer, Jawad Lee, Sang-Woong Duy Tan University Institute of Research and Development Da Nang550000 Viet Nam Duy Tan University School of Medicine and Pharmacy Da Nang550000 Viet Nam Shahid Rajaee Teacher Training University Department of Computer Engineering Tehran16788-15811 Iran National Yunlin University of Science and Technology Future Technology Research Center Douliou Yunlin64002 Taiwan School of Computer Science Tehran19395-5746 Iran University of Finance and Administration Faculty of Economic Studies Department of Computer Science and Mathematics Prague101 00 Czech Republic University of Human Development Department of Information Technology Sulaymaniyah0778-6 Iraq Sejong University Department of Computer Science and Engineering Seoul05006 Korea Republic of Gachon University Pattern Recognition and Machine Learning Laboratory Department of Ai Software Seongnam-si13557 Korea Republic of
RFID technology offers an affordable and user-friendly solution for contactless identification of objects and individuals. However, the widespread adoption of RFID systems raises concerns regarding security and privac... 详细信息
来源: 评论