咨询与建议

限定检索结果

文献类型

  • 34,458 篇 会议
  • 27,143 篇 期刊文献
  • 358 册 图书

馆藏范围

  • 61,959 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 36,920 篇 工学
    • 20,895 篇 计算机科学与技术...
    • 16,237 篇 软件工程
    • 6,781 篇 信息与通信工程
    • 5,934 篇 电气工程
    • 5,932 篇 电子科学与技术(可...
    • 4,875 篇 控制科学与工程
    • 3,578 篇 光学工程
    • 3,421 篇 生物工程
    • 2,798 篇 生物医学工程(可授...
    • 2,756 篇 材料科学与工程(可...
    • 2,503 篇 化学工程与技术
    • 2,394 篇 机械工程
    • 2,083 篇 仪器科学与技术
    • 1,592 篇 动力工程及工程热...
    • 1,192 篇 力学(可授工学、理...
    • 917 篇 土木工程
  • 24,752 篇 理学
    • 10,810 篇 物理学
    • 10,649 篇 数学
    • 4,233 篇 生物学
    • 3,408 篇 统计学(可授理学、...
    • 2,935 篇 化学
    • 2,217 篇 系统科学
    • 1,137 篇 地球物理学
  • 7,351 篇 管理学
    • 4,407 篇 管理科学与工程(可...
    • 3,138 篇 图书情报与档案管...
    • 1,902 篇 工商管理
  • 2,665 篇 医学
    • 2,200 篇 临床医学
    • 1,736 篇 基础医学(可授医学...
    • 1,139 篇 药学(可授医学、理...
  • 1,092 篇 法学
    • 926 篇 社会学
  • 609 篇 农学
  • 605 篇 经济学
  • 396 篇 教育学
  • 192 篇 文学
  • 128 篇 军事学
  • 112 篇 艺术学
  • 27 篇 哲学
  • 13 篇 历史学

主题

  • 3,344 篇 computer science
  • 3,100 篇 laboratories
  • 1,108 篇 computational mo...
  • 879 篇 application soft...
  • 711 篇 computer archite...
  • 615 篇 bandwidth
  • 602 篇 feature extracti...
  • 570 篇 artificial intel...
  • 565 篇 testing
  • 550 篇 data mining
  • 550 篇 costs
  • 542 篇 machine learning
  • 530 篇 delay
  • 527 篇 semantics
  • 526 篇 protocols
  • 503 篇 algorithm design...
  • 488 篇 hardware
  • 470 篇 deep learning
  • 464 篇 robustness
  • 449 篇 control systems

机构

  • 1,103 篇 cavendish labora...
  • 1,033 篇 department of ph...
  • 976 篇 oliver lodge lab...
  • 963 篇 physikalisches i...
  • 797 篇 university of ch...
  • 632 篇 infn laboratori ...
  • 617 篇 infn sezione di ...
  • 616 篇 department of co...
  • 599 篇 infn sezione di ...
  • 573 篇 fakultät physik ...
  • 568 篇 infn sezione di ...
  • 558 篇 school of physic...
  • 537 篇 horia hulubei na...
  • 528 篇 school of physic...
  • 526 篇 department of ph...
  • 517 篇 imperial college...
  • 511 篇 h.h. wills physi...
  • 508 篇 iccub universita...
  • 504 篇 nikhef national ...
  • 503 篇 stfc rutherford ...

作者

  • 267 篇 barter w.
  • 247 篇 a. gomes
  • 243 篇 beiter a.
  • 234 篇 c. alexa
  • 233 篇 bellee v.
  • 232 篇 blake t.
  • 231 篇 j. m. izen
  • 226 篇 c. amelung
  • 225 篇 brundu d.
  • 225 篇 bowcock t.j.v.
  • 224 篇 g. bella
  • 224 篇 j. strandberg
  • 224 篇 d. calvet
  • 221 篇 amato s.
  • 220 篇 g. spigo
  • 220 篇 s. chen
  • 217 篇 betancourt c.
  • 217 篇 boettcher t.
  • 215 篇 borsato m.
  • 214 篇 bencivenni g.

语言

  • 56,017 篇 英文
  • 5,207 篇 其他
  • 727 篇 中文
  • 17 篇 德文
  • 15 篇 俄文
  • 13 篇 法文
  • 9 篇 日文
  • 5 篇 斯洛文尼亚文
  • 3 篇 西班牙文
  • 1 篇 阿拉伯文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Graphics Laboratory Department of Computer Science"
61959 条 记 录,以下是4411-4420 订阅
排序:
Prediction of Shock Formation From Boundary Measurements
Prediction of Shock Formation From Boundary Measurements
收藏 引用
IEEE/SP Workshop on Statistical Signal Processing (SSP)
作者: Helmuth Naumer Farzad Kamalabadi Department of Electrical and Computer Engineering and The Coordinated Science Laboratory University of Illinois Urbana–Champaign Urbana IL USA
We propose a method for the Bayesian prediction of shocks in scalar partial differential equations (PDEs) representing conservation equations from noisy observations of the boundary conditions. By considering the impl...
来源: 评论
A New Extension of the Topp–Leone-Family of Models with Applications to Real Data
收藏 引用
Annals of Data science 2023年 第1期10卷 225-250页
作者: Muhammad, Mustapha Liu, Lixia Abba, Badamasi Muhammad, Isyaku Bouchane, Mouna Zhang, Hexin Musa, Sani Department of Mathematics Guangdong University of Petrochemical Technology Maoming525000 China School of Mathematical Sciences Hebei Normal University Shijiazhuang050024 China School of Mathematics and Statistics Central South University Changsha China Department of Mathematics Yusuf Maitama Sule University Kano Nigeria School of Mechanical and Electrical Engineering University of Electronic Science and Technology of China Chengdu611731 China Key Laboratory of Augmented Reality College of Mathematics and Information Science Hebei Normal University Shijiazhuang China Department of Mathematics and Computer Science Sule Lamido University Jigawa Kafin-Hausa Nigeria
In this article, we proposed a new extension of the Topp–Leone family of distributions. Some important properties of the model are developed, such as quantile function, stochastic ordering, model series representatio... 详细信息
来源: 评论
Software Vulnerability Detection with GPT and In-Context Learning
Software Vulnerability Detection with GPT and In-Context Lea...
收藏 引用
IEEE International Conference on Data science in Cyberspace (DSC)
作者: Zhihong Liu Qing Liao Wenchao Gu Cuiyun Gao School of Computer Science and Technology Harbin Institute of Technology Shenzhen China Peng Cheng Laboratory Shenzhen China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong China
Code vulnerability detection is a software security analysis technique that focuses on recognizing and resolving possible code vulnerabilities and weaknesses. Its primary objective is to mitigate the chances of malici...
来源: 评论
Neuro-Haptic BCI Spark for TensorFlow Flying Avatars
Neuro-Haptic BCI Spark for TensorFlow Flying Avatars
收藏 引用
IEEE International Conference on Electro-Information Technology
作者: John Knudson Adriano Cavalcanti Maninder Singh Department of Computer Science and Information Technology Autonomous Systems Laboratory St. Cloud State University St. Cloud MN USA
The article explores the bleeding-edge intersection of neuro-haptics, brain-computer interface (BCI) technology, and machine learning to enable the creation and control of flying avatars. Our work integrates neuroscie... 详细信息
来源: 评论
Contrastive learning for body gesture detection during Adapted Physical Activity
Contrastive learning for body gesture detection during Adapt...
收藏 引用
IEEE International Workshop on Robot and Human Communication (ROMAN)
作者: Juan Martinez Rocha Federico Pennino Cécile Dubois Eric Monacelli Maurizio Gabbrielli Versailles Engineering Systems Laboratory University of Paris-Saclay Vélizy France Department of Computer Science and Engineering University of Bologna Bologna Italy
This paper presents a novel approach to body gesture recognition for powered wheelchair users, leveraging inertial data from wrist-mounted sensors to facilitate movement and enhance autonomy in Adapted Physical Activi... 详细信息
来源: 评论
Accelerating Persistent Hash Indexes via Reducing Negative Searches
Accelerating Persistent Hash Indexes via Reducing Negative S...
收藏 引用
IEEE International Conference on computer Design: VLSI in computers and Processors, (ICCD)
作者: Renzhi Xiao Hong Jiang Dan Feng Yuchong Hu Wei Tong Kang Liu Yucheng Zhang Xueliang Wei Zhengtao Li Wuhan National Laboratory for Optoelectronics Huazhong University of Science and Technology Wuhan China Department of Computer Science and Engineering University of Texas at Arlington Arlington USA School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Hashing is a widely used and efficient indexing mechanism for key-value storage. Persistent memory (PM) has attracted extensive attention in research due to its non-volatility and DRAM-like performance. Intel DCPMM, a...
来源: 评论
Rosetta: Enabling Robust TLS Encrypted Traffic Classification in Diverse Network Environments with TCP-Aware Traffic Augmentation  23
Rosetta: Enabling Robust TLS Encrypted Traffic Classificatio...
收藏 引用
2023 ACM Turing Award Celebration Conference, CHINA 2023
作者: Xie, Renjie Wang, Yixiao Cao, Jiahao Dong, Enhuan Xu, Mingwei Sun, Kun Li, Qi Shen, Licheng Zhang, Menghao Institute for Network Sciences and Cyberspace Tsinghua University China Department of Computer Science and Technology Tsinghua University China Beijing National Research Center for Information Science and Technology Tsinghua University China Department of Information Sciences and Technology George Mason University United States Quan Cheng Laboratory China Kuaishou Technology China
As the majority of Internet traffic is encrypted by the Transport Layer Security (TLS) protocol, recent advances leverage Deep Learning (DL) models to conduct encrypted traffic classification. We propose Rosetta to en... 详细信息
来源: 评论
Reducing Network Distance Measurement Overhead: A Tensor Completion Solution With a New Minimum Sampling Bound
收藏 引用
IEEE/ACM Transactions on Networking 2024年
作者: Tian, Jiazheng Xie, Kun Wang, Xin Wen, Jigang Xie, Gaogang Cao, Jiannong Liang, Wei Li, Kenli Hunan University College of Computer Science and Electronics Engineering Changsha410082 China Ministry of Education Key Laboratory of 'Fusion Computing of Supercomputing and Artificial Intelligence' Changsha410082 China State of New York University at Stony Brook Department of Electrical and Computer Engineering Stony BrookNY11794 United States Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan411199 China Chinese Academy of Sciences Computer Network Information Center Beijing100080 China University of Chinese Academy of Sciences School of Computer Science and Technology Beijing101408 China The Hong Kong Polytechnic University Department of Computing Hong Kong Hong Kong
Network distance measurement is crucial for evaluating network performance, attracting significant research attention. However, conducting measurements for the entire network is exceedingly expensive and time-consumin... 详细信息
来源: 评论
Edge-Assisted Accelerated Cooperative Sensing for CAVs: Task Placement and Resource Allocation
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Yuxuan Qu, Kaige Wu, Wen Shen, Xuemin Frontier Research Center Pengcheng Laboratory China School of Electronic and Computer Engineering Peking University China School of Transportation Science and Engineering Beihang University China Department of Electrical and Computer Engineering University of Waterloo Canada
In this paper, we propose a novel road side unit (RSU)-assisted cooperative sensing scheme for connected autonomous vehicles (CAVs), with the objective to reduce completion time of sensing tasks. Specifically, LiDAR s... 详细信息
来源: 评论
Multiplanar Self-Calibration for Mobile Cobot 3D Object Manipulation Using 2D Detectors and Depth Estimation
Multiplanar Self-Calibration for Mobile Cobot 3D Object Mani...
收藏 引用
IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)
作者: Tuan Dang Khang Nguyen Manfred Huber Department of Computer Science and Engineering Learning and Adaptive Robotics Laboratory University of Texas at Arlington Arlington TX USA
Calibration is the first and foremost step in dealing with sensor displacement errors that can appear during extended operation and off-time periods to enable robot object manipulation with precision. In this paper, w...
来源: 评论