咨询与建议

限定检索结果

文献类型

  • 34,447 篇 会议
  • 27,186 篇 期刊文献
  • 365 册 图书

馆藏范围

  • 61,998 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 36,530 篇 工学
    • 20,984 篇 计算机科学与技术...
    • 16,354 篇 软件工程
    • 6,820 篇 信息与通信工程
    • 5,714 篇 电子科学与技术(可...
    • 5,706 篇 电气工程
    • 4,910 篇 控制科学与工程
    • 3,727 篇 光学工程
    • 3,428 篇 生物工程
    • 2,808 篇 生物医学工程(可授...
    • 2,499 篇 化学工程与技术
    • 2,447 篇 材料科学与工程(可...
    • 2,402 篇 机械工程
    • 2,091 篇 仪器科学与技术
    • 1,595 篇 动力工程及工程热...
    • 1,196 篇 力学(可授工学、理...
    • 925 篇 土木工程
  • 24,821 篇 理学
    • 10,803 篇 物理学
    • 10,647 篇 数学
    • 4,244 篇 生物学
    • 3,363 篇 统计学(可授理学、...
    • 2,930 篇 化学
    • 2,217 篇 系统科学
    • 1,137 篇 地球物理学
  • 7,401 篇 管理学
    • 4,436 篇 管理科学与工程(可...
    • 3,157 篇 图书情报与档案管...
    • 1,910 篇 工商管理
  • 2,671 篇 医学
    • 2,206 篇 临床医学
    • 1,742 篇 基础医学(可授医学...
    • 1,137 篇 药学(可授医学、理...
  • 1,091 篇 法学
    • 923 篇 社会学
  • 620 篇 农学
  • 609 篇 经济学
  • 401 篇 教育学
  • 193 篇 文学
  • 128 篇 军事学
  • 114 篇 艺术学
  • 27 篇 哲学
  • 13 篇 历史学

主题

  • 3,345 篇 computer science
  • 3,097 篇 laboratories
  • 1,108 篇 computational mo...
  • 874 篇 application soft...
  • 702 篇 computer archite...
  • 610 篇 bandwidth
  • 600 篇 feature extracti...
  • 568 篇 artificial intel...
  • 555 篇 testing
  • 546 篇 costs
  • 543 篇 data mining
  • 543 篇 machine learning
  • 532 篇 semantics
  • 523 篇 protocols
  • 522 篇 delay
  • 501 篇 algorithm design...
  • 476 篇 hardware
  • 463 篇 robustness
  • 458 篇 deep learning
  • 445 篇 control systems

机构

  • 1,108 篇 cavendish labora...
  • 1,032 篇 department of ph...
  • 979 篇 oliver lodge lab...
  • 964 篇 physikalisches i...
  • 801 篇 university of ch...
  • 637 篇 infn laboratori ...
  • 617 篇 infn sezione di ...
  • 603 篇 department of co...
  • 602 篇 infn sezione di ...
  • 575 篇 fakultät physik ...
  • 569 篇 infn sezione di ...
  • 556 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 527 篇 school of physic...
  • 525 篇 department of ph...
  • 517 篇 imperial college...
  • 515 篇 h.h. wills physi...
  • 511 篇 iccub universita...
  • 508 篇 nikhef national ...
  • 505 篇 stfc rutherford ...

作者

  • 262 篇 barter w.
  • 244 篇 a. gomes
  • 243 篇 beiter a.
  • 233 篇 c. alexa
  • 231 篇 j. m. izen
  • 230 篇 bellee v.
  • 229 篇 blake t.
  • 225 篇 c. amelung
  • 223 篇 g. bella
  • 223 篇 j. strandberg
  • 223 篇 d. calvet
  • 222 篇 brundu d.
  • 222 篇 bowcock t.j.v.
  • 221 篇 amato s.
  • 220 篇 g. spigo
  • 220 篇 s. chen
  • 217 篇 betancourt c.
  • 217 篇 boettcher t.
  • 216 篇 j. wang
  • 215 篇 borsato m.

语言

  • 58,521 篇 英文
  • 2,672 篇 其他
  • 776 篇 中文
  • 15 篇 俄文
  • 14 篇 德文
  • 10 篇 法文
  • 9 篇 日文
  • 4 篇 斯洛文尼亚文
  • 3 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Graphics Laboratory Department of Computer Science"
61998 条 记 录,以下是821-830 订阅
排序:
Cyber Deception System based on Monte Carlo Simulation in the Mobile Edge Computing (MEC)
Cyber Deception System based on Monte Carlo Simulation in th...
收藏 引用
2023 IEEE International Conference on computer, Information, and Telecommunication Systems, CITS 2023
作者: Kabdjou, Joelle Tagne, Elie Fute Rawat, Danda B. Acosta, Jaime Kamhoua, Charles University of Dschang Department of Mathematics and Computer Science Dschang Cameroon University of Buea Department of Computer Engineering Dschang Buea Cameroon Howard University Department of Electrical Engineering and Computer Science Washington United States Network Security Branch Devcom Army Research Laboratory Adelphi United States
The frequency of malicious activities by cyber attackers is on the rise, posing a significant challenge to counter cyber attacks in the Mobile Edge Computing (MEC) environment. The vulnerability of wireless networks, ... 详细信息
来源: 评论
Multiobjective Resource Allocation for Cloud-Edge–Terminal Collaboration
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 17024-17033页
作者: Liu, Xin Wang, Zhaokun Zhang, Chunqing Cao, Bin Fridenfalk, Mikael Kumar Singh, Amit Hebei University of Technology State Key Laboratory of Reliability and Intelligence of Electrical Equipment Tianjin300401 China Uppsala University Department of Game Design Uppsala751 05 Sweden National Institute of Technology Patna Department of Computer Science Patna800005 India
This article proposes a cloud-edge–terminal collaborative resource allocation architecture that efficiently allocates resources. Traditional resource allocation often focuses solely on optimizing delay and service co... 详细信息
来源: 评论
Functional plastic films:nano-engineered composite based flexible microwave antennas with near-unity relative visible transmittance
收藏 引用
Light(Advanced Manufacturing) 2024年 第2期5卷 95-105页
作者: Cheng Zhang Liang Zhu Chengang Ji Zhilu Ye Nabeel Alsaab Minye Yang Yuhui Hu Pai-Yen Chen L.Jay Guo School of Optical and Electronic Information&Wuhan National Laboratory for Optoelectronics Huazhong University of Science and TechnologyWuhan430074China Department of Electrical and Computer Engineering University of Illinois at ChicagoChicagoIL 60607USA Department of Electrical Engineering and Computer Science University of MichiganAnn ArborMI 48109USA
Microwave antennas are essential elements for various applications,such as telecommunication,radar,sensing,and wireless power *** antennas are conventionally manufactured on rigid substrates using opaque materials,suc... 详细信息
来源: 评论
Attentional Conditional Generative Adversarial Network for Ambient Occlusion Approximation  2nd
Attentional Conditional Generative Adversarial Network for ...
收藏 引用
2nd International Conference on Intelligent Systems and Pattern Recognition, ISPR 2022
作者: Abbas, Fayçal Malah, Mehdi Babahenini, Mohamed Chaouki LESIA Laboratory Computer Science Department University of Abbes Laghrour Khenchela Khenchela Algeria ICOSI Laboratory Computer Science Department University of Abbes Laghrour Khenchela Khenchela Algeria LESIA Laboratory Computer Science Department University of Mohamed Khider Biskra Biskra Algeria
Ambient occlusion is a method that increases the realism of computer generated images by estimating the reflected illumination in areas where light fails to illuminate them due to occlusions imposed by surrounding obj... 详细信息
来源: 评论
HyperplaneGAN: a unified consistent translation framework for facial attribute editing
收藏 引用
Multimedia Tools and Applications 2024年 1-25页
作者: Li, Defang Deng, Huiqi Qin, Peng Chen, Weifu Feng, Guocan College of General Education Guangzhou Vocational College of Technology and Business Guangzhou China Department of Computer Science Guangzhou Maritime University Guangzhou China School of Mathematics Sun Yat-sen University Guangzhou China Guangdong Province Key Laboratory Sun Yat-sen University Guangzhou China School of Computer Science and Technology Xi’an Jiaotong University Shaanxi Xi’an China
Facial attribute editing has been obtaining remarkable progress as the rapid development in deep generative models. Existing algorithms can be roughly grouped into two distinct categories: attribute-guided models and ... 详细信息
来源: 评论
Dates Detection System for Automatic Harvesting Using Deep Learning  1
收藏 引用
International Conference on Advanced Intelligent Systems for Sustainable Development, AI2SD 2022
作者: Zarouit, Yousra Aksasse, Brahim Ouhda, Mohamed Department of Computer Science Faculty of Sciences and Technics Moulay Ismail University Errachidia Morocco MAIS Laboratory Department of Computer Science Faculty of Sciences Moulay Ismail University Meknes Meknes Morocco Department of Computer and Mathematics Higher School of Technology Sultan Moulay Slimane University Khenifra Morocco
An accurate vision system for detecting and analyzing fruit in real-time requires fast and accurate algorithms for object detection. This will allows robotic systems to analyze and process in real-time identically lik... 详细信息
来源: 评论
A Machine Learning Based Framework for a Stage-Wise Classification of Date Palm White Scale Disease
收藏 引用
Big Data Mining and Analytics 2023年 第3期6卷 263-272页
作者: Abdelaaziz Hessane Ahmed El Youssefi Yousef Farhaoui Badraddine Aghoutane Fatima Amounas STI Laboratory IDMSFaculty of Sciences and TechniquesMoulay Ismail University of MeknesErrachidia 52000Morocco. IA Laboratory Department of Computer ScienceFaculty of SciencesMoulay Ismail University of MeknesMeknes 50070Morocco. RO.AL&I Group Computer Sciences DepartmentFaculty of Sciences and TechniquesMoulay Ismail University of MeknesErrachidia 52000Morocco.
Date palm production is critical to oasis agriculture,owing to its economic importance and nutritional *** diseases endanger this precious tree,putting a strain on the economy and *** scale Parlatoria blanchardi is a ... 详细信息
来源: 评论
CRP2-VCS: Contrast-Oriented Region-based Progressive Probabilistic Visual Cryptography Schemes
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2025年 第6期35卷 5501-5517页
作者: Wu, Xiaotian Song, Bofan Fang, Jia Yan, WeiQi Peng, Qing-Yu Jinan University Guangdong Key Laboratory of Data Security and Privacy Preserving College of Cyber Security College of Information Science and Technology Guangzhou China Auckland University of Technology Department of Computer and Information Systems Auckland New Zealand Jinan University Sino-French Joint Laboratory for Astrometry Dynamics and Space Science Guangzhou China
Most visual cryptography schemes (VCSs) are condition-oriented which implies their designs focus on satisfying the contrast and security conditions in VCS. In this paper, we explore a new architecture of VCS: contrast... 详细信息
来源: 评论
FUNKNN: NEURAL INTERPOLATION FOR FUNCTIONAL GENERATION  11
FUNKNN: NEURAL INTERPOLATION FOR FUNCTIONAL GENERATION
收藏 引用
11th International Conference on Learning Representations, ICLR 2023
作者: Khorashadizadeh, AmirEhsan Chaman, Anadi Debarnot, Valentin Dokmanić, Ivan Department of Mathematics and Computer Science University of Basel Switzerland Coordinated Science Laboratory University of Illinois at Urbana-Champaign United States
Can we build continuous generative models which generalize across scales, can be evaluated at any coordinate, admit calculation of exact derivatives, and are conceptually simple? Existing MLP-based architectures gener... 详细信息
来源: 评论
CIL4EMTD: A Novel Class Incremental Learning Method for Encrypted Malware Traffic Detection  9
CIL4EMTD: A Novel Class Incremental Learning Method for Encr...
收藏 引用
9th IEEE International Conference on Data science in Cyberspace, DSC 2024
作者: Li, Jiarui Du, Lei Chen, Yilu Zeng, Liyi Li, Hao Gu, Zhaoquan School of Computer Science and Technology Shenzhen China Pengcheng Laboratory Department of New Networks Shenzhen China National Key Laboratory of Advanced Communication Networks Shijiazhuang China
With the widespread adoption of traffic encryption technologies, detecting attack behaviors in encrypted malware traffic has become a critical and challenging problem. The encrypted malware traffic contains a lot of r... 详细信息
来源: 评论