咨询与建议

限定检索结果

文献类型

  • 34,458 篇 会议
  • 27,143 篇 期刊文献
  • 358 册 图书

馆藏范围

  • 61,959 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 36,920 篇 工学
    • 20,895 篇 计算机科学与技术...
    • 16,237 篇 软件工程
    • 6,781 篇 信息与通信工程
    • 5,934 篇 电气工程
    • 5,932 篇 电子科学与技术(可...
    • 4,875 篇 控制科学与工程
    • 3,578 篇 光学工程
    • 3,421 篇 生物工程
    • 2,798 篇 生物医学工程(可授...
    • 2,756 篇 材料科学与工程(可...
    • 2,503 篇 化学工程与技术
    • 2,394 篇 机械工程
    • 2,083 篇 仪器科学与技术
    • 1,592 篇 动力工程及工程热...
    • 1,192 篇 力学(可授工学、理...
    • 917 篇 土木工程
  • 24,752 篇 理学
    • 10,810 篇 物理学
    • 10,649 篇 数学
    • 4,233 篇 生物学
    • 3,408 篇 统计学(可授理学、...
    • 2,935 篇 化学
    • 2,217 篇 系统科学
    • 1,137 篇 地球物理学
  • 7,351 篇 管理学
    • 4,407 篇 管理科学与工程(可...
    • 3,138 篇 图书情报与档案管...
    • 1,902 篇 工商管理
  • 2,665 篇 医学
    • 2,200 篇 临床医学
    • 1,736 篇 基础医学(可授医学...
    • 1,139 篇 药学(可授医学、理...
  • 1,092 篇 法学
    • 926 篇 社会学
  • 609 篇 农学
  • 605 篇 经济学
  • 396 篇 教育学
  • 192 篇 文学
  • 128 篇 军事学
  • 112 篇 艺术学
  • 27 篇 哲学
  • 13 篇 历史学

主题

  • 3,344 篇 computer science
  • 3,100 篇 laboratories
  • 1,108 篇 computational mo...
  • 879 篇 application soft...
  • 711 篇 computer archite...
  • 615 篇 bandwidth
  • 602 篇 feature extracti...
  • 570 篇 artificial intel...
  • 565 篇 testing
  • 550 篇 data mining
  • 550 篇 costs
  • 542 篇 machine learning
  • 530 篇 delay
  • 527 篇 semantics
  • 526 篇 protocols
  • 503 篇 algorithm design...
  • 488 篇 hardware
  • 470 篇 deep learning
  • 464 篇 robustness
  • 449 篇 control systems

机构

  • 1,103 篇 cavendish labora...
  • 1,033 篇 department of ph...
  • 976 篇 oliver lodge lab...
  • 963 篇 physikalisches i...
  • 797 篇 university of ch...
  • 632 篇 infn laboratori ...
  • 617 篇 infn sezione di ...
  • 616 篇 department of co...
  • 599 篇 infn sezione di ...
  • 573 篇 fakultät physik ...
  • 568 篇 infn sezione di ...
  • 558 篇 school of physic...
  • 537 篇 horia hulubei na...
  • 528 篇 school of physic...
  • 526 篇 department of ph...
  • 517 篇 imperial college...
  • 511 篇 h.h. wills physi...
  • 508 篇 iccub universita...
  • 504 篇 nikhef national ...
  • 503 篇 stfc rutherford ...

作者

  • 267 篇 barter w.
  • 247 篇 a. gomes
  • 243 篇 beiter a.
  • 234 篇 c. alexa
  • 233 篇 bellee v.
  • 232 篇 blake t.
  • 231 篇 j. m. izen
  • 226 篇 c. amelung
  • 225 篇 brundu d.
  • 225 篇 bowcock t.j.v.
  • 224 篇 g. bella
  • 224 篇 j. strandberg
  • 224 篇 d. calvet
  • 221 篇 amato s.
  • 220 篇 g. spigo
  • 220 篇 s. chen
  • 217 篇 betancourt c.
  • 217 篇 boettcher t.
  • 215 篇 borsato m.
  • 214 篇 bencivenni g.

语言

  • 56,017 篇 英文
  • 5,207 篇 其他
  • 727 篇 中文
  • 17 篇 德文
  • 15 篇 俄文
  • 13 篇 法文
  • 9 篇 日文
  • 5 篇 斯洛文尼亚文
  • 3 篇 西班牙文
  • 1 篇 阿拉伯文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Graphics Laboratory Department of Computer Science"
61959 条 记 录,以下是841-850 订阅
排序:
CIL4EMTD: A Novel Class Incremental Learning Method for Encrypted Malware Traffic Detection  9
CIL4EMTD: A Novel Class Incremental Learning Method for Encr...
收藏 引用
9th IEEE International Conference on Data science in Cyberspace, DSC 2024
作者: Li, Jiarui Du, Lei Chen, Yilu Zeng, Liyi Li, Hao Gu, Zhaoquan School of Computer Science and Technology Shenzhen China Pengcheng Laboratory Department of New Networks Shenzhen China National Key Laboratory of Advanced Communication Networks Shijiazhuang China
With the widespread adoption of traffic encryption technologies, detecting attack behaviors in encrypted malware traffic has become a critical and challenging problem. The encrypted malware traffic contains a lot of r... 详细信息
来源: 评论
Exploring BERT and ELMo for Bangla Spam SMS Dataset Creation and Detection  26
Exploring BERT and ELMo for Bangla Spam SMS Dataset Creation...
收藏 引用
26th International Conference on computer and Information Technology, ICCIT 2023
作者: Khan, Fariba Mustafa, Rashed Tasnim, Farzana Mahmud, Tanjim Hossain, Mohammad Shahadat Andersson, Karl University of Chittagong Department of Computer Science and Engineering Chittagong4331 Bangladesh International Islamic University Chittagong Department of Computer Science and Engineering Chittagong4318 Bangladesh Rangamati Science and Technology University Department of Computer Science and Engineering Rangamati4500 Bangladesh Luleå University of Technology Pervasive and Mobile Computing Laboratory Luleå971 87 Sweden
The proliferation of digital communication and social media platforms has led to an upsurge in spam messages across various languages, including Bangla. These intrusive messages not only cause user annoyance but also ... 详细信息
来源: 评论
Diagnosing the Compositional Knowledge of Vision Language Models from a Game-Theoretic View  41
Diagnosing the Compositional Knowledge of Vision Language Mo...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Wang, Jin Dong, Shichao Zhu, Yapeng Yao, Kelu Zhao, Weidong Li, Chao Luo, Ping Department of Computer Science The University of Hong Kong Hong Kong Shanghai AI Laboratory China Zhejiang Laboratory Hangzhou China Baidu Inc. Beijing China
Compositional reasoning capabilities are usually considered as fundamental skills to characterize human perception. Recent studies show that current Vision Language Models (VLMs) surprisingly lack sufficient knowledge... 详细信息
来源: 评论
Hemodynamic Analysis and Diagnosis Based on Multi-Deep Learning Models
收藏 引用
Fluid Dynamics & Materials Processing 2023年 第6期19卷 1369-1383页
作者: Xing Deng Feipeng Da Haijian Shao School of Automation Key Laboratory of Measurement and Control for CSEMinistry of EducationSoutheast UniversityNanjing210096China School of Computer Jiangsu University of Science and TechnologyZhenjiang212003China Department of Electrical and Computer Engineering University of NevadaLas Vegas89154USA
This study employs nine distinct deep learning models to categorize 12,444 blood cell images and automatically extract from them relevant information with an accuracy that is beyond that achievable with traditional **... 详细信息
来源: 评论
Brain-inspired artificial intelligence research: A review
收藏 引用
science China(Technological sciences) 2024年 第8期67卷 2282-2296页
作者: WANG GuoYin BAO HuaNan LIU Qun ZHOU TianGang WU Si HUANG TieJun YU ZhaoFei LU CeWu GONG YiHong ZHANG ZhaoXiang HE Sheng Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and TelecommunicationsChongqing 400065China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and TelecommunicationsChongqing 400065China College of Computer and Information Science Chongqing Normal UniversityChongqing 401331China State Key Laboratory of Brain and Cognitive Science Institute of BiophysicsChinese Academy of SciencesBeijing 100101China School of Psychological and Cognitive Sciences Peking UniversityBeijing 100871China State Key Laboratory of Multimedia Information Processing School of Computer SciencePeking UniversityBeijing 100871China Department of Computer Science School of ElectronicsInformation and Electrical EngineeringShanghai Jiao Tong UniversityShanghai 200240China Faculty of Electronic and Information Engineering Xi’an Jiaotong UniversityXi’an 710049China The Center for Research on Intelligent Perception and Computing Institute of AutomationChinese Academy of SciencesBeijing 100190China Institute of Biophysics Chinese Academy of SciencesBeijing 100101China
Artificial intelligence(AI) systems surpass certain human intelligence abilities in a statistical sense as a whole, but are not yet the true realization of these human intelligence abilities and behaviors. There are d... 详细信息
来源: 评论
Integrated Energy-Efficient Distributed Link Stability Algorithm for UAV Networks
收藏 引用
computers, Materials & Continua 2024年 第11期81卷 2357-2394页
作者: Altaf Hussain Shuaiyong Li Tariq Hussain Razaz Waheeb Attar Farman Ali Ahmed Alhomoud Babar Shah School of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing400065China Key Laboratory of Industrial Internet of Things and Networked Control Ministry of EducationChongqing University of Posts and TelecommunicationsChongqing400065China School of Computer Science and Information Engineering Zhejiang Gongshang UniversityHangzhou310018China Management Department College of Business AdministrationPrincess Nourah bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Applied AI School of ConvergenceCollege of Computing and InformaticsSungkyunkwan UniversitySeoul03063Republic of Korea Department of Computer Science College of ScienceNorthern Border UniversityArar91431Saudi Arabia College of Technological Innovation Zayed UniversityDubai19282United Arab Emirates
Ad hoc networks offer promising applications due to their ease of use,installation,and deployment,as they do not require a centralized control *** these networks,nodes function as senders,receivers,and *** such networ... 详细信息
来源: 评论
A Novel Method for Solving the University Course Timetabling Problem Based on the Grey Wolf Optimizer Algorithm  3
A Novel Method for Solving the University Course Timetabling...
收藏 引用
3rd International Conference on Theoretical and Applicative Aspects of computer science, ICTAACS 2023
作者: Sarra, Khelifi Djamel, Zeghida Smaine, Mazouzi 20 Août 1955 University Licus Laboratory Department of Computer Science P.O Box 26 Skikda21000 Algeria 20 Août 1955 University Licus Laboratory Department of Computer Science P.O Box 26. Algeria Badji Mokhtar University Lisco Laboratory Department of Computer Science P.O Box 12 Annaba23000 Algeria
Combinatorial optimization problems are ultimately NP-Hard problems. Save for some limited versions of these problems, treatable by exact methods, solving them requires turning to approximate methods capable of provid... 详细信息
来源: 评论
An Efficient Multi-band Infrared Small Objects Detection Approach for Low-Altitude Artificial Intelligence of Thing
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20757-20772页
作者: Peng, Yuhuai Wang, Jing Wang, Wenqian Liu, Lei Atiquzzaman, Mohammed Guizani, Mohsen Dustdar, Schahram Northeastern University School of Computer Science and Engineering Shenyang110819 China Zhiyuan Research Institute Hangzhou310024 China Northeastern University School of Computer Science and Engineering Shenyang110819 China Xidian University State Key Laboratory of Integrated Service Networks Xi'an710071 China University of Oklahoma School of Computer Science NormanOK73019 United States Mohamed Bin Zayed University of Artificial Intelligence Department of Machine Learning Masdar United Arab Emirates Technische Universität Wien Distributed Systems Group Vienna1040 Austria
As a cutting-edge technology of low-altitude Artificial Intelligence of Thing (AIoT), UAV object detection significantly enhances the surveillance services capabilities of low-altitude AIoT. However, the difficulty of... 详细信息
来源: 评论
Optical Ciphering Scheme for Cancellable Speaker Identification System
收藏 引用
computer Systems science & Engineering 2023年 第4期45卷 563-578页
作者: Walid El-Shafai Marwa A.Elsayed Mohsen A.Rashwan Moawad I.Dessouky Adel S.El-Fishawy Naglaa F.Soliman Amel A.Alhussan Fathi EAbd El-Samie Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Laboratory Department of Computer SciencePrince Sultan UniversityRiyadh11586Saudi Arabia Department of Electronics and Communications Faculty of EngineeringCairo UniversityCairoEgypt Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadhSaudi Arabia
Most current security and authentication systems are based on personal *** security problem is a major issue in the field of biometric *** is due to the use in databases of the original *** biometrics will forever be ... 详细信息
来源: 评论
Domain-specific data characteristics: A study on meaning of stylometric sub-concepts and in-class imbalance
收藏 引用
Procedia computer science 2024年 246卷 4421-4430页
作者: Urszula Stańczyk Department of Computer Graphics Vision and Digital Systems Faculty of Automatic Control Electronics and Computer Science Silesian University of Technology Akademicka 2A 44-100 Gliwice Poland
In the context of data imbalance probably the most investigated problem is imbalance of classes, as learning from the data with this characteristic makes detection of existing patterns for all classes more difficult. ... 详细信息
来源: 评论