咨询与建议

限定检索结果

文献类型

  • 3,238 篇 会议
  • 2,307 篇 期刊文献
  • 57 册 图书

馆藏范围

  • 5,602 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,446 篇 工学
    • 2,215 篇 计算机科学与技术...
    • 1,797 篇 软件工程
    • 835 篇 信息与通信工程
    • 568 篇 控制科学与工程
    • 481 篇 电气工程
    • 373 篇 电子科学与技术(可...
    • 314 篇 生物工程
    • 272 篇 机械工程
    • 236 篇 光学工程
    • 196 篇 生物医学工程(可授...
    • 156 篇 仪器科学与技术
    • 156 篇 动力工程及工程热...
    • 118 篇 化学工程与技术
    • 104 篇 交通运输工程
    • 93 篇 材料科学与工程(可...
    • 82 篇 安全科学与工程
    • 73 篇 建筑学
  • 1,852 篇 理学
    • 976 篇 数学
    • 526 篇 物理学
    • 356 篇 生物学
    • 350 篇 统计学(可授理学、...
    • 277 篇 系统科学
    • 139 篇 化学
  • 810 篇 管理学
    • 501 篇 管理科学与工程(可...
    • 337 篇 图书情报与档案管...
    • 248 篇 工商管理
  • 201 篇 医学
    • 178 篇 临床医学
    • 139 篇 基础医学(可授医学...
    • 80 篇 药学(可授医学、理...
  • 137 篇 法学
    • 113 篇 社会学
  • 76 篇 农学
  • 72 篇 经济学
  • 34 篇 教育学
  • 24 篇 文学
  • 13 篇 军事学
  • 7 篇 艺术学
  • 5 篇 哲学
  • 1 篇 历史学

主题

  • 277 篇 laboratories
  • 113 篇 information syst...
  • 110 篇 computer science
  • 94 篇 computational mo...
  • 88 篇 feature extracti...
  • 79 篇 computer archite...
  • 79 篇 wireless network...
  • 78 篇 artificial intel...
  • 77 篇 semantics
  • 72 篇 quality of servi...
  • 70 篇 machine learning
  • 70 篇 training
  • 68 篇 application soft...
  • 68 篇 throughput
  • 65 篇 deep learning
  • 65 篇 wireless sensor ...
  • 60 篇 data mining
  • 59 篇 bandwidth
  • 59 篇 control systems
  • 57 篇 visualization

机构

  • 69 篇 state key labora...
  • 49 篇 school of comput...
  • 47 篇 state key labora...
  • 42 篇 department of co...
  • 40 篇 networking and i...
  • 33 篇 state key labora...
  • 33 篇 state key labora...
  • 30 篇 school of inform...
  • 29 篇 department of el...
  • 29 篇 laboratory for i...
  • 27 篇 laboratory for i...
  • 26 篇 school of comput...
  • 26 篇 state key labora...
  • 25 篇 school of comput...
  • 25 篇 state key labora...
  • 25 篇 state key labora...
  • 25 篇 intelligent inte...
  • 23 篇 university of ch...
  • 23 篇 peng cheng labor...
  • 23 篇 laboratory for i...

作者

  • 87 篇 xi zhang
  • 40 篇 guo hong
  • 27 篇 zhang xi
  • 26 篇 xiong zehui
  • 25 篇 niyato dusit
  • 25 篇 yang jian
  • 22 篇 sun maosong
  • 22 篇 zhidong deng
  • 20 篇 liu yang
  • 19 篇 druzdzel marek j...
  • 18 篇 rajkumar buyya
  • 17 篇 fuchun sun
  • 17 篇 ismail leila
  • 16 篇 runyao duan
  • 16 篇 buyya rajkumar
  • 15 篇 zhang yichen
  • 15 篇 qixuan zhu
  • 15 篇 xu hua
  • 14 篇 a.s. willsky
  • 14 篇 tao dacheng

语言

  • 5,347 篇 英文
  • 176 篇 其他
  • 73 篇 中文
  • 4 篇 俄文
  • 2 篇 法文
  • 1 篇 德文
  • 1 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Graphics Laboratory Information Systems Laboratory"
5602 条 记 录,以下是1-10 订阅
排序:
Analyzing and Mitigating Attacks in IoT Smart Home Using a Threat Modeling Approach-Based STRIDE
International Journal of Interactive Mobile Technologies
收藏 引用
International Journal of Interactive Mobile Technologies 2025年 第2期19卷 126-142页
作者: Ouaissa, Mariya Ouaissa, Mariyam Computer Systems Engineering Laboratory Cadi Ayyad University Marrakech Morocco Laboratory of Information Technologies Chouaib Doukkali University El Jadida Morocco
The Internet of Things (IoT) is a network of interconnected devices that enables data exchange. It is widely used in areas such as healthcare, aviation, agriculture, energy, and home automation. Despite its rapid grow... 详细信息
来源: 评论
CNN-Based Multi-Output and Multi-Task Regression for Supershape Reconstruction from 3D Point Clouds
Informatica (Slovenia)
收藏 引用
Informatica (Slovenia) 2025年 第5期49卷 37-48页
作者: Remmach, Hassnae Razak, Siti Fatimah Abdul Ullah, Arif Yogarayan, Sumendra Sayeed, Md Shohel Mrhari, Amine Computer Systems Engineering Laboratory Cadi Ayyad University Marrakesh40000 Morocco Faculty of Information Science and Technology Multimedia University Ayer Keroh75450 Malaysia Research in Computer Science Laboratory Faculty of Sciences Ibn Tofail University Kenitra Morocco
In a number of industries, including computer graphics, robotics, and medical imaging, three-dimensional reconstruction is essential. In this research, a CNN-based Multi-output and Multi-Task Regressor with deep learn... 详细信息
来源: 评论
Electromagnetic metamaterial agent
收藏 引用
Light(Science & Applications) 2025年 第1期14卷 118-130页
作者: Shengguo Hu Mingyi Li Jiawen Xu Hongrui Zhang Shanghang Zhang Tie Jun Cui Philipp del Hougne Lianlin Li State Key Laboratory of Advanced Optical Communication Systems and Networks School of ElectronicsPeking UniversityBeijing100871China National Key Laboratory for Multimedia Information Processing School of Computer SciencePeking UniversityBeijing100871China State Key Laboratory of Millimeter Waves Southeast UniversityNanjing210096China Pazhou Laboratory(Huangpu) GuangzhouGuangdong510555China Univ Rennes CNRSIETR-UMR 6164F-35000RennesFrance
Metamaterials have revolutionized wave control;in the last two decades,they evolved from passive devices via programmable devices to sensor-endowed self-adaptive devices realizing a user-specified *** deep-learning te... 详细信息
来源: 评论
Listen with Seeing: Cross-modal Contrastive Learning for Audio-Visual Event Localization
收藏 引用
IEEE Transactions on Multimedia 2025年 27卷 2650-2665页
作者: Sun, Chao Chen, Min Zhu, Chuanbo Zhang, Sheng Lu, Ping Chen, Jincai Huazhong University of Science and Technology Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of Data Storage Systems and Technology Ministry of Education of China School of Computer Science and Technology Wuhan430074 China South China University of Technology School of Computer Science and Engineering Guangzhou510640 China Pazhou Laboratory Guangzhou510640 China
In real-world physiological and psychological scenarios, there often exists a robust complementary correlation between audio and visual signals. Audio-Visual Event Localization (AVEL) aims to identify segments with Au... 详细信息
来源: 评论
History of Artificial Lighting, From Fire to LED [History]
收藏 引用
IEEE INDUSTRY APPLICATIONS MAGAZINE 2025年 第2期31卷 10-25页
作者: Canale, Laurent Hamady, Mohamad S & C Electric Company Chicago Illinois USA Research Engineer CNRS LAPLACE Laboratory UMR 5213 Paul Sabatier University Toulouse Cedex 9 France Computer Systems Department Faculty of Computer and Information Sciences Ain Shams University Cairo Cairo Egypt
Having become so present and accessible, artificial light has been forgotten in the same way as the air we breathe. It is obvious and is only noticed by its often-exceptional absence. Its omnipresence is such that it ... 详细信息
来源: 评论
MMH-FE:AMulti-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural Network Training Based on Functional Encryption
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 5387-5405页
作者: Hao Li Kuan Shao Xin Wang Mufeng Wang Zhenyong Zhang The State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China China Industrial Control Systems Cyber Emergency Response Team Beijing100040China
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achie... 详细信息
来源: 评论
LightGBM-Based Audio Watermarking Robust to Recapturing and Hybrid Attacks
收藏 引用
IEEE Transactions on information Forensics and Security 2025年 20卷 4212-4227页
作者: Su, Zhaopin Weng, Zhaofang Zhang, Guofu Lian, Chensi Wang, Niansong Hefei University of Technology School of Computer Science and Information Engineering Hefei230601 China Intelligent Interconnected Systems Laboratory of Anhui Province Hefei230009 China Anhui Province Key Laboratory of Industry Safety and Emergency Technology Hefei230601 China Joint Laboratory of Intelligent Prevention and Recognition of Audio and Video Anhui Provincial Public Security Department Hefei230000 China
Digital audio watermarking is a critical technology widely used for copyright protection, content authentication, and broadcast monitoring. However, its robustness is significantly challenged by recapturing and hybrid... 详细信息
来源: 评论
Random Staircase Generator Matrix Codes: Coding Theorem, Performance Analysis, and Code Design
收藏 引用
IEEE Transactions on information Theory 2025年 第5期71卷 3497-3509页
作者: Wang, Qianfan Wang, Yiwen Wang, Yixin Liang, Jifan Ma, Xiao Sun Yat-sen University School of Computer Science Engineering and Guangdong Key Laboratory of Information Security Technology Guangzhou510006 China Sun Yat-sen University School of Systems Science and Engineering Guangzhou510006 China
In this paper, we present a class of codes, referred to as random staircase generator matrix codes (SGMCs), which have staircase-like generator matrices. In the infinite-length region, we prove that the random SGMC is... 详细信息
来源: 评论
Solving Overlapping Coalition Structure Generation in Task-Based Settings
收藏 引用
Journal of Artificial Intelligence Research 2025年 82卷 2125-2166页
作者: Zhang, Guofu Su, Zhaopin Song, Xiaoxiao Gao, Zixuan Li, Miqing Yao, Xin School of Computer Science and Information Engineering Hefei University of Technology Anhui Hefei China Intelligent Interconnected Systems Laboratory of Anhui Province Anhui Hefei China Anhui Province Key Laboratory of Industry Safety and Emergency Technology Anhui Hefei China CERCIA School of Computer Science University of Birmingham Birmingham United Kingdom School of Data Science Lingnan University Hong Kong
The overlapping coalition structure generation problem (OCSGP) is a challenging computational problem in multi-agent systems. It focuses on selecting possibly overlapping coalitions from a set of agents to maximize th... 详细信息
来源: 评论
Assessment of Multilevel Intransitive Noninterference by Nonblocking Analysis
收藏 引用
IEEE Transactions on Automatic Control 2025年 第5期70卷 2902-2917页
作者: Zhong, Wenjing Zhao, Jinjing Hu, Hesuan Xidian University School of Electro-Mechanical Engineering Xi'an710071 China National Key Laboratory of Science and Technology on Information System Security Beijing100101 China Nanyang Technological University School of Computer Science and Engineering College of Engineering 639798 Singapore Xi'an Jiaotong University State Key Laboratory for Manufacturing Systems Engineering Xi'an710054 China
Security of system behavior is a kind of information flow security, which is achieved by confusing the intruders via the indistinguishability of system behaviors. Noninterference is a typical notion to describe inform... 详细信息
来源: 评论