咨询与建议

限定检索结果

文献类型

  • 34,458 篇 会议
  • 27,200 篇 期刊文献
  • 363 册 图书

馆藏范围

  • 62,021 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 36,821 篇 工学
    • 20,894 篇 计算机科学与技术...
    • 16,237 篇 软件工程
    • 6,780 篇 信息与通信工程
    • 5,890 篇 电气工程
    • 5,890 篇 电子科学与技术(可...
    • 4,877 篇 控制科学与工程
    • 3,603 篇 光学工程
    • 3,421 篇 生物工程
    • 2,798 篇 生物医学工程(可授...
    • 2,697 篇 材料科学与工程(可...
    • 2,503 篇 化学工程与技术
    • 2,395 篇 机械工程
    • 2,085 篇 仪器科学与技术
    • 1,592 篇 动力工程及工程热...
    • 1,190 篇 力学(可授工学、理...
    • 916 篇 土木工程
  • 24,759 篇 理学
    • 10,812 篇 物理学
    • 10,635 篇 数学
    • 4,235 篇 生物学
    • 3,390 篇 统计学(可授理学、...
    • 2,934 篇 化学
    • 2,217 篇 系统科学
    • 1,136 篇 地球物理学
  • 7,352 篇 管理学
    • 4,408 篇 管理科学与工程(可...
    • 3,137 篇 图书情报与档案管...
    • 1,903 篇 工商管理
  • 2,666 篇 医学
    • 2,200 篇 临床医学
    • 1,737 篇 基础医学(可授医学...
    • 1,139 篇 药学(可授医学、理...
  • 1,092 篇 法学
    • 926 篇 社会学
  • 610 篇 农学
  • 608 篇 经济学
  • 395 篇 教育学
  • 193 篇 文学
  • 128 篇 军事学
  • 112 篇 艺术学
  • 27 篇 哲学
  • 13 篇 历史学

主题

  • 3,343 篇 computer science
  • 3,099 篇 laboratories
  • 1,108 篇 computational mo...
  • 878 篇 application soft...
  • 707 篇 computer archite...
  • 608 篇 bandwidth
  • 607 篇 feature extracti...
  • 569 篇 testing
  • 567 篇 artificial intel...
  • 554 篇 costs
  • 548 篇 data mining
  • 542 篇 machine learning
  • 527 篇 semantics
  • 525 篇 delay
  • 523 篇 protocols
  • 500 篇 algorithm design...
  • 484 篇 hardware
  • 464 篇 robustness
  • 461 篇 deep learning
  • 443 篇 control systems

机构

  • 1,109 篇 cavendish labora...
  • 1,036 篇 department of ph...
  • 980 篇 oliver lodge lab...
  • 970 篇 physikalisches i...
  • 807 篇 university of ch...
  • 641 篇 infn laboratori ...
  • 620 篇 infn sezione di ...
  • 605 篇 infn sezione di ...
  • 604 篇 department of co...
  • 581 篇 fakultät physik ...
  • 575 篇 infn sezione di ...
  • 561 篇 school of physic...
  • 540 篇 horia hulubei na...
  • 529 篇 school of physic...
  • 528 篇 department of ph...
  • 518 篇 imperial college...
  • 514 篇 h.h. wills physi...
  • 513 篇 iccub universita...
  • 506 篇 stfc rutherford ...
  • 505 篇 nikhef national ...

作者

  • 272 篇 barter w.
  • 244 篇 a. gomes
  • 242 篇 beiter a.
  • 235 篇 blake t.
  • 233 篇 c. alexa
  • 233 篇 bellee v.
  • 230 篇 j. m. izen
  • 227 篇 brundu d.
  • 225 篇 c. amelung
  • 224 篇 amato s.
  • 223 篇 g. bella
  • 223 篇 j. strandberg
  • 223 篇 d. calvet
  • 222 篇 bowcock t.j.v.
  • 222 篇 betancourt c.
  • 220 篇 g. spigo
  • 220 篇 borsato m.
  • 220 篇 boettcher t.
  • 220 篇 s. chen
  • 219 篇 bencivenni g.

语言

  • 56,065 篇 英文
  • 5,210 篇 其他
  • 737 篇 中文
  • 17 篇 德文
  • 15 篇 俄文
  • 13 篇 法文
  • 9 篇 日文
  • 5 篇 斯洛文尼亚文
  • 3 篇 西班牙文
  • 1 篇 阿拉伯文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science Department Computer Graphics Laboratory"
62021 条 记 录,以下是1061-1070 订阅
排序:
Generalized Non-Integer Order Controllers Implementations  46
Generalized Non-Integer Order Controllers Implementations
收藏 引用
46th International Conference on Telecommunications and Signal Processing, TSP 2023
作者: Nako, Julia Tsirimokou, Georgia Psychalinos, Costas University of Patras Department of Physics Electronics Laboratory Rio Patras Greece University of Ioannina Department of Computer Science & Engineering Ioannina Greece
Generalized structures capable of implementing both fractional-order and power-law controllers are presented in this work. The first one is an active-RC scheme, realized using one active element, while the second one ... 详细信息
来源: 评论
A novel deep generative model for mRNA vaccine development: Designing 5′ UTRs with N1-methyl-pseudouridine modification
收藏 引用
Acta Pharmaceutica Sinica B 2024年 第4期14卷 1814-1826页
作者: Xiaoshan Tang Miaozhe Huo Yuting Chen Hai Huang Shugang Qin Jiaqi Luo Zeyi Qin Xin Jiang Yongmei Liu Xing Duan Ruohan Wang Lingxi Chen Hao Li Na Fan Zhongshan He Xi He Bairong Shen Shuai Cheng Li Xiangrong Song Institute of Systems Genetics Department of Critical Care MedicineFrontiers Science Center for Disease-related Molecular NetworkState Key Laboratory of Biotherapy and Cancer CenterWest China HospitalSichuan UniversityChengdu 610000China Department of Computer Science City University of Hong KongHong Kong 99907China Department of Biology Brandeis UniversityBostonMA 02453USA
Efficient translation mediated by the 5'untranslated region(5'UTR)is essential for the robust efficacy of mRNA ***,the N1-methyl-pseudouridine(m1)modification of mRNA can impact the translation efficiency of t... 详细信息
来源: 评论
Delving into the Realm of Information-Theoretic Security Emerging Trends and Future Directions
Delving into the Realm of Information-Theoretic Security Eme...
收藏 引用
2024 International Conference on Communication, computer sciences and Engineering, IC3SE 2024
作者: Srilekha, Gopu Santosh Kumar, B. Singh, Navdeep Singh, Jay Bhavana, Munugapati Jabbar, Ahmed Sabah Abed AL-Zahra Institute Of Aeronautical Engineering Department Of Computer Science And Engineering Telangana Hyderabad India New Horizon College Of Engineering Department Of Computer Science Engineering Bangalore India Lovely Professional University Phagwara India Gl Bajaj Institute Of Technology & Management U.P. Greater Noida India Mlr Institute Of Technology Department Of Computer Science And Information Technology Telangana Hyderabad India College Of Medical Technology The Islamic University Medical Laboratory Technology Department Najaf Iraq
QKD, ECC, PQC, SMPC, and biometric-based authentication are examined in this work as essential information-theoretic security approaches. Each solution improves information-theoretic security by improving communicatio... 详细信息
来源: 评论
Normalization in R2-Based Hypervolume and Hypervolume Contribution Approximation
Normalization in R2-Based Hypervolume and Hypervolume Contri...
收藏 引用
2023 IEEE Symposium Series on Computational Intelligence, SSCI 2023
作者: Wu, Guotong Shu, Tianye Shang, Ke Ishibuchi, Hisao Southern University of Science and Technology Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Department of Computer Science and Engineering Shenzhen China
In this paper, we examine the effect of normalization in R2-based hypervolume and hypervolume contribution approximation. The fact is that the region with different scales on objective space brings approximation bias.... 详细信息
来源: 评论
A Lightweight AI Model for Anomaly Detection in Wireless Networks  2
A Lightweight AI Model for Anomaly Detection in Wireless Net...
收藏 引用
2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2024
作者: Kopcho, Thomas J. Fouda, Mostafa M. Krome, Cameron J. Idaho State University Department of Computer Science PocatelloID United States Idaho State University Department of Electrical and Computer Engineering PocatelloID United States Idaho National Laboratory Ai Data & Visualization Idaho FallsID United States
Detecting network anomalies is critical for wireless network security and reliability. Traditional AI methods often require substantial computational resources, particularly when deployed on cloud servers, leading to ... 详细信息
来源: 评论
Analyzing the Impact of Security Measures on Wi-Fi Quality of Service  2
Analyzing the Impact of Security Measures on Wi-Fi Quality o...
收藏 引用
2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2024
作者: Kopcho, Thomas J. Fouda, Mostafa M. Krome, Cameron J. Quach, Anna T. Olaveson, Israel G. Idaho State University Department of Computer Science PocatelloID United States Idaho State University Department of Electrical and Computer Engineering PocatelloID United States Ai Data & Visualization Idaho National Laboratory Idaho FallsID United States
This study examines the relationship between Quality of Service (QoS) and security in Wi-Fi networks. Using a detailed dataset consisting of QoS metrics of file transfers under various security configurations, we anal... 详细信息
来源: 评论
Privacy Preserving Fingerprint Authentication based on Homomorphic Encryption and Blockchain  1
Privacy Preserving Fingerprint Authentication based on Homom...
收藏 引用
1st International Conference on computer Communications and Intelligent Systems, I3CIS 2022
作者: Yousra, Ali Zouaghi Meriama, Mahamdioua Atidel, Lahoulou Mohamed Seddik Ben Yahia University Faculty of Exact Sciences and Computer Science Computer Science Department Jijel Algeria Laoti Laboratory Mohamed Seddik Ben Yahia University Computer Science Department Jijel Algeria
Biometric authentication methods generally rely on centralized authority such as centralized database servers to store biometric templates and manage authentication. These methods suffer from different points of attac... 详细信息
来源: 评论
Empirical Hypervolume Optimal μ-Distributions on Complex Pareto Fronts
Empirical Hypervolume Optimal μ-Distributions on Complex Pa...
收藏 引用
2023 IEEE Symposium Series on Computational Intelligence, SSCI 2023
作者: Shang, Ke Shu, Tianye Wu, Guotong Nan, Yang Pang, Lie Meng Ishibuchi, Hisao Southern University of Science and Technology Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Department of Computer Science and Engineering Shenzhen China
Hypervolume optimal μ-distribution is the distribution of μ solutions maximizing the hypervolume indicator of μ solutions on a specific Pareto front. Most studies have focused on simple Pareto fronts such as triang... 详细信息
来源: 评论
Ensemble R2-based Hypervolume Contribution Approximation
Ensemble R2-based Hypervolume Contribution Approximation
收藏 引用
2023 IEEE Symposium Series on Computational Intelligence, SSCI 2023
作者: Wu, Guotong Shu, Tianye Nan, Yang Shang, Ke Ishibuchi, Hisao Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Southern University of Science and Technology Department of Computer Science and Engineering Shenzhen China
The hypervolume-based multi-objective evolutionary algorithms (HV-MOEAs) have proven to be highly effective in solving multi-objective optimization problems. However, the computation time of the hypervolume calculatio... 详细信息
来源: 评论
Semi-supervised Medical Image Segmentation via Feature-perturbed Consistency
Semi-supervised Medical Image Segmentation via Feature-pertu...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Yang, Yang Wang, Ruixuan Zhang, Tong Su, Jingyong Harbin Institute of Technology School of Computer Science and Technology Shenzhen China Peng Cheng Laboratory Department of Network Intelligence Shenzhen China Sun Yat-sen University School of Computer Science and Engineering Guangzhou China
Although deep convolutional neural networks have achieved satisfactory performance in many medical image segmentation tasks, a considerable annotation challenge still needs to be solved, which is expensive and time-co... 详细信息
来源: 评论