咨询与建议

限定检索结果

文献类型

  • 34,563 篇 会议
  • 27,336 篇 期刊文献
  • 363 册 图书

馆藏范围

  • 62,262 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 36,649 篇 工学
    • 21,063 篇 计算机科学与技术...
    • 16,337 篇 软件工程
    • 6,905 篇 信息与通信工程
    • 5,813 篇 电气工程
    • 5,762 篇 电子科学与技术(可...
    • 4,987 篇 控制科学与工程
    • 3,732 篇 光学工程
    • 3,435 篇 生物工程
    • 2,813 篇 生物医学工程(可授...
    • 2,514 篇 化学工程与技术
    • 2,470 篇 材料科学与工程(可...
    • 2,437 篇 机械工程
    • 2,106 篇 仪器科学与技术
    • 1,603 篇 动力工程及工程热...
    • 1,205 篇 力学(可授工学、理...
    • 932 篇 土木工程
  • 24,899 篇 理学
    • 10,857 篇 物理学
    • 10,641 篇 数学
    • 4,262 篇 生物学
    • 3,356 篇 统计学(可授理学、...
    • 2,963 篇 化学
    • 2,221 篇 系统科学
    • 1,156 篇 地球物理学
  • 7,434 篇 管理学
    • 4,457 篇 管理科学与工程(可...
    • 3,186 篇 图书情报与档案管...
    • 1,915 篇 工商管理
  • 2,724 篇 医学
    • 2,235 篇 临床医学
    • 1,761 篇 基础医学(可授医学...
    • 1,143 篇 药学(可授医学、理...
  • 1,103 篇 法学
    • 935 篇 社会学
  • 617 篇 农学
  • 612 篇 经济学
  • 407 篇 教育学
  • 193 篇 文学
  • 128 篇 军事学
  • 112 篇 艺术学
  • 27 篇 哲学
  • 13 篇 历史学

主题

  • 3,342 篇 computer science
  • 3,097 篇 laboratories
  • 1,111 篇 computational mo...
  • 874 篇 application soft...
  • 705 篇 computer archite...
  • 624 篇 feature extracti...
  • 609 篇 bandwidth
  • 570 篇 artificial intel...
  • 564 篇 testing
  • 554 篇 machine learning
  • 549 篇 data mining
  • 549 篇 costs
  • 529 篇 semantics
  • 523 篇 protocols
  • 522 篇 delay
  • 502 篇 algorithm design...
  • 487 篇 deep learning
  • 476 篇 hardware
  • 471 篇 robustness
  • 442 篇 control systems

机构

  • 1,109 篇 cavendish labora...
  • 1,034 篇 department of ph...
  • 980 篇 oliver lodge lab...
  • 973 篇 physikalisches i...
  • 807 篇 university of ch...
  • 641 篇 infn laboratori ...
  • 620 篇 infn sezione di ...
  • 605 篇 infn sezione di ...
  • 604 篇 department of co...
  • 581 篇 fakultät physik ...
  • 573 篇 infn sezione di ...
  • 561 篇 school of physic...
  • 538 篇 horia hulubei na...
  • 529 篇 school of physic...
  • 528 篇 department of ph...
  • 518 篇 imperial college...
  • 513 篇 iccub universita...
  • 512 篇 h.h. wills physi...
  • 506 篇 stfc rutherford ...
  • 505 篇 nikhef national ...

作者

  • 272 篇 barter w.
  • 244 篇 a. gomes
  • 237 篇 beiter a.
  • 235 篇 blake t.
  • 233 篇 c. alexa
  • 233 篇 bellee v.
  • 230 篇 j. m. izen
  • 227 篇 brundu d.
  • 225 篇 c. amelung
  • 224 篇 amato s.
  • 223 篇 g. bella
  • 223 篇 j. strandberg
  • 223 篇 d. calvet
  • 222 篇 bowcock t.j.v.
  • 222 篇 betancourt c.
  • 221 篇 bencivenni g.
  • 220 篇 g. spigo
  • 220 篇 borsato m.
  • 220 篇 boettcher t.
  • 220 篇 s. chen

语言

  • 54,565 篇 英文
  • 6,958 篇 其他
  • 763 篇 中文
  • 22 篇 德文
  • 17 篇 法文
  • 16 篇 俄文
  • 9 篇 日文
  • 7 篇 斯洛文尼亚文
  • 3 篇 西班牙文
  • 1 篇 阿拉伯文
  • 1 篇 芬兰文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science Department Computer Graphics Laboratory"
62262 条 记 录,以下是1151-1160 订阅
排序:
A Lightweight AI Model for Anomaly Detection in Wireless Networks  2
A Lightweight AI Model for Anomaly Detection in Wireless Net...
收藏 引用
2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things, AIBThings 2024
作者: Kopcho, Thomas J. Fouda, Mostafa M. Krome, Cameron J. Idaho State University Department of Computer Science PocatelloID United States Idaho State University Department of Electrical and Computer Engineering PocatelloID United States Idaho National Laboratory Ai Data & Visualization Idaho FallsID United States
Detecting network anomalies is critical for wireless network security and reliability. Traditional AI methods often require substantial computational resources, particularly when deployed on cloud servers, leading to ... 详细信息
来源: 评论
Privacy Preserving Fingerprint Authentication based on Homomorphic Encryption and Blockchain  1
Privacy Preserving Fingerprint Authentication based on Homom...
收藏 引用
1st International Conference on computer Communications and Intelligent Systems, I3CIS 2022
作者: Yousra, Ali Zouaghi Meriama, Mahamdioua Atidel, Lahoulou Mohamed Seddik Ben Yahia University Faculty of Exact Sciences and Computer Science Computer Science Department Jijel Algeria Laoti Laboratory Mohamed Seddik Ben Yahia University Computer Science Department Jijel Algeria
Biometric authentication methods generally rely on centralized authority such as centralized database servers to store biometric templates and manage authentication. These methods suffer from different points of attac... 详细信息
来源: 评论
Empirical Hypervolume Optimal μ-Distributions on Complex Pareto Fronts
Empirical Hypervolume Optimal μ-Distributions on Complex Pa...
收藏 引用
2023 IEEE Symposium Series on Computational Intelligence, SSCI 2023
作者: Shang, Ke Shu, Tianye Wu, Guotong Nan, Yang Pang, Lie Meng Ishibuchi, Hisao Southern University of Science and Technology Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Department of Computer Science and Engineering Shenzhen China
Hypervolume optimal μ-distribution is the distribution of μ solutions maximizing the hypervolume indicator of μ solutions on a specific Pareto front. Most studies have focused on simple Pareto fronts such as triang... 详细信息
来源: 评论
Ensemble R2-based Hypervolume Contribution Approximation
Ensemble R2-based Hypervolume Contribution Approximation
收藏 引用
2023 IEEE Symposium Series on Computational Intelligence, SSCI 2023
作者: Wu, Guotong Shu, Tianye Nan, Yang Shang, Ke Ishibuchi, Hisao Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Southern University of Science and Technology Department of Computer Science and Engineering Shenzhen China
The hypervolume-based multi-objective evolutionary algorithms (HV-MOEAs) have proven to be highly effective in solving multi-objective optimization problems. However, the computation time of the hypervolume calculatio... 详细信息
来源: 评论
Semi-supervised Medical Image Segmentation via Feature-perturbed Consistency
Semi-supervised Medical Image Segmentation via Feature-pertu...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Yang, Yang Wang, Ruixuan Zhang, Tong Su, Jingyong Harbin Institute of Technology School of Computer Science and Technology Shenzhen China Peng Cheng Laboratory Department of Network Intelligence Shenzhen China Sun Yat-sen University School of Computer Science and Engineering Guangzhou China
Although deep convolutional neural networks have achieved satisfactory performance in many medical image segmentation tasks, a considerable annotation challenge still needs to be solved, which is expensive and time-co... 详细信息
来源: 评论
SUMI-IFL: An Information-Theoretic Framework for Image Forgery Localization with Sufficiency and Minimality Constraints  39
SUMI-IFL: An Information-Theoretic Framework for Image Forge...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Sheng, Ziqi Lu, Wei Luo, Xiangyang Zhou, Jiantao Cao, Xiaochun School of Computer Science and Engineering MoE Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University China State Key Laboratory of Mathematical Engineering and Advanced Computing China State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science University of Macau China School of Cyber Science and Technology Shenzhen Campus of Sun Yat-sen University China
Image forgery localization (IFL) is a crucial technique for preventing tampered image misuse and protecting social safety. However, due to the rapid development of image tampering technologies, extracting more compreh... 详细信息
来源: 评论
Efficient and accurate numerical-projection of electromagnetic multipoles for scattering objects
收藏 引用
Frontiers of Optoelectronics 2023年 第4期16卷 215-226页
作者: Wenfei Guo Zizhe Cai Zhongfei Xiong Weijin Chen Yuntian Chen School of Optical and Electronic Information Huazhong University of Science and TechnologyWuhan 430074China Department of Electrical and Computer Engineering National University of SingaporeSingapore 117576Singapore Wuhan National Laboratory of Optoelectronics Huazhong University of Science and TechnologyWuhan 430074China Optics Valley Laboratory Wuhan 430074China
In this paper,we develop an efcient and accurate procedure of electromagnetic multipole decomposition by using the Lebedev and Gaussian quadrature methods to perform the numerical ***,we briefy review the principles o... 详细信息
来源: 评论
Neural Circuitry Involving Substance P in Male Sexual Behavior
收藏 引用
Neuroscience Bulletin 2024年 第4期40卷 544-546页
作者: Xinrong Wang Junqiang Zheng Han Xu Department of Neurobiology and Department of Neurology of the Second Affiliated Hospital and School of Brain Science and Brain Medicine Zhejiang University School of MedicineHangzhou310058China Nanhu Brain-Computer Interface Institute Hangzhou311100China Liangzhu Laboratory MOE Frontier Science Center for Brain Science and Brain-machine IntegrationState Key Laboratory of Brain-Machine IntelligenceZhejiang UniversityHangzhou311121China NHC and CAMS Key Laboratory of Medical Neurobiology Zhejiang UniversityHangzhou310058China Lingang Laboratory Shanghai200031China
Male sexual behavior is an innate social behavior crucial for reproduction[1].Previous studies have identified several brain regions crucial for the control of both sexual and aggressive behaviors in ***,molecularly s... 详细信息
来源: 评论
Oxytocinergic Control of a Hypothalamic Social Fear Circuitry
收藏 引用
Neuroscience Bulletin 2024年 第9期40卷 1399-1401页
作者: Junqiang Zheng Xingying Wu Han Xu Department of Neurobiology and Department of Psychiatry of the Second Affiliated Hospital and School of Brain Science and Brain Medicine Zhejiang University School of MedicineHangzhou310058China Nanhu Brain-Computer Interface Institute Hangzhou311100China Liangzhu Laboratory MOE Frontier Science Center for Brain Science and Brain-Machine IntegrationState Key Laboratory of Brain-Machine IntelligenceZhejiang UniversityHangzhou311121China NHC and CAMS Key Laboratory of Medical Neurobiology Zhejiang UniversityHangzhou310058China Lingang Laboratory Shanghai200031China
Exhibiting appropriate social behavior toward conspecifics is crucial for survival within a social *** instance,after a conflict,it is essential for the loser to stay away from the victor to avoid further harm[1].Prev... 详细信息
来源: 评论
Analysis of Partition Methods for Dominated Solution Removal from Large Solution Sets
Analysis of Partition Methods for Dominated Solution Removal...
收藏 引用
2023 IEEE Symposium Series on Computational Intelligence, SSCI 2023
作者: Shu, Tianye Nan, Yang Shang, Ke Ishibuchi, Hisao Southern University of Science and Technology Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Department of Computer Science and Engineering Shenzhen China
In evolutionary multi-objective optimization (EMO), one important issue is to efficiently remove dominated solutions from a large number of solutions examined by an EMO algorithm. An efficient approach to remove domin...
来源: 评论