咨询与建议

限定检索结果

文献类型

  • 34,447 篇 会议
  • 27,186 篇 期刊文献
  • 365 册 图书

馆藏范围

  • 61,998 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 36,530 篇 工学
    • 20,984 篇 计算机科学与技术...
    • 16,354 篇 软件工程
    • 6,820 篇 信息与通信工程
    • 5,714 篇 电子科学与技术(可...
    • 5,706 篇 电气工程
    • 4,910 篇 控制科学与工程
    • 3,727 篇 光学工程
    • 3,428 篇 生物工程
    • 2,808 篇 生物医学工程(可授...
    • 2,499 篇 化学工程与技术
    • 2,447 篇 材料科学与工程(可...
    • 2,402 篇 机械工程
    • 2,091 篇 仪器科学与技术
    • 1,595 篇 动力工程及工程热...
    • 1,196 篇 力学(可授工学、理...
    • 925 篇 土木工程
  • 24,821 篇 理学
    • 10,803 篇 物理学
    • 10,647 篇 数学
    • 4,244 篇 生物学
    • 3,363 篇 统计学(可授理学、...
    • 2,930 篇 化学
    • 2,217 篇 系统科学
    • 1,137 篇 地球物理学
  • 7,401 篇 管理学
    • 4,436 篇 管理科学与工程(可...
    • 3,157 篇 图书情报与档案管...
    • 1,910 篇 工商管理
  • 2,671 篇 医学
    • 2,206 篇 临床医学
    • 1,742 篇 基础医学(可授医学...
    • 1,137 篇 药学(可授医学、理...
  • 1,091 篇 法学
    • 923 篇 社会学
  • 620 篇 农学
  • 609 篇 经济学
  • 401 篇 教育学
  • 193 篇 文学
  • 128 篇 军事学
  • 114 篇 艺术学
  • 27 篇 哲学
  • 13 篇 历史学

主题

  • 3,345 篇 computer science
  • 3,097 篇 laboratories
  • 1,108 篇 computational mo...
  • 874 篇 application soft...
  • 702 篇 computer archite...
  • 610 篇 bandwidth
  • 600 篇 feature extracti...
  • 568 篇 artificial intel...
  • 555 篇 testing
  • 546 篇 costs
  • 543 篇 data mining
  • 543 篇 machine learning
  • 532 篇 semantics
  • 523 篇 protocols
  • 522 篇 delay
  • 501 篇 algorithm design...
  • 476 篇 hardware
  • 463 篇 robustness
  • 458 篇 deep learning
  • 445 篇 control systems

机构

  • 1,108 篇 cavendish labora...
  • 1,032 篇 department of ph...
  • 979 篇 oliver lodge lab...
  • 964 篇 physikalisches i...
  • 801 篇 university of ch...
  • 637 篇 infn laboratori ...
  • 617 篇 infn sezione di ...
  • 603 篇 department of co...
  • 602 篇 infn sezione di ...
  • 575 篇 fakultät physik ...
  • 569 篇 infn sezione di ...
  • 556 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 527 篇 school of physic...
  • 525 篇 department of ph...
  • 517 篇 imperial college...
  • 515 篇 h.h. wills physi...
  • 511 篇 iccub universita...
  • 508 篇 nikhef national ...
  • 505 篇 stfc rutherford ...

作者

  • 262 篇 barter w.
  • 244 篇 a. gomes
  • 243 篇 beiter a.
  • 233 篇 c. alexa
  • 231 篇 j. m. izen
  • 230 篇 bellee v.
  • 229 篇 blake t.
  • 225 篇 c. amelung
  • 223 篇 g. bella
  • 223 篇 j. strandberg
  • 223 篇 d. calvet
  • 222 篇 brundu d.
  • 222 篇 bowcock t.j.v.
  • 221 篇 amato s.
  • 220 篇 g. spigo
  • 220 篇 s. chen
  • 217 篇 betancourt c.
  • 217 篇 boettcher t.
  • 216 篇 j. wang
  • 215 篇 borsato m.

语言

  • 58,521 篇 英文
  • 2,672 篇 其他
  • 776 篇 中文
  • 15 篇 俄文
  • 14 篇 德文
  • 10 篇 法文
  • 9 篇 日文
  • 4 篇 斯洛文尼亚文
  • 3 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science Department Computer Graphics Laboratory"
61998 条 记 录,以下是401-410 订阅
排序:
PAD: A Robustness Enhancement Ensemble Method via Promoting Attention Diversity  30
PAD: A Robustness Enhancement Ensemble Method via Promoting ...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Yang, Yuting Huang, Pei Ma, Feifei Cao, Juan Li, Jintao China University of Chinese Academy of Sciences China Department of Computer Science Stanford University United States State Key Laboratory of Computer Science Institute of Software CAS China Laboratory of Parallel Software and Computational Science Institute of Software CAS China
Deep neural networks can be vulnerable to adversarial attacks, even for the mainstream Transformer-based models. Although several robustness enhancement approaches have been proposed, they usually focus on some certai... 详细信息
来源: 评论
Dual-Recommendation Disentanglement Network for View Fuzz in Action Recognition
收藏 引用
IEEE Transactions on Image Processing 2023年 32卷 2719-2733页
作者: Liu, Wenxuan Zhong, Xian Zhou, Zhuo Jiang, Kui Wang, Zheng Lin, Chia-Wen Wuhan University of Technology School of Computer Science and Artificial Intelligence Wuhan430070 China Wuhan University of Technology Hubei Key Laboratory of Transportation Internet of Things School of Computer Science and Artificial Intelligence Wuhan430070 China Peking University School of Electronics Engineering and Computer Science Beijing100091 China Harbin Institute of Technology School of Computer Science and Technology Harbin150001 China Wuhan University School of Computer Science Wuhan430072 China National Tsing Hua University Department of Electrical Engineering Hsinchu30013 Taiwan
Multi-view action recognition aims to identify action categories from given clues. Existing studies ignore the negative influences of fuzzy views between view and action in disentangling, commonly arising the mistaken... 详细信息
来源: 评论
Detecting DTI Using Graph Embedding and Multi-Head Attention Mechanism
Detecting DTI Using Graph Embedding and Multi-Head Attention...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Lin, Xiaoli Chen, Yaoyu Yang, Wenli Yu, HaiPing Wu, Zimo Zhang, Xiaolong Wuhan University of Science and Technology Hubei Key Laboratory of Intelligent Information Processing and Real-Time Industrial System School of Computer Science and Technology Wuhan China China Graphics Society School of Information Wuhan Vocational College Professional Committee of Graphics and Big Data Wuhan China
Drug-target interaction (DTI) prediction has an important role in drug discovery, significantly expediting the drug design and development process. This paper proposes a new model, ERW-BiAN, that seamlessly integrates... 详细信息
来源: 评论
Smart and fuzzy approach based on CSP for cloud resources allocation
收藏 引用
International Journal of computers and Applications 2022年 第2期44卷 117-129页
作者: Almutawakel, Abdallah Kazar, Okba Bali, Mouadh Belouaar, Houcine Barkat, Abdelbasset LINFI laboratory Computer science department University of Biskra Biskra Algeria Department of Computer Science Faculty of Exact Sciences University of El Oued El Oued Algeria LIMED Laboratory Faculty of Exact Sciences University of Bejaia Bejaia Algeria Department of Computer Science M’sila University M’sila Algeria
In this study, we proposed a resource allocation approach that aims at fulfilling two main objectives. First, it equilibrates between the different cloud infrastructure particularities including load balancing, so it ... 详细信息
来源: 评论
A Robust Key Exchange and Tamper-Resistant Protocol for HAN and NAN Networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21394-21403页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart Grids (SG) rely on Home Area Networks (HAN) and Neighborhood Area Networks (NAN) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these adva... 详细信息
来源: 评论
Deep learning based water leakage detection for shield tunnel lining
收藏 引用
Frontiers of Structural and Civil Engineering 2024年 第6期18卷 887-898页
作者: Shichang LIU Xu XU Gwanggil JEON Junxin CHEN Ben-Guo HE College of Computer Science Sichuan UniversityChengdu 610065China School of Computer Science and Engineering Northeastern UniversityShenyang 110004China Department of Embedded Systems Engineering Incheon National UniversityIncheon 22012Korea School of Software Dalian University of TechnologyDalian 116621China Key Laboratory of Ministry of Education on Safe Mining of Deep Metal Mines Northeastern UniversityShenyang 110819China
Shield tunnel lining is prone to water leakage,which may further bring about corrosion and structural damage to the walls,potentially leading to dangerous *** avoid tedious and inefficient manual inspection,many proje... 详细信息
来源: 评论
EECLP: AWireless Sensor Networks Energy Efficient Cross-Layer Protocol
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 2611-2631页
作者: Mohammed Kaddi Mohammed Omari Moamen Alnatoor LDDI Laboratory University of AdrarAdrar01000Algeria Computer Science and Engineering Department School of EngineeringAmerican University of Ras Al KhaimahRas Al Khaimah72603United Arab Emirates
Recent advancements in wireless communications have allowed the birth of novel wireless sensor networks(WSN).A sensor network comprises several micro-sensors deployed randomly in an area of interest.A micro-sensor is ... 详细信息
来源: 评论
An improved particle swarm optimization algorithm for task scheduling in cloud computing
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第4期14卷 4313-4327页
作者: Pirozmand, Poria Jalalinejad, Hoda Hosseinabadi, Ali Asghar Rahmani Mirkamali, Seyedsaeid Li, Yingqiu Hebei Key Laboratory of Machine Learning and Computational Intelligence Hebei University Baoding071002 China Department of Mathematics and Computer Science Bandar Abbas Branch Islamic Azad University Bandar Abbas Iran Department of Computer Science University of Regina Regina Canada Tehran Iran
In the context of cloud computing, the task scheduling issue has an immediate effect on service quality. Task scheduling is the process of assigning work to available resources based on requirements. The objective of ... 详细信息
来源: 评论
Topological defects on solutions of the non-relativistic equation for extended double ring-shaped potential
收藏 引用
Communications in Theoretical Physics 2024年 第8期76卷 29-43页
作者: Badredine Boudjedaa Faizuddin Ahmed Natural Sciences and Materials Laboratory University Center Abdelhafid BoussoufMilaAlgeria Department of Mathematics Institute of Mathematics and Computer ScienceUniversity Center Abdelhafid BoussoufMilaAlgeria Department of Physics University of Science&Technology MeghalayaRi-Bhoi793101India
In this study, we focus into the non-relativistic wave equation described by the Schrodinger equation, specifically considering angular-dependent potentials within the context of a topological defect background genera... 详细信息
来源: 评论
A Bicriterion Concentration Inequality and Prophet Inequalities for k-Fold Matroid Unions  16
A Bicriterion Concentration Inequality and Prophet Inequalit...
收藏 引用
16th Innovations in Theoretical computer science Conference, ITCS 2025
作者: Alon, Noga Gravin, Nick Pollner, Tristan Rubinstein, Aviad Wang, Hongao Weinberg, S. Matthew Zhang, Qianfan Department of Mathematics Princeton University NJ United States Schools of Mathematics and Computer Science Tel Aviv University Tel Aviv Israel Key Laboratory of Interdisciplinary Research of Computation and Economics Shanghai University of Finance and Economics China Department of Management Science and Engineering Stanford University CA United States Department of Computer Science Stanford University CA United States Department of Computer Science Purdue University West LafayetteIN United States Department of Computer Science Princeton University NJ United States
We investigate prophet inequalities with competitive ratios approaching 1, seeking to generalize k-uniform matroids. We first show that large girth does not suffice: for all k, there exists a matroid of girth ≥ k and... 详细信息
来源: 评论