咨询与建议

限定检索结果

文献类型

  • 34,447 篇 会议
  • 27,186 篇 期刊文献
  • 365 册 图书

馆藏范围

  • 61,998 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 36,530 篇 工学
    • 20,984 篇 计算机科学与技术...
    • 16,354 篇 软件工程
    • 6,820 篇 信息与通信工程
    • 5,714 篇 电子科学与技术(可...
    • 5,706 篇 电气工程
    • 4,910 篇 控制科学与工程
    • 3,727 篇 光学工程
    • 3,428 篇 生物工程
    • 2,808 篇 生物医学工程(可授...
    • 2,499 篇 化学工程与技术
    • 2,447 篇 材料科学与工程(可...
    • 2,402 篇 机械工程
    • 2,091 篇 仪器科学与技术
    • 1,595 篇 动力工程及工程热...
    • 1,196 篇 力学(可授工学、理...
    • 925 篇 土木工程
  • 24,821 篇 理学
    • 10,803 篇 物理学
    • 10,647 篇 数学
    • 4,244 篇 生物学
    • 3,363 篇 统计学(可授理学、...
    • 2,930 篇 化学
    • 2,217 篇 系统科学
    • 1,137 篇 地球物理学
  • 7,401 篇 管理学
    • 4,436 篇 管理科学与工程(可...
    • 3,157 篇 图书情报与档案管...
    • 1,910 篇 工商管理
  • 2,671 篇 医学
    • 2,206 篇 临床医学
    • 1,742 篇 基础医学(可授医学...
    • 1,137 篇 药学(可授医学、理...
  • 1,091 篇 法学
    • 923 篇 社会学
  • 620 篇 农学
  • 609 篇 经济学
  • 401 篇 教育学
  • 193 篇 文学
  • 128 篇 军事学
  • 114 篇 艺术学
  • 27 篇 哲学
  • 13 篇 历史学

主题

  • 3,345 篇 computer science
  • 3,097 篇 laboratories
  • 1,108 篇 computational mo...
  • 874 篇 application soft...
  • 702 篇 computer archite...
  • 610 篇 bandwidth
  • 600 篇 feature extracti...
  • 568 篇 artificial intel...
  • 555 篇 testing
  • 546 篇 costs
  • 543 篇 data mining
  • 543 篇 machine learning
  • 532 篇 semantics
  • 523 篇 protocols
  • 522 篇 delay
  • 501 篇 algorithm design...
  • 476 篇 hardware
  • 463 篇 robustness
  • 458 篇 deep learning
  • 445 篇 control systems

机构

  • 1,108 篇 cavendish labora...
  • 1,032 篇 department of ph...
  • 979 篇 oliver lodge lab...
  • 964 篇 physikalisches i...
  • 801 篇 university of ch...
  • 637 篇 infn laboratori ...
  • 617 篇 infn sezione di ...
  • 603 篇 department of co...
  • 602 篇 infn sezione di ...
  • 575 篇 fakultät physik ...
  • 569 篇 infn sezione di ...
  • 556 篇 school of physic...
  • 542 篇 horia hulubei na...
  • 527 篇 school of physic...
  • 525 篇 department of ph...
  • 517 篇 imperial college...
  • 515 篇 h.h. wills physi...
  • 511 篇 iccub universita...
  • 508 篇 nikhef national ...
  • 505 篇 stfc rutherford ...

作者

  • 262 篇 barter w.
  • 244 篇 a. gomes
  • 243 篇 beiter a.
  • 233 篇 c. alexa
  • 231 篇 j. m. izen
  • 230 篇 bellee v.
  • 229 篇 blake t.
  • 225 篇 c. amelung
  • 223 篇 g. bella
  • 223 篇 j. strandberg
  • 223 篇 d. calvet
  • 222 篇 brundu d.
  • 222 篇 bowcock t.j.v.
  • 221 篇 amato s.
  • 220 篇 g. spigo
  • 220 篇 s. chen
  • 217 篇 betancourt c.
  • 217 篇 boettcher t.
  • 216 篇 j. wang
  • 215 篇 borsato m.

语言

  • 58,521 篇 英文
  • 2,672 篇 其他
  • 776 篇 中文
  • 15 篇 俄文
  • 14 篇 德文
  • 10 篇 法文
  • 9 篇 日文
  • 4 篇 斯洛文尼亚文
  • 3 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 葡萄牙文
检索条件"机构=Computer Science Department Computer Graphics Laboratory"
61998 条 记 录,以下是641-650 订阅
排序:
A Review on Network Layer Attacks in Wireless Sensor Network and Defensive Mechanisms  7th
A Review on Network Layer Attacks in Wireless Sensor Network...
收藏 引用
7th International Conference on Artificial Intelligence in Renewable Energetic Systems, IC-AIRES 2023
作者: Touhami, Sana Belghachi, Mohamed Touhami, Achouak Department of Mathematics and Computer Science Tahri Mohammed University Bechar Algeria Department of Mathematics and Computer Science Ali Kafi University Center Tindouf Algeria Information and Telecommunication Laboratory Tahri Mohamed University Bechar Algeria Energetic in Arid Zones Laboratory Tahri Mohamed University Bechar Algeria
Wireless sensor networks (WSN) are considered as one of the most widely used networks for all-inclusive applications. They are organized into many sensor nodes. The deployment of nodes in these networks is not secure,... 详细信息
来源: 评论
Modeling and Clustering of Parabolic Granular Data
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第7期5卷 3728-3742页
作者: Tang, Yiming Gao, Jianwei Pedrycz, Witold Hu, Xianghui Xi, Lei Ren, Fuji Hu, Min Hefei University of Technology Anhui Province Key Laboratory of Affective Computing and Advanced Intelligent Machine School of Computer and Information Hefei230601 China University of Alberta Department of Electrical and Computer Engineering EdmontonABT6R 2V4 Canada Hefei University of Technology School of Computer and Information Hefei230601 China University of Alberta Department of Electrical and Computer Engineering EdmontonABT6G 2R3 Canada Polish Academy of Sciences Systems Research Institute Warsaw00-901 Poland Istinye University Research Center of Performance and Productivity Analysis Istanbul34010 Turkey Southeast University School of Computer Science and Engineering Nanjing211189 China University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China
At present, there exist some problems in granular clustering methods, such as lack of nonlinear membership description and global optimization of granular data boundaries. To address these issues, in this study, revol... 详细信息
来源: 评论
E-commerce Scheme Based on Proxy t-out-of-n Oblivious Signature
收藏 引用
International Journal of Network Security 2024年 第5期26卷 851-860页
作者: Chen, Jingyu Gong, Linming Ma, Xiangxiang Wang, Daoshun The Shaanxi Key Laboratory of Clothing Intelligence School of Computer Science Xi’an Polytechinic University Xi’an710048 China State and Local Joint Engineering Research Center for Advanced Networking and Intelligent Information Services School of Computer Science Xi’an Polytechnic University Shaanxi Xi’an710048 China Department of Computer Science and Technology Tsinghua University Beijing100084 China No. 58 Shan-gu Road Lintong Xi’an710600 China
With the development of the internet and the demand for online shopping, intelligent online shopping systems have received widespread attention in recent years. However, existing online shopping systems’ security and... 详细信息
来源: 评论
Critical Infrastructure Security Goes to Space: Leveraging Lessons Learned on the Ground
Critical Infrastructure Security Goes to Space: Leveraging L...
收藏 引用
Accelerating Space Commerce, Exploration, and New Discovery Conference, ASCEND 2023
作者: Ellis, Tim Hitaj, Briland Lindqvist, Ulf Shands, Deborah Tinnel, Laura DeBruhl, Bruce Computer Science Laboratory SRI International California Polytechnic State University United States Computer Science and Software Engineering Department California Polytechnic State University United States
Space systems enable essential communications, navigation, imaging and sensing for a variety of domains, including agriculture, commerce, transportation, and emergency operations by first responders. Protecting the cy... 详细信息
来源: 评论
Efficient and Lightweight Framework for Confidential Medical Image Search using Edge Computing  2
Efficient and Lightweight Framework for Confidential Medical...
收藏 引用
2nd International Conference on Computational Intelligence and Network Systems, CINS 2024
作者: Rajan, Arun Amaithi Vetriselvi, V. Aishwarya, R. Rajan, Anitha Amaithi Security Research Laboratory Department of Computer Science and Engineering College of Engineering Guindy Anna University Tamil Nadu Chennai600025 India Department of Computer Science and Business Systems Francis Xavier Engineering College Tamil Nadu Tirunelveli627011 India
In healthcare, medical images are playing a major role in accurate diagnosis. Cloud storage for medical images creates security risks and latency due to some critical vulnerabilities and their distance from data sourc... 详细信息
来源: 评论
Heterogeneous UPF Integration Framework and 5G User Plane Acceleration  24
Heterogeneous UPF Integration Framework and 5G User Plane Ac...
收藏 引用
24th Asia-Pacific Network Operations and Management Symposium, APNOMS 2023
作者: Wang, Tse-Han Hu, Min-Chih Yen, Li-Hsing Tseng, Chien-Chao Department of Computer Science College of Computer Science National Yang Ming Chiao Tung University Hsinchu Taiwan Network Management Laboratory Chunghwa Telecom Laboratories Taoyuan Taiwan
The 3rd Generation Partnership Project (3GPP) proposes User Plane Function (UPF) in the fifth generation (5G) mobile networks to handle user data between radio access network (RAN) and data network (DN). Since pure so... 详细信息
来源: 评论
Assessing radiographic findings on finger X-rays using an enhanced deep learning approach
收藏 引用
International Journal of Information Technology (Singapore) 2024年 第7期16卷 4279-4288页
作者: Kumar, Rahul K, Suganya Devi Mohapatra, Devi Prasad Medical Imaging Laboratory Department of Computer Science and Engineering National Institute of Technology Assam Silchar 788010 India Department of Plastic Surgery JIPMER Puducherry 605006 India
The human upper extremity, which includes the shoulder, humerus, elbow, forearm, wrist, hand, and fingers, demonstrates incredible biological complexity, enabling us to make crucial and intricate movements in our dail... 详细信息
来源: 评论
Language Agnostic Approach for Unification of Implementation Variants for Different Computing Devices  14th
Language Agnostic Approach for Unification of Implementati...
收藏 引用
14th International Conference on Parallel Processing and Applied Mathematics, PPAM 2022
作者: Dubey, Anshu Klosterman, Tom Mathematics and Computer Science Division Argonne National Laboratory LemontIL60439 United States Department of Computer Science University of Chicago ChicagoIL60637 United States
Scientific software used on high performance computing platforms is in a phase of transformation because of combined increase in the heterogeneity and complexity of models and hardware platforms. Having separate imple... 详细信息
来源: 评论
A bytecode-based integrated detection and repair method for reentrancy vulnerabilities in smart contracts
IET Blockchain
收藏 引用
IET Blockchain 2024年 第3期4卷 235-251页
作者: Feng, Zijun Feng, Yuming He, Hui Zhang, Weizhe Zhang, Yu School of Cyberspace Science Harbin Institute of Technology Harbin China School of Computer Science and Technology Harbin Institute of Technology Shenzhen China Department of New Networks Peng Cheng Laboratory Shenzhen China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Shenzhen China
The reentrancy vulnerability in smart contracts has caused significant losses in the digital currency economy. Existing solutions for detecting and repairing this vulnerability are limited in scope and lack a comprehe... 详细信息
来源: 评论
Adapting the Simulated Annealing Algorithm to Enhance the Performance of the LEACH Protocol
Adapting the Simulated Annealing Algorithm to Enhance the Pe...
收藏 引用
2024 International Conference on computer and Applications, ICCA 2024
作者: Benhadji, Mohammed Mohammed, Kaddi Mohammed, Omari Material Sciences Department Algeria University of Adrar Lddi Laboratory Mathematics and Computer Science Department Algeria American University of Ras Al Khaimah Computer Science and Engineering Department P.O.Box 10021 Ras Al Khaimah United Arab Emirates
In parallel with the proliferation and extension of wireless sensor networks (WSNs), as well as the diversity of their applications, such networks continue to fail to operate for lengthy periods of time due to node fa... 详细信息
来源: 评论