咨询与建议

限定检索结果

文献类型

  • 6,624 篇 会议
  • 6,110 篇 期刊文献
  • 70 册 图书

馆藏范围

  • 12,804 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,532 篇 工学
    • 4,629 篇 计算机科学与技术...
    • 3,816 篇 软件工程
    • 1,729 篇 信息与通信工程
    • 1,176 篇 控制科学与工程
    • 974 篇 电子科学与技术(可...
    • 967 篇 电气工程
    • 870 篇 生物工程
    • 789 篇 光学工程
    • 720 篇 生物医学工程(可授...
    • 581 篇 机械工程
    • 569 篇 化学工程与技术
    • 532 篇 仪器科学与技术
    • 441 篇 网络空间安全
    • 366 篇 材料科学与工程(可...
    • 351 篇 动力工程及工程热...
    • 300 篇 核科学与技术
    • 289 篇 安全科学与工程
  • 5,322 篇 理学
    • 2,655 篇 物理学
    • 1,844 篇 数学
    • 1,005 篇 生物学
    • 684 篇 化学
    • 588 篇 统计学(可授理学、...
    • 334 篇 系统科学
  • 1,871 篇 管理学
    • 1,178 篇 管理科学与工程(可...
    • 771 篇 图书情报与档案管...
    • 397 篇 工商管理
  • 806 篇 医学
    • 605 篇 临床医学
    • 540 篇 基础医学(可授医学...
    • 355 篇 药学(可授医学、理...
    • 331 篇 公共卫生与预防医...
  • 298 篇 法学
  • 212 篇 农学
  • 148 篇 经济学
  • 80 篇 教育学
  • 73 篇 文学
  • 50 篇 军事学
  • 21 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 368 篇 deep learning
  • 348 篇 accuracy
  • 293 篇 feature extracti...
  • 253 篇 computational mo...
  • 227 篇 machine learning
  • 205 篇 hadron colliders
  • 193 篇 real-time system...
  • 181 篇 semantics
  • 172 篇 training
  • 169 篇 predictive model...
  • 165 篇 optimization
  • 163 篇 support vector m...
  • 141 篇 internet of thin...
  • 137 篇 image segmentati...
  • 128 篇 data mining
  • 107 篇 computer science
  • 104 篇 neural networks
  • 98 篇 computer archite...
  • 98 篇 hadrons
  • 95 篇 visualization

机构

  • 1,100 篇 cavendish labora...
  • 1,030 篇 department of ph...
  • 1,004 篇 university of ch...
  • 988 篇 physikalisches i...
  • 973 篇 oliver lodge lab...
  • 649 篇 infn laboratori ...
  • 622 篇 infn sezione di ...
  • 615 篇 fakultät physik ...
  • 605 篇 infn sezione di ...
  • 599 篇 infn sezione di ...
  • 570 篇 school of physic...
  • 561 篇 horia hulubei na...
  • 546 篇 iccub universita...
  • 538 篇 school of physic...
  • 538 篇 department of ph...
  • 534 篇 h.h. wills physi...
  • 521 篇 imperial college...
  • 513 篇 stfc rutherford ...
  • 509 篇 nikhef national ...
  • 505 篇 school of physic...

作者

  • 280 篇 barter w.
  • 258 篇 a. gomes
  • 250 篇 beiter a.
  • 250 篇 blake t.
  • 247 篇 c. alexa
  • 245 篇 j. m. izen
  • 245 篇 bellee v.
  • 242 篇 g. bella
  • 242 篇 j. strandberg
  • 239 篇 c. amelung
  • 238 篇 d. calvet
  • 238 篇 brundu d.
  • 236 篇 bowcock t.j.v.
  • 235 篇 betancourt c.
  • 233 篇 g. spigo
  • 233 篇 borsato m.
  • 232 篇 amato s.
  • 231 篇 f. siegert
  • 228 篇 s. chen
  • 225 篇 boettcher t.

语言

  • 10,137 篇 英文
  • 2,494 篇 其他
  • 200 篇 中文
  • 1 篇 阿拉伯文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=Computer Science and Engineering Academy of Technology"
12804 条 记 录,以下是471-480 订阅
排序:
Spiking High-Dimensional Information Coding Based on Wavelet Decomposition Technique  21
Spiking High-Dimensional Information Coding Based on Wavelet...
收藏 引用
21st International computer Conference on Wavelet Active Media technology and Information Processing, ICCWAMTIP 2024
作者: He, Liu Ao, Ren Jianping, Li College of Computer Science Chongqing University Chongqing401331 China Chongqing Academy of Educational Sciences Chongqing400015 China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China
This paper studies the Spiking high-dimensional information coding method based on wavelet decomposition technology. Firstly, the wavelet decomposition technique is used to extract the multi-scale features of the inpu... 详细信息
来源: 评论
Design and Implementation of Advanced Driver Assistance Systems
Design and Implementation of Advanced Driver Assistance Syst...
收藏 引用
2024 International Telecommunications Conference, ITC-Egypt 2024
作者: Ali, Waleed Abd-Elshafi Saleh, Hatem Abdelhamid Eid, Haneen Salah Fathi, Ahmed Mohamed Mohamed, Abd-El Rahman Amr Higher Institute of Engineering EL- Shorouk Academy Department of Communications and Computer Engineering Cairo Egypt Misr University for Science and Technology Department of Electronics and Communications Engineering Giza Egypt
Advanced Driver Assistance Systems (ADAS) are a pivotal advancement in automotive technology, enhancing vehicle safety and driving experience. In our project, we have successfully designed and built a robotic prototyp... 详细信息
来源: 评论
WiFi for Privacy-Friendly Surveillance  15
WiFi for Privacy-Friendly Surveillance
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Ghosh, Akhilbaran Chouksey, Arjun Academy Of Technology Department of Computer Science and Engineering Adisaptagram West Bengal Hooghly India Jabalpur Engineering College Department of Electronics & Communications Engineering Madhya Pradesh Jabalpur India
In the ongoing debate between surveillance necessity and privacy concerns, WiFi sensing emerges as a promising solution for efficient data monitoring while safeguarding personal privacy. Unlike traditional surveillanc... 详细信息
来源: 评论
RISC-V Multicore for Miniature DNA Sequencers
RISC-V Multicore for Miniature DNA Sequencers
收藏 引用
2023 IEEE Biomedical Circuits and Systems Conference, BioCAS 2023
作者: Beyene, Abel Wu, ZhongPan Hammad, Karim Ghafar-Zadeh, Ebrahim Magierowski, Sebastian York University Electrical Engineering and Computer Science Toronto Canada Technology and Maritime Transport Arab Academy for Science Cairo Egypt
Hand-sized DNA sequencers have demonstrated excellent scientific utility. They also present exciting opportunities for the expansion of DNA analysis to a diverse range of uses and users. But this potential is currentl... 详细信息
来源: 评论
High-integrated photonic tensor core utilizing high-dimensional lightwave and microwave multidomain multiplexing
收藏 引用
Light(science & Applications) 2025年 第1期14卷 227-237页
作者: Xiangyan Meng Nuannuan Shi Guojie Zhang Junshen Li Ye Jin Shiyou Sun Yichen Shen Wei Li Ninghua Zhu Ming Li Key Laboratory of Optoelectronic Materials and Devices Institute of SemiconductorsChinese Academy of SciencesBeijing100083China College of Materials Science and Opto-Electronic Technology University of Chinese Academy of SciencesBeijing100049China School of Electronic Electrical and Communication EngineeringUniversity of Chinese Academy of SciencesBeijing100049China China Academy of Space Technology(Xi’an) Xi’anShaanxi710100China WeChat Pay Lab 33 Shenzhen Tencent Computer System Co.Ltd.Shenzhen518054China Lightelligence Group Hangzhou311121China
The burgeoning volume of parameters in artificial neural network models has posed substantial challenges to conventional tensor computing *** from the available optical multidimensional information entropy,optical int... 详细信息
来源: 评论
Fortaleza: The Emergence of a Network Hub
收藏 引用
arXiv 2023年 第1期3卷 272-279页
作者: Bragion, Eric Akter, Habiba Kumar, Mohit Xu, Minxian Abdelmoniem, Ahmed M. Gill, Sukhpal Singh School of Electronic Engineering and Computer Science Queen Mary University of London United Kingdom Department of Information Technology National Institute of Technology Jalandhar India Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China
Digitalisation, accelerated by the pandemic, has brought the opportunity for companies to expand their businesses beyond their geographic location and has considerably affected networks around the world. Cloud service... 详细信息
来源: 评论
Balancing communication overhead and accuracy in compression integration: a survey
收藏 引用
Journal of Supercomputing 2025年 第8期81卷 1-63页
作者: Yang, Aiqiang Liu, Jie Yang, Bo Mo, Zeyao Li, Keqin College of Computer Science and Technology National University of Defense Technology Changsha410000 China Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology Changsha410073 China National Key Laboratory of Parallel and Distributed Computing National University of Defense Technology Changsha410073 China China Academy of Engineering Physics Beijing China Department of Computer Science State University of New York New PaltzNY12561 United States
In large-scale distributed training, communication compression techniques are widely used to reduce the significant communication overhead caused by the frequent exchange of model parameters or gradients between train... 详细信息
来源: 评论
Pendant Graphs: Unveiling Regularity, Irregularity, and Support Vertices
收藏 引用
IAENG International Journal of Applied Mathematics 2025年 第1期55卷 45-51页
作者: Mathew, Suji Elizabeth Kalayathankal, Sunny Joseph Thankachan, Baiju Mathew, Bibin Department of Mathematics Catholicate College Kerala Pathanamthitta689643 India Department of Computer Science and Engineering Rajagiri School of Engineering and Technology Kerala Kochi682039 India Department of Mathematics Manipal Institute of Technology Manipal Academy of Higher Education Karnataka Manipal576104 India Department of Education National Institute of Technology Calicut Kerala 673601 India
This paper investigates Pendant Graphs, which are graphs that contain pendant vertices. It introduces a new perspective on the regularity and irregularity of pendant graphs, and discusses their relationship with Highl... 详细信息
来源: 评论
An Enhanced Approach to Intelligent computer-Assisted Localization of Liver Tumor on Computed Tomography Images
收藏 引用
SN computer science 2024年 第7期5卷 809页
作者: Arakeri, Megha Lakshmana Reddy, Raghavendra Ravishankar, H. Deepa, K.R. Department of Computer Science and Engineering Manipal Institute of Technology Bengaluru Manipal Academy of Higher Education Karnataka Manipal India Seamovations Labs Pvt Ltd Karnataka Bengaluru India School of Computer Science and Engineering REVA University Karnataka Bengaluru India School of Computer Science and Information Technology REVA University Karnataka Bengaluru India School of Electrical and Electronics Engineering REVA University Karnataka Bengaluru India
Computed Tomography (CT) Imaging is frequently used to find liver cancer. CT imaging of the liver generates cross-sectional images of the abdominal region. The task of segmenting a liver tumor on CT images is tedious ... 详细信息
来源: 评论
Bypassing LLM Safeguards: The In-Context Tense Attack Approach  14th
Bypassing LLM Safeguards: The In-Context Tense Attack Approa...
收藏 引用
14th International Conference on computer engineering and Networks, CENet 2024
作者: Wang, Shaohuang Geng, Ruijing Lei, Shuai Lv, Yanfei Zhang, Huaping School of computer science Xinjiang University Urumqi China Space Engineering University Beijing China Academy of Military Science Beijing China Beijing Institute of Technology Beijing China
In the field of cybersecurity, the emergence of Large Language Models (LLMs) has opened up a new domain of potential risks. Although these models show an impressive level of capability across a range of applications, ... 详细信息
来源: 评论