咨询与建议

限定检索结果

文献类型

  • 297,672 篇 会议
  • 126,347 篇 期刊文献
  • 3,060 册 图书
  • 10 篇 学位论文
  • 7 篇 专利

馆藏范围

  • 427,095 篇 电子文献
  • 6 种 纸本馆藏

日期分布

学科分类号

  • 252,920 篇 工学
    • 177,784 篇 计算机科学与技术...
    • 144,415 篇 软件工程
    • 59,323 篇 信息与通信工程
    • 37,308 篇 控制科学与工程
    • 28,507 篇 电气工程
    • 27,566 篇 电子科学与技术(可...
    • 27,394 篇 生物工程
    • 19,279 篇 生物医学工程(可授...
    • 18,482 篇 机械工程
    • 17,609 篇 光学工程
    • 13,365 篇 化学工程与技术
    • 12,693 篇 仪器科学与技术
    • 11,506 篇 动力工程及工程热...
    • 9,000 篇 材料科学与工程(可...
    • 8,871 篇 网络空间安全
    • 8,661 篇 安全科学与工程
    • 8,212 篇 交通运输工程
  • 138,918 篇 理学
    • 73,846 篇 数学
    • 40,947 篇 物理学
    • 30,472 篇 生物学
    • 22,797 篇 统计学(可授理学、...
    • 14,965 篇 系统科学
    • 13,972 篇 化学
  • 70,046 篇 管理学
    • 41,872 篇 管理科学与工程(可...
    • 31,292 篇 图书情报与档案管...
    • 17,877 篇 工商管理
  • 17,499 篇 医学
    • 14,688 篇 临床医学
    • 13,220 篇 基础医学(可授医学...
    • 8,363 篇 药学(可授医学、理...
  • 11,242 篇 法学
    • 9,121 篇 社会学
  • 6,834 篇 经济学
  • 5,539 篇 农学
  • 4,839 篇 教育学
  • 2,131 篇 文学
  • 963 篇 军事学
  • 818 篇 艺术学
  • 114 篇 哲学
  • 73 篇 历史学

主题

  • 17,625 篇 computer science
  • 10,929 篇 feature extracti...
  • 10,106 篇 accuracy
  • 9,800 篇 computational mo...
  • 8,666 篇 training
  • 8,476 篇 deep learning
  • 7,339 篇 machine learning
  • 6,546 篇 data mining
  • 5,732 篇 semantics
  • 5,513 篇 support vector m...
  • 5,508 篇 predictive model...
  • 5,356 篇 optimization
  • 5,069 篇 data models
  • 4,880 篇 neural networks
  • 4,859 篇 algorithm design...
  • 4,815 篇 educational inst...
  • 4,581 篇 computer archite...
  • 4,577 篇 convolutional ne...
  • 4,448 篇 artificial intel...
  • 4,328 篇 real-time system...

机构

  • 4,985 篇 department of co...
  • 2,886 篇 school of comput...
  • 2,497 篇 college of compu...
  • 2,450 篇 school of comput...
  • 2,369 篇 college of compu...
  • 2,133 篇 chitkara univers...
  • 1,546 篇 school of comput...
  • 1,462 篇 school of comput...
  • 1,414 篇 university of ch...
  • 1,324 篇 school of comput...
  • 1,285 篇 school of comput...
  • 1,244 篇 school of comput...
  • 1,191 篇 school of comput...
  • 1,023 篇 school of comput...
  • 1,015 篇 college of compu...
  • 975 篇 department of ph...
  • 968 篇 cavendish labora...
  • 953 篇 college of compu...
  • 884 篇 school of comput...
  • 835 篇 oliver lodge lab...

作者

  • 325 篇 liu yang
  • 291 篇 wang wei
  • 278 篇 niyato dusit
  • 246 篇 barter w.
  • 221 篇 blake t.
  • 218 篇 bowcock t.j.v.
  • 217 篇 betancourt c.
  • 217 篇 s. chen
  • 216 篇 bellee v.
  • 215 篇 borsato m.
  • 209 篇 amato s.
  • 207 篇 brundu d.
  • 207 篇 boettcher t.
  • 206 篇 a. gomes
  • 203 篇 j. wang
  • 199 篇 beiter a.
  • 193 篇 c. alexa
  • 191 篇 j. m. izen
  • 190 篇 c. amelung
  • 188 篇 g. bella

语言

  • 407,145 篇 英文
  • 12,875 篇 其他
  • 7,066 篇 中文
  • 302 篇 日文
  • 47 篇 德文
  • 37 篇 朝鲜文
  • 31 篇 法文
  • 26 篇 斯洛文尼亚文
  • 9 篇 俄文
  • 6 篇 荷兰文
  • 4 篇 西班牙文
  • 3 篇 葡萄牙文
  • 3 篇 土耳其文
  • 1 篇 阿拉伯文
  • 1 篇 捷克文
  • 1 篇 意大利文
检索条件"机构=Computer Science and Technology"
427096 条 记 录,以下是11-20 订阅
排序:
Characteristic Direction of Talents Cultivation of computer science and technology Specialty
Characteristic Direction of Talents Cultivation of Computer ...
收藏 引用
2013 International Conference on Education and Educational Research(EER 2013)
作者: Baoan Li Yangsen Zhang Wei Zhang Keqin Peng Computer School Beijing Information Science and Technology University
computer science and technology specialty is one which has long history in computer subjectAt present in our country's university, it is basically set in computer schoolWith the establishment of related specialtie... 详细信息
来源: 评论
Towards Reliable Configuration Management in Clouds: A Lightweight Consistency Validation Mechanism for Virtual Private Clouds
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 49-63页
作者: Yuhang Qiu Gongming Zhao Hongli Xu Long Li He Huang Liusheng Huang School of Computer Science and Technology University of Science and Technology of China Suzhou Institute for Advanced Research University of Science and Technology of China School of Computer Science and Technology Soochow University
The virtual private cloud service currently lacks a real-time end-to-end consistency validation mechanism, which prevents tenants from receiving immediate feedback on their requests. Existing solutions consume excessi... 详细信息
来源: 评论
PriChain: Efficient Privacy-Preserving Fine-Grained Redactable Blockchains in Decentralized Settings
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 82-97页
作者: Hongchen Guo Weilin Gan Mingyang Zhao Chuan Zhang Tong Wu Liehuang Zhu Jingfeng Xue School of Computer Science and Technology Beijing Institute of Technology School of Cyberspace Science and Technology Beijing Institute of Technology School of Computer and Communication Engineering University of Science and Technology Beijing
Recently, redactable blockchain has been proposed and leveraged in a wide range of real systems for its unique properties of decentralization, traceability, and transparency while ensuring controllable on-chain data r... 详细信息
来源: 评论
A recover-then-discriminate framework for robust anomaly detection
收藏 引用
science China(Information sciences) 2025年 第4期68卷 300-318页
作者: Peng XING Dong ZHANG Jinhui TANG Zechao LI School of Computer Science and Engineering Nanjing University of Science and Technology Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology
Anomaly detection(AD) has been extensively studied and applied across various scenarios in recent years. However, gaps remain between the current performance and the desired recognition accuracy required for practical... 详细信息
来源: 评论
Witness encryption with updatable ciphertexts
收藏 引用
science China(Information sciences) 2025年 第3期68卷 181-196页
作者: Yuzhu WANG Mingwu ZHANG School of Computer Science and Information Security Guilin University of Electronic Technology School of Computer Science Hubei University of Technology
Witness encryption(WE) is a novel type of cryptographic primitive that enables a message to be encrypted via an NP instance. Anyone who possesses a solution to this instance(i.e., a witness) can then recover the messa... 详细信息
来源: 评论
Fast Cross-Platform Binary Code Similarity Detection Framework Based on CFGs Taking Advantage of NLP and Inductive GNN
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 128-138页
作者: Jinxue PENG Yong WANG Jingfeng XUE Zhenyan LIU School of Computer Science and Technology Beijing Institute of Technology
Cross-platform binary code similarity detection aims at detecting whether two or more pieces of binary code are similar or not. Existing approaches that combine control flow graphs(CFGs)-based function representation ... 详细信息
来源: 评论
TPpred-SC: multi-functional therapeutic peptide prediction based on multi-label supervised contrastive learning
收藏 引用
science China(Information sciences) 2024年 第11期67卷 136-147页
作者: Ke YAN Hongwu LV Jiangyi SHAO Shutao CHEN Bin LIU School of Computer Science and Technology Beijing Institute of Technology
Therapeutic peptides contribute significantly to human health and have the potential for personalized medicine. The prediction for the therapeutic peptides is beneficial and emerging for the discovery of drugs. Althou... 详细信息
来源: 评论
Labeling-based centrality approaches for identifying critical edges on temporal graphs
收藏 引用
Frontiers of computer science 2025年 第2期19卷 89-104页
作者: Tianming ZHANG Jie ZHAO Cibo YU Lu CHEN Yunjun GAO Bin CAO Jing FAN Ge YU School of Computer Science and Technology Zhejiang University of TechnologyHangzhou 310023China School of Computer Science and Technology Zhejiang UniversityHangzhou 310013China Department of Computer Science Northeastern UniversityShenyang 110819China
Edge closeness and betweenness centralities are widely used path-based metrics for characterizing the importance of edges in *** general graphs,edge closeness centrality indicates the importance of edges by the shorte... 详细信息
来源: 评论
Efficient Untargeted White-Box Adversarial Attacks Based on Simple Initialization
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 979-988页
作者: Yunyi ZHOU Haichang GAO Jianping HE Shudong ZHANG Zihui WU School of Computer Science and Technology Xidian University
Adversarial examples(AEs) are an additive amalgamation of clean examples and artificially malicious perturbations. Attackers often leverage random noise and multiple random restarts to initialize perturbation starting... 详细信息
来源: 评论
Perception-entropy-driven temporal reusing for real-time ray tracing
收藏 引用
Optoelectronics Letters 2025年 第6期21卷 378-384页
作者: SHEN Zhongye CHEN Chunyi YAO Weixun YU Haiyang PENG Jun School of Computer Science and Technology Changchun University of Science and Technology
Although ray tracing produces high-fidelity, realistic images, it is considered computationally burdensome when implemented on a high rendering rate system. Perception-driven rendering techniques generate images with ... 详细信息
来源: 评论