咨询与建议

限定检索结果

文献类型

  • 149,501 篇 会议
  • 70,945 篇 期刊文献
  • 2,035 册 图书
  • 7 篇 专利

馆藏范围

  • 222,487 篇 电子文献
  • 5 种 纸本馆藏

日期分布

学科分类号

  • 129,225 篇 工学
    • 89,504 篇 计算机科学与技术...
    • 71,774 篇 软件工程
    • 30,563 篇 信息与通信工程
    • 20,194 篇 控制科学与工程
    • 16,355 篇 电气工程
    • 14,975 篇 电子科学与技术(可...
    • 14,699 篇 生物工程
    • 10,975 篇 生物医学工程(可授...
    • 10,411 篇 光学工程
    • 8,929 篇 机械工程
    • 7,402 篇 化学工程与技术
    • 6,793 篇 仪器科学与技术
    • 6,374 篇 动力工程及工程热...
    • 5,602 篇 材料科学与工程(可...
    • 5,538 篇 网络空间安全
    • 4,945 篇 安全科学与工程
  • 76,108 篇 理学
    • 37,455 篇 数学
    • 25,835 篇 物理学
    • 16,688 篇 生物学
    • 12,041 篇 统计学(可授理学、...
    • 8,325 篇 化学
    • 7,597 篇 系统科学
  • 34,119 篇 管理学
    • 20,693 篇 管理科学与工程(可...
    • 14,987 篇 图书情报与档案管...
    • 9,256 篇 工商管理
  • 10,821 篇 医学
    • 8,908 篇 临床医学
    • 7,957 篇 基础医学(可授医学...
    • 4,889 篇 药学(可授医学、理...
    • 4,613 篇 公共卫生与预防医...
  • 6,071 篇 法学
    • 5,001 篇 社会学
  • 3,617 篇 经济学
  • 3,293 篇 农学
  • 2,280 篇 教育学
  • 1,006 篇 文学
  • 506 篇 军事学
  • 318 篇 艺术学
  • 72 篇 哲学
  • 40 篇 历史学

主题

  • 8,081 篇 computer science
  • 6,648 篇 accuracy
  • 5,580 篇 deep learning
  • 5,479 篇 feature extracti...
  • 5,251 篇 computational mo...
  • 4,624 篇 machine learning
  • 4,567 篇 training
  • 3,266 篇 predictive model...
  • 3,224 篇 convolutional ne...
  • 3,173 篇 real-time system...
  • 3,014 篇 support vector m...
  • 2,815 篇 artificial intel...
  • 2,772 篇 data mining
  • 2,767 篇 data models
  • 2,617 篇 optimization
  • 2,595 篇 internet of thin...
  • 2,469 篇 neural networks
  • 2,394 篇 semantics
  • 2,311 篇 computer archite...
  • 2,221 篇 security

机构

  • 2,880 篇 school of comput...
  • 2,296 篇 university of ch...
  • 2,259 篇 chitkara univers...
  • 1,383 篇 school of comput...
  • 1,086 篇 cavendish labora...
  • 1,037 篇 department of co...
  • 984 篇 department of ph...
  • 979 篇 institute of com...
  • 917 篇 physikalisches i...
  • 915 篇 oliver lodge lab...
  • 569 篇 infn sezione di ...
  • 553 篇 infn laboratori ...
  • 540 篇 infn sezione di ...
  • 524 篇 horia hulubei na...
  • 511 篇 infn sezione di ...
  • 508 篇 department of ph...
  • 504 篇 h.h. wills physi...
  • 504 篇 school of comput...
  • 503 篇 school of physic...
  • 501 篇 fakultät physik ...

作者

  • 258 篇 barter w.
  • 256 篇 j. wang
  • 239 篇 s. chen
  • 236 篇 a. gomes
  • 233 篇 blake t.
  • 225 篇 c. alexa
  • 224 篇 amato s.
  • 222 篇 j. m. izen
  • 222 篇 bellee v.
  • 222 篇 betancourt c.
  • 220 篇 bowcock t.j.v.
  • 220 篇 borsato m.
  • 218 篇 brundu d.
  • 218 篇 boettcher t.
  • 211 篇 d. calvet
  • 211 篇 bencivenni g.
  • 210 篇 beiter a.
  • 204 篇 g. bella
  • 204 篇 j. strandberg
  • 204 篇 bay a.

语言

  • 182,302 篇 英文
  • 37,606 篇 其他
  • 2,917 篇 中文
  • 213 篇 日文
  • 38 篇 德文
  • 31 篇 斯洛文尼亚文
  • 27 篇 法文
  • 17 篇 俄文
  • 16 篇 朝鲜文
  • 5 篇 葡萄牙文
  • 4 篇 西班牙文
  • 3 篇 阿拉伯文
  • 2 篇 意大利文
  • 2 篇 荷兰文
  • 2 篇 波兰文
检索条件"机构=Computer Science and Technology in Institute of Computing Technology"
222488 条 记 录,以下是21-30 订阅
排序:
Indoor Uncertain Semantic Trajectory Similarity Join
收藏 引用
Journal of computer science & technology 2024年 第6期39卷 1441-1465页
作者: Hong-Bo Yin Dong-Hua Yang Kai-Qi Zhang Hong Gao Jian-Zhong Li Faculty of Computing Harbin Institute of TechnologyHarbin 150001China Center of Analysis Measurement and ComputingHarbin Institute of TechnologyHarbin 150001China Faculty of Computer Science and Control Engineering Shenzhen Institute of Advanced TechnologyChinese Academy of SciencesShenzhen 518055China
With the widespread deployment of indoor positioning systems, an unprecedented scale of indoor trajectories is being produced. By considering the inherent uncertainties and the text information contained in such an in... 详细信息
来源: 评论
A hybrid memory architecture supporting fine-grained data migration
收藏 引用
Frontiers of computer science 2024年 第2期18卷 31-41页
作者: Ye CHI Jianhui YUE Xiaofei LIAO Haikun LIU Hai JIN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China Department of Computer Science Michigan Technological UniversityMichigan 49931USA
Hybrid memory systems composed of dynamic random access memory(DRAM)and Non-volatile memory(NVM)often exploit page migration technologies to fully take the advantages of different memory *** previous proposals usually... 详细信息
来源: 评论
Answering reachability queries with ordered label constraints over labeled graphs
收藏 引用
Frontiers of computer science 2024年 第1期18卷 105-117页
作者: Daoliang HE Pingpeng YUAN Hai JIN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science&TechnologyHuazhong University of Science and TechnologyWuhan 430074China
Reachability query plays a vital role in many graph analysis *** researches proposed many methods to efficiently answer reachability queries between vertex *** many real graphs are labeled graph,it highly demands Labe... 详细信息
来源: 评论
The quantum Ising model for perfect matching and solving it with variational quantum eigensolver
收藏 引用
science China(Information sciences) 2024年 第9期67卷 306-320页
作者: Qilin ZHENG Pingyu ZHU Chao WU Miaomiao YU Weihong LUO Ping XU Institute for Quantum Information and State Key Laboratory of High Performance Computing College of Computer Science and Technology National University of Defense Technology Hefei National Laboratory
Obtaining all perfect matchings of a graph is a tough problem in graph theory, and its complexity belongs to the #P-Complete class. The problem is closely related to combinatorics, marriage matching problems, dense su... 详细信息
来源: 评论
Maxwell’s Demon in MLP-Mixer:towards transferable adversarial attacks
收藏 引用
Cybersecurity 2025年 第1期8卷 180-188页
作者: Haoran Lyu Yajie Wang Yu‑an Tan Huipeng Zhou Yuhang Zhao Quanxin Zhang School of Cyberspace Science and Technology Beijing Institute of TechnologyBeijingChina School of Computer Science and Technology Beijing Institute of TechnologyBeijingChina
Models based on MLP-Mixer architecture are becoming popular,but they still sufer from adversarial *** it has been shown that MLP-Mixer is more robust to adversarial attacks compared to convolutional neural networks(CN... 详细信息
来源: 评论
Word2State: Modeling Word Representations as States with Density Matrices
收藏 引用
Chinese Journal of Electronics 2025年 第2期34卷 649-660页
作者: Zhang Chenchen Li Qiuchi Su Zhan Song Dawei School of Computer Science and Technology Beijing Institute of Technology Beijing 100081 China Department of Computer Science University of Copenhagen Copenhagen 2100 Denmark
Polysemy is a common phenomenon in linguistics. Quantum-inspired complex word embeddings based on Semantic Hilbert Space play an important role in natural language processing, which may accurately define a genuine pro... 详细信息
来源: 评论
Four-wave mixing Bragg scattering for small frequency shift from silicon coupled microrings
收藏 引用
Chinese Physics B 2025年 第1期34卷 351-355页
作者: Chang Zhao Chao Wu Pingyu Zhu Yuxing Du Yan Wang Miaomiao Yu Kaikai Zhang Ping Xu Institute for Quantum Information&State Key Laboratory of High Performance Computing College of Computer Science and TechnologyNational University of Defense TechnologyChangsha 410073China
Frequency conversion is pivotal in nonlinear optics and quantum optics for manipulating and translating light signals across different wavelength *** frequency conversion between two light beams with a small frequency... 详细信息
来源: 评论
On-chip quantum NOON state sensing for temperature and humidity
收藏 引用
Chinese Physics B 2024年 第10期33卷 15-20页
作者: Weihong Luo Chao Wu Yuxing Du Chang Zhao Miaomiao Yu Pingyu Zhu Kaikai Zhang Ping Xu Institute for Quantum Information&State Key Laboratory of High Performance Computing College of Computer Science and TechnologyNational University of Defense TechnologyChangsha 410073China
A maximal photon number entangled state,namely NOON state,can be adopted for sensing with a quantum *** this work,we designed silicon quantum photonic chips containing two types of Mach-Zehnder interferometerswherein ... 详细信息
来源: 评论
Optimizing Image Retrieval in Cloud Servers with TN-AGW: A Secure and Efficient Approach
收藏 引用
Journal of The Institution of Engineers (India): Series B 2025年 第2期106卷 459-473页
作者: Ponnuviji, N.P. Nirmala, G. Kokila, M. L. Sworna Priyadharshini, S. Indra Department of Computer Science and Engineering RMK College of Engineering and Technology Puduvoyal Thiruvallur India Department of Computer Science and Engineering RMD Engineering College Chennai India Department of Computing Technologies School of Computing Faculty of Engineering and Technology SRM Institute of Science and Technology Tamil Nādu Kattankulathur Chennai India School of Computer Science and Engineering Vellore Institute of Technology Chennai India
The increasing use of cloud-based image storage and retrieval systems has made ensuring security and efficiency crucial. The security enhancement of image retrieval and image archival in cloud computing has received c... 详细信息
来源: 评论
A survey of acoustic eavesdropping attacks:Principle,methods,and progress
收藏 引用
High-Confidence computing 2024年 第4期4卷 116-128页
作者: Yiwei Chen Wenhao Li Xiuzhen Cheng Pengfei Hu Institute of Intelligent Computing the School of Computer Science and TechnologyShandong UniversityQingdao 266237China
In today’s information age,eavesdropping has been one of the most serious privacy threats in information security,such as exodus spyware(Rudie et al.,2021)and pegasus spyware(Anatolyevich,2020).And the main one of th... 详细信息
来源: 评论