咨询与建议

限定检索结果

文献类型

  • 4,186 篇 会议
  • 1,922 篇 期刊文献
  • 40 册 图书

馆藏范围

  • 6,148 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,821 篇 工学
    • 2,774 篇 计算机科学与技术...
    • 2,266 篇 软件工程
    • 961 篇 信息与通信工程
    • 618 篇 控制科学与工程
    • 451 篇 生物工程
    • 380 篇 电气工程
    • 329 篇 电子科学与技术(可...
    • 319 篇 生物医学工程(可授...
    • 286 篇 机械工程
    • 282 篇 光学工程
    • 224 篇 网络空间安全
    • 191 篇 化学工程与技术
    • 179 篇 仪器科学与技术
    • 173 篇 动力工程及工程热...
    • 165 篇 安全科学与工程
    • 148 篇 交通运输工程
  • 2,070 篇 理学
    • 1,006 篇 数学
    • 647 篇 物理学
    • 492 篇 生物学
    • 339 篇 统计学(可授理学、...
    • 205 篇 系统科学
    • 192 篇 化学
  • 1,118 篇 管理学
    • 661 篇 管理科学与工程(可...
    • 502 篇 图书情报与档案管...
    • 254 篇 工商管理
  • 292 篇 医学
    • 230 篇 临床医学
    • 223 篇 基础医学(可授医学...
    • 140 篇 公共卫生与预防医...
    • 125 篇 药学(可授医学、理...
  • 202 篇 法学
    • 165 篇 社会学
  • 106 篇 农学
  • 103 篇 经济学
  • 69 篇 教育学
  • 36 篇 文学
  • 28 篇 军事学
  • 13 篇 艺术学

主题

  • 207 篇 accuracy
  • 180 篇 deep learning
  • 155 篇 computational mo...
  • 149 篇 feature extracti...
  • 137 篇 machine learning
  • 121 篇 training
  • 100 篇 hadron colliders
  • 99 篇 convolutional ne...
  • 96 篇 data models
  • 95 篇 predictive model...
  • 94 篇 semantics
  • 92 篇 real-time system...
  • 90 篇 support vector m...
  • 86 篇 data mining
  • 85 篇 computer applica...
  • 81 篇 optimization
  • 78 篇 internet of thin...
  • 77 篇 artificial intel...
  • 69 篇 security
  • 68 篇 wireless sensor ...

机构

  • 133 篇 yerevan physics ...
  • 130 篇 national and kap...
  • 130 篇 centro brasileir...
  • 130 篇 istanbul technic...
  • 128 篇 university of sp...
  • 128 篇 indian institute...
  • 127 篇 universidad iber...
  • 126 篇 brunel universit...
  • 125 篇 università di to...
  • 125 篇 academy of scien...
  • 125 篇 infn sezione di ...
  • 124 篇 charles universi...
  • 124 篇 zhejiang univers...
  • 123 篇 department of ph...
  • 122 篇 infn sezione di ...
  • 121 篇 university of de...
  • 119 篇 rwth aachen univ...
  • 118 篇 imperial college...
  • 115 篇 department of ph...
  • 109 篇 università di ca...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 5,690 篇 英文
  • 364 篇 其他
  • 98 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Computer Technology and Application"
6148 条 记 录,以下是1-10 订阅
排序:
CBA: multi source fusion model for fast and intelligent target intention identification
收藏 引用
Journal of Systems Engineering and Electronics 2024年 第2期35卷 406-416页
作者: WAN Shichang LI Qingshan WANG Xuhua LU Nanhua School of Computer Science and Technology Xidian UniversityXi’an 710071China School of Mathematics and Computer Application Shangluo UniversityShangluo 726000China
How to mine valuable information from massive multisource heterogeneous data and identify the intention of aerial targets is a major research focus at present. Aiming at the longterm dependence of air target intention... 详细信息
来源: 评论
Deep learning-based open API recommendation for Mashup development
收藏 引用
Science China(Information Sciences) 2023年 第7期66卷 94-111页
作者: Ye WANG Junwu CHEN Qiao HUANG Xin XIA Bo JIANG School of Computer and Information Engineering Zhejiang Gongshang University Software Engineering Application Technology Lab
Mashup developers often need to find open application programming interfaces(APIs) for their composition application development. Although most enterprises and service organizations have encapsulated their businesses ... 详细信息
来源: 评论
Heap Memory Vulnerability Detection and Protection in Embedded Real-Time Operating Systems  24
Heap Memory Vulnerability Detection and Protection in Embedd...
收藏 引用
8th International Conference on Electronic Information technology and computer Engineering, EITCE 2024
作者: Zhang, Jinyuan Yao, Rui Zhang, Yang Beijing Institute of Computer Technology and Application Beijing China
In application software development, memory defects are difficult to detect. Traditional memory defect detection tools generally face issues of high performance overhead and excessive memory consumption, which limits ... 详细信息
来源: 评论
UniTrans:Unified Parameter-Efficient Transfer Learning and Multimodal Alignment for Large Multimodal Foundation Model
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 219-238页
作者: Jiakang Sun Ke Chen Xinyang He Xu Liu Ke Li Cheng Peng Chengdu Institute of Computer Application Chinese Academy of SciencesChengdu610213China School of Computer Science and Technology University of Chinese Academy of SciencesBeijing101499China
With the advancements in parameter-efficient transfer learning techniques,it has become feasible to leverage large pre-trained language models for downstream tasks under low-cost and low-resource ***,applying this tec... 详细信息
来源: 评论
Research of Military Cyber Operation Forensic and Analysis in Russia-Ukraine Conflict  24
Research of Military Cyber Operation Forensic and Analysis i...
收藏 引用
24th IEEE International Conference on Software Quality, Reliability and Security Companion, QRS-C 2024
作者: Liu, Shiyu Li, Dongfang Yang, Guang Su, Mingyue Shen, Wei Beijing Institute of Computer Technology and Application Beijing China
The Russia-Ukraine conflict represents the first regional military confrontation between major (and external) powers that is thoroughly interspersed with cyber operations throughout the main military theater. In essen... 详细信息
来源: 评论
Research on the Impact of Tester's Technical and Cognitive Factors on Aerospace Software Test Quality  24
Research on the Impact of Tester's Technical and Cognitive F...
收藏 引用
24th IEEE International Conference on Software Quality, Reliability and Security Companion, QRS-C 2024
作者: Hu, Yadi Tao, Jinlong Liang, Yu Xu, Zhewei Jia, Zhangtao Beijing Institute of Computer Technology and Application Beijing China
This paper primarily analyzes the impact of tester capabilities on the quality of aerospace software testing and elaborates on how to assess tester abilities from both technical and cognitive perspectives. The researc... 详细信息
来源: 评论
A Efficient DNN Sparsity Framework with Data Pruning and Auxiliary Network  5
A Efficient DNN Sparsity Framework with Data Pruning and Aux...
收藏 引用
5th International Conference on Artificial Intelligence and computer Engineering, ICAICE 2024
作者: Guo, Enping Beijing Institute of Computer Technology and Application Beijing China
Model compression frequently leverages model pruning, an approach aimed at minimizing neural network size without compromising performance. Prior research has demonstrated the effectiveness of iterative pruning combin... 详细信息
来源: 评论
Adaptive coupled-sliding-variable-based finite-time control of composite formation for multi-robot systems
收藏 引用
Science China(Information Sciences) 2024年 第10期67卷 244-260页
作者: Xinru MA Hengyu LI Jun LIU Yueying WANG Shaorong XIE Jun LUO School of Mechatronic Engineering and Automation Shanghai University School of Mathematics and Computer Application Technology Jining University School of Computer Science Shanghai University College of Mechanical and Vehicle Engineering Chongqing University
This paper focuses on the finite-time control(FTC) of the composite formation consensus(CFC)problems for multi-robot systems(MRSs). The CFC problems are firstly proposed for MRSs under the complex network topology of ... 详细信息
来源: 评论
Platform-specific code generation method for the tyche embedded operating system based on AADL models  3
Platform-specific code generation method for the tyche embed...
收藏 引用
3rd International Conference on Algorithms, Network, and Communication technology, ICANCT 2024
作者: Chen, Li Jia, Zhangtao An, Heng Li, Haoyu Beijing Computer Technology and Application Research Institute Beijing China
The Tyche Embedded Operating System is a highly customized real-time embedded operating system, widely applied in fields such as aerospace, medical devices, and industrial automation. Renowned for its robust support f... 详细信息
来源: 评论
A Blockchain-Based Key Management Scheme in FANETs  4
A Blockchain-Based Key Management Scheme in FANETs
收藏 引用
4th International Conference on Electronic Information Engineering and computer Science, EIECS 2024
作者: Yin, Datong Han, Lei Beijing Institute of Computer Technology and Application Beijing China
Flying Ad-Hoc Networks (FANETs) enable the deployment of Unmanned aerial vehicles (UAVs) in a clustered manner to execute complex missions, yet their inherent openness poses significant challenges to communication sec... 详细信息
来源: 评论