咨询与建议

限定检索结果

文献类型

  • 32,419 篇 会议
  • 18,587 篇 期刊文献
  • 176 册 图书

馆藏范围

  • 51,182 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 28,126 篇 工学
    • 9,991 篇 计算机科学与技术...
    • 8,453 篇 电子科学与技术(可...
    • 8,061 篇 电气工程
    • 7,644 篇 软件工程
    • 5,955 篇 信息与通信工程
    • 4,188 篇 控制科学与工程
    • 4,068 篇 光学工程
    • 3,069 篇 材料科学与工程(可...
    • 2,463 篇 化学工程与技术
    • 2,326 篇 仪器科学与技术
    • 2,112 篇 机械工程
    • 2,009 篇 动力工程及工程热...
    • 1,970 篇 生物工程
    • 1,693 篇 生物医学工程(可授...
    • 1,156 篇 力学(可授工学、理...
    • 923 篇 冶金工程
    • 671 篇 航空宇航科学与技...
    • 658 篇 土木工程
  • 19,323 篇 理学
    • 10,981 篇 物理学
    • 6,571 篇 数学
    • 2,764 篇 化学
    • 2,278 篇 生物学
    • 2,179 篇 统计学(可授理学、...
    • 1,807 篇 系统科学
  • 3,548 篇 管理学
    • 2,508 篇 管理科学与工程(可...
    • 1,143 篇 工商管理
    • 1,093 篇 图书情报与档案管...
  • 1,422 篇 医学
    • 1,155 篇 临床医学
    • 891 篇 基础医学(可授医学...
  • 513 篇 法学
  • 448 篇 经济学
  • 275 篇 农学
  • 164 篇 教育学
  • 113 篇 文学
  • 111 篇 军事学
  • 65 篇 艺术学
  • 5 篇 哲学
  • 5 篇 历史学

主题

  • 2,878 篇 laboratories
  • 911 篇 frequency
  • 871 篇 computational mo...
  • 815 篇 bandwidth
  • 703 篇 control systems
  • 588 篇 testing
  • 559 篇 computer archite...
  • 525 篇 application soft...
  • 499 篇 equations
  • 496 篇 switches
  • 494 篇 voltage
  • 480 篇 neural networks
  • 480 篇 delay
  • 469 篇 computer science
  • 449 篇 hardware
  • 444 篇 robustness
  • 443 篇 feature extracti...
  • 417 篇 costs
  • 373 篇 silicon
  • 366 篇 signal processin...

机构

  • 372 篇 department of el...
  • 254 篇 national mobile ...
  • 225 篇 radiation labora...
  • 195 篇 yerevan physics ...
  • 149 篇 national and kap...
  • 148 篇 centro brasileir...
  • 146 篇 universidad iber...
  • 140 篇 istanbul technic...
  • 138 篇 brunel universit...
  • 134 篇 infn sezione di ...
  • 116 篇 university of sp...
  • 115 篇 università di to...
  • 112 篇 school of optica...
  • 106 篇 state university...
  • 99 篇 department of el...
  • 95 篇 department of ph...
  • 95 篇 the university o...
  • 94 篇 faculty of scien...
  • 94 篇 wigner research ...
  • 92 篇 departamento de ...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 108 篇 l. valencia palo...
  • 108 篇 t. liu
  • 108 篇 c. hensel
  • 93 篇 a. garcia-bellid...
  • 93 篇 a. steen
  • 92 篇 w. busza
  • 92 篇 a. babaev
  • 90 篇 n. cartiglia
  • 89 篇 v. karjavine
  • 89 篇 n. colino
  • 89 篇 f. moortgat
  • 89 篇 b. clerbaux
  • 89 篇 g. sultanov
  • 89 篇 m. a. ciocci
  • 88 篇 k. lamichhane
  • 87 篇 s. maselli
  • 87 篇 e. migliore
  • 87 篇 p. avery

语言

  • 48,465 篇 英文
  • 1,902 篇 其他
  • 797 篇 中文
  • 3 篇 日文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 阿拉伯文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
检索条件"机构=Computer Vision Laboratory Electrical and Computer Engineering"
51182 条 记 录,以下是4451-4460 订阅
排序:
Constructing Quadratic and Cubic Negabent Functions over Finite Fields
Constructing Quadratic and Cubic Negabent Functions over Fin...
收藏 引用
IEEE International Symposium on Information Theory
作者: Fei Guo Zilong Wang Guang Gong State Key Laboratory of Integrated Service Networks Xidian University Xi’an China Department of Electrical and Computer Engineering University of Waterloo Waterloo Ontario Canada
Bent functions have flat absolute Walsh-Hadamard spectra and negabent functions have flat absolute nega-Hadamard spectra. Those properties are wide applications in cryptography for constructing cryptographically stron...
来源: 评论
Accelerated Modelling of Interfaces for Electronic Devices using Graph Neural Networks
arXiv
收藏 引用
arXiv 2023年
作者: Brahma, Pratik Bhattaram, Krishnakumar Salahuddin, Sayeef Department of Electrical Engineering and Computer Sciences University of California Berkeley United States Materials Science Division Lawrence Berkeley National Laboratory United States
Modern microelectronic devices are composed of interfaces between a large number of materials, many of which are in amorphous or polycrystalline phases. Modeling such non-crystalline materials using first-principles m... 详细信息
来源: 评论
Adaptive Softmax Regression for Credit Scoring  16th
Adaptive Softmax Regression for Credit Scoring
收藏 引用
16th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2020 in conjunction with the 13th International Conference on Frontiers of Information Technology, Applications and Tools, FITAT 2020
作者: Munkhdalai, Lkhagvadorj Davagdorj, Khishigsuren Pham, Van-Huy Ryu, Keun Ho Database/Bioinformatics Laboratory School of Electrical and Computer Engineering Chungbuk National University Cheongju28644 Korea Republic of Faculty of Information Technology Ton Duc Thang University Ho Chi Minh City700000 Viet Nam Department of Computer Science College of Electrical and Computer Engineering Chungbuk National University Cheongju28644 Korea Republic of
Credit scoring is a classification task from the machine learning perspective. Efficiently classifying bad borrowers is the main aim of building a credit scoring model. This work proposes a novel adaptive softmax regr... 详细信息
来源: 评论
Simulation to Reality Semantic Segmentation for Humanoid Soccer Robots
Simulation to Reality Semantic Segmentation for Humanoid Soc...
收藏 引用
Conference on Artificial Intelligence and Robotics and Asia-Pacific International Symposium
作者: Amir Gholami Fatemeh Rashnozadeh Arash Rahmani Ahmadreza Nazari Pegah Behvarmanesh Alejandro Ramirez-Serrano Department of Mechanical and Manufacturing Engineering University of Calgary Calgary Alberta Canada Mechatronics Research Laboratory Qazvin Islamic Azad University Qazvin Iran Department of Electrical and Computer Engineering University of Calgary Calgary Alberta Canada
Deep learning methods like semantic segmentation have gained popularity in computer vision, but challenges remain, particularly in the lack of relevant datasets, such as for humanoid soccer robots. Manually annotating...
来源: 评论
Environment Provisioning and Management for Cybersecurity Education
Environment Provisioning and Management for Cybersecurity Ed...
收藏 引用
IEEE International Conference on Electro-Information Technology
作者: John Ford David Arnold Jafar Saniie Department of Electrical and Computer Engineering Embedded Computing and Signal Processing (ECASP) Research Laboratory Illinois Institute of Technology Chicago IL U.S.A.
Hands-on learning environments and cyber ranges are popular tools in cybersecurity education. These resources provide students with practical assessments to strengthen their abilities and can assist in transferring ma...
来源: 评论
Channel Rank Improvement in Urban Drone Corridors Using Passive Intelligent Reflectors
Channel Rank Improvement in Urban Drone Corridors Using Pass...
收藏 引用
IEEE Conference on Aerospace
作者: Ender Ozturk Chethan K. Anjinappa Fatih Erden Md Moin Uddin Chowdhury Ismail Guvenc Huaiyu Dai Arupjyoti Bhuyan Department of Electrical and Computer Engineering NC State University Raleign NC INL Wireless Security Institute Idaho National Laboratory Idaho Falls ID
Multiple-input multiple-output (MIMO) techniques can help in scaling the achievable air-to-ground (A2G) channel capacity while communicating with drones. However, spatial multiplexing with drones suffers from rank-def... 详细信息
来源: 评论
MPC Implementation for Optimal Active Power Control of Large-Scale Wind-PV-Battery Hybrid System
MPC Implementation for Optimal Active Power Control of Large...
收藏 引用
第42届中国控制会议
作者: Zihan Zhang Zhongwei Lin Ze Zhao Jiawei Zhou Chenzhi Qu State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources School of Control and Computer Engineering North China Electric Power University
This paper investigates the operational strategy for real-time optimal active power control of large-scale wind-PV-battery hybrid system. The MPC strategy is established with objective, forecast models and constraints...
来源: 评论
Suppressing Error Floors in SCPPM via an Efficient CRC-aided List Viterbi Decoding Algorithm
Suppressing Error Floors in SCPPM via an Efficient CRC-aided...
收藏 引用
Topics in Coding (ISTC), International Symposium on
作者: Amaael Antonini Wenhui Sui Brendan Towell Dariush Divsalar Jon Hamkins Richard D. Wesel Department of Electrical and Computer Engineering University of California Los Angeles CA USA Jet Propulsion Laboratory California Instute of Technology Pasadena CA USA
List Viterbi decoders are a very effective way to improve the performance of block codes in combination with an error detection outer code. In this work, we combine an efficient serial list Viterbi decoder design with...
来源: 评论
Statistical AoI, Delay, and Error-Rate Bounded QoS Provisioning for Satellite-Terrestrial Integrated Networks
Statistical AoI, Delay, and Error-Rate Bounded QoS Provision...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Jingqing Wang Wenchi Cheng H. Vincent Poor State Key Laboratory of Integrated Services Networks Xidian University Xian China Department of Electrical and Computer Engineering Princeton University Princeton NJ USA
Massive ultra-reliable and low latency communications (mURLLC) has emerged to support wireless time/error-sensitive services, which has attracted significant research attention while imposing several unprecedented cha...
来源: 评论
QUADFormer: Learning-based Detection of Cyber Attacks in Quadrotor UAVs
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Pengyu Yang, Zhaohua Yang, Nachuan Wang, Zikai Li, Jialu Zhang, Fan Wang, Chaoqun Wang, Jiankun Meng, Max Q.-H. Shi, Ling Shenzhen Key Laboratory of Robotics Perception and Intelligence The Department of Electronic and Electrical Engineering Southern University of Science and Technology Shenzhen China Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong The School of Control Science and Engineering Shandong University Shandong China Jiaxing Research Institute Southern University of Science and Technology Jiaxing China Department of Electronic Engineering The Chinese University of Hong Kong Hong Kong Department of Electrical and Computer Engineering The University of Alberta Canada
Safety-critical intelligent cyber-physical systems, such as quadrotor unmanned aerial vehicles (UAVs), are vulnerable to different types of cyber attacks, and the absence of timely and accurate attack detection can le... 详细信息
来源: 评论