咨询与建议

限定检索结果

文献类型

  • 6,932 篇 会议
  • 3,618 篇 期刊文献
  • 47 册 图书

馆藏范围

  • 10,597 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,434 篇 工学
    • 4,303 篇 计算机科学与技术...
    • 3,361 篇 软件工程
    • 1,844 篇 信息与通信工程
    • 862 篇 电子科学与技术(可...
    • 837 篇 电气工程
    • 748 篇 控制科学与工程
    • 548 篇 生物工程
    • 401 篇 机械工程
    • 355 篇 仪器科学与技术
    • 349 篇 生物医学工程(可授...
    • 348 篇 光学工程
    • 263 篇 动力工程及工程热...
    • 243 篇 网络空间安全
    • 242 篇 化学工程与技术
    • 190 篇 安全科学与工程
    • 186 篇 材料科学与工程(可...
    • 175 篇 交通运输工程
  • 3,065 篇 理学
    • 1,592 篇 数学
    • 918 篇 物理学
    • 607 篇 生物学
    • 483 篇 统计学(可授理学、...
    • 309 篇 系统科学
    • 259 篇 化学
  • 1,618 篇 管理学
    • 1,029 篇 管理科学与工程(可...
    • 624 篇 图书情报与档案管...
    • 434 篇 工商管理
  • 331 篇 医学
    • 267 篇 临床医学
    • 231 篇 基础医学(可授医学...
  • 254 篇 法学
    • 175 篇 社会学
  • 166 篇 经济学
    • 165 篇 应用经济学
  • 123 篇 教育学
  • 92 篇 农学
  • 51 篇 军事学
  • 45 篇 文学
  • 17 篇 艺术学
  • 1 篇 哲学

主题

  • 224 篇 computer network...
  • 199 篇 bandwidth
  • 191 篇 computational mo...
  • 186 篇 computer science
  • 183 篇 protocols
  • 182 篇 feature extracti...
  • 152 篇 throughput
  • 151 篇 quality of servi...
  • 151 篇 wireless sensor ...
  • 150 篇 semantics
  • 138 篇 computer archite...
  • 137 篇 wireless communi...
  • 137 篇 internet
  • 133 篇 routing
  • 128 篇 optimization
  • 127 篇 deep learning
  • 124 篇 security
  • 119 篇 monitoring
  • 118 篇 servers
  • 117 篇 authentication

机构

  • 160 篇 school of comput...
  • 149 篇 national and kap...
  • 149 篇 centro brasileir...
  • 148 篇 istanbul technic...
  • 147 篇 yerevan physics ...
  • 146 篇 universidad iber...
  • 146 篇 university of sp...
  • 146 篇 institute of inf...
  • 144 篇 brunel universit...
  • 144 篇 indian institute...
  • 143 篇 academy of scien...
  • 141 篇 charles universi...
  • 138 篇 national compute...
  • 137 篇 università di to...
  • 137 篇 rwth aachen univ...
  • 136 篇 university of de...
  • 135 篇 imperial college...
  • 134 篇 infn sezione di ...
  • 131 篇 zhejiang univers...
  • 128 篇 department of ph...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 112 篇 a. steen
  • 112 篇 n. cartiglia
  • 112 篇 n. colino
  • 112 篇 f. moortgat
  • 112 篇 b. clerbaux
  • 112 篇 g. sultanov
  • 112 篇 m. a. ciocci
  • 112 篇 k. lamichhane
  • 112 篇 s. maselli
  • 111 篇 a. babaev
  • 111 篇 v. karjavine
  • 111 篇 e. migliore
  • 111 篇 p. avery
  • 111 篇 l. silvestris

语言

  • 9,510 篇 英文
  • 867 篇 其他
  • 230 篇 中文
  • 10 篇 日文
  • 2 篇 德文
  • 1 篇 西班牙文
检索条件"机构=Computer and Network Engineering"
10597 条 记 录,以下是41-50 订阅
排序:
Image Recognition Technology Supported Environment Monitoring Smart Fan  7
Image Recognition Technology Supported Environment Monitorin...
收藏 引用
7th IEEE Eurasian Conference on Educational Innovation, ECEI 2024
作者: Yang, Sheng-Yuan Lee, Hsiu-Chia Lunghwa University of Science and Technology Department of Computer Information and Network Engineering Taoyuan Taiwan
Owing to the development of the Internet of Things (IoT), smart electrical appliances bring convenience to life. However, smart home appliances are too cumbersome as their interface operations are mostly not intuitive... 详细信息
来源: 评论
PROMIPL: A Probabilistic Generative Model for Multi-Instance Partial-Label Learning  24
PROMIPL: A Probabilistic Generative Model for Multi-Instance...
收藏 引用
24th IEEE International Conference on Data Mining, ICDM 2024
作者: Yang, Yin-Fang Tang, Wei Zhang, Min-Ling School of Computer Science and Engineering Southeast University Nanjing China Ministry of Education Key Laboratory of Computer Network China
Multi-instance partial-label learning (MIPL) tackles scenarios where each training sample is represented as a multiinstance bag associated with a candidate label set. This set contains one true label and several false... 详细信息
来源: 评论
Multi-class Bitcoin mixing service identification based on graph classification
收藏 引用
Digital Communications and networks 2024年 第6期10卷 1881-1893页
作者: Xiaoyan Hu Meiqun Gui Guang Cheng Ruidong Li Hua Wu School of Cyber Science&Engineering Southeast UniversityNanjing 211189China Purple Mountain Laboratories for Network and Communication Security Nanjing 211111China Jiangsu Provincial Engineering Research Center of Security for Ubiquitous Network Nanjing 211189China Key Laboratory of Computer Network and Information Integration Southeast UniversityMinistry of EducationChina Research Base of International Cyberspace Governance Southeast UniversityNanjing 211189China Institute of Science and Engineering Kanazawa UniversityKakumaKanazawa920-1192Japan
Due to its anonymity and decentralization,Bitcoin has long been a haven for various illegal *** generally legalize illicit funds by Bitcoin mixing ***,it is critical to investigate the mixing services in cryptocurrenc... 详细信息
来源: 评论
A New Encrypted Traffic Identification Model Based on VAE-LSTM-DRN
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 569-588页
作者: Haizhen Wang Jinying Yan Na Jia College of Computer and Control Engineering Qiqihar UniversityQiqihar161006China Heilongjiang Key Laboratory of Big Data Network Security Detection and Analysis Qiqihar UniversityQiqiharChina
Encrypted traffic identification pertains to the precise acquisition and categorization of data from traffic datasets containing imbalanced and obscured *** extraction of encrypted traffic attributes and their subsequ... 详细信息
来源: 评论
A Resource-Efficient Multi-core Multi-thread RISC-V-based System-on-Chip  21
A Resource-Efficient Multi-core Multi-thread RISC-V-based Sy...
收藏 引用
21st International System-on-Chip Design Conference, ISOCC 2024
作者: Kieu-Do-Nguyen, Binh Nguyen, Khai-Duy Binh, Nguyen The Dang, Tuan-Kiet Le, Duc-Hung Pham-Quoc, Cuong Tran, Ngoc-Thinh Pham, Cong-Kha Hoang, Trong-Thuc Department of Computer and Network Engineering Tokyo Japan Faculty of Computer Science and Engineering Hochiminh Viet Nam Faculty of Electronics and Telecommunications Hochiminh Viet Nam
In the past, a small size microcontroller was needed to control and gather data from resource-constrained electronic devices aimed at Internet of Things (IoT) applications. While the server nodes receive the requests ... 详细信息
来源: 评论
A Novel Eccentric Intrusion Detection Model Based on Recurrent Neural networks with Leveraging LSTM
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3089-3127页
作者: Navaneetha Krishnan Muthunambu Senthil Prabakaran Balasubramanian Prabhu Kavin Kishore Senthil Siruvangur Kavitha Chinnadurai Jehad Ali Department of Computer Applications Karpagam College of EngineeringCoimbatore641032India Department of Computer Science and Engineering Karpagam College of EngineeringCoimbatore641032India Department of Data Science and Business Systems College of Engineering and TechnologySRM Institute of Science and TechnologyKattankulathur603203India Department of Computer Science and Engineering Sathyabama Institute of Science and TechnologyJeppiaar NagarRajiv Gandhi SalaiChennai600119India Department of AI Convergence Network Ajou UniversitySuwon16499Korea
The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the ***,this development has ex... 详细信息
来源: 评论
Cache Allocation in Multi-Tenant Edge Computing: An Online Model-Based Reinforcement Learning Approach
收藏 引用
IEEE Transactions on Cloud Computing 2025年 第2期13卷 459-472页
作者: Ben-Ameur, Ayoub Araldo, Andrea Chahed, Tijani Dán, György Institut Polytechnique de Paris SAMOVAR Telecom SudParis Palaiseau91120 France KTH Royal Institute of Technology Division of Network and Systems Engineering School of Electrical Engineering and Computer Science Stockholm11428 Sweden
We consider a network Operator (NO) that owns Edge Computing (EC) resources, virtualizes them and lets third party Service Providers (SPs) run their services, using the allocated slice of resources. We focus on one sp... 详细信息
来源: 评论
Key Agreement and Management Scheme Based on Blockchain for 5G-Enabled Vehicular networks
收藏 引用
China Communications 2025年 第3期22卷 270-287页
作者: Wang Zhihua Wang Shuaibo Wang Haofan Li Jiaze Yao Yizhe Wang Yongjian Yang Xiaolong School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China School of Cyber Science and Engineering Zhengzhou UniversityZhengzhou 449001China Lab of National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing 100029China
5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large nu... 详细信息
来源: 评论
Dynamic Reinforcement Learning for Optimal Go AI Training: Adaptive Adjustment and Optimization
收藏 引用
IEEE Transactions on Consumer Electronics 2024年 第1期71卷 292-302页
作者: Zhang, Chunjiong Shan, Gaoyang Lim, Junghyun Roh, Byeong-Hee Ajou University Department of AI Convergence Network Suwon16499 Korea Republic of Ajou University Department of Software and Computer Engineering Suwon16499 Korea Republic of
Go is a popular strategy game today, but due to its large search space and task complexity, ensuring stable AI implementation is challenging. Specifically, Go AI training requires setting a fixed optimal learning rate... 详细信息
来源: 评论
Method of Fundamental Solutions for Doubly Periodic Potential Problems  10th
Method of Fundamental Solutions for Doubly Periodic Potentia...
收藏 引用
10th International Conference on Mathematics and Computing, ICMC 2024
作者: Ogata, Hidenori Department of Computer and Network Engineering Graduate School of Informatics and Engineering The University of Electro-Communications Chofu182-8585 Japan
In this paper, we propose a method of fundamental solution for two-dimensional doubly periodic problems, especially potential flow problems with a doubly periodic array of obstacles. In the proposed method, we approxi... 详细信息
来源: 评论