咨询与建议

限定检索结果

文献类型

  • 5,374 篇 会议
  • 3,881 篇 期刊文献
  • 77 册 图书

馆藏范围

  • 9,332 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,512 篇 工学
    • 3,200 篇 计算机科学与技术...
    • 2,677 篇 软件工程
    • 1,131 篇 信息与通信工程
    • 1,031 篇 控制科学与工程
    • 848 篇 电气工程
    • 693 篇 电子科学与技术(可...
    • 544 篇 机械工程
    • 504 篇 生物工程
    • 445 篇 光学工程
    • 340 篇 生物医学工程(可授...
    • 307 篇 仪器科学与技术
    • 261 篇 动力工程及工程热...
    • 253 篇 化学工程与技术
    • 202 篇 材料科学与工程(可...
    • 189 篇 交通运输工程
    • 145 篇 安全科学与工程
    • 139 篇 航空宇航科学与技...
    • 135 篇 土木工程
  • 3,170 篇 理学
    • 1,499 篇 数学
    • 1,018 篇 物理学
    • 593 篇 生物学
    • 481 篇 统计学(可授理学、...
    • 469 篇 系统科学
    • 293 篇 化学
  • 1,214 篇 管理学
    • 782 篇 管理科学与工程(可...
    • 465 篇 图书情报与档案管...
    • 320 篇 工商管理
  • 345 篇 医学
    • 279 篇 临床医学
    • 225 篇 基础医学(可授医学...
    • 151 篇 药学(可授医学、理...
  • 162 篇 法学
  • 111 篇 经济学
  • 96 篇 农学
  • 54 篇 教育学
  • 36 篇 文学
  • 20 篇 艺术学
  • 18 篇 军事学
  • 5 篇 哲学
  • 2 篇 历史学

主题

  • 481 篇 laboratories
  • 242 篇 computer science
  • 169 篇 control systems
  • 140 篇 computer archite...
  • 137 篇 neural networks
  • 133 篇 computational mo...
  • 126 篇 feature extracti...
  • 115 篇 optimization
  • 114 篇 semantics
  • 109 篇 deep learning
  • 109 篇 application soft...
  • 97 篇 costs
  • 96 篇 data mining
  • 92 篇 bandwidth
  • 89 篇 throughput
  • 84 篇 artificial intel...
  • 81 篇 machine learning
  • 78 篇 visualization
  • 77 篇 routing
  • 73 篇 image segmentati...

机构

  • 151 篇 state key labora...
  • 151 篇 state key labora...
  • 97 篇 state key labora...
  • 86 篇 spoken language ...
  • 66 篇 department of co...
  • 62 篇 peng cheng labor...
  • 59 篇 ieee
  • 48 篇 university of ch...
  • 48 篇 state key labora...
  • 44 篇 department of el...
  • 43 篇 zhongguancun lab...
  • 41 篇 school of comput...
  • 40 篇 hubei key labora...
  • 38 篇 state key labora...
  • 33 篇 college of compu...
  • 33 篇 state key labora...
  • 33 篇 school of artifi...
  • 31 篇 jet propulsion l...
  • 30 篇 beijing key labo...
  • 30 篇 college of compu...

作者

  • 43 篇 fuchun sun
  • 39 篇 m. zahn
  • 38 篇 guo hong
  • 33 篇 niyato dusit
  • 31 篇 wei li
  • 28 篇 sun maosong
  • 26 篇 zhang min
  • 26 篇 li-rong zheng
  • 26 篇 niu jianwei
  • 26 篇 sun fuchun
  • 25 篇 liu yang
  • 25 篇 johansson karl h...
  • 25 篇 zhang bo
  • 24 篇 ganesh k. venaya...
  • 24 篇 zengqi sun
  • 23 篇 peifa jia
  • 23 篇 j.h. lang
  • 22 篇 chen xiaowu
  • 22 篇 mingsheng ying
  • 21 篇 mengchu zhou

语言

  • 8,915 篇 英文
  • 272 篇 其他
  • 146 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer and Systems Technology Laboratory"
9332 条 记 录,以下是181-190 订阅
排序:
Quantum Computing and Password Security: Applying Grover's Algorithm and QRNG with Qiskit
Quantum Computing and Password Security: Applying Grover's A...
收藏 引用
2024 Global Congress on Emerging Technologies, GCET 2024
作者: Belkhir, Maria Benkaouha, Haroun Benkhelifa, Elhadj Meriem, Nebbali Khalida Hiba, Lamdani Houari Boumediene University of Science and Technology Computer Science LSI Laboratory Algiers Algeria Staffordshire University Smart Systems AI and Cybersecurity Research Centre Stoke on Trent United Kingdom Houari Boumediene University of Science and Technology Computer Science Faculty Algiers Algeria
The digitization of our daily lives, driven by the Internet of Things (IoT) and other applications, has heightened the importance of data security. This paper explores the impact of quantum computing on password secur... 详细信息
来源: 评论
An Anomaly Detection Method Based on Adaptive Log and Dual Feature Fusion Analysis for Distributed systems  11
An Anomaly Detection Method Based on Adaptive Log and Dual F...
收藏 引用
11th International Conference on Information systems and Computing technology, ISCTech 2023
作者: Jia, Yijiang Li, Kefei Lu, Ping Xie, Baodi Wang, Huayang Chen, Jincai Huazhong University of Science and Technology School of Computer Science and Technology Wuhan China Huazhong University of Science and Technology Wuhan National Laboratory for Optoelectronics Wuhan China National Key Laboratory of Modeling and Simulation for Complex Systems Beijing China
In this study, we present a middleware-based approach for detecting anomalies in distributed systems. Our method facilitates the dynamic collection of logs at various levels of detail and incorporates an a priori dict... 详细信息
来源: 评论
Detecting Duplicate Contributions in Pull-Based Model CombiningTextual and Change Similarities
收藏 引用
Journal of computer Science & technology 2021年 第1期36卷 191-206页
作者: Zhi-Xing Li Yue Yu Tao Wang Gang Yin Xin-Jun Mao Huai-Min Wang Key Laboratory of Parallel and Distributed Computing College of ComputerNational University of Defense Technology Changsha 410073China Laboratory of Software Engineering for Complex Systems College of ComputerNational University of Defense TechnologyChangsha 410073China
Communication and coordination between OSS developers who do not work physically in the same location have always been the challenging *** pull-based development model,as the state-of-art collaborative development mec... 详细信息
来源: 评论
Text-Guided Attention is All You Need for Zero-Shot Robustness in Vision-Language Models  38
Text-Guided Attention is All You Need for Zero-Shot Robustne...
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Yu, Lu Zhang, Haiyang Xu, Changsheng School of Computer Science and Engineering Tianjin University of Technology China State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation University of Chinese Academy of Sciences China
Due to the impressive zero-shot capabilities, pre-trained vision-language models (e.g. CLIP), have attracted widespread attention and adoption across various domains. Nonetheless, CLIP has been observed to be suscepti...
来源: 评论
Scavenger: Better Space-Time Trade-Offs for Key-Value Separated LSM-trees  40
Scavenger: Better Space-Time Trade-Offs for Key-Value Separa...
收藏 引用
40th IEEE International Conference on Data Engineering, ICDE 2024
作者: Zhang, Jianshun Wang, Fang Qiu, Sheng Wang, Yi Ou, Jiaxin Huang, Junxun Li, Baoquan Fang, Peng Feng, Dan School of Computer Science and Technology Huazhong University of Science and Technology Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of Data Storage Systems and Technology Ministry of Education of China China Shenzhen Huazhong University of Science and Technology Research Institute China Bytefrance Inc.
Key-Value Stores (KVS) implemented with log-structured merge-tree (LSM-tree) have gained widespread ac-ceptance in storage systems. Nonetheless, a significant challenge arises in the form of high write amplification d... 详细信息
来源: 评论
Optimization of Grayscale Image Security through the use of Hybrid Cryptographic Techniques based on Sine and Logistics Maps  4
Optimization of Grayscale Image Security through the use of ...
收藏 引用
4th International Conference on Innovative Research in Applied Science, Engineering and technology, IRASET 2024
作者: Koulouh, Fatima Safae, Amine Es-Sabry, Mohammed Mostafa, Merras Elakkad, Nabile Sidi Mohamed Ben Abdellah University Department Of Computer Science Morocco Abdelmalek Essaadi University Laboratory Of Information Security Intelligent Systems And Applications Tetouan Morocco High School Of Technology Moulay Ismail University Image Laboratory Morocco Sidi Mohamed Ben Abdellah University Laboratory Of Engineering Systems And Applications Morocco
This paper presents an innovative method for enhancing security improve the security of grayscale images by integrating hybrid cryptographic techniques, specifically taking advantage of the sine map and a dual applica... 详细信息
来源: 评论
CBi-GRU: Post-route timing path analysis method based on combined bidirectional GRU  8
CBi-GRU: Post-route timing path analysis method based on com...
收藏 引用
8th International Conference on Integrated Circuits and Microsystems, ICICM 2023
作者: Wang, Bin Huang, Pengcheng You, Huiqing Wang, Yaohua Key Laboratory of Advanced Microprocessor Chips and Systems Changsha China National University of Defense Technology College of Computer Science Changsha China Changsha University of Science and Technology School of Computer and Communication Engineering Changsha China
As the level of circuit integration increases, the physical design becomes more and more complex, iterative static timing analysis(STA) is one of the most time-consuming task to achieve timing closure. After the route... 详细信息
来源: 评论
Research on Polarization Imaging Target Detection Method Based on Multi-View  3
Research on Polarization Imaging Target Detection Method Bas...
收藏 引用
3rd International Conference on computer Graphics, Image, and Virtualization, ICCGIV 2023
作者: Cui, Hao Wang, Xin Pu, Xiankun Shi, Lei Zhou, Zhiqiang Gao, Jun School of Computer and Information Hefei University of Technology Hefei230009 China Intelligent Interconnected Systems Laboratory of Anhui Province Hefei230009 China
Traditional multi-view target detection can only obtain the light intensity information of the target, and its detection ability is very limited in complex environments;Traditional polarization target detection mainly... 详细信息
来源: 评论
UAV-Assisted Dynamic Avatar Task Migration for Vehicular Metaverse Services: A Multi-Agent Deep Reinforcement Learning Approach
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第2期11卷 430-445页
作者: Jiawen Kang Junlong Chen Minrui Xu Zehui Xiong Yutao Jiao Luchao Han Dusit Niyato Yongju Tong Shengli Xie IEEE School of Automation Guangdong University of TechnologyGuangzhou 510006China 111 Center for Intelligent Batch Manufacturing based on IoT Technology Guangzhou 510006China Key Laboratory of Intelligent Information Processing and System Integration of IoT Ministry of EducationGuangzhou 510006China School of Computer Science and Engineering Nanyang Technological UniversitySingaporeSingapore Pillar of Information Systems Technology and Design Singapore University of Technology and DesignSingaporeSingapore College of Communication Engineering Army Engineering University of PLANanjing 210007China National Natural Science Foundation of China Beijing 100085China Key Laboratory of Intelligent Detection and IoT in Manufacturing Ministry of EducationGuangzhou 510006China Guangdong Key Laboratory of IoT Information Technology Guangzhou 510006China
Avatars, as promising digital representations and service assistants of users in Metaverses, can enable drivers and passengers to immerse themselves in 3D virtual services and spaces of UAV-assisted vehicular Metavers... 详细信息
来源: 评论
Zero-Phase Virtual Sampling-Based Anti-disturbance Repetitive Control for Permanent Magnet Synchronous Generators
收藏 引用
IEEE Transactions on Energy Conversion 2024年 第2期40卷 950-958页
作者: Wei, Chun Song, Chenlong Zhang, Cheng Qiao, Wei Shen, Yangwu Zhejiang University of Technology College of Information Engineering Zhejiang Hangzhou310023 China University of Nebraska-Lincoln Power and Energy Systems Laboratory Department of Electrical and Computer Engineering LincolnNE68588-0511 United States China Three Gorges Corporation Wuhan Science and Technology Innovation Park Hubei Wuhan430010 China
This paper proposes an active disturbance rejection zero-phase virtual sampling repetitive control (ADR-ZVSRC) for permanent magnet synchronous generator (PMSG)-based wind energy conversion systems (WECSs) to mitigate... 详细信息
来源: 评论