咨询与建议

限定检索结果

文献类型

  • 60,080 篇 会议
  • 33,533 篇 期刊文献
  • 743 册 图书
  • 61 篇 专利
  • 3 篇 学位论文
  • 1 篇 科技报告

馆藏范围

  • 94,421 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 56,109 篇 工学
    • 39,564 篇 计算机科学与技术...
    • 31,721 篇 软件工程
    • 11,575 篇 信息与通信工程
    • 8,061 篇 控制科学与工程
    • 6,099 篇 电气工程
    • 5,917 篇 生物工程
    • 5,449 篇 电子科学与技术(可...
    • 3,993 篇 生物医学工程(可授...
    • 3,989 篇 机械工程
    • 3,909 篇 光学工程
    • 2,957 篇 化学工程与技术
    • 2,590 篇 仪器科学与技术
    • 2,550 篇 动力工程及工程热...
    • 2,310 篇 材料科学与工程(可...
    • 1,911 篇 安全科学与工程
    • 1,837 篇 交通运输工程
    • 1,797 篇 网络空间安全
  • 32,591 篇 理学
    • 16,698 篇 数学
    • 10,858 篇 物理学
    • 6,698 篇 生物学
    • 5,208 篇 统计学(可授理学、...
    • 3,346 篇 系统科学
    • 3,245 篇 化学
  • 15,179 篇 管理学
    • 8,985 篇 管理科学与工程(可...
    • 6,906 篇 图书情报与档案管...
    • 4,243 篇 工商管理
  • 3,954 篇 医学
    • 3,338 篇 临床医学
    • 2,937 篇 基础医学(可授医学...
    • 1,741 篇 药学(可授医学、理...
  • 2,548 篇 法学
    • 2,141 篇 社会学
  • 1,649 篇 经济学
  • 1,384 篇 教育学
  • 1,107 篇 农学
  • 328 篇 文学
  • 195 篇 艺术学
  • 183 篇 军事学
  • 70 篇 哲学
  • 33 篇 历史学

主题

  • 2,126 篇 computational mo...
  • 1,895 篇 accuracy
  • 1,865 篇 feature extracti...
  • 1,780 篇 deep learning
  • 1,767 篇 training
  • 1,673 篇 machine learning
  • 1,362 篇 educational inst...
  • 1,278 篇 semantics
  • 1,166 篇 predictive model...
  • 1,092 篇 computer archite...
  • 1,022 篇 data models
  • 998 篇 data mining
  • 961 篇 computer science
  • 924 篇 optimization
  • 877 篇 real-time system...
  • 874 篇 neural networks
  • 847 篇 visualization
  • 834 篇 internet of thin...
  • 767 篇 artificial intel...
  • 750 篇 support vector m...

机构

  • 3,450 篇 institute of com...
  • 2,805 篇 university of ch...
  • 647 篇 institute of com...
  • 618 篇 college of compu...
  • 470 篇 school of comput...
  • 442 篇 college of intel...
  • 407 篇 key laboratory o...
  • 345 篇 university of sc...
  • 342 篇 shenyang institu...
  • 309 篇 institute of com...
  • 303 篇 faculty of compu...
  • 296 篇 department of co...
  • 207 篇 department of co...
  • 200 篇 peng cheng labor...
  • 190 篇 institute of hig...
  • 175 篇 college of compu...
  • 170 篇 college of compu...
  • 170 篇 faculty of compu...
  • 155 篇 department of co...
  • 139 篇 college of compu...

作者

  • 311 篇 hai jin
  • 225 篇 cheng xueqi
  • 215 篇 jin hai
  • 188 篇 niyato dusit
  • 158 篇 wen gao
  • 127 篇 wang lei
  • 113 篇 bastieri d.
  • 89 篇 lei wang
  • 88 篇 ferrara g.
  • 87 篇 ardid m.
  • 86 篇 chen a.
  • 85 篇 calvo d.
  • 85 篇 xiaowei li
  • 83 篇 zhang lei
  • 79 篇 li cheng
  • 77 篇 shen huawei
  • 75 篇 gao wen
  • 74 篇 fang j.
  • 74 篇 feng c.f.
  • 74 篇 wang wei

语言

  • 89,786 篇 英文
  • 3,493 篇 其他
  • 1,142 篇 中文
  • 39 篇 日文
  • 15 篇 德文
  • 12 篇 俄文
  • 8 篇 法文
  • 7 篇 西班牙文
  • 4 篇 葡萄牙文
  • 2 篇 意大利文
  • 2 篇 荷兰文
  • 2 篇 斯洛文尼亚文
  • 1 篇 捷克文
检索条件"机构=Computing Technology"
94421 条 记 录,以下是1-10 订阅
排序:
The biomedical computing technology information center (BCTIC) SHARING programs, data, and interface designs  76
The biomedical computing technology information center (BCTI...
收藏 引用
1976 ACM Annual Conference/Annual Meeting, ACM 1976
作者: Maskewitz, Betty F. Henne, R.L. McClain, W.J. Biomedical Computing Technology Information Center Oak Ridge National Laboratory Oak RidgeTN United States
In response to a recognized need to facilitate computing technology transfer in biomedicine, the Biomedical computing technology Information Center (BCTIC) was established by the Division of Biomedical and Environment... 详细信息
来源: 评论
Research on Binocular Disparity computing technology of Mobile Terminal
Research on Binocular Disparity Computing Technology of Mobi...
收藏 引用
2022 International Conference on Cloud computing, Internet of Things, and Computer Applications, CICA 2022
作者: Wang, Wenhao Liu, Yi Xu, Xintao Li, Chunpeng Institute of Computing Technology Chinese Academy of Sciences China Institute of Semiconductors Chinese Academy of Sciences China School of Microelectronics University of Sciences and Technology of China China
With the increasingly prominent application of binocular disparity computing technology in mobile terminals, how to achieve efficient and high-precision binocular disparity computing in mobile terminals with limited c... 详细信息
来源: 评论
Increase quantum computing technology readiness level through experimentation in space  70
Increase quantum computing technology readiness level throug...
收藏 引用
70th International Astronautical Congress, IAC 2019
作者: Correale, Giuseppe Cerrone, Gianluca Al-Ars, Zaid Bertels, Koen Department of Aerospace Engineering Delft University of Technology Mekelweg 5 Delft2628 CD Netherlands Business Manager Rhea Group Jonckerweg 18 Noordwijk2201 DZ Netherlands Department of Quantum Computing Delft University of Technology Mekelweg 5 Delft2628 CD Netherlands
The exploitation of quantum physics and of quantum states superposition and entanglement properties for computing applications has been studied since 1980s [1] [2] for their disrupting potential in the evolution of in... 详细信息
来源: 评论
A Hybrid Task Schedule Algorithm for Real-Time System Employing Trusted computing technology
A Hybrid Task Schedule Algorithm for Real-Time System Employ...
收藏 引用
International Conference on Computational Intelligence and Security
作者: Tingyu Jiang Yahui Li Yuan Dong Department of computer science and technology Aeronautics Computing Technique Research Institute Xi'an China Aeronautics Computing Technique Research Institute Xi'an China Department of computer science and technology Tsinghua University Beijing China
Security has been a serious concern in more and more embedded systems. But restricted by the constrained resources in embedded system, security may damage the system real-time performance, we refer to this challenge a... 详细信息
来源: 评论
Cloud agent-based encryption mechanism (caem): A security framework model for improving adoption, implementation and usage of cloud computing technology
Cloud agent-based encryption mechanism (caem): A security fr...
收藏 引用
2020 International Conference on Advances in computing, Communication and Materials, ICACCM 2020
作者: Lata, Kiran Ahmad, Salim Kumar, Sanjeev Singh, Deepali Nims University Department of Education Rajasthan India Faculty of Computing It Federal University Department of Information Technology Dutse Nigeria Tulas Institute Dehradun Department of Computer Application Uttarakhand India School of Humanties and Social Science Nims University Rajashtan India
Fast Growth of (ICT) Information and Communication technology results to Innovation of Cloud computing and is considered as a key driver for technological innovations, as an IT innovations, cloud computing had added a... 详细信息
来源: 评论
Ensemble subsurface modeling using grid computing technology
Ensemble subsurface modeling using grid computing technology
收藏 引用
2nd International Multi-Symposiums on Computer and Computational Sciences 2007, IMSCCS'07
作者: Li, Xin Lei, Zhou White, Christopher D. Allen, Gabrielle Qin, Guan Tsai, Frank T.-C. Center for Computation and Technology Louisiana State University United States Department of Petroleum Engineering Louisiana State University United States Department of Civil and Environmental Engineering Louisiana State University United States Institute of Scientific Computing Texas A and M University United States
Ensemble Kalman Filter (EnKF) uses a randomized ensemble of subsurface models for error and uncertainty estimation. However, the complexity of geological models and the requirement of a large number of simulation runs... 详细信息
来源: 评论
A Review on Fog computing technology
A Review on Fog Computing Technology
收藏 引用
IEEE International Conference on Systems, Man, and Cybernetics
作者: Firas Al-Doghman Zenon Chaczko Alina Rakhi Ajayan Ryszard Klempous Centre for Innovation in IT Services and Applications (iNEXT) School of Computing & Communications Faculty of Engineering & IT University of Technology Sydney - 2007 NSW Australia Faculty of Electronics Wroclaw University of Technology Poland
Out of the many computing and software oriented models that are being adopted by Computer Networking, Fog computing has captured quite a wide audience in Research and Industry. There is a lot of confusion on its preci... 详细信息
来源: 评论
Intelligence computing technology for UAV's Autonomy
Intelligence Computing Technology for UAV's Autonomy
收藏 引用
International Conference on Computational Intelligence and Security
作者: Pengcheng Wen Yadi Zhang Yahui Li Xiaoan Li Aviation Key Laboratory of Science and Technology AVIC Computing Technique Research Institute Xi'an China College of Computer Science Northwestern Polytechnical University Xi'an China
UAV has been more and more applied in the military and civil domain. It needs to have the capability to perform some autonomous tasks to ensure its mission's success under the complex electromagnetic conditions. H... 详细信息
来源: 评论
Home appliance control and monitoring system model based on cloud computing technology
Home appliance control and monitoring system model based on ...
收藏 引用
4th International Conference on Mobile, Ubiquitous, and Intelligent computing, MUSIC 2013
作者: Cui, Yun Kim, Myoungjin Kum, Seung-Woo Jung, Jong-Jin Lim, Tae-Beom Lee, Hanku Choi, Okkyung Department of Internet and Multimedia Engineering Konkuk University Seoul Korea Republic of Center for Social Media Cloud Computing Konkuk University Neungdong-Ro 120 Gwangjin-Gu Seoul Korea Republic of 3 Digital Media Research Center Korea Electronic Technology Institute Electronics Center No 1599 Sangam-dong Seoul 121-835 Korea Republic of
With the development of intelligent home appliance technology, real-time home appliance status information is now generated in large quantities. New technology is necessary in order to process the large amount of stat... 详细信息
来源: 评论
AN ENHANCED SCHEME OF ENFORCING DTE SECURITY POLICY BASED ON TRUSTED computing technology
AN ENHANCED SCHEME OF ENFORCING DTE SECURITY POLICY BASED ON...
收藏 引用
2008 International Conference on Machine Learning and Cybernetics(2008机器学习与控制论国际会议)
作者: WEI-PENG LIU XIAO-DONG ZUO QIANG HUANG The State Key Laboratory of Information Security of Graduate School of Chinese Academy of Science B China Information Security Certification Center Beijing 100020 China Naval Institute of Computing Technology Beijing 100841 China
As a classical security policy, DTE (Domain and Type Enforcement) is usually used to protect the integrity of information and implemented in many famous security operating systems. But there arc three main questions f... 详细信息
来源: 评论