咨询与建议

限定检索结果

文献类型

  • 6,218 篇 期刊文献
  • 4,778 篇 会议
  • 5 册 图书

馆藏范围

  • 11,001 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,484 篇 工学
    • 4,545 篇 计算机科学与技术...
    • 3,801 篇 软件工程
    • 1,604 篇 信息与通信工程
    • 928 篇 电气工程
    • 855 篇 控制科学与工程
    • 773 篇 生物工程
    • 772 篇 化学工程与技术
    • 744 篇 电子科学与技术(可...
    • 554 篇 光学工程
    • 531 篇 生物医学工程(可授...
    • 519 篇 机械工程
    • 368 篇 材料科学与工程(可...
    • 357 篇 仪器科学与技术
    • 315 篇 动力工程及工程热...
    • 294 篇 交通运输工程
    • 232 篇 建筑学
    • 227 篇 土木工程
  • 4,379 篇 理学
    • 2,086 篇 数学
    • 1,294 篇 物理学
    • 964 篇 生物学
    • 682 篇 统计学(可授理学、...
    • 627 篇 化学
    • 313 篇 系统科学
  • 1,926 篇 管理学
    • 1,116 篇 管理科学与工程(可...
    • 884 篇 图书情报与档案管...
    • 364 篇 工商管理
  • 538 篇 医学
    • 438 篇 临床医学
    • 324 篇 基础医学(可授医学...
    • 220 篇 药学(可授医学、理...
  • 276 篇 法学
    • 229 篇 社会学
  • 248 篇 农学
  • 159 篇 经济学
  • 88 篇 教育学
  • 33 篇 军事学
  • 30 篇 文学
  • 17 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 261 篇 semantics
  • 223 篇 feature extracti...
  • 208 篇 deep learning
  • 162 篇 data mining
  • 135 篇 computational mo...
  • 127 篇 training
  • 125 篇 machine learning
  • 114 篇 convolution
  • 113 篇 knowledge engine...
  • 101 篇 neural networks
  • 99 篇 predictive model...
  • 98 篇 image segmentati...
  • 94 篇 computer science
  • 91 篇 data models
  • 90 篇 object detection
  • 88 篇 reinforcement le...
  • 88 篇 accuracy
  • 83 篇 optimization
  • 82 篇 laboratories
  • 77 篇 educational inst...

机构

  • 394 篇 college of compu...
  • 306 篇 university of ch...
  • 256 篇 key laboratory o...
  • 174 篇 iccub universita...
  • 173 篇 infn sezione di ...
  • 171 篇 department of ph...
  • 166 篇 school of inform...
  • 160 篇 infn sezione di ...
  • 158 篇 horia hulubei na...
  • 152 篇 h.h. wills physi...
  • 151 篇 yandex school of...
  • 147 篇 van swinderen in...
  • 138 篇 universiteit maa...
  • 124 篇 massachusetts in...
  • 116 篇 national researc...
  • 113 篇 warsaw
  • 113 篇 university of ci...
  • 113 篇 university of ma...
  • 112 篇 université clerm...
  • 111 篇 lpnhe sorbonne u...

作者

  • 117 篇 beiter a.
  • 117 篇 arzymatov k.
  • 116 篇 barter w.
  • 114 篇 brundu d.
  • 110 篇 bellee v.
  • 102 篇 bowcock t.j.v.
  • 102 篇 casse g.
  • 101 篇 bobulska d.
  • 100 篇 blake t.
  • 99 篇 borsato m.
  • 99 篇 betancourt c.
  • 99 篇 belin s.
  • 96 篇 afsharnia h.
  • 94 篇 belavin v.
  • 92 篇 bediaga i.
  • 90 篇 cali s.
  • 86 篇 amato s.
  • 85 篇 baryshnikov f.
  • 83 篇 bjørn m.
  • 77 篇 niyato dusit

语言

  • 10,217 篇 英文
  • 516 篇 其他
  • 268 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Data Engineering and Knowledge Engineering Key Laboratory"
11001 条 记 录,以下是4951-4960 订阅
排序:
Convergence acceleration for multiobjective sparse reconstruction via knowledge transfer  10th
Convergence acceleration for multiobjective sparse reconstru...
收藏 引用
10th International Conference on Evolutionary Multi-Criterion Optimization, EMO 2019
作者: Yan, Bai Zhao, Qi Zhang, J. Andrew Li, Yonghui Wang, Zhihai Institute of Laser Engineering Beijing University of Technology Beijing China College of Economics and Management Beijing University of Technology Beijing China Global Big Data Technologies Centre University of Technology Sydney Sydney Australia School of Electrical and Information Engineering University of Sydney Sydney Australia Key Laboratory of Optoelectronics Technology Ministry of Education Beijing University of Technology Beijing China
Multiobjective sparse reconstruction (MOSR) methods can potentially obtain superior reconstruction performance. However, they suffer from high computational cost, especially in high-dimensional reconstruction. Further... 详细信息
来源: 评论
Heuristics Propositional Extension Rule Method
Heuristics Propositional Extension Rule Method
收藏 引用
International Conference on Innovative Computing, Information and Control (ICICIC)
作者: Xia Wu Haihong Yu Ying Li College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering Ministry of Education Changchun China
Theorem proving based on the extension rule is a new reasoning method. Based on the extension rule algorithm RIER, this paper presents a more efficient algorithm HRIER, which uses the heuristic strategy to guide the c... 详细信息
来源: 评论
Enhancing GPSR's credibility using experienced trustiness for VANET
收藏 引用
Journal of Computational Information Systems 2010年 第8期6卷 2537-2544页
作者: Liu, Yanheng He, Junting Wang, Jian College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
Vehicular ad hoc network (VANET) is a kind of self-organizing ad hoc network, which is specifically designed for communication among vehicles. In VANET, a source vehicle must rely on intermediate vehicles to forward i... 详细信息
来源: 评论
ROD: Reception-aware online distillation for sparse graphs
arXiv
收藏 引用
arXiv 2021年
作者: Zhang, Wentao Jiang, Yuezihan Li, Yang Sheng, Zeang Shen, Yu Miao, Xupeng Wang, Liang Yang, Zhi Cui, Bin School of EECS Key Laboratory of High Confidence Software Technologies Peking University Center for Data Science Peking University National Engineering Laboratory for Big Data Analysis and Applications Alibaba Group
Graph neural networks (GNNs) have been widely used in many graph-based tasks such as node classification, link prediction, and node clustering. However, GNNs gain their performance benefits mainly from performing the ... 详细信息
来源: 评论
Weakly supervised prototype topic model with discriminative seed words: Modifying the category prior by self-exploring supervised signals
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Bing Wang, Yue Li, Ximing Ouyang, Jihong College of Computer Science and Technology Jilin University China Key Laboratory of Symbolic Computation Knowledge Engineering of Ministry of Education Jilin University China
dataless text classification, i.e., a new paradigm of weakly supervised learning, refers to the task of learning with unlabeled documents and a few predefined representative words of categories, known as seed words. T... 详细信息
来源: 评论
eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI Defense  1
收藏 引用
18th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2022
作者: Zhang, Tianning Cai, Miao Zhang, Diming Huang, Hao Department of Computer Science and Technology Nanjing University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China School of Computer and Information Hohai University Nanjing China College of Computer Engineering Jiangsu University of Science and Technology Nanjing China
Signal Return Oriented Programming (SROP) is a dangerous code reuse attack method. Recently, defense techniques have been proposed to defeat SROP attacks. In this paper, we leverage the signal nesting mechanism provid... 详细信息
来源: 评论
Terahertz metamaterial narrowband absorber based on metal split ring
Terahertz metamaterial narrowband absorber based on metal sp...
收藏 引用
2023 Applied Optics and Photonics China: Optical Sensing, Imaging, and Display Technology and Applications;and Biomedical Optics, AOPC 2023
作者: Ji, Xiaodi Ge, Hongyi Jiang, Yuying Wu, Xuyang Jia, Zhiyuan Sun, Zhenyu Key Laboratory of Grain Information Processing and Control Henan University of Technology Ministry of Education Henan China Henan Provincial Key Laboratory of Grain Photoelectric Detection and Control Henan China College of Information Science and Engineering Henan University of Technology Henan Zhengzhou450001 China School of Artificial Intelligence and Big Data Henan University of Technology Henan Zhengzhou450001 China
Multi-band terahertz metamaterial absorbers offer new perspectives to achieve perfect absorption and multipoint information matching, which enable an ever-growing number of applications. In this study, a dual-band ter... 详细信息
来源: 评论
A direction-based search algorithm in P2P network
收藏 引用
Journal of Computational Information Systems 2010年 第1期6卷 25-31页
作者: Liu, Xiaonan Fang, Zhiyi Tang, Huanhuan College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
We researched one search algorithm based on direction in the unstructured P2P network, analyzed the limited insufficiencies of this algorithm to the search speed, we proposed the improved direction search algorithm ba... 详细信息
来源: 评论
Panicle-Cloud:An Open and Al-Powered Cloud Computing Platform for Quantifying Rice Panicles from Drone-Collected Imagery to Enable the Classification of Yield Production in Rice
收藏 引用
Plant Phenomics 2023年 第4期5卷 905-916页
作者: Zixuan Teng Jiawei Chen Jian Wang Shuixiu Wu Riqing Chen Yaohai Lin Liyan Shen Robert Jackson Ji Zhou Changcai Yang Digital Fujian Research Institute of Big Data for Agriculture and Forestry College of Computer and Information SciencesFujian Agriculture and Forestry UniversityFuzhou 350002China State Key Laboratory of Crop Genetics&Germplasm Enhancement academy for Advanced Interdisciplinary StudiesNanjing Agricultural UniversityNanjing 210095China Ningxia Academy of Agriculture and Forestry Sciences Yinchuan 750002China College of Mechanical and Electrical Engineering Fujian Agriculture and Forestry UniversityFuzhou 350002China Cambridge Crop Research National Institute of Agricultural Botany(NIAB)Cambridge CB3 OLEUK Key Laboratory of Smart Agriculture and Forestry(Fujian Agriculture and Forestry University) Fujian Province UniversityFuzhou 350002China Center for Agroforestry Mega Data Science School of Future TechnologyFujian Agriculture and Forestry UniversityFuzhou 350002China
Rice(Oryza sativa)is an essential stable food for many rice consumption nations in the world and,thus,the importance to improve its yield production under global climate *** evaluate different rice varieties'yield... 详细信息
来源: 评论
Improved (Pseudo) preimage attacks on reduced-round GOST and Grøstl-256 and studies on several truncation patterns for AES-like compression functions  10th
Improved (Pseudo) preimage attacks on reduced-round GOST and...
收藏 引用
10th International Workshop on Security, IWSEC 2015
作者: Ma, Bingke Li, Bao Hao, Ronglin Li, Xiaoqian State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Data Assurance and Communication Security Research Center Chinese Academy of Sciences Beijing100093 China University of Chinese Academy of Sciences Beijing China Department of Electronic Engineering and Information Science University of Science and Technology of China Hefei230027 China
In this paper, we present improved preimage attacks on the reduced-round GOST hash function family, which serves as the new Russian hash standard, with the aid of techniques such as the rebound attack, the Meet-in-the... 详细信息
来源: 评论