咨询与建议

限定检索结果

文献类型

  • 4,861 篇 会议
  • 4,828 篇 期刊文献
  • 62 册 图书

馆藏范围

  • 9,751 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,336 篇 工学
    • 4,100 篇 计算机科学与技术...
    • 3,269 篇 软件工程
    • 1,474 篇 信息与通信工程
    • 876 篇 控制科学与工程
    • 731 篇 电气工程
    • 706 篇 电子科学与技术(可...
    • 595 篇 生物工程
    • 469 篇 机械工程
    • 404 篇 光学工程
    • 364 篇 生物医学工程(可授...
    • 321 篇 仪器科学与技术
    • 264 篇 动力工程及工程热...
    • 243 篇 化学工程与技术
    • 192 篇 交通运输工程
    • 190 篇 核科学与技术
    • 167 篇 材料科学与工程(可...
    • 164 篇 建筑学
  • 3,532 篇 理学
    • 1,621 篇 数学
    • 1,190 篇 物理学
    • 662 篇 生物学
    • 562 篇 统计学(可授理学、...
    • 363 篇 系统科学
    • 261 篇 化学
  • 1,683 篇 管理学
    • 1,061 篇 管理科学与工程(可...
    • 662 篇 图书情报与档案管...
    • 403 篇 工商管理
  • 400 篇 医学
    • 343 篇 临床医学
    • 270 篇 基础医学(可授医学...
    • 168 篇 药学(可授医学、理...
  • 273 篇 法学
    • 225 篇 社会学
  • 150 篇 经济学
  • 117 篇 农学
  • 73 篇 教育学
  • 49 篇 文学
  • 34 篇 军事学
  • 26 篇 艺术学
  • 6 篇 哲学
  • 4 篇 历史学

主题

  • 262 篇 computer science
  • 189 篇 deep learning
  • 176 篇 feature extracti...
  • 166 篇 semantics
  • 152 篇 computational mo...
  • 129 篇 data mining
  • 126 篇 machine learning
  • 124 篇 optimization
  • 118 篇 laboratories
  • 115 篇 educational inst...
  • 109 篇 training
  • 107 篇 algorithm design...
  • 97 篇 accuracy
  • 92 篇 quality of servi...
  • 91 篇 routing
  • 91 篇 protocols
  • 90 篇 support vector m...
  • 88 篇 servers
  • 87 篇 computer archite...
  • 81 篇 predictive model...

机构

  • 766 篇 department of co...
  • 291 篇 department for p...
  • 289 篇 faculty of scien...
  • 282 篇 department of ph...
  • 281 篇 departamento de ...
  • 274 篇 department of ph...
  • 270 篇 kirchhoff-instit...
  • 267 篇 department of ph...
  • 265 篇 institute of phy...
  • 262 篇 department of ph...
  • 257 篇 faculté des scie...
  • 246 篇 fakultät für phy...
  • 246 篇 institute of phy...
  • 239 篇 institut für ast...
  • 228 篇 yerevan physics ...
  • 223 篇 department of ph...
  • 222 篇 department of ph...
  • 219 篇 physics division...
  • 214 篇 department of ph...
  • 209 篇 department of ph...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 266 篇 a. c. könig
  • 265 篇 f. siegert
  • 263 篇 m. klein
  • 263 篇 r. ströhmer
  • 263 篇 m. rijssenbeek
  • 263 篇 s. jin
  • 262 篇 g. gaudio
  • 262 篇 s. mohapatra
  • 261 篇 y. nagasaka
  • 260 篇 h. a. gordon
  • 260 篇 h. sakamoto
  • 258 篇 s. guindon
  • 254 篇 a. kaczmarska

语言

  • 9,169 篇 英文
  • 315 篇 其他
  • 269 篇 中文
  • 2 篇 日文
检索条件"机构=Department of Computer Information System Beijing Information Science&Technology University"
9751 条 记 录,以下是1-10 订阅
排序:
UDI-3DVT: A Novel Network for 3-D Reconstruction via Uncertainty-Driven Sampling and Incremental Visual-Tactile Fusion
收藏 引用
IEEE Sensors Journal 2025年 第6期25卷 10358-10369页
作者: Zhang, Chenyang Zhang, Shaohua Li, Yao Chen, Wenbai Gao, Guowei Wu, Peiliang Yanshan University Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province School of Information Science and Engineering Qinhuangdao066004 China Beijing Information Science and Technology University School of Automation Beijing100192 China
The fusion of visual and tactile senses allows robots to reconstruct and understand objects, aiding in downstream tasks such as object recognition and object grasping. However, most existing visual-tactile reconstruct... 详细信息
来源: 评论
Unsupervised Meteorological Downscaling Based on Dual Learning and Subgrid-scale Auxiliary information
收藏 引用
Advances in Atmospheric sciences 2025年 第1期42卷 53-66页
作者: Jing HU Jialing MU Xiaomeng HUANG Xi WU Department of Computer Science Chengdu University of Information TechnologyChengdu 610225China Department of Earth System Science Ministry of Education Key Laboratory for Earth System ModelingInstitute for Global Change StudiesTsinghua UniversityBeijing 100084China
Climate downscaling is used to transform large-scale meteorological data into small-scale data with enhanced detail,which finds wide applications in climate modeling,numerical weather forecasting,and renewable *** dee... 详细信息
来源: 评论
DualRec: A Collaborative Training Framework for Device and Cloud Recommendation Models
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 5202-5213页
作者: Zhang, Ye Deng, Yongheng Yue, Sheng Li, Qiushi Ren, Ju Beijing Information Science and Technology University School of Computer Science Beijing100101 China Tsinghua University Department of Computer Science and Technology BNRist Beijing100084 China Zhongguancun Laboratory Beijing100084 China
Recommendation systems (RS) play a vital role in various domains. However, under recent data regulations like General Data Protection Regulation (GDPR), traditional RS that rely on collecting user's interaction da... 详细信息
来源: 评论
Advanced Machine Learning Approaches for Breast Cancer Detection with Neutrosophic Sets
收藏 引用
Neutrosophic Sets and systems 2025年 81卷 273-284页
作者: Elbehiery, Hussam Fathi, Hanaa Eassa, Mohamed Abdelhafeez, Ahmed Abdellah, Mohamed Refaat Mahmoud, Hadeer Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt College of Information Technology Amman Arab University Amman Jordan Applied Science Research Center Applied Science Private University Amman Jordan The Department of Computer Science College of Information Technology Misr University for Science and Technology Cairo Egypt Department of Artificial Intelligence Faculty of Computers and Artificial Intelligence Modern University for Technology & Information Cairo Egypt
Breast Cancer (BC) remains a significant health challenge for women and is one of the leading causes of mortality worldwide. Accurate diagnosis is critical for successful therapy and increased survival rates. Recent a... 详细信息
来源: 评论
Single-Valued Neutrosophic Graph with Heptapartitioend Structure
收藏 引用
Neutrosophic Sets and systems 2025年 80卷 728-748页
作者: Fathi, Hanaa Myvizhi, M. Abdelhafeez, Ahmed Abdellah, Mohamed Refaat Eassa, Mohamed Sawah, Mohamed S. Elbehiery, Hussam College of Information Technology Amman Arab University Amman Jordan KPR Institute of Engineering and Technology Tamilnadu Coimbatore India Computer Science Department Faculty of Information System and Computer Science October 6 University Giza12585 Egypt Applied Science Research Center Applied Science Private University Amman Jordan The Department of Computer Science College of Information Technology Misr University for Science and Technology Cairo Egypt Department of Computer Science Faculty of Information Technology Ajloun National University P.O.43 Ajloun26810 Jordan
This study applies single-valued neutrosophic sets, which extend the frameworks of fuzzy and intuitionistic fuzzy sets, to graph theory. We introduce a new category of graphs called Single-Valued Heptapartitioned Neut... 详细信息
来源: 评论
Robust Detection of Malicious Encrypted Traffic via Contrastive Learning
收藏 引用
IEEE Transactions on information Forensics and Security 2025年 20卷 4228-4242页
作者: Shen, Meng Wu, Jinhe Ye, Ke Xu, Ke Xiong, Gang Zhu, Liehuang Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Beijing Institute of Technology School of Computer Science Beijing100081 China Tsinghua University Department of Computer Science and Technology Beijing100084 China Institute of Information Engineering Chinese Academy of Sciences Beijing100190 China
Traffic encryption is widely used to protect communication privacy but is increasingly exploited by attackers to conceal malicious activities. Existing malicious encrypted traffic detection methods rely on large amoun... 详细信息
来源: 评论
Diffusion models for 3D generation: A survey
收藏 引用
Computational Visual Media 2025年 第1期11卷 1-28页
作者: Chen Wang Hao-Yang Peng Ying-Tian Liu Jiatao Gu Shi-Min Hu Department of Computer and Information Science University of PennsylvaniaPhiladelphiaPennsylvania 19104USA Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China Machine Learning Research Apple AI/MLNew YorkUSA.E-mail:jiatao@***
Denoising diffusion models have demonstrated tremendous success in modeling data distributions and synthesizing high-quality *** the 2D image domain,they have become the state-of-the-art and are capable of generating ... 详细信息
来源: 评论
A novel U-net model for brain tumor segmentation from MRI images
收藏 引用
Alexandria Engineering Journal 2025年 126卷 220-230页
作者: Obayya, Marwa Alshuhail, Asma Mahmood, Khalid Alanazi, Meshari H. Alqahtani, Mohammed Aljehane, Nojood O. Almansour, Hamad Al-Hagery, Mohammed Abdullah Department of Biomedical Engineering College of Engineering Princess Nourah bint Abdulrahman University PO Box 84428 Riyadh11671 Saudi Arabia Department of Information Systems College of Computer Sciences & Information Technology King Faisal university Saudi Arabia Department of Information Systems Applied College at Mahayil King Khalid University Saudi Arabia Department of Computer Science College of Sciences Northern Border University Arar Saudi Arabia Department of Information System and Cyber Security College of Computing and Information Technology University of Bisha Bisha61922 Saudi Arabia Department of Computer Science Faculty of Computers and Information Technology University of Tabuk Tabuk Saudi Arabia Applied Collage Najran University Najran Saudi Arabia Department of Computer Science College of Computer Qassim University Saudi Arabia
Segmentation of brain tumors aids in diagnosing the disease early, planning treatment, and monitoring its progression in medical image analysis. Automation is necessary to eliminate the time and variability associated... 详细信息
来源: 评论
Blockchain-Driven Secure Data Sharing Framework for Edge Computing Networks
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 978-997页
作者: Fuad A.M.Al-Yarimi Ramzi Salah Khaled Mohamoud Department of Computer Science King Khalid UniversityMuhayel Aseer 62529Saudi Arabia Faculty of Information Science and Technology University Kebangassan MalaysiaBangi 43600Malaysia Department of Information System King Khalid UniversityMuhayel Aseer 62529Saudi Arabia
This study examines secure and effective data sharing methods for edge computing *** methods of sharing data at the edge have issues with security,speed,and *** goal is to develop a Blockchain-based Secure Data Sharin... 详细信息
来源: 评论
Absorbing Time Synchronization Errors Using Shadow Queues in Time-Sensitive Networking
收藏 引用
IEEE Internet of Things Journal 2025年 第9期12卷 12912-12926页
作者: Yang, Hao Zhang, Tong Feng, Xiaoqin Ma, Yanying Zhang, Liwei Ren, Fengyuan Lanzhou University School of Information Science and Engineering Lanzhou730000 China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing210016 China Tsinghua University Department of Computer Science and Technology Beijing100084 China
Time-sensitive networking (TSN) is widely used in industrial automation and automotive applications due to its ability to provide deterministic transmission. To meet the stringent deterministic requirements of time-se... 详细信息
来源: 评论