咨询与建议

限定检索结果

文献类型

  • 16,823 篇 期刊文献
  • 14,798 篇 会议
  • 169 册 图书

馆藏范围

  • 31,790 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18,995 篇 工学
    • 10,781 篇 计算机科学与技术...
    • 8,454 篇 软件工程
    • 3,653 篇 信息与通信工程
    • 3,086 篇 电子科学与技术(可...
    • 2,856 篇 电气工程
    • 2,175 篇 光学工程
    • 2,145 篇 控制科学与工程
    • 2,072 篇 生物工程
    • 1,794 篇 生物医学工程(可授...
    • 1,459 篇 化学工程与技术
    • 1,340 篇 材料科学与工程(可...
    • 1,174 篇 机械工程
    • 1,154 篇 仪器科学与技术
    • 889 篇 动力工程及工程热...
    • 597 篇 力学(可授工学、理...
  • 14,026 篇 理学
    • 7,056 篇 物理学
    • 4,975 篇 数学
    • 2,630 篇 生物学
    • 1,780 篇 统计学(可授理学、...
    • 1,701 篇 化学
    • 941 篇 系统科学
    • 897 篇 地球物理学
  • 4,226 篇 管理学
    • 2,601 篇 管理科学与工程(可...
    • 1,680 篇 图书情报与档案管...
    • 1,080 篇 工商管理
  • 2,032 篇 医学
    • 1,669 篇 临床医学
    • 1,296 篇 基础医学(可授医学...
    • 775 篇 药学(可授医学、理...
    • 605 篇 公共卫生与预防医...
  • 738 篇 法学
    • 591 篇 社会学
  • 439 篇 农学
  • 394 篇 经济学
  • 378 篇 教育学
  • 135 篇 文学
  • 66 篇 军事学
  • 54 篇 艺术学
  • 6 篇 哲学
  • 6 篇 历史学

主题

  • 873 篇 computer science
  • 499 篇 deep learning
  • 349 篇 feature extracti...
  • 338 篇 machine learning
  • 307 篇 computational mo...
  • 257 篇 accuracy
  • 210 篇 computer archite...
  • 209 篇 semantics
  • 208 篇 application soft...
  • 206 篇 support vector m...
  • 205 篇 routing
  • 198 篇 data mining
  • 196 篇 internet of thin...
  • 196 篇 image segmentati...
  • 191 篇 training
  • 173 篇 galaxies
  • 160 篇 artificial intel...
  • 158 篇 throughput
  • 152 篇 reinforcement le...
  • 151 篇 hadron colliders

机构

  • 1,044 篇 cavendish labora...
  • 977 篇 department of ph...
  • 923 篇 oliver lodge lab...
  • 905 篇 physikalisches i...
  • 901 篇 infn laboratori ...
  • 847 篇 infn sezione di ...
  • 820 篇 infn sezione di ...
  • 806 篇 infn sezione di ...
  • 649 篇 university of ch...
  • 647 篇 infn sezione di ...
  • 636 篇 infn sezione di ...
  • 600 篇 infn sezione di ...
  • 525 篇 fakultät physik ...
  • 515 篇 school of physic...
  • 508 篇 yerevan physics ...
  • 483 篇 horia hulubei na...
  • 474 篇 iccub universita...
  • 465 篇 school of physic...
  • 464 篇 h.h. wills physi...
  • 454 篇 department of ph...

作者

  • 374 篇 j. wang
  • 237 篇 barter w.
  • 234 篇 beiter a.
  • 227 篇 a. gomes
  • 224 篇 a. vorobyev
  • 222 篇 bellee v.
  • 211 篇 y. chen
  • 209 篇 c. alexa
  • 208 篇 s. chen
  • 206 篇 h. li
  • 203 篇 j. m. izen
  • 196 篇 brundu d.
  • 193 篇 blake t.
  • 192 篇 g. bella
  • 192 篇 c. amelung
  • 192 篇 bowcock t.j.v.
  • 191 篇 j. strandberg
  • 190 篇 d. calvet
  • 190 篇 a. bocci
  • 188 篇 y. gao

语言

  • 29,759 篇 英文
  • 1,563 篇 其他
  • 431 篇 中文
  • 28 篇 日文
  • 5 篇 德文
  • 3 篇 俄文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 2 篇 葡萄牙文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science and Center for Network Science and Technology"
31790 条 记 录,以下是111-120 订阅
排序:
Joint View Selection, Multigroup Multicast Beamforming, and DIBR for RIS-Aided Multi-View Videos
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第07期24卷 6376-6393页
作者: Lee, Chi-Han Yang, De-Nian Lee, Guang-Siang Wang, Chih-Hang Liao, Wanjiun National Taiwan University Department of Electrical Engineering Taiwan Academia Sinica Institute of Information Science The Research Center for Information Technology Innovation Taiwan Academia Sinica Research Center for Information Technology Innovation Taiwan National Chung Cheng University Department of Computer Science and Information Engineering Taiwan
The rapid development of multi-view videos (MVV) transmission is an irresistible trend. Concurrently, reconfigurable intelligent surface (RIS)-assisted wireless communication has drawn significant attention. We observ... 详细信息
来源: 评论
Sexism Identification in Social networks using TF-IDF Embeddings, PreProccessing, Feature Selection, Word/Char N-Grams and Various Machine Learning Models In Spanish and English  25
Sexism Identification in Social Networks using TF-IDF Embedd...
收藏 引用
25th Working Notes of the Conference and Labs of the Evaluation Forum, CLEF 2024
作者: Keinan, Ron Department of Computer Science Jerusalem College of Technology Lev Academic Center Israel
In this paper, we describe our submission to the EXIST-2024 contest. We tackled Task 1 - "Sexism Identification in tweets" in English and Spanish. To classify the tweets as texts containing sexism, we create... 详细信息
来源: 评论
Edge artificial intelligence for big data: a systematic review
收藏 引用
Neural Computing and Applications 2024年 第19期36卷 11461-11494页
作者: Hemmati, Atefeh Raoufi, Parisa Rahmani, Amir Masoud Department of Computer Engineering Science and Research Branch Islamic Azad University Tehran Iran Department of Computer Engineering Central Tehran Branch Islamic Azad University Tehran Iran Future Technology Research Center National Yunlin University of Science and Technology Yunlin Douliou64002 Taiwan
Edge computing, artificial intelligence (AI), and machine learning (ML) concepts have become increasingly prevalent in Internet of Things (IoT) applications. As the number of IoT devices continues to grow, relying sol... 详细信息
来源: 评论
Extinction Chains Reveal Intermediate Phases Between the Safety and Collapse in Mutualistic Ecosystems
收藏 引用
Engineering 2024年 第12期43卷 89-98页
作者: Guangwei Wang Xueming Liu Ying Xiao Ye Yuan Linqiang Pan Xiaohong Guan Jianxi Gao Hai-Tao Zhang The MOE Engineering Research Center of Autonomous Intelligent Unmanned Systems State Key Laboratory of Digital Manufacturing Equipment and TechnologySchool of Artificial Intelligence and AutomationHuazhong University of Science and TechnologyWuhan 430074China Guangdong HUST Industrial Technology Research Institute Huazhong University of Science and TechnologyDongguan 523808China Guangdong Provincial Engineering Technology Center of Autonomous Unmanned Vessels Dongguan 523808China MOE Key Laboratory of Intelligent Networks and Network Security&State Key Laboratory of Manufacturing Systems Xi’an Jiaotong UniversityXi’an 710049China Tsinghua National Laboratory of Information Science and Technology Department of AutomationTsinghua UniversityBeijing 100084China Department of Computer Science Rensselaer Polytechnic InstituteTroyNY 12180USA
Ecosystems are undergoing unprecedented persistent deterioration due to unsustainable anthropogenic human activities,such as overfishing and deforestation,and the effects of such damage on ecological stability are ***... 详细信息
来源: 评论
E-voting system using cloud-based hybrid blockchain technology
收藏 引用
Journal of Safety science and Resilience 2024年 第1期5卷 102-109页
作者: Beulah Jayakumari S Lilly Sheeba Maya Eapen Jani Anbarasi Vinayakumar Ravi A.Suganya Malathy Jawahar Department of Information Technology Tagore Engineering College Chennai India School of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram ChennaiIndia Department of Information Technology Jerusalem College of Engineering ChennaiIndia School of Computer Science and Engineering Vellore Institute of Technology Chennai India Center for Artificial Intelligence Prince Mohammad Bin Fahd UniversityKhobarSaudi Arabia Leather Process Technology Division CSIR-Central Leather Research Institute ChennaiIndia
With the invention of Internet-enabled devices,cloud and blockchain-based technologies,an online voting system can smoothly carry out election *** pandemic situations,citizens tend to develop panic about mass gatherin... 详细信息
来源: 评论
Dual-Mode Resonant Sectorial Monopole Antenna with Stable Backfire Gain
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1478-1486页
作者: Feiyan JI Heng ZHANG Xiuqiong XING Wenjun LU Lei ZHU Jiangsu Key Laboratory of Wireless Communications Nanjing University of Posts and Telecommunications Key Laboratory of Wireless Sensor Network & Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Department of Electrical and Computer Engineering Faculty of Science and Technology University of Macau
A novel design approach to wideband, dual-mode resonant monopole antenna with stable, enhanced backfire gain is advanced. The sectorial monopole evolves from a linear, 0.75-wavelength electric prototype monopole under... 详细信息
来源: 评论
A bitcoin service community classification method based on Random Forest and improved KNN algorithm
IET Blockchain
收藏 引用
IET Blockchain 2024年 第3期4卷 276-286页
作者: Gao, Muyun Lin, Shenwen Tian, Xin He, Xi He, Ketai Chen, Shifeng School of Mechanical Engineering University of Science and Technology Beijing Beijing China Internet Financial Security Technology Key Laboratory National Computer Network Emergency Response Technical Team/Coordination Center of China Beijing China
There are service communities with different functions in the Bitcoin transactions system. Identifying community categories helps to further understand the Bitcoin transactions system and facilitates targeted regulati... 详细信息
来源: 评论
Video Corpus Moment Retrieval with Query-specific Context Learning and Progressive Localization
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年 第6期35卷 5659-5670页
作者: Zhang, Long Song, Peipei Duan, Zhangling Wang, Shuo Chang, Xiaojun Yang, Xun School of Information Science and Technology Hefei230026 China Hefei Comprehensive National Science Center Institute of Artificial Intelligence Hefei230026 China University of Science and Technology of China School of Information Science and Technology Hefei230026 China Department of Computer Vision Abu Dhabi United Arab Emirates University of Science and Technology of China MoE Key Laboratory of Brain-inspired Intelligent Perception and Cognition China
Video corpus moment retrieval (VCMR) aims to retrieve a moment from a large corpus of untrimmed videos corresponding to a given language query. However, existing methods often fall short due to their reliance on simpl... 详细信息
来源: 评论
Encrypted Mining Traffic Detection Mechanism Based on TLS Handshake Message and Machine Learning  10
Encrypted Mining Traffic Detection Mechanism Based on TLS Ha...
收藏 引用
10th International Conference on Big Data Computing and Communications, BIGCOM 2024
作者: Zhu, Jianlei Fu, Guilu Huang, Wenchao Shi, Boxuan Xiong, Yan School of Cyber Science and Technology University of Science and Technology of China Hefei China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China
As activities related to cryptocurrency have been classified as illegal financial activities in China, many organizations have started to use encrypted connections to mine cryptocurrency. Traditional detection mechani... 详细信息
来源: 评论
MMH-FE:AMulti-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural network Training Based on Functional Encryption
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 5387-5405页
作者: Hao Li Kuan Shao Xin Wang Mufeng Wang Zhenyong Zhang The State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China China Industrial Control Systems Cyber Emergency Response Team Beijing100040China
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achie... 详细信息
来源: 评论