咨询与建议

限定检索结果

文献类型

  • 16,823 篇 期刊文献
  • 14,798 篇 会议
  • 169 册 图书

馆藏范围

  • 31,790 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18,995 篇 工学
    • 10,781 篇 计算机科学与技术...
    • 8,454 篇 软件工程
    • 3,653 篇 信息与通信工程
    • 3,086 篇 电子科学与技术(可...
    • 2,856 篇 电气工程
    • 2,175 篇 光学工程
    • 2,145 篇 控制科学与工程
    • 2,072 篇 生物工程
    • 1,794 篇 生物医学工程(可授...
    • 1,459 篇 化学工程与技术
    • 1,340 篇 材料科学与工程(可...
    • 1,174 篇 机械工程
    • 1,154 篇 仪器科学与技术
    • 889 篇 动力工程及工程热...
    • 597 篇 力学(可授工学、理...
  • 14,026 篇 理学
    • 7,056 篇 物理学
    • 4,975 篇 数学
    • 2,630 篇 生物学
    • 1,780 篇 统计学(可授理学、...
    • 1,701 篇 化学
    • 941 篇 系统科学
    • 897 篇 地球物理学
  • 4,226 篇 管理学
    • 2,601 篇 管理科学与工程(可...
    • 1,680 篇 图书情报与档案管...
    • 1,080 篇 工商管理
  • 2,032 篇 医学
    • 1,669 篇 临床医学
    • 1,296 篇 基础医学(可授医学...
    • 775 篇 药学(可授医学、理...
    • 605 篇 公共卫生与预防医...
  • 738 篇 法学
    • 591 篇 社会学
  • 439 篇 农学
  • 394 篇 经济学
  • 378 篇 教育学
  • 135 篇 文学
  • 66 篇 军事学
  • 54 篇 艺术学
  • 6 篇 哲学
  • 6 篇 历史学

主题

  • 873 篇 computer science
  • 499 篇 deep learning
  • 349 篇 feature extracti...
  • 338 篇 machine learning
  • 307 篇 computational mo...
  • 257 篇 accuracy
  • 210 篇 computer archite...
  • 209 篇 semantics
  • 208 篇 application soft...
  • 206 篇 support vector m...
  • 205 篇 routing
  • 198 篇 data mining
  • 196 篇 internet of thin...
  • 196 篇 image segmentati...
  • 191 篇 training
  • 173 篇 galaxies
  • 160 篇 artificial intel...
  • 158 篇 throughput
  • 152 篇 reinforcement le...
  • 151 篇 hadron colliders

机构

  • 1,044 篇 cavendish labora...
  • 977 篇 department of ph...
  • 923 篇 oliver lodge lab...
  • 905 篇 physikalisches i...
  • 901 篇 infn laboratori ...
  • 847 篇 infn sezione di ...
  • 820 篇 infn sezione di ...
  • 806 篇 infn sezione di ...
  • 649 篇 university of ch...
  • 647 篇 infn sezione di ...
  • 636 篇 infn sezione di ...
  • 600 篇 infn sezione di ...
  • 525 篇 fakultät physik ...
  • 515 篇 school of physic...
  • 508 篇 yerevan physics ...
  • 483 篇 horia hulubei na...
  • 474 篇 iccub universita...
  • 465 篇 school of physic...
  • 464 篇 h.h. wills physi...
  • 454 篇 department of ph...

作者

  • 374 篇 j. wang
  • 237 篇 barter w.
  • 234 篇 beiter a.
  • 227 篇 a. gomes
  • 224 篇 a. vorobyev
  • 222 篇 bellee v.
  • 211 篇 y. chen
  • 209 篇 c. alexa
  • 208 篇 s. chen
  • 206 篇 h. li
  • 203 篇 j. m. izen
  • 196 篇 brundu d.
  • 193 篇 blake t.
  • 192 篇 g. bella
  • 192 篇 c. amelung
  • 192 篇 bowcock t.j.v.
  • 191 篇 j. strandberg
  • 190 篇 d. calvet
  • 190 篇 a. bocci
  • 188 篇 y. gao

语言

  • 29,759 篇 英文
  • 1,563 篇 其他
  • 431 篇 中文
  • 28 篇 日文
  • 5 篇 德文
  • 3 篇 俄文
  • 2 篇 法文
  • 2 篇 朝鲜文
  • 2 篇 葡萄牙文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science and Center for Network Science and Technology"
31790 条 记 录,以下是151-160 订阅
排序:
Forward Legal Anonymous Group Pairing-Onion Routing for Mobile Opportunistic networks
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第07期24卷 6595-6612页
作者: Zhu, Xiuzhen Lin, Limei Huang, Yanze Wang, Xiaoding Hsieh, Sun-Yuan Wu, Jie Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fujian Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan Temple University Department of Computer and Information Science 1925 N. 12th St PhiladelphiaPA19122 United States
Mobile Opportunistic networks (MONs) often experience frequent interruptions in end-to-end connections, which increases the likelihood of message loss during delivery and makes users more susceptible to various cyber ... 详细信息
来源: 评论
LogESP: Enhancing Log Semantic Representation With Word Position for Anomaly Detection  22
LogESP: Enhancing Log Semantic Representation With Word Posi...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Ni, Zhengping Di, Xiaoqiang Liu, Xu Chang, Lianjie Li, Jinqing Tang, Qiyue Changchun University of Science and Technology School of Computer Science and Technology Changchun130022 China Changchun University of Science and Technology Jilin Province Key Laboratory of Network and Information Security Changchun130022 China Changchun University of Science and Technology Information Center Changchun130022 China
Logs are valuable data for detecting anomalous network behavior. Accurate feature extraction from logs is essential for anomaly detection. However, statistical-based feature extraction methods consider the statistical... 详细信息
来源: 评论
Sentiment Analysis of Low-Resource Language Literature Using Data Processing and Deep Learning
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 713-733页
作者: Aizaz Ali Maqbool Khan Khalil Khan Rehan Ullah Khan Abdulrahman Aloraini Department of IT and Computer Science Pak-Austria Fachhochschule:Institute of Applied Sciences and TechnologyHaripur22620Pakistan Software Competence Center Hagenberg Softwarepark 32aHagenberg4232Austria Department of Computer Science School of Engineering and Digital SciencesNazarbayev UniversityAstana010000Kazakhstan Department of Information Technology College of ComputerQassim UniversityP.O.Box 1162BuraydahSaudi Arabia
Sentiment analysis, a crucial task in discerning emotional tones within the text, plays a pivotal role in understandingpublic opinion and user sentiment across diverse *** numerous scholars conduct sentiment analysisi... 详细信息
来源: 评论
Metaverse Perspectives from Japan: A Participatory Speculative Design Case Study
收藏 引用
Proceedings of the ACM on Human-computer Interaction 2024年 第CSCW2期8卷 1-51页
作者: Hohendanner, Michel Ullstein, Chiara Miyamoto, Dohjin Huffman, Emma Fukuwatari Socher, Gudrun Grossklags, Jens Osawa, Hirotaka Munich Center for Digital Sciences and AI Munich University of Applied Sciences Munich Germany Department of Computer Science Technical University of Munich Germany Department of Computer Science Technical University of Munich Munich Germany Tokyo University Tokyo Japan Kyoto Design Lab Kyoto Institute of Technology Kyoto Japan Faculty of Science and Technology Keio University Yokohama Japan
Currently, the development of the metaverse lies in the hands of industry. Citizens have little influence on this process. Instead, to do justice to the pluralism of (digital) societies, we should strive for an open d... 详细信息
来源: 评论
An Adaptable Algorithm for Optimizing Bus Line Distribution Using the Clustering Method
收藏 引用
Wireless Personal Communications 2024年 第4期134卷 2347-2370页
作者: Sheikhi, Fatemeh Rahmani, Amir Masoud Computer Engineering Department Science and Research Branch Islamic Azad University Tehran Iran Future Technology Research Center National Yunlin University of Science and Technology 123 University Road Section 3 Yunlin Douliou64002 Taiwan
The current fleet of cars requires reevaluation, upgrades, and replacement in response to the expanding human population, the increase in urban traffic volume, and the elevated levels of air pollution attributed to ve... 详细信息
来源: 评论
Multilevel Self-Training Approach for Cross-Domain Semantic Segmentation in Intelligent Vehicles
收藏 引用
IEEE Intelligent Transportation Systems Magazine 2024年 第1期16卷 148-161页
作者: Chen, Yung-Yao Jhong, Sin-Ye National Taiwan University of Science and Technology Department of Electronic and Computer Engineering Smart Electric Vehicle Research Center Taipei106335 Taiwan National Cheng Kung University Department of Engineering Science Tainan City701 Taiwan
The use of intelligent vehicle technology is increasing;however, this technology requires further improvement. Semantic segmentation enables intelligent vehicles to understand the environment. Although advances have b... 详细信息
来源: 评论
MedX-Net: Hierarchical Transformer with Large Kernel Convolutions for 3D Medical Image Segmentation
MedX-Net: Hierarchical Transformer with Large Kernel Convolu...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Lu, Lin Zou, Qingzhi Key Laboratory of Computing Power Network and Information Se-curity Ministry of Education Shandong Computer Science Center Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Due to the exceptional performance of Transform-ers in 2D medical image segmentation, recent work has also introduced them into 3D medical segmentation tasks. For instance, Swin UNETR and other hierarchical Transforme... 详细信息
来源: 评论
Endogenous Security of FQn networks: Adaptive System-Level Fault Self-Diagnosis
收藏 引用
IEEE Transactions on Reliability 2024年 第3期73卷 1659-1668页
作者: Lin, Yuhang Lin, Limei Huang, Yanze Xu, Li Hsieh, Sun-Yuan Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou350117 China Fujian University of Technology School of Computer Science and Mathematics Fuzhou350118 China National Cheng Kung University Department of Computer Science and Information Engineering Tainan701 Taiwan
Endogenous security has the ability to discover, eliminate, and solve internal security problems and hidden dangers within the network, and is a superior technology to ensure future network security. The t/k-diagnosis... 详细信息
来源: 评论
Image Splicing Forgery Detection Using Feature-Based of Sonine Functions and Deep Features
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 795-810页
作者: Ala’a R.Al-Shamasneh Rabha W.Ibrahim Department of Computer Science College of Computer&Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Computer Science and Mathematics Lebanese American UniversityBeirut11022801Lebanon Department of Mathematics Mathematics Research CenterNear East UniversityNicosia99138Turkey Information and Communication Technology Research Group Scientific Research CenterAlayen UniversityDhi Qar64001Iraq
The growing prevalence of fake images on the Internet and social media makes image integrity verification a crucial research *** of the most popular methods for manipulating digital images is image splicing,which invo... 详细信息
来源: 评论
MDGCN-Lt:Fair Web API Classification with Sparse and Heterogeneous Data Based on Deep GCN
收藏 引用
清华大学学报自然科学版(英文版) 2025年 第3期30卷 1294-1314页
作者: Boyuan Yan Yankun Zhang Wenwen Gong Haoyang Wan Wenwei Wang Weiyi Zhong Caixia Bu Department of School of Computer Science Qufu Normal UniversityRizhao 276500China Shandong Provincial University Laboratory for Protected Horticulture Weifang University of Science and TechnologyWeifang 261000China Department of Computer Science and Technology Tsinghua UniversityBeijing 100084China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of JinanJinan 250022China Department of Univalsoft Joint Stock Co. Ltd.Weifang 261000China
Developers integrate web Application Programming Interfaces(APIs)into edge applications,enabling data expansion to the edge computing area for comprehensive coverage of devices in that *** develop edge applications,de... 详细信息
来源: 评论