咨询与建议

限定检索结果

文献类型

  • 16,854 篇 期刊文献
  • 14,845 篇 会议
  • 169 册 图书

馆藏范围

  • 31,868 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19,312 篇 工学
    • 10,735 篇 计算机科学与技术...
    • 8,402 篇 软件工程
    • 3,637 篇 信息与通信工程
    • 3,166 篇 电子科学与技术(可...
    • 2,927 篇 电气工程
    • 2,131 篇 控制科学与工程
    • 2,109 篇 光学工程
    • 2,071 篇 生物工程
    • 1,780 篇 生物医学工程(可授...
    • 1,509 篇 材料科学与工程(可...
    • 1,459 篇 化学工程与技术
    • 1,172 篇 机械工程
    • 1,143 篇 仪器科学与技术
    • 888 篇 动力工程及工程热...
    • 691 篇 核科学与技术
    • 594 篇 力学(可授工学、理...
  • 13,976 篇 理学
    • 7,046 篇 物理学
    • 5,006 篇 数学
    • 2,618 篇 生物学
    • 1,830 篇 统计学(可授理学、...
    • 1,701 篇 化学
    • 941 篇 系统科学
    • 891 篇 地球物理学
  • 4,200 篇 管理学
    • 2,582 篇 管理科学与工程(可...
    • 1,673 篇 图书情报与档案管...
    • 1,076 篇 工商管理
  • 2,021 篇 医学
    • 1,658 篇 临床医学
    • 1,288 篇 基础医学(可授医学...
    • 774 篇 药学(可授医学、理...
    • 597 篇 公共卫生与预防医...
  • 735 篇 法学
  • 430 篇 农学
  • 396 篇 经济学
  • 375 篇 教育学
  • 134 篇 文学
  • 67 篇 军事学
  • 54 篇 艺术学
  • 6 篇 哲学
  • 6 篇 历史学

主题

  • 874 篇 computer science
  • 500 篇 deep learning
  • 367 篇 feature extracti...
  • 341 篇 machine learning
  • 318 篇 computational mo...
  • 286 篇 accuracy
  • 217 篇 computer archite...
  • 213 篇 semantics
  • 209 篇 application soft...
  • 206 篇 support vector m...
  • 205 篇 routing
  • 201 篇 data mining
  • 200 篇 internet of thin...
  • 200 篇 image segmentati...
  • 198 篇 training
  • 174 篇 galaxies
  • 169 篇 throughput
  • 165 篇 artificial intel...
  • 151 篇 reinforcement le...
  • 150 篇 magnetic resonan...

机构

  • 1,050 篇 cavendish labora...
  • 983 篇 department of ph...
  • 926 篇 oliver lodge lab...
  • 915 篇 physikalisches i...
  • 908 篇 infn laboratori ...
  • 857 篇 infn sezione di ...
  • 830 篇 infn sezione di ...
  • 816 篇 infn sezione di ...
  • 660 篇 university of ch...
  • 647 篇 infn sezione di ...
  • 635 篇 infn sezione di ...
  • 603 篇 infn sezione di ...
  • 535 篇 fakultät physik ...
  • 513 篇 yerevan physics ...
  • 512 篇 school of physic...
  • 483 篇 horia hulubei na...
  • 478 篇 iccub universita...
  • 467 篇 school of physic...
  • 463 篇 h.h. wills physi...
  • 455 篇 department of ph...

作者

  • 374 篇 j. wang
  • 247 篇 barter w.
  • 234 篇 beiter a.
  • 227 篇 a. gomes
  • 225 篇 bellee v.
  • 224 篇 a. vorobyev
  • 212 篇 y. chen
  • 209 篇 h. li
  • 208 篇 c. alexa
  • 208 篇 s. chen
  • 203 篇 j. m. izen
  • 201 篇 brundu d.
  • 199 篇 blake t.
  • 192 篇 c. amelung
  • 192 篇 bowcock t.j.v.
  • 191 篇 g. bella
  • 191 篇 j. strandberg
  • 191 篇 a. bocci
  • 190 篇 d. calvet
  • 190 篇 betancourt c.

语言

  • 28,279 篇 英文
  • 3,147 篇 其他
  • 416 篇 中文
  • 28 篇 日文
  • 7 篇 德文
  • 4 篇 法文
  • 3 篇 俄文
  • 2 篇 朝鲜文
  • 2 篇 葡萄牙文
  • 1 篇 西班牙文
  • 1 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science and Center for Network Science and Technology"
31868 条 记 录,以下是311-320 订阅
排序:
Medical knowledge graph question answering for drug-drug interaction prediction based on multi-hop machine reading comprehension
收藏 引用
CAAI Transactions on Intelligence technology 2024年 第5期9卷 1217-1228页
作者: Peng Gao Feng Gao Jian-Cheng Ni Yu Wang Fei Wang Qiquan Zhang School of Cyber Science and Engineering Qufu Normal UniversityQufuChina School of Computer Science and Technology East China Normal UniversityShanghaiChina Network and Information Center Qufu Normal UniversityQufuChina School of Electronics and Information Engineering Harbin Institute of TechnologyShenzhenChina School of Electrical Engineering and Telecommunications University of New South WalesSydneyNSWAustralia
Drug-drug interaction(DDI)prediction is a crucial issue in molecular *** methods of observing drug-drug interactions through medical experiments require significant resources and *** authors present a Medical Knowledg... 详细信息
来源: 评论
Secure State Estimation for A Class of Nonlinear Systems Over Sensor networks With Sensor Resolution: Tackling Replay Attacks
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 25333-25345页
作者: Fu, Haijing Wang, Zidong Zhao, Di Shen, Bo Donghua University College of Information Science and Technology Shanghai201620 China Ministry of Education Engineering Research Center of Digitalized Textile and Fashion Technology Shanghai201620 China Brunel University London Department of Computer Science Middlesex UxbridgeUB8 3PH United Kingdom University of Shanghai for Science and Technology Business School Shanghai200093 China
This paper addresses the problem of distributed state estimation for nonlinear systems over sensor networks that are subject to replay attacks. Sensor resolution, recognized as a crucial indicator of measurement accur... 详细信息
来源: 评论
A Unified Deep Reinforcement Learning Approach for Constructing Rectilinear and Octilinear Steiner Minimum Tree
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2024年 第7期44卷 2711-2724页
作者: Lin, Zhenkun Liu, Genggeng Huang, Xing Lin, Yibo Zhang, Jixin Liu, Wen-Hao Wang, Ting-Chi Fuzhou University College of Computer and Data Science Fuzhou350100 China Northwestern Polytechnical University School of Computer Science Xi'an710072 China Peking University Beijing Advanced Innovation Center for Integrated Circuits School of Integrated Circuits Beijing China Peking University Institute of Electronic Design Automation Wuxi China Hubei University of Technology School of Computer Science Wuhan China Nvidia Taiwan National Tsing Hua University Department of Computer Science Hsinchu30013 Taiwan
The Steiner Minimum Tree (SMT) serves as an optimal connection model for multi-terminal nets in Very Large Scale Integration (VLSI). Constructing both Rectilinear Steiner Minimum Tree (RSMT) and Octilinear Steiner Min... 详细信息
来源: 评论
A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 31-63页
作者: Sunil Kumar Dilip Kumar Ramraj Dangi Gaurav Choudhary Nicola Dragoni Ilsun You Department of Computer Science and Engineering National Institute of Technology JamshedpurJamshedpurIndia School of Computing Science and Engineering VIT University BhopalBhopal466114India Center for Industrial Software The Maersk Mc-Kinney Moller InstituteUniversity of Southern DenmarkSonderborgOdenseDenmark Department of Applied Mathematics and Computer Science Technical University of DenmarkLyngby2800Denmark Department of Information Security Cryptologyand MathematicsKookmin UniversitySeoulSouth Korea
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different *** settings are probed for data,which is then transferred via linked *** are several hurdles to ... 详细信息
来源: 评论
JTEA: Implementing Semi-Supervised Entity Alignment Using Joint Teaching Strategies
JTEA: Implementing Semi-Supervised Entity Alignment Using Jo...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Lu, Kai Zhao, Jing Ding, Lichao Hao, Zenghao Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan China Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
Entity alignment(EA) aims to identify equivalent entities in different knowledge graphs or data sources and establish correspondences between them. In recent years, embedding-based methods have made significant progre... 详细信息
来源: 评论
TinyTrain: Resource-Aware Task-Adaptive Sparse Training of DNNs at the Data-Scarce Edge  41
TinyTrain: Resource-Aware Task-Adaptive Sparse Training of D...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Kwon, Young D. Li, Rui Venieris, Stylianos I. Chauhan, Jagmohan Lane, Nicholas D. Mascolo, Cecilia Department of Computer Science and Technology University of Cambridge United Kingdom Samsung AI Center Cambridge United Kingdom School of Electronics and Computer Science University of Southampton United Kingdom
On-device training is essential for user personalisation and privacy. With the pervasiveness of IoT devices and microcontroller units (MCUs), this task becomes more challenging due to the constrained memory and comput... 详细信息
来源: 评论
User story clustering in agile development:a framework and an empirical study
收藏 引用
Frontiers of computer science 2023年 第6期17卷 43-59页
作者: Bo YANG Xiuyin MA Chunhui WANG Haoran GUO Huai LIU Zhi JIN School of Information Science and Technology Beijing Forestry UniversityBeijing 100083China Engineering Research Center for Forestry Oriented Intelligent Information Processing National Forestry and Grassland AdministrationBeijing 100083China School of Information Science and Technology North China University of TechnologyBeijing 100144China College of Computer Science and Technology Inner Mongolia Normal UniversityHohhot 010020China Department of Computer Science and Software Engineering Swinburne University of TechnologyHawthorn VIC 3122Australia Key Laboratory of High Confidence Software Technologies(Peking University) Ministry of EducationBeijing 100871China Institute of Software School of Computer SciencePeking UniversityBeijing 100871China
Agile development aims at rapidly developing software while embracing the continuous evolution of user requirements along the whole development *** stories are the primary means of requirements collection and elicitat... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23933-23945页
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
Quantifying the weakness of ties with hierarchy-based link centrality
收藏 引用
science China(Information sciences) 2025年
作者: Jianhong MOU Longyun WANG Kang WEN Bitao DAI Suoyi TAN Fredrik LILJEROS Petter HOLME Xin LU College of Systems Engineering National University of Defense Technology Department of Sociology Stockholm University Department of Computer Science Aalto University Center for Computational Social Science Kobe University
Quantifying the significance of ties in preserving network connectivity is crucial for identifying weak ties, which often serve as bridges between communities, and for detecting community structures. However, accurate...
来源: 评论
Enhance Performance of Ad-hoc Search via Prompt Learning  1
收藏 引用
28th China Conference on Information Retrieval, CCIR 2022
作者: Yang, Shenghao Liu, Yiqun Xie, Xiaohui Zhang, Min Ma, Shaoping Department of Computer Science and Technology Beijing National Research Center for Information Science and Technology Tsinghua University Beijing100084 China
Recently, pre-trained language models (PTM) have achieved great success on ad hoc search. However, the performance decline in low-resource scenarios demonstrates the capability of PTM has not been inspired fully. As a... 详细信息
来源: 评论