咨询与建议

限定检索结果

文献类型

  • 6,288 篇 期刊文献
  • 6,211 篇 会议
  • 85 册 图书

馆藏范围

  • 12,584 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,924 篇 工学
    • 5,094 篇 计算机科学与技术...
    • 3,967 篇 软件工程
    • 1,908 篇 信息与通信工程
    • 1,085 篇 电气工程
    • 1,007 篇 电子科学与技术(可...
    • 988 篇 生物工程
    • 977 篇 控制科学与工程
    • 761 篇 光学工程
    • 759 篇 生物医学工程(可授...
    • 515 篇 机械工程
    • 415 篇 仪器科学与技术
    • 367 篇 化学工程与技术
    • 330 篇 动力工程及工程热...
    • 321 篇 材料科学与工程(可...
    • 294 篇 核科学与技术
    • 236 篇 网络空间安全
  • 4,947 篇 理学
    • 2,154 篇 物理学
    • 2,033 篇 数学
    • 1,170 篇 生物学
    • 703 篇 统计学(可授理学、...
    • 467 篇 化学
    • 378 篇 系统科学
  • 1,892 篇 管理学
    • 1,152 篇 管理科学与工程(可...
    • 767 篇 图书情报与档案管...
    • 517 篇 工商管理
  • 863 篇 医学
    • 725 篇 临床医学
    • 599 篇 基础医学(可授医学...
    • 343 篇 药学(可授医学、理...
    • 304 篇 公共卫生与预防医...
  • 359 篇 法学
    • 283 篇 社会学
  • 190 篇 农学
  • 186 篇 教育学
  • 181 篇 经济学
  • 55 篇 军事学
  • 53 篇 文学
  • 20 篇 艺术学

主题

  • 349 篇 computer science
  • 261 篇 deep learning
  • 210 篇 machine learning
  • 175 篇 computational mo...
  • 170 篇 feature extracti...
  • 158 篇 data mining
  • 143 篇 semantics
  • 126 篇 optimization
  • 116 篇 educational inst...
  • 114 篇 hadron colliders
  • 112 篇 bandwidth
  • 112 篇 accuracy
  • 110 篇 internet
  • 109 篇 servers
  • 108 篇 predictive model...
  • 105 篇 internet of thin...
  • 103 篇 wireless sensor ...
  • 98 篇 image segmentati...
  • 98 篇 wireless communi...
  • 96 篇 computer archite...

机构

  • 376 篇 yerevan physics ...
  • 281 篇 faculty of scien...
  • 278 篇 department for p...
  • 276 篇 department of ph...
  • 275 篇 departamento de ...
  • 270 篇 department of ph...
  • 264 篇 department of ph...
  • 262 篇 department of ph...
  • 252 篇 faculté des scie...
  • 248 篇 kirchhoff-instit...
  • 221 篇 department of ph...
  • 219 篇 department of ph...
  • 218 篇 fakultät für phy...
  • 215 篇 institute of phy...
  • 214 篇 physics division...
  • 207 篇 department of ph...
  • 194 篇 department of ph...
  • 193 篇 institut für ast...
  • 190 篇 department of ph...
  • 185 篇 institute of phy...

作者

  • 265 篇 c. alexa
  • 264 篇 j. m. izen
  • 255 篇 g. bella
  • 255 篇 d. calvet
  • 254 篇 j. strandberg
  • 253 篇 c. amelung
  • 234 篇 g. spigo
  • 231 篇 f. siegert
  • 231 篇 a. c. könig
  • 231 篇 m. klein
  • 230 篇 r. ströhmer
  • 228 篇 h. a. gordon
  • 228 篇 m. rijssenbeek
  • 226 篇 h. sakamoto
  • 226 篇 s. jin
  • 226 篇 g. gaudio
  • 226 篇 s. mohapatra
  • 223 篇 y. nagasaka
  • 221 篇 s. guindon
  • 214 篇 y. tayalati

语言

  • 11,028 篇 英文
  • 1,393 篇 其他
  • 165 篇 中文
  • 8 篇 日文
  • 6 篇 德文
  • 3 篇 法文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science and Information Engineering/Computer and Network Center"
12584 条 记 录,以下是4381-4390 订阅
排序:
Stabilizing two-qubit entanglement with dynamically decoupled active feedback
收藏 引用
Physical Review Applied 2024年 第2期21卷 024022-024022页
作者: Sacha Greenfield Leigh Martin Felix Motzoi K. Birgitta Whaley Justin Dressel Eli M. Levenson-Falk Department of Physics and Astronomy University of Southern California Los Angeles California 90089 USA Center for Quantum Information Science and Technology University of Southern California Los Angeles California 90089 USA Institute for Quantum Studies Chapman University Orange California 92866 USA Berkeley Center for Quantum Information and Computation Berkeley California 94720 USA Department of Physics University of California Berkeley California 94720 USA Department of Chemistry University of California Berkeley California 94720 USA Peter Grünberg Institute of Quantum Control (PGI-8) Forschungszentrum Jülich GmbH Wilhelm-Johnen-Straße Jülich 52428 Germany Schmid College of Science and Technology Chapman University Orange California 92866 USA Ming Hsieh Department of Electrical and Computer Engineering University of Southern California Los Angeles California 90089 USA
We propose and analyze a protocol for stabilizing a maximally entangled state of two noninteracting qubits using active state-dependent feedback from a continuous two-qubit half-parity measurement in coordination with... 详细信息
来源: 评论
Hardware Resource Reliability Analysis based on Deep Learning for Virtual Machine Deployment Optimization  9
Hardware Resource Reliability Analysis based on Deep Learnin...
收藏 引用
9th IEEE Global Conference on Consumer Electronics, GCCE 2020
作者: Huang, Chih-Hao Huang, Bo-Hong Wu, Tin-Yu National Ilan University. Master Program of E-Learning for Multimedia and Network Communications Yilan Taiwan National Ilan University Department of Computer Science and Information Engineering Yilan Taiwan
This paper proposes a new method based on the Apriori algorithm and deep learning technology to improve the flexibility of hardware deployment and to analyze hardware usage reliability for VM. This method can signific... 详细信息
来源: 评论
New observation on the key schedule of RECTANGLE
收藏 引用
science China(information sciences) 2019年 第3期62卷 106-118页
作者: Hailun YAN Yiyuan LUO Mo CHEN Xuejia LAI Department of Computer Science and Engineering Shanghai Jiao Tong University School of Electronics and Information Shanghai Dianji University Westone Cryptologic Research Center
We evaluate the security of RECTANGLE from the perspective of actual key information(AKI).Insufficient AKI permits the attackers to deduce some subkey bits from some other subkey bits, thereby lowering the overall att... 详细信息
来源: 评论
Design of a Secure Machine Learning-Based Malware Detection and Analysis Scheme
Design of a Secure Machine Learning-Based Malware Detection ...
收藏 引用
Communications, Computing, Cybersecurity, and Informatics (CCCI), International Conference on
作者: Pankaj Kumar Mohammad S. Obaidat Piyush Pandey Mohammad Wazid Ashok Kumar Das Devesh Pratap Singh Department of Computer Science and Engineering Graphic Era Deemed to be University Dehradun India King Abdullah II School of Information Technology The University of Jordan Amman Jordan School of Computing SRM University Jordan University of Science and Technology Beijing Beijing China School of Computing SRM University Kattankulathur TN India Center for Security Theory Algorithmic Research International Institute of Information Technology Hyderabad India
Today's world is rapidly growing towards the advanced concept of technology. Technology nowadays is at its peak of development and has great advantages in all fields of work, whether it is in industrial automation...
来源: 评论
Verifiable Privacy Preservation Scheme for Outsourcing Medi-cal Image to Cloud Through ROI Based Crypto-Watermarking
Verifiable Privacy Preservation Scheme for Outsourcing Medi-...
收藏 引用
IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social Computing (CPSCom) Green Computing and Communications (GreenCom)
作者: Chuan Zhou Yi Zhou XingHan An Yan Liu Min Wang XiangZhi Liu Tianjin University Tianjin China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China College of Environmental Science and Engineering Beijing Forestry University Beijing China Inspur Software Co. Ltd. Jinan China The Party School of cpc Jinan Municipal Committee Jinan China
A novel verifiable privacy preservation scheme for outsourcing medical image to cloud through ROI based crypto-watermarking is proposed in the paper. In the proposed scheme, data owner firstly carries out substitution...
来源: 评论
An Improvement of Coherent Semantic Attention for Image Inpainting  1
收藏 引用
6th International Conference on Artificial Intelligence and Security,ICAIS 2020
作者: Wang, Weiqing Gu, Enming Fang, Wei School of Computer & Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Jiangsu Key Laboratory of Computer Information Process Technology SooChow University Suzhou China
In some image restoration algorithms of the past, they often do not consider the continuity between pixels, and the internal features of the hole region. The mapping to the image semantically does not take into accoun... 详细信息
来源: 评论
PDCapsNet: A Convolution Neural network Method for COVID-19 Detection from Chest X-Ray Images
PDCapsNet: A Convolution Neural Network Method for COVID-19 ...
收藏 引用
IEEE International Symposium on information (IT) in Medicine and Education, ITME
作者: Zhihao Liang Huijuan Lu Cunqian You Wenjie Zhu Li Xie Yudong Yao Key Laboratory of Electromagnetic Wave Information Technology and Metrology College of Information Engineering China Jiliang University Hangzhou Zhejiang Province China College of Information Engineering China Jiliang University Drore Information and Technology Co. LTD Hangzhou Zhejiang Province China College of Information Engineering China Jiliang University Modern Educational Technology Center Hangzhou City Zhejiang Province China College of Biomedical Engineering and Instrumentation Science Zhejiang University Institute of Advanced Digital Technologies and Instrumentation Hangzhou Zhejiang Province China Department of Electrical and Computer Engineering Stevens Institute of Technology Hoboken New Jersey USA
The COVID-19 epidemic started in 2019 and it is still important to develop intelligent and efficient diagnostic methods for the detection of COVID-19. In the task of COVID-19 X-ray image recognition, conventional deep...
来源: 评论
Compressed gate characterization for quantum devices with time-correlated noise
arXiv
收藏 引用
arXiv 2023年
作者: Gullans, M.J. Caranti, M. Mills, A.R. Petta, J.R. Joint Center for Quantum Information and Computer Science NIST University of Maryland College ParkMD20742 United States Department of Physics Princeton University PrincetonNJ08544 United States Department of Physics and Astronomy University of California - Los Angeles Los AngelesCA90095 United States Center for Quantum Science and Engineering University of California - Los Angeles Los AngelesCA90095 United States
As quantum devices make steady progress towards intermediate scale and fault-tolerant quantum computing, it is essential to develop rigorous and efficient measurement protocols that account for known sources of noise.... 详细信息
来源: 评论
Optimizing Stabilizer Parities for Improved Logical Qubit Memories
收藏 引用
Physical Review Letters 2021年 第24期127卷 240501-240501页
作者: Dripto M. Debroy Laird Egan Crystal Noel Andrew Risinger Daiwei Zhu Debopriyo Biswas Marko Cetina Chris Monroe Kenneth R. Brown Department of Physics Duke University Durham North Carolina 27708 USA Joint Quantum Institute Center for Quantum Information and Computer Science and Departments of Physics and Electrical and Computer Engineering University of Maryland College Park Maryland 20742 USA Department of Electrical and Computer Engineering Duke University Durham North Carolina 27708 USA IonQ College Park Maryland 20740 USA
We study variants of Shor’s code that are adept at handling single-axis correlated idling errors, which are commonly observed in many quantum systems. By using the repetition code structure of the Shor’s code basis ... 详细信息
来源: 评论
A Graph Convolution Neural network Based Method for Insider Threat Detection
A Graph Convolution Neural Network Based Method for Insider ...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Kexiong Fei Jiang Zhou Lin Su Weiping Wang Yong Chen Fan Zhang School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China Department of Computer Science Texas Tech University Lubbock USA Information Technology Center China Mobile Beijing China
In this research, we propose Log2Graph, a new insider threat detection method based on graph convolution neural network (GCN). This method first retrieves the corresponding logs and features from log files through fea... 详细信息
来源: 评论