咨询与建议

限定检索结果

文献类型

  • 11,178 篇 期刊文献
  • 8,740 篇 会议
  • 118 册 图书

馆藏范围

  • 20,036 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12,282 篇 工学
    • 6,365 篇 计算机科学与技术...
    • 5,043 篇 软件工程
    • 2,376 篇 信息与通信工程
    • 2,304 篇 电子科学与技术(可...
    • 2,100 篇 电气工程
    • 1,655 篇 光学工程
    • 1,537 篇 生物工程
    • 1,481 篇 控制科学与工程
    • 1,366 篇 生物医学工程(可授...
    • 1,078 篇 化学工程与技术
    • 1,065 篇 材料科学与工程(可...
    • 810 篇 机械工程
    • 801 篇 仪器科学与技术
    • 659 篇 动力工程及工程热...
    • 455 篇 力学(可授工学、理...
    • 389 篇 冶金工程
  • 9,236 篇 理学
    • 4,957 篇 物理学
    • 2,996 篇 数学
    • 1,874 篇 生物学
    • 1,263 篇 化学
    • 1,105 篇 统计学(可授理学、...
    • 613 篇 系统科学
  • 2,511 篇 管理学
    • 1,601 篇 管理科学与工程(可...
    • 922 篇 图书情报与档案管...
    • 707 篇 工商管理
  • 1,433 篇 医学
    • 1,173 篇 临床医学
    • 960 篇 基础医学(可授医学...
    • 596 篇 药学(可授医学、理...
    • 440 篇 公共卫生与预防医...
  • 476 篇 法学
    • 384 篇 社会学
  • 292 篇 农学
  • 259 篇 经济学
  • 234 篇 教育学
  • 82 篇 文学
  • 36 篇 军事学
  • 36 篇 艺术学
  • 3 篇 哲学
  • 2 篇 历史学

主题

  • 405 篇 deep learning
  • 315 篇 computer science
  • 215 篇 machine learning
  • 167 篇 computational mo...
  • 167 篇 feature extracti...
  • 149 篇 internet of thin...
  • 147 篇 image segmentati...
  • 147 篇 accuracy
  • 142 篇 optimization
  • 127 篇 support vector m...
  • 123 篇 wireless communi...
  • 121 篇 data mining
  • 111 篇 neural networks
  • 110 篇 hadron colliders
  • 106 篇 magnetic resonan...
  • 106 篇 bandwidth
  • 101 篇 training
  • 98 篇 hadrons
  • 93 篇 throughput
  • 89 篇 reliability

机构

  • 1,076 篇 cavendish labora...
  • 1,008 篇 department of ph...
  • 964 篇 physikalisches i...
  • 948 篇 oliver lodge lab...
  • 628 篇 infn laboratori ...
  • 601 篇 infn sezione di ...
  • 589 篇 fakultät physik ...
  • 588 篇 university of ch...
  • 581 篇 infn sezione di ...
  • 575 篇 infn sezione di ...
  • 559 篇 school of physic...
  • 522 篇 iccub universita...
  • 521 篇 horia hulubei na...
  • 510 篇 school of physic...
  • 501 篇 department of ph...
  • 495 篇 imperial college...
  • 494 篇 center for high ...
  • 491 篇 h.h. wills physi...
  • 491 篇 nikhef national ...
  • 486 篇 stfc rutherford ...

作者

  • 264 篇 beiter a.
  • 261 篇 a. gomes
  • 259 篇 barter w.
  • 249 篇 bellee v.
  • 247 篇 c. alexa
  • 245 篇 j. m. izen
  • 238 篇 c. amelung
  • 237 篇 g. bella
  • 237 篇 j. strandberg
  • 237 篇 s. chen
  • 236 篇 d. calvet
  • 233 篇 g. spigo
  • 231 篇 f. siegert
  • 226 篇 blake t.
  • 225 篇 bowcock t.j.v.
  • 221 篇 brundu d.
  • 219 篇 j. wang
  • 215 篇 r. ströhmer
  • 213 篇 y. tayalati
  • 210 篇 m. rijssenbeek

语言

  • 19,031 篇 英文
  • 748 篇 其他
  • 240 篇 中文
  • 16 篇 日文
  • 4 篇 法文
  • 3 篇 德文
  • 3 篇 朝鲜文
  • 2 篇 荷兰文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Digital Technology Center and Department of Computer Science and Engineering"
20036 条 记 录,以下是121-130 订阅
排序:
A Novel Redundant Service Caching and Task Offloading Method in Mobile Edge Computing  31st
A Novel Redundant Service Caching and Task Offloading Metho...
收藏 引用
31st International Conference on Web Services, ICWS 2024, Held as Part of the Services Conference Federation, SCF 2024
作者: Ouyang, Zhaobin Xia, Yunni Li, Jingpeng Feng, Jiafeng Yu, Yang Zhang, Ke Xu, Xifeng Ma, Yong Chen, Peng Li, Xiaobo School of Computer Chongqing University Chongqing400030 China China Huadian Corporation Guangdong Branch Guangdong China Nanjing Nanzi Huadun Digital Technology Co. Ltd. Nanjing China School of Computer Science and Technology Beijing Institute of Technology Beijing100083 China School of Computer and Information Engineering Jiangxi Normal University Nanchang330000 China School of Computer and Software Engineering Xihua University Chengdu China Chongqing Animal Husbandry Techniques Extension Center Chongqing China
Edge caching is a promising technologies, which enhances content delivery and reduces service latency by caching potentially interested content and services on edge nodes near users. Due to constraints such as limited... 详细信息
来源: 评论
MCFTNet: Multimodal Cross-layer Fusion Transformer Network for Hyperspectral and LiDAR Data Classification
收藏 引用
IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing 2025年 18卷 12803-12818页
作者: Huang, Wei Wu, Tianren Zhang, Xueyu Li, Liangliang Lv, Ming Jia, Zhenhong Zhao, Xiaobin Ma, Hongbing Vivone, Gemine Xinjiang University School of Computer Science and Technology Urumqi830017 China Xinjiang University Key Laboratory of Signal Detection and Processing Urumqi830017 China Guangxi University School of Computer and Electronic Information Nanning530004 China Guangxi University Guangxi Key Laboratory of Multimedia Communications and Network Technology Nanning530004 China Beijing Institute of Technology School of Information and Electronics Beijing100081 China University of Science and Technology Beijing School of Computer and Communication Engineering Beijing100083 China Tsinghua University Department of Electronic Engineering Beijing100084 China National Research Council Tito85050 Italy NBFC National Biodiversity Future Center Palermo90133 Italy
Remote sensing image classification is a popular yet challenging field. Many researchers have combined convolutional neural networks (CNNs) and Transformers for hyperspectral image (HSI) classification tasks. However,... 详细信息
来源: 评论
A Triangular Stable Node Network based on Self-supervised Learning for personalized prediction
A Triangular Stable Node Network based on Self-supervised Le...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Qing Gao, Qian Fan, Jun Zhang, Zhiqiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250014 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd. No.1999 Shunhua road Shandong Jinan250101 China
In recent years, research has illuminated the potency of implicit data processing in enhancing user preferences. Nevertheless, barriers remain in breaking through the constraints of implicit information. This study ai... 详细信息
来源: 评论
Development of the Decision Systems for Cloud Security Based on AI and ML  12th
Development of the Decision Systems for Cloud Security Based...
收藏 引用
12th International Conference on Frontiers of Intelligent Computing: Theory and Applications, FICTA 2024
作者: Maral, Vikas Balasaheb Tambakhe, Manoj D. Dhage, Prashant Shukla, Jyoti Khalaf, Osamah Ibrahim Pise, Ganesh Shivaji Vishwakarma Institute of Information Technology Maharashtra Pune India Department of Information Technology Sipna College of Engineering and Technology Amravati Maharashtra Amravati India Pune India Department of Computer Science and Engineering Arya College of Engineering Jaipur India Department of Solar Al-Nahrain Research Center for Renewable Energy Al-Nahrain University Jadriya Baghdad Iraq Department of Information Technology PICT Maharashtra Pune India
One of the most important and crucial factors often considered in keeping a network secure is the adoption of an intrusion detection system. This process is commonly called as an IDS stage which is required to keep th... 详细信息
来源: 评论
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2637-2664页
作者: Reshma Siyal Muhammad Asim Long Jun Mohammed Elaffendi Sundas Iftikhar Rana Alnashwan Samia Allaoua Chelloug School of Computer Science and Engineering Central South UniversityChangsha410083China EIAS LAB College of Computer and Information Sciencesand Center of Excellence in Quantum and Intelligent ComputingPrince Sultan UniversityRiyadh11586Saudi Arabia Gianforte School of Computing Montana State UniversityBozemanMT 59717USA Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh11671Saudi Arabia
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built... 详细信息
来源: 评论
Development of Permit-to-Work Management System Based on POP Model for Petrochemical Construction Safety
Journal of Intelligent Construction
收藏 引用
Journal of Intelligent Construction 2025年 第2期1卷 1-19页
作者: Shida Chen Weiguang Jiang Cheng Zhou Department of Prefabricated Building Construction Engineering Technology School of Digital Construction Shanghai Urban Construction Vocational College Shanghai China National Center of Technology Innovation for Digital Construction Huazhong University of Science and Technology Wuhan China Department of Construction Management School of Civil and Hydraulic Engineering Huazhong University of Science and Technology Wuhan China
The process of new construction and reconstruction projects in the petrochemical industry is complicated, and the construction accidents have a domino effect. Construction permit-to-work management is an important par... 详细信息
来源: 评论
Multi-Classification Refactoring Framework Using Hopfield Neural Network for Sustainable Software Development
收藏 引用
IEEE Access 2025年 13卷 31785-31808页
作者: Almogahed, Abdullah Mahdin, Hairulnizam Hyeon Gu, Yeong Al-Masni, Mohammed A. Alzaeemi, Shehab Abdulhabib Omar, Mazni Alawadhi, Abdulwadood Obaid Barraood, Samera Rehman Gilal, Abdul Ameen Bakather, Adnan Universiti Tun Hussein Onn Malaysia Faculty of Computer Science and Information Technology Parit Raja Johor86400 Malaysia Sejong University College of AI Convergence Department of Artificial Intelligence and Data Science Seoul05006 Korea Republic of King Fahd University of Petroleum and Minerals Interdisciplinary Research Center in Finance and Digital Economy Business School Dhahran31261 Saudi Arabia Universiti Utara Malaysia School of Computing Sintok06010 Malaysia Hadhramout University College of Computers and Information Technology Department of Computer Science Hadhramaut Yemen Florida International University Knight Foundation School of Computing and Information Sciences MiamiFL33199 United States
Adopting high-quality source code is the ultimate way through which software evolution can be ensured as sustainable. Continuous refactoring in complex software systems ensures longevity and increases architecture kno... 详细信息
来源: 评论
QCACNN: A Quantum Convolutional Neural Network Algorithm for Traffic Sign Recognition in Carbon-Intelligent Electric Vehicles
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Qu, Zhiguo Xia, Yichen Sun, Le Liu, Wenjie Muhammad, Ghulam Nanjing University of Information Science and Technology Engineering Research Center of Digital Forensics Ministry of Education School of Computer Science Nanjing210044 China Nanjing University of Information Science and Technology School of Computer Science Nanjing210044 China Nanjing University of Information Science and Technology School of Software Nanjing210044 China King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh Saudi Arabia
Traffic sign recognition is essential for autonomous driving, enhancing driving efficiency and ensuring road safety. Traffic signs utilize colors and patterns to relay critical information, with color accuracy being e... 详细信息
来源: 评论
An End-to-End Deep Learning QoS Prediction Model Based on Temporal Context and Feature Fusion
收藏 引用
IEEE Transactions on Services Computing 2025年
作者: Zhang, Peiyun Fan, Jiajun Chen, Yutong Huang, Wenjun Zhu, Haibin Zhao, Qinglin Nanjing University of Information Science & Technology Engineering Research Center of Digital Forensics of Ministry of Education School of Computer Science Nanjing210044 China Nipissing University Department of Computer Science and Mathematics North BayONP1B 8L7 Canada Macau University of Science and Technology School of Computer Science and Engineering Taipa999078 China
Existing end-to-end quality of service (QoS) prediction methods based on deep learning often use one-hot encodings as features, which are input into neural networks. It is difficult for the networks to learn the infor... 详细信息
来源: 评论
A secure quantum homomorphic encryption ciphertext retrieval scheme
收藏 引用
Soft Computing 2025年 第3期29卷 1497-1509页
作者: Cheng, Zhen-Wen Chen, Xiu-Bo Xu, Gang Chang, Yan Miao, Li-Hua Yang, Yi-Xian Wang, Ya-Lan School of Data and Computer Science Shandong Women’s University Jinan250300 China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China School of Information Science and Technology North China University of Technology Beijing100144 China School of Cybersecurity Chengdu University of Information Technology Chengdu610225 China Huawei Technologies Co. Ltd Shenzhen518129 China Department of Computer Science Faculty of Engineering and Physical Sciences University of Surrey Surrey GuildfordGU2 7XH United Kingdom
In a recent paper (Gong et al. Quantum Inf Process 19:3, 2020), a novel ciphertext retrieval scheme based on the Grover algorithm and quantum homomorphic encryption was presented. In this scheme, when the server perfo... 详细信息
来源: 评论