咨询与建议

限定检索结果

文献类型

  • 1,646 篇 期刊文献
  • 966 篇 会议
  • 28 册 图书

馆藏范围

  • 2,640 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,585 篇 工学
    • 1,007 篇 计算机科学与技术...
    • 797 篇 软件工程
    • 339 篇 信息与通信工程
    • 240 篇 电气工程
    • 211 篇 电子科学与技术(可...
    • 166 篇 光学工程
    • 162 篇 生物工程
    • 151 篇 控制科学与工程
    • 117 篇 生物医学工程(可授...
    • 86 篇 仪器科学与技术
    • 85 篇 机械工程
    • 73 篇 动力工程及工程热...
    • 69 篇 核科学与技术
    • 63 篇 化学工程与技术
    • 51 篇 材料科学与工程(可...
    • 49 篇 航空宇航科学与技...
    • 47 篇 交通运输工程
  • 1,320 篇 理学
    • 747 篇 物理学
    • 433 篇 数学
    • 185 篇 生物学
    • 126 篇 统计学(可授理学、...
    • 89 篇 化学
    • 85 篇 地球物理学
    • 80 篇 系统科学
  • 387 篇 管理学
    • 254 篇 管理科学与工程(可...
    • 141 篇 工商管理
    • 137 篇 图书情报与档案管...
  • 132 篇 医学
    • 118 篇 临床医学
    • 96 篇 基础医学(可授医学...
    • 59 篇 药学(可授医学、理...
  • 43 篇 法学
  • 35 篇 经济学
  • 25 篇 教育学
  • 24 篇 农学
  • 9 篇 军事学
  • 7 篇 文学
  • 6 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 55 篇 machine learning
  • 47 篇 deep learning
  • 47 篇 proton-proton in...
  • 47 篇 computational mo...
  • 46 篇 computer science
  • 44 篇 higgs bosons
  • 40 篇 hadron colliders
  • 37 篇 grid computing
  • 35 篇 large hadron col...
  • 35 篇 standard model (...
  • 34 篇 training
  • 32 篇 computer archite...
  • 31 篇 feature extracti...
  • 31 篇 distributed comp...
  • 30 篇 laboratories
  • 29 篇 collisions (nucl...
  • 29 篇 application soft...
  • 29 篇 nuclear counters
  • 28 篇 semantics
  • 28 篇 cloud computing

机构

  • 286 篇 department for p...
  • 285 篇 department of ph...
  • 284 篇 faculty of scien...
  • 279 篇 departamento de ...
  • 275 篇 department of ph...
  • 268 篇 department of ph...
  • 268 篇 kirchhoff-instit...
  • 266 篇 institute of phy...
  • 264 篇 department of ph...
  • 259 篇 faculté des scie...
  • 259 篇 institute of phy...
  • 249 篇 fakultät für phy...
  • 241 篇 instituto de fís...
  • 238 篇 institut für ast...
  • 234 篇 yerevan physics ...
  • 231 篇 physics departme...
  • 223 篇 department of ph...
  • 221 篇 department of ph...
  • 217 篇 physics division...
  • 216 篇 department of ph...

作者

  • 268 篇 c. alexa
  • 268 篇 j. m. izen
  • 268 篇 g. bella
  • 268 篇 j. strandberg
  • 268 篇 d. calvet
  • 268 篇 c. amelung
  • 268 篇 g. spigo
  • 267 篇 f. siegert
  • 267 篇 a. c. könig
  • 263 篇 m. klein
  • 262 篇 h. a. gordon
  • 261 篇 r. ströhmer
  • 258 篇 m. rijssenbeek
  • 257 篇 s. jin
  • 257 篇 g. gaudio
  • 257 篇 s. mohapatra
  • 257 篇 y. nagasaka
  • 256 篇 h. sakamoto
  • 250 篇 s. guindon
  • 247 篇 a. kaczmarska

语言

  • 2,483 篇 英文
  • 122 篇 其他
  • 34 篇 中文
  • 2 篇 德文
检索条件"机构=High-Performance Computing Laboratory Department of Computer Science and Information Engineering"
2640 条 记 录,以下是531-540 订阅
排序:
MIMO Beamforming and Signal Modulation Design for Federated Learning Optimization
MIMO Beamforming and Signal Modulation Design for Federated ...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Nuocheng Yang Sihua Wang Mingzhe Chen Cong Shen Changchuan Yin Christopher G. Brinton Beijing Laboratory of Advanced Information Network Beijing University of Posts and Telecommunications Beijing China Department of Electrical and Computer Engineering Institute for Data Science and Computing University of Miami Coral Gables FL USA Charles L. Brown Department of Electrical and Computer Engineering University of Virginia Charlottesville VA USA School of Electrical and Computer Engineering Purdue University West Lafayette IN USA
In this paper, we consider the optimization of federated learning (FL) over a realistic wireless multiple-input multiple-output (MIMO) communication system with digital modulation and over-the-air computation (AirComp...
来源: 评论
AFF-Dehazing: Attention-based feature fusion network for low-light image Dehazing
AFF-Dehazing: Attention-based feature fusion network for low...
收藏 引用
作者: Zhou, Yu Chen, Zhihua Sheng, Bin Li, Ping Kim, Jinman Wu, Enhua Department of Computer Science and Engineering East China University of Science and Technology Shanghai China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Department of Computing The Hong Kong Polytechnic University Kowloon Hong Kong School of Information Technologies The University of Sydney Sydney Australia State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Faculty of Science and Technology University of Macau China
Images captured in haze conditions, especially at nighttime with low light, often suffer from degraded visibility, contrasts, and vividness, which makes it difficult to carry out the following vision tasks. In this ar... 详细信息
来源: 评论
Logical Relation Modeling and Mining in Hyperbolic Space for Recommendation
Logical Relation Modeling and Mining in Hyperbolic Space for...
收藏 引用
International Conference on Data engineering
作者: Yanchao Tan Hang Lv Zihao Zhou Wenzhong Guo Bo Xiong Weiming Liu Chaochao Chen Shiping Wang Carl Yang College of Computer and Data Science Fuzhou University Fuzhou China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China Institute for Artificial Intelligence University of Stuttgart Stuttgart Germany College of Computer Science Zhejiang University Hangzhou China Department of Computer Science Emory University Atlanta United States
The sparse interactions between users and items have aggravated the difficulty of their representations in recommender systems. Existing methods leverage tags to alleviate the sparsity problem but ignore prevalent log... 详细信息
来源: 评论
Efficient Graph Neural Network Driven Recurrent Reinforcement Learning for GNSS Position Correction  36
Efficient Graph Neural Network Driven Recurrent Reinforcemen...
收藏 引用
36th International Technical Meeting of the Satellite Division of the Institute of Navigation, ION GNSS+ 2023
作者: Zhao, Haoli Tang, Jianhao Li, Zhenni Wu, Zhuoyu Xie, Shengli Wu, Zhaofeng Liu, Ming Kumara, Banage T.G.S. School of Automation Guangdong University of Technology Guangzhou510006 China Guangdong-HongKong-Macao Joint Laboratory for Smart Discrete Manufacturing Guangzhou510006 China 111 Center for Intelligent Batch Manufacturing Based on IoT Technology Guangzhou510006 China Key Laboratory of Intelligent Detection and The Internet of Things in Manufacturing Guangzhou510006 China Guangdong Key Laboratory of IoT Information Technology Guangzhou510006 China Techtotop Microelectronics Technology Co. Ltd. Guangzhou510000 China Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong Department of Computing and Information Systems Sabaragamuwa University of Sri Lanka Belihuloya Sri Lanka
With the wide applications of the Global Navigation Satellite System (GNSS) in autonomous driving scenarios, the demand for high-precision positioning of navigation systems has increased dramatically in complex multip...
来源: 评论
Prediction of piRNA-mRNA interactions based on an interactive inference network
Prediction of piRNA-mRNA interactions based on an interactiv...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yajun Liu Ru Li Aimin Li Rong Fei Xie Guo Fang-Xiang Wu Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an University of Technology Xi'an China Department of Computer Science Department of Mechanical Engineering Division of Biomedical Engineering University of Saskatchewan Saskatoon Canada
As the largest class of small non-coding RNAs, piRNAs primarily present in the reproductive cells of mammals, which influence post-transcriptional processes of mRNAs in multiple ways. Effective methods for predicting ...
来源: 评论
Towards Energy-Efficiency: Integrating MATD3 Reinforcement Learning Method for Computational Offloading in RIS-Aided UAV-MEC Environments
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Wu, Liangshun Zhang, Cong Zhang, Bin Du, Jianbo Qu, Junsuo Key Laboratory of Embedded System and Service Computing Tongji University Ministry of Education Shanghai201804 China Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai201210 China School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai200240 China Xi'an Key Laboratory of Advanced Control and Intelligent Process School of Automation Xi'an University of Posts & Telecommunications Xi'an710061 China Xinjiang University of Political Science and Law Tumushuke832003 China School of Remote Sensing and Information Engineering Wuhan University Wuhan430079 China Department of Computer City University of Hong Kong 999077 Hong Kong School of Communications and Information Engineering Xi'an University of Posts & Telecommunications Xi'an710061 China
With the proliferation of IoT devices, there is an escalating demand for enhanced computing and communication capabilities. Mobile Edge computing (MEC) addresses this need by relocating computing resources to the netw... 详细信息
来源: 评论
UAV-Aided Covert Federated Learning Networks
收藏 引用
IEEE Network 2025年
作者: Wang, Chao Guo, Shaoyong Xiong, Zehui Xing, Chengwen Zhao, Nan Niyato, Dusit Karagiannidis, George Dalian University of Technology School of Information and Communication Engineering Dalian116024 China Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China Singapore University of Technology and Design Information Systems Technology and Design Pillar 487372 Singapore Beijing Institute of Technology School of Information and Electronics Beijing100081 China Nanyang Technological University College of Computing and Data Science 639798 Singapore Aristotle University of Thessaloniki Department of Electrical and Computer Engineering Greece
With the increasing emphasis on data privacy, federated learning (FL) networks show great potential through distributed training without directly sharing the raw data. However, the coverage of FL terrestrial servers i... 详细信息
来源: 评论
On the Equity of Nuclear Norm Maximization in Unsupervised Domain Adaptation
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Wenju Zhang, Xiang Liao, Qing Lan, Long Wang, Mengzhu Wang, Wei Peng, Baoyun Ding, Zhengming Institute for Quantum Information State Key Laboratory of High Performance Computing National University of Defense Technology Changsha China College of Computer National University of Defense Technology Changsha China Department of Computer Science and Technology Harbin Institute of Technology Shenzhen China DUT-RU International School of Information Science & Engineering Dalian University of Technology Dalian China Tulane University New OrleansLA United States
Nuclear norm maximization has shown the power to enhance the transferability of unsupervised domain adaptation model (UDA) in an empirical scheme. In this paper, we identify a new property termed equity, which indicat... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi... 详细信息
来源: 评论
Encryption with Image Steganography Based Data Hiding Technique in IIoT Environment
收藏 引用
computers, Materials & Continua 2022年 第7期72卷 1323-1338页
作者: Mahmoud Ragab Samah Alshehri Hani A.Alhadrami Faris Kateb Ehab Bahaudien Ashary SAbdel-khalek Information Technology Department Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia Centre of Artificial Intelligence for Precision Medicines King Abdulaziz UniversityJeddah21589Saudi Arabia Department of Mathematics Faculty of ScienceAl-Azhar UniversityNaser City11884CairoEgypt Department of Pharmacy Practice Faculty of PharmacyKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Medical Laboratory Technology Faculty of Applied Medical SciencesKing Abdulaziz UniversityJeddah21589Saudi Arabia Molecular Diagnostic Lab King Abdulaziz University HospitalKing Abdulaziz UniversityJeddah21589Saudi Arabia Special Infectious Agent Unit King Fahd Medical Research CenterKing Abdulaziz UniversityJeddah21589Saudi Arabia Electrical and Computer Engineering Department Faculty of EngineeringKing Abdulaziz UniversityJeddah21589Saudi Arabia Department of Mathematics Faculty of ScienceTaif UniversityTaif21944Saudi Arabia Department of Mathematics Faculty of ScienceSohag UniversitySohag82524Egypt
Rapid advancements of the Industrial Internet of Things(IIoT)and artificial intelligence(AI)pose serious security issues by revealing secret ***,security data becomes a crucial issue in IIoT communication where secrec... 详细信息
来源: 评论