咨询与建议

限定检索结果

文献类型

  • 2,425 篇 期刊文献
  • 1,900 篇 会议
  • 1 册 图书

馆藏范围

  • 4,326 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,758 篇 工学
    • 1,855 篇 计算机科学与技术...
    • 1,520 篇 软件工程
    • 584 篇 信息与通信工程
    • 333 篇 电气工程
    • 325 篇 生物工程
    • 318 篇 控制科学与工程
    • 235 篇 化学工程与技术
    • 209 篇 电子科学与技术(可...
    • 180 篇 生物医学工程(可授...
    • 167 篇 光学工程
    • 158 篇 机械工程
    • 118 篇 材料科学与工程(可...
    • 118 篇 动力工程及工程热...
    • 92 篇 土木工程
    • 91 篇 交通运输工程
    • 89 篇 仪器科学与技术
    • 84 篇 建筑学
  • 1,649 篇 理学
    • 773 篇 数学
    • 496 篇 物理学
    • 406 篇 生物学
    • 272 篇 统计学(可授理学、...
    • 256 篇 化学
    • 104 篇 系统科学
  • 716 篇 管理学
    • 405 篇 管理科学与工程(可...
    • 328 篇 图书情报与档案管...
    • 150 篇 工商管理
  • 243 篇 医学
    • 191 篇 临床医学
    • 119 篇 基础医学(可授医学...
  • 129 篇 法学
    • 100 篇 社会学
  • 88 篇 农学
  • 80 篇 经济学
    • 80 篇 应用经济学
  • 38 篇 教育学
  • 14 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 145 篇 semantics
  • 123 篇 feature extracti...
  • 116 篇 deep learning
  • 108 篇 training
  • 83 篇 computational mo...
  • 66 篇 machine learning
  • 65 篇 accuracy
  • 61 篇 data mining
  • 61 篇 federated learni...
  • 60 篇 convolution
  • 55 篇 predictive model...
  • 55 篇 data models
  • 52 篇 graph neural net...
  • 48 篇 hadrons
  • 47 篇 contrastive lear...
  • 45 篇 neural networks
  • 45 篇 adaptation model...
  • 42 篇 object detection
  • 42 篇 visualization
  • 40 篇 task analysis

机构

  • 227 篇 university of ch...
  • 172 篇 iccub universita...
  • 171 篇 department of ph...
  • 171 篇 infn sezione di ...
  • 169 篇 infn sezione di ...
  • 169 篇 yandex school of...
  • 166 篇 cavendish labora...
  • 166 篇 school of physic...
  • 166 篇 infn sezione di ...
  • 164 篇 infn sezione di ...
  • 161 篇 van swinderen in...
  • 160 篇 horia hulubei na...
  • 160 篇 department of ph...
  • 158 篇 h.h. wills physi...
  • 152 篇 imperial college...
  • 140 篇 stfc rutherford ...
  • 137 篇 universiteit maa...
  • 137 篇 institute of par...
  • 132 篇 center for high ...
  • 125 篇 massachusetts in...

作者

  • 117 篇 beiter a.
  • 117 篇 arzymatov k.
  • 117 篇 barter w.
  • 117 篇 brundu d.
  • 117 篇 bellee v.
  • 103 篇 bowcock t.j.v.
  • 103 篇 casse g.
  • 103 篇 blake t.
  • 103 篇 borsato m.
  • 103 篇 betancourt c.
  • 103 篇 belin s.
  • 103 篇 amato s.
  • 103 篇 boettcher t.
  • 102 篇 bobulska d.
  • 102 篇 afsharnia h.
  • 101 篇 belavin v.
  • 101 篇 bediaga i.
  • 101 篇 cali s.
  • 101 篇 baryshnikov f.
  • 101 篇 bjørn m.

语言

  • 3,683 篇 英文
  • 576 篇 其他
  • 81 篇 中文
  • 3 篇 德文
  • 3 篇 法文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=Hubei Key Laboratory of Big Data in Science and Technology"
4326 条 记 录,以下是181-190 订阅
排序:
Pushing AI to wireless network edge: an overview on integrated sensing, communication, and computation towards 6G
收藏 引用
science China(Information sciences) 2023年 第3期66卷 7-25页
作者: Guangxu ZHU Zhonghao LYU Xiang JIAO Peixi LIU Mingzhe CHEN Jie XU Shuguang CUI Ping ZHANG Shenzhen Research Institute of Big Data Future Network of Intelligence Institute (FNii) The Chinese University of Hong Kong (Shenzhen) School of Science and Engineering (SSE) The Chinese University of Hong Kong (Shenzhen) State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Peking University Department of Electrical and Computer Engineering and Institute for Data Science and Computing University of Miami Peng Cheng Laboratory State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications
Pushing artificial intelligence(AI) from central cloud to network edge has reached board consensus in both industry and academia for materializing the vision of artificial intelligence of things(AIoT) in the sixth-gen... 详细信息
来源: 评论
A Provably Secure Certificateless Signature Scheme With Anonymity for Healthcare IIoT
收藏 引用
IEEE Internet of Things Journal 2025年 第13期12卷 23797-23808页
作者: Qiao, Zirui Xu, Ran Zhou, Yanwei Yang, Bo Zhu, Tianqing Zhang, Mingwu Xi’an University of Posts and Telecommunications School of Cyberspace Security Xi’an China Ministry of Education Key Laboratory of Data Protection and Intelligent Management China Shaanxi Normal University School of Computer Science Xi’an China City University of Macau Faculty of Data Science Macau China Hubei University of Technology School of Computer Wuhan China
The industrial Internet of Things (IIoT) is changing our way of life and work. As the number of mobile devices connected to IIoT increases, users will face many security challenges such as insecure communication envir... 详细信息
来源: 评论
An Effective Security Comparison Protocol in Cloud Computing
收藏 引用
Computers, Materials & Continua 2023年 第6期75卷 5141-5158页
作者: Yuling Chen Junhong Tao Tao Li Jiangyuan Cai Xiaojun Ren State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550000China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin550000China POWERCHINA Guizhou Electric Power Engineering Co. Ltd.Guiyang550000China Blockchain Laboratory of Agricultural Vegetables Weifang University of Science and TechnologyWeifang261000China
With the development of cloud computing technology,more and more data owners upload their local data to the public cloud server for storage and *** this can save customers’operating costs,it also poses privacy and se... 详细信息
来源: 评论
Research on Home Energy Consumption Optimization Based on User Habit Analysis
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2023年 第3期8卷 839-855页
作者: Sung, Tien-Wen Huang, Zeming Liang, Qiaoxin Lin, Tao Kong, Lingping College of Computer Science and Mathematics Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fujian Fuzhou350118 China Department of Computer Science VSB-Technical University of Ostrava Czech Republic
With the development of smart electricity technology and demand response, optimization of household electricity consumption behavior has become an important research element for energy saving in residential buildings.... 详细信息
来源: 评论
An in-depth Exploration of LAMOST Unknown Spectra Based on Density Clustering
收藏 引用
Research in Astronomy and Astrophysics 2023年 第5期23卷 52-65页
作者: Hai-Feng Yang Xiao-Na Yin Jiang-Hui Cai Yu-Qing Yang A-Li Luo Zhong-Rui Bai Li-Chan Zhou Xu-Jun Zhao Ya-Ling Xun Shanxi Key Laboratory of Big Data Analysis and Parallel Computing Taiyuan University of Science and TechnologyTaiyuan 030024China School of Computer Science and Technology Taiyuan University of Science and TechnologyTaiyuan 030024China School of Computer Science and Technology North University of ChinaTaiyuan 030051China National Astronomical Observatories Chinese Academy of SciencesBeijing 100101China
Large sky Area Multi-Object fiber Spectroscopic Telescope(LAMOST) has completed the observation of nearly 20 million celestial objects,including a class of spectra labeled “Unknown.” Besides low signal-to-noise rati... 详细信息
来源: 评论
A potential game-based outsourcing computation framework for multiple calculators
收藏 引用
Digital Communications and Networks 2022年 第5期8卷 654-663页
作者: Duo Zhang Youliang Tian Linjie Wang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China School of Mathematics and Statistics Guizhou UniversityGuiyang550025China
Outsourcing computation enables a computationally weak client to outsource the computation of a function f to a more powerful but untrusted *** traditional outsourcing computation model forbids communication between p... 详细信息
来源: 评论
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection  31
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
31st IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2024
作者: Chen, Kang Wen, Ming Jia, Haoxiang Wu, Rongxin Jin, Hai Wuhan430074 China Jin YinHu Laboratory Wuhan430074 China School of Informatics Xiamen University Xiamen361005 China School of Computer Science and Technology HUST Wuhan430074 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论
Two-Layer Information Granulation:Mapping-Equivalence Neighborhood Rough Set and Its Attribute Reduction
收藏 引用
Intelligent Automation & Soft Computing 2023年 第8期37卷 2059-2075页
作者: Changshun Liu Yan Liu Jingjing Song Taihua Xu School of Computer Jiangsu University of Science and TechnologyZhenjiang212100China Key Laboratory of Oceanographic Big Data Mining&Application of Zhejiang Province Zhejiang Ocean UniversityZhoushan316022China
Attribute reduction,as one of the essential applications of the rough set,has attracted extensive attention from *** granulation is a key step of attribute reduction,and its efficiency has a significant impact on the ... 详细信息
来源: 评论
DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection
收藏 引用
science China(Information sciences) 2023年 第3期66卷 289-290页
作者: Axin XIANG Hongfeng GAO Youliang TIAN Liang WAN College of Computer Science and Technology Guizhou University Institute of Cryptography and Data Security Guizhou University Network and Information Management Center Guizhou University State Key Laboratory of Public Big Data Guizhou University Institute of Computer Software and Theory Guizhou University
Dear editor, key security is of great practical significance and demand to guarantee the security of digital assets in the blockchain system. At present, users prefer to escrow their assets on centralized institutions...
来源: 评论
Local and Global Feature-Aware Dual-Branch Networks for Plant Disease Recognition
收藏 引用
植物表型组学(英文) 2024年 第4期6卷 828-840页
作者: Jianwu Lin Xin Zhang Yongbin Qin Shengxian Yang Xingtian Wen Tomislav Cernava Quirico Migheli Xiaoyulong Chen Text Computing & Cognitive Intelligence Engineering Research Center of National Education Ministry College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China College of Big Data and Information Engineering Guizhou UniversityGuiyang 550025China Guizhou-Europe Environmental Biotechnology and Agricultural Informatics Oversea Innovation Center in Guizhou University Guizhou Provincial Science and Technology DepartmentGuiyang 550025China Text Computing & Cognitive Intelligence Engineering Research Center of National Education Ministry College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China College of Big Data and Information Engineering Guizhou UniversityGuiyang 550025China Guizhou-Europe Environmental Biotechnology and Agricultural Informatics Oversea Innovation Center in Guizhou University Guizhou Provincial Science and Technology DepartmentGuiyang 550025China College of Big Data and Information Engineering Guizhou UniversityGuiyang 550025China School of Biological Sciences Faculty of Environmental and Life SciencesUniversity of SouthamptonSouthampton S017 1BJUK Dipartimento di Agraria and NRD-Nucleo di Ricerca sulla Desertificazione Università degli Studi di SassariSassariItaly Guizhou-Europe Environmental Biotechnology and Agricultural Informatics Oversea Innovation Center in Guizhou University Guizhou Provincial Science and Technology DepartmentGuiyang 550025China College of Life Sciences Guizhou UniversityGuiyang 550025China
Accurate identification of plant diseases is important for ensuring the safety of agricultural *** neural networks(CNNs)and visual transformers(VTs)can extract effective representations of images and have been widely ... 详细信息
来源: 评论