咨询与建议

限定检索结果

文献类型

  • 416 篇 会议
  • 287 篇 期刊文献

馆藏范围

  • 703 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 425 篇 工学
    • 279 篇 计算机科学与技术...
    • 213 篇 软件工程
    • 135 篇 信息与通信工程
    • 79 篇 电子科学与技术(可...
    • 55 篇 控制科学与工程
    • 54 篇 光学工程
    • 51 篇 电气工程
    • 39 篇 生物工程
    • 32 篇 仪器科学与技术
    • 31 篇 机械工程
    • 26 篇 网络空间安全
    • 19 篇 安全科学与工程
    • 17 篇 生物医学工程(可授...
    • 14 篇 动力工程及工程热...
    • 14 篇 化学工程与技术
    • 13 篇 材料科学与工程(可...
    • 13 篇 交通运输工程
    • 9 篇 航空宇航科学与技...
  • 202 篇 理学
    • 95 篇 数学
    • 63 篇 物理学
    • 42 篇 生物学
    • 30 篇 系统科学
    • 29 篇 统计学(可授理学、...
    • 24 篇 化学
  • 118 篇 管理学
    • 76 篇 管理科学与工程(可...
    • 49 篇 图书情报与档案管...
    • 28 篇 工商管理
  • 19 篇 医学
    • 15 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 9 篇 经济学
    • 9 篇 应用经济学
  • 8 篇 法学
  • 3 篇 教育学
  • 2 篇 军事学

主题

  • 26 篇 semantics
  • 24 篇 computer network...
  • 21 篇 timing
  • 21 篇 real time system...
  • 20 篇 delay
  • 18 篇 computational mo...
  • 18 篇 feature extracti...
  • 16 篇 throughput
  • 16 篇 bandwidth
  • 16 篇 performance anal...
  • 15 篇 quality of servi...
  • 15 篇 processor schedu...
  • 14 篇 robustness
  • 12 篇 wireless sensor ...
  • 12 篇 algorithm design...
  • 12 篇 protocols
  • 11 篇 optimization
  • 11 篇 predictive model...
  • 11 篇 embedded system
  • 11 篇 hardware

机构

  • 35 篇 institute of ima...
  • 25 篇 hubei key labora...
  • 24 篇 school of comput...
  • 24 篇 jd explore acade...
  • 20 篇 institute of com...
  • 19 篇 national enginee...
  • 18 篇 school of comput...
  • 17 篇 school of comput...
  • 17 篇 institute of com...
  • 16 篇 the university o...
  • 15 篇 hubei luojia lab...
  • 12 篇 national enginee...
  • 12 篇 institute of art...
  • 12 篇 national enginee...
  • 11 篇 hubei key labora...
  • 10 篇 school of comput...
  • 9 篇 key laboratory o...
  • 9 篇 school of comput...
  • 9 篇 national enginee...
  • 8 篇 department of co...

作者

  • 72 篇 du bo
  • 36 篇 tao dacheng
  • 26 篇 liu juhua
  • 21 篇 zhai guangtao
  • 20 篇 ernst rolf
  • 18 篇 rolf ernst
  • 17 篇 bo du
  • 17 篇 ding liang
  • 17 篇 r. ernst
  • 16 篇 zhong qihuang
  • 14 篇 陈景标
  • 12 篇 luo yong
  • 12 篇 min xiongkuo
  • 11 篇 yang yang
  • 11 篇 liu weiwei
  • 11 篇 weiwei liu
  • 10 篇 shen li
  • 10 篇 zhang liangpei
  • 9 篇 hu ruimin
  • 9 篇 mang ye

语言

  • 657 篇 英文
  • 37 篇 其他
  • 7 篇 中文
  • 1 篇 德文
  • 1 篇 日文
检索条件"机构=Institute of Computer and communication Network Engineering"
703 条 记 录,以下是1-10 订阅
排序:
Resource Allocation in 6G network for High-Speed Train Using D2D Outband communication  3rd
Resource Allocation in 6G Network for High-Speed Train Using...
收藏 引用
3rd International Conference on Machine Vision and Augmented Intelligence, MAI 2023
作者: Garg, Aakansha Arya, Rajeev Singh, Maheshwari Prasad Wireless Sensor Network Lab Department of Electronics and Communication Engineering Patna India Department of Computer Science and Engineering National Institute of Technology Patna India
The growth of 6G results in rising data transmission rate in static scenario. To achieve fast communication and computation with quality service in high-speed train is a challenge. This is due to fast handover and Dop... 详细信息
来源: 评论
Dual-Mode Resonant Sectorial Monopole Antenna with Stable Backfire Gain
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1478-1486页
作者: Feiyan JI Heng ZHANG Xiuqiong XING Wenjun LU Lei ZHU Jiangsu Key Laboratory of Wireless Communications Nanjing University of Posts and Telecommunications Key Laboratory of Wireless Sensor Network & Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Department of Electrical and Computer Engineering Faculty of Science and Technology University of Macau
A novel design approach to wideband, dual-mode resonant monopole antenna with stable, enhanced backfire gain is advanced. The sectorial monopole evolves from a linear, 0.75-wavelength electric prototype monopole under... 详细信息
来源: 评论
A KUSHO WORDS RECOGNITION METHOD FOR CONTACTLESS INFORMATION MANAGEMENT IN RESTAURANT KITCHENS  51
A KUSHO WORDS RECOGNITION METHOD FOR CONTACTLESS INFORMATION...
收藏 引用
51st International Conference on computers and Industrial engineering, CIE 2024
作者: Usuki, Risa Usuki, Jun Department of Computer Science and Engineering Waseda University Tokyo Japan Department of Information Network and Communication Kanagawa Institute of Technology Kanagawa Japan
Advances in IT technology have led to research into KUSHO recognition, which enables the non-contact operation of devices without the use of devices such as keyboards or controllers. This is a technology that transmit... 详细信息
来源: 评论
Multi-class Bitcoin mixing service identification based on graph classification
收藏 引用
Digital communications and networks 2024年 第6期10卷 1881-1893页
作者: Xiaoyan Hu Meiqun Gui Guang Cheng Ruidong Li Hua Wu School of Cyber Science&Engineering Southeast UniversityNanjing 211189China Purple Mountain Laboratories for Network and Communication Security Nanjing 211111China Jiangsu Provincial Engineering Research Center of Security for Ubiquitous Network Nanjing 211189China Key Laboratory of Computer Network and Information Integration Southeast UniversityMinistry of EducationChina Research Base of International Cyberspace Governance Southeast UniversityNanjing 211189China Institute of Science and Engineering Kanazawa UniversityKakumaKanazawa920-1192Japan
Due to its anonymity and decentralization,Bitcoin has long been a haven for various illegal *** generally legalize illicit funds by Bitcoin mixing ***,it is critical to investigate the mixing services in cryptocurrenc... 详细信息
来源: 评论
Resource Allocation in D2D based Mobile Edge Computing System for Applications in Rural Areas  8
Resource Allocation in D2D based Mobile Edge Computing Syste...
收藏 引用
8th International Conference on Computing in engineering and Technology, ICCET 2023
作者: Garg, Aakansha Arya, Rajeev Singh, Maheshwari Prasad Wireless Sensor Network Lab Department of Electronics & Communication Engineering India Department of Computer Science and Engineering National Institute of Technology Patna India
With the development with 5G the mobile connectivity in rural areas has increased. The use of artificial intelligence (AI) and internet of things (IOT) has increased its horizon in some applications like Agriculture, ... 详细信息
来源: 评论
A Provable Decision Rule for Out-of-Distribution Detection  41
A Provable Decision Rule for Out-of-Distribution Detection
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Ma, Xinsong Zou, Xin Liu, Weiwei School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China
Out-of-distribution (OOD) detection task plays the key role in reliable and safety-critical applications. Existing researches mainly devote to designing or training the powerful score function but overlook investigati...
来源: 评论
Sequential Kernel Goodness-of-fit Testing  41
Sequential Kernel Goodness-of-fit Testing
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Zhou, Zhengyu Liu, Weiwei School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China
Goodness-of-fit testing, a classical statistical tool, has been extensively explored in the batch setting, where the sample size is ***, practitioners often prefer methods that adapt to the complexity of a problem rat...
来源: 评论
Cloth-aware Augmentation for Cloth-generalized Person Re-identification  24
Cloth-aware Augmentation for Cloth-generalized Person Re-ide...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Liu, Fangyi Ye, Mang Du, Bo National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence School of Computer Science Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China
Person re-identification (ReID) is crucial in video surveillance, aiming to match individuals across different camera views while cloth-changing person re-identification (CC-ReID) focuses on pedestrians changing attir... 详细信息
来源: 评论
A Theoretical Analysis of Backdoor Poisoning Attacks in Convolutional Neural networks  41
A Theoretical Analysis of Backdoor Poisoning Attacks in Conv...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Li, Boqi Liu, Weiwei School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China
The rising threat of backdoor poisoning attacks (BPAs) on Deep Neural networks (DNNs) has become a significant concern in recent years. In such attacks, the adversaries strategically target a specific class and genera... 详细信息
来源: 评论
Devil is in Details: Locality-Aware 3D Abdominal CT Volume Generation for Self-Supervised Organ Segmentation  24
Devil is in Details: Locality-Aware 3D Abdominal CT Volume G...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Wang, Yuran Wan, Zhijing Qiu, Yansheng Wang, Zheng National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering Institute of Artificial Intelligence School of Computer Science Wuhan University Wuhan China
In the realm of medical image analysis, self-supervised learning (SSL) techniques have emerged to alleviate labeling demands, while still facing the challenge of training data scarcity owing to escalating resource req... 详细信息
来源: 评论