咨询与建议

限定检索结果

文献类型

  • 638 篇 期刊文献
  • 445 篇 会议

馆藏范围

  • 1,083 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 726 篇 工学
    • 454 篇 计算机科学与技术...
    • 357 篇 软件工程
    • 169 篇 信息与通信工程
    • 110 篇 电气工程
    • 97 篇 控制科学与工程
    • 93 篇 电子科学与技术(可...
    • 58 篇 生物工程
    • 56 篇 机械工程
    • 47 篇 光学工程
    • 42 篇 动力工程及工程热...
    • 37 篇 仪器科学与技术
    • 34 篇 生物医学工程(可授...
    • 31 篇 化学工程与技术
    • 29 篇 材料科学与工程(可...
    • 21 篇 建筑学
    • 20 篇 交通运输工程
    • 19 篇 土木工程
  • 458 篇 理学
    • 204 篇 数学
    • 189 篇 物理学
    • 64 篇 生物学
    • 56 篇 统计学(可授理学、...
    • 49 篇 系统科学
    • 43 篇 化学
    • 20 篇 大气科学
  • 218 篇 管理学
    • 131 篇 管理科学与工程(可...
    • 96 篇 图书情报与档案管...
    • 45 篇 工商管理
  • 37 篇 医学
    • 33 篇 临床医学
    • 25 篇 基础医学(可授医学...
  • 23 篇 法学
    • 19 篇 社会学
  • 18 篇 农学
  • 15 篇 经济学
  • 10 篇 文学
  • 7 篇 教育学
  • 3 篇 艺术学
  • 2 篇 哲学
  • 2 篇 军事学

主题

  • 28 篇 feature extracti...
  • 23 篇 deep learning
  • 22 篇 semantics
  • 19 篇 higgs bosons
  • 18 篇 hadron colliders
  • 15 篇 training
  • 14 篇 computer science
  • 14 篇 laboratories
  • 14 篇 wireless sensor ...
  • 14 篇 clustering algor...
  • 13 篇 convolution
  • 13 篇 data mining
  • 12 篇 computational mo...
  • 12 篇 algorithm design...
  • 12 篇 blockchain
  • 12 篇 accuracy
  • 12 篇 top quark
  • 12 篇 information proc...
  • 11 篇 internet of thin...
  • 11 篇 image segmentati...

机构

  • 91 篇 faculty of scien...
  • 91 篇 departamento de ...
  • 91 篇 department for p...
  • 91 篇 institute of phy...
  • 90 篇 department of ph...
  • 90 篇 department of ph...
  • 90 篇 dipartimento di ...
  • 90 篇 yerevan physics ...
  • 90 篇 kirchhoff-instit...
  • 90 篇 institute of phy...
  • 89 篇 graduate school ...
  • 89 篇 physikalisches i...
  • 88 篇 department of ph...
  • 88 篇 physics departme...
  • 87 篇 institut für ast...
  • 87 篇 instituto de fís...
  • 87 篇 national researc...
  • 86 篇 fakultät für phy...
  • 86 篇 department of ph...
  • 85 篇 dipartimento di ...

作者

  • 82 篇 f. buehrer
  • 82 篇 a. t. law
  • 82 篇 c. alexa
  • 82 篇 j. m. izen
  • 82 篇 s. veneziano
  • 82 篇 d. di valentino
  • 82 篇 g. bella
  • 82 篇 j. strandberg
  • 82 篇 d. calvet
  • 82 篇 c. amelung
  • 82 篇 n. orlando
  • 82 篇 c. gumpert
  • 82 篇 h. a. gordon
  • 82 篇 y. tayalati
  • 82 篇 g. spigo
  • 82 篇 v. chiarella
  • 82 篇 f. siegert
  • 82 篇 a. c. könig
  • 82 篇 a. dimitrievska
  • 82 篇 f. deliot

语言

  • 1,023 篇 英文
  • 35 篇 中文
  • 27 篇 其他
检索条件"机构=Jiangsu Key Laboratory of Computer Information Process Technology"
1083 条 记 录,以下是61-70 订阅
排序:
Investigation of cavitation bubble collapse in hydrophobic concave using the pseudopotential multi-relaxation-time lattice Boltzmann method
收藏 引用
Chinese Physics B 2021年 第4期30卷 333-341页
作者: Minglei Shan Yu Yang Xuemeng Zhao Qingbang Han Cheng Yao Jiangsu Key Laboratory of Power Transmission and Distribution Equipment Technology Hohai UniversityChangzhou 213022China College of Computer and Information Hohai UniversityNanjing 210000China
The interaction between cavitation bubble and solid surface is a fundamental topic which is deeply concerned for the utilization or avoidance of cavitation *** complexity of this topic is that the cavitation bubble co... 详细信息
来源: 评论
Minimum length key in MST cryptosystems
收藏 引用
Science China(information Sciences) 2017年 第5期60卷 142-152页
作者: Haibo HONG Licheng WANG Haseeb AHMAD Yixian YANG Zhiguo QU School of Computer Science and Information Engineering Zhejiang Gongshang University Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and Telecommunications Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science & Technology
As a special factorization category of finite groups, logarithmic signature(LS) is used as the main component of cryptographic keys that operate within secret key cryptosystems such as PGM and public key cryptosystems... 详细信息
来源: 评论
The M-computations induced by accessibility relations in nonstandard models M of Hoare logic
收藏 引用
Frontiers of computer Science 2016年 第4期10卷 717-725页
作者: Cungen CAO Yuefei SUI Zaiyue ZHANG Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Department of Computer Science Jiangsu University of Sciences and Technology Zhenjiang 212003 China
Hoare logic is a logic used as a way of specifying semantics of programming languages, which has been extended to be a separation logic to reason about mutable heap structure. In a model M of Hoare logic, each program... 详细信息
来源: 评论
An Integration Testing Framework and Evaluation Metric for Vulnerability Mining Methods
收藏 引用
China Communications 2018年 第2期15卷 190-208页
作者: Jin Li Jinfu Chen Minhuan Huang Minmin Zhou Wanggen Xie Zhifeng Zeng Shujie Chen Zufa Zhang National key laboratory of science and technology on information system security Beijing institute of system engineering School of Computer Science and Communication Engineering Jiangsu University
Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid devel... 详细信息
来源: 评论
Hierarchical Structures on Multigranulation Spaces
收藏 引用
Journal of computer Science & technology 2012年 第6期27卷 1169-1183页
作者: 杨习贝 钱宇华 杨静宇 School of Computer Science and Engineering Jiangsu University of Science and Technology School of Computer Science and Technology Nanjing University of Science and Technology Key Laboratory of Computational Intelligence and Chinese Information Processing of Ministry of Education School of Computer and Information Technology Shanxi University
Though many hierarchical structures have been proposed to analyze the finer or coarser relationships between two granulation spaces, these structures can only be used to compare the single granulation spaces. However,... 详细信息
来源: 评论
Dual-Mode Resonant Sectorial Monopole Antenna with Stable Backfire Gain
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1478-1486页
作者: Feiyan JI Heng ZHANG Xiuqiong XING Wenjun LU Lei ZHU Jiangsu Key Laboratory of Wireless Communications Nanjing University of Posts and Telecommunications Key Laboratory of Wireless Sensor Network & Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Department of Electrical and Computer Engineering Faculty of Science and Technology University of Macau
A novel design approach to wideband, dual-mode resonant monopole antenna with stable, enhanced backfire gain is advanced. The sectorial monopole evolves from a linear, 0.75-wavelength electric prototype monopole under... 详细信息
来源: 评论
Modeling curve dynamics and spatial geometry characteristics of rice leaves
收藏 引用
Journal of Integrative Agriculture 2017年 第10期16卷 2177-2190页
作者: ZHANG Yong-hui TANG Liang LIU Xiao-jun LIU Lei-lei CAO Wei-xing ZHU Yan Computer Engineering School Weifang University National Engineering and Technology Center for Information Agriculture/Key Laboratory for Crop System Analysis and Decision Making Ministry of Agriculture/Jiangsu Key Laboratory for Information Agriculture/Jiangsu Collaborative Innovation Center for Modern Crop Production/Nanjing Agricultural University
The objective of this work was to develop a dynamic model for describing leaf curves and a the rice leaf (including sub-models for unexpanded leaf blades, expanded leaf blades, and dimensional (3D) dynamic visualiz... 详细信息
来源: 评论
Load Balanced Coding Aware Multipath Routing for Wireless Mesh Networks
收藏 引用
Chinese Journal of Electronics 2015年 第1期24卷 8-12页
作者: SHAO Xing WANG Ruchuan HUANG Haiping SUN Lijuan College of Computer Nanjing University of Posts and Telecommunications College of Information Engneering Yancheng Institutue of Technology Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Key Lab of Broadband Wireless Communication and Sensor Network Technology
The growth of network coding opportunities is considered the unique optimization goal by most current network coding based routing algorithms for wireless mesh networks. This usually results in flows aggregation probl... 详细信息
来源: 评论
Enhancing Interest Forwarding for Fast Recovery from Unanticipated Data Access Failure in NDN
收藏 引用
China Communications 2019年 第7期16卷 120-130页
作者: Xiaoyan Hu Xuhui Liu Lixia Zhao Jian Gong Guang Cheng School of Cyber Science & Engineering Southeast University Nanjing 211189 China Key Laboratory of Computer Network and Information Integration of Ministry of Education Southeast University Nanjing China Key Laboratory of Computer Network Technology of Jiangsu Province Nanjing China
We show that an aggregated Interest in Named Data Networking (NDN) may fail to retrieve desired data since the Interest previously sent upstream for the same content is judged as a duplicate one and then dropped by an... 详细信息
来源: 评论
An Improvement of Coherent Semantic Attention for Image Inpainting  1
收藏 引用
6th International Conference on Artificial Intelligence and Security,ICAIS 2020
作者: Wang, Weiqing Gu, Enming Fang, Wei School of Computer & Software Jiangsu Engineering Center of Network Monitoring Nanjing University of Information Science and Technology Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Jiangsu Key Laboratory of Computer Information Process Technology SooChow University Suzhou China
In some image restoration algorithms of the past, they often do not consider the continuity between pixels, and the internal features of the hole region. The mapping to the image semantically does not take into accoun... 详细信息
来源: 评论