咨询与建议

限定检索结果

文献类型

  • 860 篇 会议
  • 800 篇 期刊文献

馆藏范围

  • 1,660 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,095 篇 工学
    • 692 篇 计算机科学与技术...
    • 588 篇 软件工程
    • 234 篇 信息与通信工程
    • 135 篇 控制科学与工程
    • 135 篇 生物工程
    • 118 篇 电气工程
    • 106 篇 电子科学与技术(可...
    • 96 篇 光学工程
    • 90 篇 核科学与技术
    • 79 篇 机械工程
    • 76 篇 生物医学工程(可授...
    • 53 篇 仪器科学与技术
    • 50 篇 化学工程与技术
    • 43 篇 材料科学与工程(可...
    • 34 篇 动力工程及工程热...
    • 33 篇 网络空间安全
    • 31 篇 交通运输工程
    • 29 篇 土木工程
  • 708 篇 理学
    • 330 篇 物理学
    • 281 篇 数学
    • 147 篇 生物学
    • 93 篇 统计学(可授理学、...
    • 52 篇 化学
    • 41 篇 系统科学
  • 265 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 126 篇 图书情报与档案管...
    • 42 篇 工商管理
  • 63 篇 医学
    • 49 篇 临床医学
    • 44 篇 基础医学(可授医学...
  • 41 篇 法学
    • 35 篇 社会学
  • 20 篇 经济学
  • 20 篇 教育学
  • 19 篇 农学
  • 9 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 100 篇 hadron colliders
  • 47 篇 deep learning
  • 37 篇 semantics
  • 33 篇 feature extracti...
  • 32 篇 training
  • 29 篇 w & z bosons
  • 28 篇 higgs bosons
  • 26 篇 data mining
  • 24 篇 computational mo...
  • 22 篇 graph neural net...
  • 21 篇 machine learning
  • 20 篇 accuracy
  • 20 篇 data models
  • 18 篇 object detection
  • 18 篇 convolutional ne...
  • 17 篇 convolution
  • 16 篇 semantic segment...
  • 16 篇 relativistic hea...
  • 16 篇 computer vision
  • 16 篇 forecasting

机构

  • 140 篇 irfu cea univers...
  • 133 篇 yerevan physics ...
  • 130 篇 national and kap...
  • 130 篇 centro brasileir...
  • 130 篇 istanbul technic...
  • 128 篇 university of sp...
  • 128 篇 indian institute...
  • 127 篇 universidad iber...
  • 126 篇 brunel universit...
  • 126 篇 charles universi...
  • 125 篇 università di to...
  • 125 篇 academy of scien...
  • 125 篇 infn sezione di ...
  • 124 篇 department of ph...
  • 123 篇 zhejiang univers...
  • 122 篇 infn sezione di ...
  • 122 篇 department of ph...
  • 121 篇 imperial college...
  • 121 篇 university of de...
  • 119 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 1,549 篇 英文
  • 78 篇 其他
  • 35 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Application Technology"
1660 条 记 录,以下是1421-1430 订阅
排序:
Analysis of urban traffic based on taxi GPS data
Analysis of urban traffic based on taxi GPS data
收藏 引用
5th FTRA International Conference on computer Science and its applications, CSA 2013
作者: Li, Meng Li, Ru-Tong Xia, Yong Qin, Zhi-Guang School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Key Laboratory of Calculation and Application Service of Shenzhen Popular High Performance Computers of Guangdong Province Shenzhen 518000 China
Recently, the problem of traffic jam in major cities is getting worse. By leveraging the taxi GPS data of Shenzhen, this paper analyzes the urban traffic status and proposes rational suggestions for urban traffic mana... 详细信息
来源: 评论
An Extended UML Method for the Verification of Security Protocols
An Extended UML Method for the Verification of Security Prot...
收藏 引用
IEEE International Conference on Engineering of Complex computer Systems
作者: Gang Shen Xiaohong Li Ruitao Feng Guangquan Xu Jing Hu Zhiyong Feng School of Computer Science and Technology Tianjin Key Laboratory of Cognitive Computing and Application Tianjin China
This paper presents a formal modeling method of security protocols based on the extended UML framework. In order to simplify the process and reduce the difficulty of security protocol modelling, extending mechanisms f... 详细信息
来源: 评论
OOPN-SRAM: A Novel Method for Software Risk Assessment
OOPN-SRAM: A Novel Method for Software Risk Assessment
收藏 引用
IEEE International Conference on Engineering of Complex computer Systems
作者: Xiaofei Wu Xiaohong Li Ruitao Feng Guangquan Xu Jing Hu Zhiyong Feng School of Computer Science and Technology Tianjin Key Laboratory of Cognitive Computing and Application Tianjin China
This paper proposes a Software Risk Assessment Method based on Object-Oriented Petri Net (OOPN-SRAM), in which risk assessment procedure is divided into four steps, expressed as four corresponding objects, including a... 详细信息
来源: 评论
The design and implementation of a campus network automatic certification in a router
The design and implementation of a campus network automatic ...
收藏 引用
2014 2nd International Conference on Frontiers in computer Education(ICFCE 2014)
作者: Ting Zhao XiHan Li Lei Zhang Gang Zhang School of Computer Science and Technology Tianjin University Tianjin Key Laboratory of Cognitive Computing and Application
Against the tedious process of PPPoE campus network access authentication on the web page,the logic flow of the client used in the router to complete the automatic certification,and part of the kernel technology are g... 详细信息
来源: 评论
Bayesian statistical inference-based estimation of distribution algorithm for the re-entrant job-shop scheduling problem with sequence-dependent setup times
Bayesian statistical inference-based estimation of distribut...
收藏 引用
10th International Conference on Intelligent Computing, ICIC 2014
作者: Chen, Shao-Feng Qian, Bin Liu, Bo Hu, Rong Zhang, Chang-Sheng Department of Automation Kunming University of Science and Technology Kunming 650500 China Key Laboratory of Computer Technologies Application of Yunnan Province Kunming 650500 China Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing 100190 China
In this paper, a bayesian statistical inference-based estimation of distribution algorithm (BEDA) is proposed for the re-entrant job-shop scheduling problem with sequence-dependent setup times (RJSSPST) to minimize th... 详细信息
来源: 评论
Mining Specification of Insecure Browser Extension Behavior
Mining Specification of Insecure Browser Extension Behavior
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Hongbin Pei Xiaohong Li Guangquan Xu Zhiyong Feng School of Computer Science and Technology Tianjin Key Laboratory of Cognitive Computing and Application Tianjin University Tianjin China
In this paper, a method about how to identify insecure behaviors of browser extensions is proposed. Typically, the identification of insecure extension behaviors is based on knowledge which is got by investigating kno... 详细信息
来源: 评论
High-precision Python-NOVAS software for a Chinese spectral radio heliograph
High-precision Python-NOVAS software for a Chinese spectral ...
收藏 引用
2014 International Conference on computer Science and Systems Engineering(CSSE2014)
作者: B.Wei M.Xiao F.Wang H.Deng Yunnan Computer Technology Application Key Laboratory Kunming University of Science and Technology Yunnan Astronomical Observatories Chinese Academy of Sciences
High-precision target position computing is a fundamental issue in astronomical research. Aiming at the requirements of high-precision positional computing in data processing of a Chinese spectral radio heliograph(CSR... 详细信息
来源: 评论
A cloaking-based approach to protect location privacy in location-based services  33
A cloaking-based approach to protect location privacy in loc...
收藏 引用
Proceedings of the 33rd Chinese Control Conference, CCC 2014
作者: Zheng, Jiangyu Tan, Xiaobin Zou, Cliff Niu, Yukun Zhu, Jin CAS Key Laboratory of Technology in Geo-spatial Information Processing and Application System University of Science and Technology of China Hefei230026 China Department of Automation University of Science and Technology of China Hefei230026 China Department of Electrical Engineering and Computer Science University of Central Florida OrlandoFL32816-2362 United States
With the widespread use of mobile devices, the location-based service (LBS) applications become increasingly popular, which introduces the new security challenge to protect user's location privacy. On one hand, a ... 详细信息
来源: 评论
ZigBee vs WiFi: Understanding issues and measuring performances of their coexistence
ZigBee vs WiFi: Understanding issues and measuring performan...
收藏 引用
IEEE International Conference on Performance, Computing and Communications (IPCCC)
作者: Zenghua Zhao Xuanxuan Wu Xin Zhang Jing Zhao Xiang-Yang Li Tianjin Key Laboratory of Cognitive Computing and Application China School of Computer Science and Technology Tianjin University China Department of Computer Science Illinois Institute of Technology USA
Wireless coexistence is crucial with the explosive development of wireless technologies in recent years. The coexistence issues of IEEE 802.11 b/g and IEEE 802.15.4 have been well studied, however few work focused on ... 详细信息
来源: 评论
Clustering by Multivariate Mutual Information under Chow-Liu Tree Approximation
Clustering by Multivariate Mutual Information under Chow-Liu...
收藏 引用
Annual Allerton Conference on Communication, Control, and Computing
作者: Chung Chan Tie Liu the Institute of Network Coding at the Chinese University of Hong Kong the Shenzhen Key Laboratory of Network Coding Key Technology and Application China and the Shenzhen Research Institute of the Chinese University of Hong Kong. the Department of Electrical and Computer Engineering Texas A&M University College Station TX 77843 USA
This paper considers two mutual-information based approaches for clustering random variables proposed in the literature: clustering by mutual information relevance networks (MIRNs) and clustering by multivariate mutua... 详细信息
来源: 评论