咨询与建议

限定检索结果

文献类型

  • 280 篇 期刊文献
  • 107 篇 会议

馆藏范围

  • 387 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 252 篇 理学
    • 189 篇 物理学
    • 53 篇 数学
    • 29 篇 统计学(可授理学、...
    • 24 篇 生物学
    • 8 篇 系统科学
    • 7 篇 化学
    • 7 篇 大气科学
    • 5 篇 地球物理学
  • 222 篇 工学
    • 80 篇 计算机科学与技术...
    • 70 篇 核科学与技术
    • 67 篇 软件工程
    • 44 篇 信息与通信工程
    • 26 篇 电气工程
    • 20 篇 控制科学与工程
    • 18 篇 生物工程
    • 17 篇 电子科学与技术(可...
    • 10 篇 航空宇航科学与技...
    • 10 篇 生物医学工程(可授...
    • 9 篇 力学(可授工学、理...
    • 9 篇 光学工程
    • 9 篇 仪器科学与技术
    • 9 篇 环境科学与工程(可...
    • 8 篇 动力工程及工程热...
    • 7 篇 冶金工程
    • 6 篇 机械工程
    • 5 篇 土木工程
  • 28 篇 管理学
    • 15 篇 管理科学与工程(可...
    • 12 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 10 篇 医学
    • 7 篇 临床医学
  • 8 篇 农学
  • 4 篇 法学
  • 3 篇 经济学
  • 2 篇 文学
  • 1 篇 教育学

主题

  • 89 篇 hadron colliders
  • 26 篇 w & z bosons
  • 19 篇 higgs bosons
  • 19 篇 cms
  • 11 篇 hypothetical par...
  • 11 篇 relativistic hea...
  • 11 篇 top quark
  • 11 篇 bosons
  • 10 篇 hadron-hadron sc...
  • 9 篇 bottom quark
  • 9 篇 photons
  • 8 篇 tau leptons
  • 8 篇 network coding
  • 7 篇 quark & gluon je...
  • 6 篇 cognitive radio
  • 5 篇 hypothetical par...
  • 5 篇 laboratories
  • 5 篇 vectors
  • 5 篇 rare decays
  • 4 篇 internet of thin...

机构

  • 181 篇 centro brasileir...
  • 181 篇 yerevan physics ...
  • 180 篇 indian institute...
  • 180 篇 charles universi...
  • 179 篇 academy of scien...
  • 179 篇 zhejiang univers...
  • 178 篇 university of sp...
  • 178 篇 department of ph...
  • 178 篇 university of de...
  • 178 篇 department of ph...
  • 175 篇 rwth aachen univ...
  • 175 篇 institute for nu...
  • 170 篇 infn sezione di ...
  • 169 篇 universidad san ...
  • 167 篇 infn sezione di ...
  • 167 篇 università di ca...
  • 157 篇 institute rudjer...
  • 156 篇 università di to...
  • 151 篇 national and kap...
  • 149 篇 infn sezione di ...

作者

  • 93 篇 g. tonelli
  • 93 篇 d. barney
  • 93 篇 l. valencia palo...
  • 93 篇 t. liu
  • 93 篇 c. hensel
  • 93 篇 a. garcia-bellid...
  • 93 篇 a. steen
  • 93 篇 n. cartiglia
  • 93 篇 d. eliseev
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 93 篇 b. clerbaux
  • 93 篇 g. sultanov
  • 93 篇 a. mallampalli
  • 93 篇 m. a. ciocci
  • 93 篇 k. lamichhane
  • 93 篇 s. maselli
  • 93 篇 e. migliore
  • 92 篇 a. babaev
  • 92 篇 v. karjavine

语言

  • 368 篇 英文
  • 17 篇 其他
  • 3 篇 中文
检索条件"机构=Key Laboratory of Network Coding Key Technology and Application"
387 条 记 录,以下是91-100 订阅
排序:
An aggregate flow based scheduler in multi-task cooperated UAVs network
收藏 引用
Chinese Journal of Aeronautics 2020年 第11期33卷 2989-2998页
作者: Xiaohuan LI Ziqi XIE Jin YE Xin TANG Chunhai LI Fengzhu TANG Rong YU School of Information and Communication Guilin University of Electronic TechnologyGuilin 541004China Guangxi Key Laboratory of Multimedia Communications and Network Technology School of ComputerElectronics and InformationGuangxi UniversityNanning 530004China National Engineering Laboratory for Comprehensive Transportation Big Data Application Technology(Guangxi) Nanning 530001China School of Automation Guangdong University of TechnologyGuangzhou 510006China
Unmanned Aerial Vehicles(UAVs)cooperative multi-task system has become the research focus in recent ***,the existing network frameworks of UAVs are not flexible and efficient enough to deal with the complex multi-task... 详细信息
来源: 评论
Discrete Jaya algorithm to solve the police resource deployment problem in emergency traffic accident  10
Discrete Jaya algorithm to solve the police resource deploym...
收藏 引用
10th IEEE Joint International Information technology and Artificial Intelligence Conference, ITAIC 2022
作者: Jing, Zhang Weijie, Ding Zhejiang Police College Department of Computer and Information Security Hangzhou310053 China Big-data and Network Security Research Institute Zhejiang Police College Hangzhou310053 China College of Information Engineering Zhejiang University of Technology Hangzhou310023 China Key Laboratory of Public Security Information Application Based on Big-data Architecture Ministry of Public Security Hangzhou310053 China
Aiming at the high frequency of urban traffic accidents and the relative shortage of police resources, a multi-objective discrete Jaya algorithm is proposed to solve the problem of police resource deployment in emerge... 详细信息
来源: 评论
A 7nm-Based Decodable Self-Resetting Regfile Circuit
A 7nm-Based Decodable Self-Resetting Regfile Circuit
收藏 引用
International Conference on ASIC
作者: Wanlong Zhao Yuejun Zhang Mingze Ren Liang Wen Pengjun Wang Faculty of Electrical Engineering and Computer Science Ningbo University Ningbo China Zhejiang Key Laboratory of Mobile Network Application Technology Ningbo University Ningbo China Department of Electronic Technology China Coast Guard Academy Ningbo China College of Electrical and Electronic Engineering Wenzhou University Wenzhou China
This paper presents a novel design scheme for a decodable self-resetting Regfile circuit that aims to reduce the power consumption caused by massive data and high computing power. The scheme consists of three steps: f...
来源: 评论
A CPK-Based Identity Authentication Scheme for IoT
收藏 引用
Computer Systems Science & Engineering 2022年 第3期40卷 1217-1231页
作者: Mingming Zhang Jiaming Mao Yuanyuan Ma Liangjie Xu Chuanjun Wang Ran Zhao Zhihao Li Lu Chen Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information&Telecommunication BranchNanjing210008China State Grid Key Laboratory of Information&Network Security Institute of Information and CommunicationGlobal Energy Interconnection Research InstituteNanjing210003China Anhui Jiyuan Software Co.Ltd SGITGHefei230088China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Engineering Research Center of Broadband Wireless Communication Technology of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and *** existing ... 详细信息
来源: 评论
A New Predefined Time Stability Theorem and its application in Multi-Modal Memristive Neural network Synchronization
A New Predefined Time Stability Theorem and its Application ...
收藏 引用
Memristive Computing and applications (ICMCA), IEEE International Conference on
作者: Hui Zhao Lei Zhou Qingjie Wang Aidi Liu Jingliang Peng Shandong Provincial Key Laboratory of Network Based Intelligent Computing School of Information Science and Engineering University of Jinan Jinan China College of Information Science and Engineering Northeastern University Shenyang China Collaborative Innovation Center of Memristive Computing Application Qilu Institute of Technology Jinan China
This article proposes a new predefined-time (PDT) stability theorem, which offers more evident advantages compared to previous predefined-time stability. Firstly, based on the limitations of existing PDT stability, th...
来源: 评论
TraCemop: Towards Federated Learning with Traceable Contribution Evaluation and Model Ownership Protection
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Liu, Jingwei Zhou, Zihan Sun, Rong Liu, Lei Lu, Rongxing Dustdar, Schahram Niyato, Dusit Ministry of Education Engineering Research Center of Blockchain Technology Application and Evaluation China Xidian University Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'an710071 China Xidian University State Key Laboratory of Integrated Services Networks Xi'an710071 China Xidian University Guangzhou Institute of Technology Guangzhou510555 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Queen's University School of Computing KingstonONK7L 2N8 Canada TU Wien Distributed Systems Group Austria UPF ICREA Barcelona Spain Nanyang Technological University School of Computer Science and Engineering Singapore
Federated Learning (FL) allows multiple clients to collaboratively train machine learning models without the need to share their local private data. As a result, it can effectively address the issue of data fragmentat... 详细信息
来源: 评论
A New Method for Predefined-Time Synchronization Control of Memristive Cohen-Grossberg Neural networks
A New Method for Predefined-Time Synchronization Control of ...
收藏 引用
Memristive Computing and applications (ICMCA), IEEE International Conference on
作者: Aidi Liu Wenyue Yu Lili Huang Jian Guo Tengfei Lei Hui Zhao School of Computer and Information Engineering Qilu Institute of Technology Jinan China School of Computer and Information Engineering Qilu Institute of Technology Collaborative Innovation Center of Memristive Computing Application School of Computer and Information Engineering Qilu Institute of Technology Shandong Provincial Key Laboratory of Network Based Intelligent Computing School of Information Science and Engineering University of Jinan Jinan China
This article mainly conducts a series of research on the synchronization control of Cohen-Grossberg neural networks. Firstly, a memristive Cohen-Grossberg neural network model with time-varying delay was constructed, ...
来源: 评论
MACCoM: A multiple attention and convolutional cross-mixer framework for detailed 2D biomedical image segmentation
收藏 引用
Computers in Biology and Medicine 2024年 179卷 108847-108847页
作者: Ejiyi, Chukwuebuka Joseph Qin, Zhen Ejiyi, Makuachukwu Bennedith Ukwuoma, Chiagoziem Ejiyi, Thomas Ugochukwu Muoka, Gladys Wavinya Gyarteng, Emmanuel S.A. Bamisile, Olusola O. Network and Data Security Key Laboratory of Sichuan Province University of Electronic Science and Technology of China Sichuan Chengdu China Pharmacy Department University of Nigeria Nsukka Enugu State Nsukka Nigeria Department of Pure and Industrial Chemistry University of Nigeria Nsukka Enugu State Nsukka Nigeria School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Sichuan Industrial Internet Intelligent Monitoring and Application Engineering Research Center Chengdu University of Technology Chengdu China
The UNet architecture, which is widely used for biomedical image segmentation, has limitations like blurred feature maps and over- or under-segmented regions. To overcome these limitations, we propose a novel network ... 详细信息
来源: 评论
AsyncSC: An Asynchronous Sidechain for Multi-Domain Data Exchange in Internet of Things
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Lingxiao Dong, Xuewen Wan, Zhiguo Gao, Sheng Tong, Wei Lu, Di Shen, Yulong Du, Xiaojiang The School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'An710071 China The Zhejiang Lab Hangzhou311121 China The School of Information Central University of Finance and Economics Beijing100081 China The School of Information Science and Engineering Zhejiang Sci-Tech University Hangzhou310018 China The School of Computer Science and Technology Xidian University China The Shaanxi Key Laboratory of Network and System Security Xi'An710071 China The School of Engineering and Science Stevens Institute of Technology Hoboken07030 United States
Sidechain techniques improve blockchain scalability and interoperability, providing decentralized exchange and cross-chain collaboration solutions for Internet of Things (IoT) data across various domains. However, cur...
来源: 评论
Joint Beamforming Design for Integrated Sensing and Communication Systems with Hybrid-Colluding Eavesdroppers
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Meiding Zhou, Zhengchun Shi, Qiao Li, Guyue Liu, Zilong Fan, Pingzhi Lee, Inkyu School of Information Science and Technology Southwest Jiaotong University Chengdu611756 China Key Laboratory of Analytical Mathematics and Applications [Fujian Normal University Ministry of Education China Purple Mountain Laboratories for Network and Communication Security Nanjing210096 China School of Cyber Science and Engineering Southeast University Nanjing210096 China School of Computer Science and Electronics Engineering University of Essex ColchesterCO4 3SQ United Kingdom Key Laboratory of Information Coding and Transmission Southwest Jiaotong University Chengdu611756 China School of Electrical Engineering Korea University Seoul02841 Korea Republic of
In this paper, we consider the physical layer security (PLS) problem for integrated sensing and communication (ISAC) systems in the presence of hybrid-colluding eavesdroppers, where an active eavesdropper (AE) and a p... 详细信息
来源: 评论