咨询与建议

限定检索结果

文献类型

  • 3,627 篇 期刊文献
  • 2,477 篇 会议
  • 4 册 图书

馆藏范围

  • 6,108 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,819 篇 工学
    • 2,506 篇 计算机科学与技术...
    • 2,033 篇 软件工程
    • 896 篇 信息与通信工程
    • 507 篇 电气工程
    • 475 篇 生物工程
    • 405 篇 控制科学与工程
    • 368 篇 电子科学与技术(可...
    • 283 篇 光学工程
    • 273 篇 生物医学工程(可授...
    • 222 篇 机械工程
    • 202 篇 化学工程与技术
    • 199 篇 仪器科学与技术
    • 139 篇 动力工程及工程热...
    • 134 篇 核科学与技术
    • 133 篇 网络空间安全
    • 130 篇 力学(可授工学、理...
    • 127 篇 交通运输工程
  • 2,866 篇 理学
    • 1,472 篇 物理学
    • 1,040 篇 数学
    • 558 篇 生物学
    • 393 篇 统计学(可授理学、...
    • 263 篇 化学
    • 158 篇 地球物理学
    • 138 篇 系统科学
  • 884 篇 管理学
    • 497 篇 管理科学与工程(可...
    • 435 篇 图书情报与档案管...
    • 150 篇 工商管理
  • 246 篇 医学
    • 215 篇 临床医学
    • 173 篇 基础医学(可授医学...
    • 124 篇 药学(可授医学、理...
  • 129 篇 法学
  • 65 篇 经济学
  • 63 篇 农学
  • 35 篇 教育学
  • 19 篇 文学
  • 13 篇 军事学
  • 10 篇 艺术学
  • 1 篇 哲学

主题

  • 228 篇 bosons
  • 186 篇 feature extracti...
  • 153 篇 hadron colliders
  • 146 篇 semantics
  • 142 篇 training
  • 128 篇 deep learning
  • 126 篇 computational mo...
  • 119 篇 accuracy
  • 117 篇 data models
  • 92 篇 federated learni...
  • 77 篇 machine learning
  • 76 篇 neural networks
  • 72 篇 convolution
  • 68 篇 predictive model...
  • 65 篇 data mining
  • 65 篇 robustness
  • 64 篇 photons
  • 59 篇 deep neural netw...
  • 59 篇 generative adver...
  • 59 篇 optimization

机构

  • 896 篇 yerevan physics ...
  • 875 篇 centro brasileir...
  • 851 篇 university of de...
  • 849 篇 charles universi...
  • 844 篇 department of ph...
  • 822 篇 institute rudjer...
  • 816 篇 university of so...
  • 804 篇 helsinki institu...
  • 795 篇 academy of scien...
  • 789 篇 rwth aachen univ...
  • 786 篇 university of cy...
  • 777 篇 institute of hig...
  • 771 篇 university of sp...
  • 767 篇 indian institute...
  • 758 篇 national and kap...
  • 747 篇 ghent university...
  • 743 篇 infn sezione di ...
  • 743 篇 deutsches elektr...
  • 742 篇 vrije universite...
  • 739 篇 panjab universit...

作者

  • 585 篇 lowette s.
  • 584 篇 waltenberger w.
  • 530 篇 tavernier s.
  • 506 篇 lemaitre v.
  • 502 篇 adam w.
  • 500 篇 skovpen k.
  • 500 篇 schieck j.
  • 498 篇 sznajder a.
  • 496 篇 tytgat m.
  • 491 篇 vannerom d.
  • 488 篇 tumasyan a.
  • 481 篇 alves g.a.
  • 472 篇 delaere c.
  • 471 篇 jeitler m.
  • 465 篇 van mechelen p.
  • 464 篇 giammanco a.
  • 452 篇 moraes a.
  • 449 篇 carvalho w.
  • 440 篇 delcourt m.
  • 439 篇 wulz c.-e.

语言

  • 4,808 篇 英文
  • 1,214 篇 其他
  • 112 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Network Data Science and Technology Institute of Computing Technology"
6108 条 记 录,以下是111-120 订阅
排序:
What makes a successful rebuttal in computer science conferences?: A perspective on social interaction
What makes a successful rebuttal in computer science confere...
收藏 引用
作者: Huang, Junjie Huang, Win-bin Bu, Yi Cao, Qi Shen, Huawei Cheng, Xueqi Data Intelligence System Research Center Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Department of Information Management Peking University Beijing China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China
With an exponential increase in submissionsto top-tier Computer science (CS) conferences, more and more conferences have introduced a rebuttal stage to the conference peer review process. The rebuttal stage can be mod... 详细信息
来源: 评论
Knowledge-Enhanced Self-Supervised Prototypical network for Few-Shot Event Detection
Knowledge-Enhanced Self-Supervised Prototypical Network for ...
收藏 引用
2022 Findings of the Association for Computational Linguistics: EMNLP 2022
作者: Zhao, Kailin Jin, Xiaolong Bai, Long Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences School of Computer Science and Technology University of Chinese Academy of Sciences China
Prototypical network based joint methods have attracted much attention in few-shot event detection, which carry out event detection in a unified sequence tagging framework. However, these methods suffer from the inacc... 详细信息
来源: 评论
A Novel 3D Medical Image Segmentation Model Using Improved SAM
A Novel 3D Medical Image Segmentation Model Using Improved S...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Kuang, Yuansen Ma, Xitong Zhao, Jing Wang, Guangchen Zeng, Yijie Liu, Song Key Laboratory of Computing Power Network and Information Security Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China
3D medical image segmentation is an essential task in the medical image field, which aims to segment organs or tumours into different labels. A number of issues exist with the current 3D medical image segmentation tas... 详细信息
来源: 评论
HiRes: Hierarchical Feature Optimization and Rescorer for Automatic ICD Coding
HiRes: Hierarchical Feature Optimization and Rescorer for Au...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liang, Zhenpeng Guan, Hongjiao Lu, Wenpeng Peng, Xueping Xu, Bing Yang, Muyun Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Australian Artificial Intelligence Institute University of Technology Sydney Sydney Australia Faculty of Computing Harbin Institute of Technology Harbin China
The International Classification of Diseases (ICD) coding assigns standardized codes to diseases. Automating this process enhances the efficiency and accuracy of clinical records processing. However, current methods s... 详细信息
来源: 评论
A Robust key Exchange and Tamper-Resistant Protocol for HAN and NAN networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21394-21403页
作者: Faizan Ayub, Muhammad Li, Xiong Mahmood, Khalid Shamshad, Salman Kumar Das, Ashok Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Korea University College of Informatics Department of Computer Science and Engineering Seoul02841 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart grids (SGs) rely on home area networks (HANs) and neighborhood area networks (NANs) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these a... 详细信息
来源: 评论
Bidirectional Logits Tree: Pursuing Granularity Reconcilement in Fine-Grained Classification  39
Bidirectional Logits Tree: Pursuing Granularity Reconcilemen...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Lu, Zhiguang Xu, Qianqian Bao, Shilong Yang, Zhiyong Huang, Qingming Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences China School of Computer Science and Technology University of Chinese Academy of Sciences China Key Laboratory of Big Data Mining and Knowledge Management University of Chinese Academy of Sciences China
This paper addresses the challenge of Granularity Competition in fine-grained classification tasks, which arises due to the semantic gap between multi-granularity labels. Existing approaches typically develop independ...
来源: 评论
Machine learning investigation of the effects of elemental doping on the mechanical properties of Fe-Cr-Ni-Al high-entropy alloys
收藏 引用
science China Technological sciences 2025年
作者: Jingteng XUE Jingtao HUANG Zhonghong LAI Nan QU Yong LIU Jingchuan ZHU School of Materials Science and Engineering Harbin Institute of Technology Department of Forensic Science and Technology Zhengzhou Police University Center for Analysis Measurement and Computing Harbin Institute of Technology National Key Laboratory for Precision Hot Processing of Metals Harbin Institute of Technology
This study investigates how doping various elements from the periodic table affects the mechanical properties of ***26representative elements, which were subsequently used to establish doping structure models. The ela...
来源: 评论
A Dynamic and Secure Join Query Protocol for Multi-User Environment in Cloud computing
收藏 引用
IEEE Transactions on Cloud computing 2025年 第2期13卷 512-525页
作者: Li, Hongjun He, Debiao Feng, Qi Yang, Xiaolin Luo, Qingcai Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University School of Cyber Science and Engineering Wuhan430072 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network & Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China National Key Laboratory of Security Communication Chengdu610041 China Inspur Cloud Information Technology Company Ltd. Shandong Jinan250000 China Inspur Academy of Science and Technology Shandong Jinan250101 China
The development of cloud computing needs to continuously improve and perfect the privacy-preserving techniques for the user’s confidential data. Multi-user join query, as an important method of data sharing, allows m... 详细信息
来源: 评论
IP-geolocater:a more reliable IP geolocation algorithm based on router error training
收藏 引用
Frontiers of Computer science 2022年 第1期16卷 101-111页
作者: Shuodi ZU Xiangyang LUO Fan ZHANG State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450001China Zhengzhou Science and Technology Institute Zhengzhou450001China
Location based services(LBS)are widely utilized,and determining the location of users’IP is the foundation for *** by unstable delay and insufficient landmarks,the existing geolocation algorithms have problems such a... 详细信息
来源: 评论
A Novel On-Demand Service Architecture for Efficient Cloud-Edge Collaboration
A Novel On-Demand Service Architecture for Efficient Cloud-E...
收藏 引用
2023 International Conference on networking and network Applications, NaNA 2023
作者: Zhang, Yaling Chen, Jingjing Wang, Yichuan Xiao, Yeqiu Liu, Xiaoxue School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology China
With the advent of 5G era, the model of cloud-edge collaboration is used to handle massive data computing tasks with significant superiority. However, this architecture still uses the traditional web service model, wh... 详细信息
来源: 评论