咨询与建议

限定检索结果

文献类型

  • 3,518 篇 期刊文献
  • 2,358 篇 会议
  • 4 册 图书

馆藏范围

  • 5,880 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,660 篇 工学
    • 2,391 篇 计算机科学与技术...
    • 1,965 篇 软件工程
    • 856 篇 信息与通信工程
    • 469 篇 生物工程
    • 454 篇 电气工程
    • 360 篇 控制科学与工程
    • 354 篇 电子科学与技术(可...
    • 277 篇 光学工程
    • 266 篇 生物医学工程(可授...
    • 217 篇 机械工程
    • 199 篇 化学工程与技术
    • 185 篇 仪器科学与技术
    • 136 篇 动力工程及工程热...
    • 131 篇 核科学与技术
    • 128 篇 力学(可授工学、理...
    • 120 篇 交通运输工程
    • 114 篇 网络空间安全
  • 2,810 篇 理学
    • 1,453 篇 物理学
    • 1,025 篇 数学
    • 547 篇 生物学
    • 387 篇 统计学(可授理学、...
    • 249 篇 化学
    • 152 篇 地球物理学
    • 137 篇 系统科学
  • 850 篇 管理学
    • 472 篇 管理科学与工程(可...
    • 422 篇 图书情报与档案管...
    • 142 篇 工商管理
  • 236 篇 医学
    • 204 篇 临床医学
    • 170 篇 基础医学(可授医学...
    • 124 篇 药学(可授医学、理...
  • 125 篇 法学
  • 63 篇 经济学
  • 59 篇 农学
  • 27 篇 教育学
  • 19 篇 文学
  • 13 篇 军事学
  • 9 篇 艺术学
  • 1 篇 哲学

主题

  • 227 篇 bosons
  • 171 篇 feature extracti...
  • 153 篇 hadron colliders
  • 139 篇 semantics
  • 129 篇 training
  • 124 篇 deep learning
  • 113 篇 computational mo...
  • 108 篇 data models
  • 97 篇 accuracy
  • 73 篇 machine learning
  • 72 篇 neural networks
  • 69 篇 convolution
  • 66 篇 predictive model...
  • 66 篇 federated learni...
  • 64 篇 photons
  • 60 篇 data mining
  • 58 篇 generative adver...
  • 56 篇 deep neural netw...
  • 55 篇 robustness
  • 52 篇 optimization

机构

  • 891 篇 yerevan physics ...
  • 870 篇 centro brasileir...
  • 845 篇 university of de...
  • 844 篇 charles universi...
  • 840 篇 department of ph...
  • 817 篇 institute rudjer...
  • 811 篇 university of so...
  • 799 篇 helsinki institu...
  • 786 篇 rwth aachen univ...
  • 781 篇 academy of scien...
  • 781 篇 university of cy...
  • 773 篇 institute of hig...
  • 765 篇 university of sp...
  • 758 篇 indian institute...
  • 747 篇 national and kap...
  • 745 篇 ghent university...
  • 738 篇 vrije universite...
  • 736 篇 deutsches elektr...
  • 735 篇 infn sezione di ...
  • 732 篇 universidad san ...

作者

  • 578 篇 lowette s.
  • 577 篇 waltenberger w.
  • 523 篇 tavernier s.
  • 501 篇 lemaitre v.
  • 496 篇 adam w.
  • 494 篇 skovpen k.
  • 494 篇 schieck j.
  • 493 篇 sznajder a.
  • 491 篇 tytgat m.
  • 486 篇 vannerom d.
  • 484 篇 tumasyan a.
  • 477 篇 alves g.a.
  • 467 篇 delaere c.
  • 466 篇 jeitler m.
  • 461 篇 giammanco a.
  • 458 篇 van mechelen p.
  • 451 篇 moraes a.
  • 446 篇 carvalho w.
  • 441 篇 delcourt m.
  • 438 篇 wulz c.-e.

语言

  • 5,477 篇 英文
  • 308 篇 其他
  • 107 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Network Data Science and Technology Institute of Computing Technology"
5880 条 记 录,以下是51-60 订阅
排序:
Multi-Perspective data Fusion Framework Based on Hierarchical BERT: Provide Visual Predictions of Business Processes
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 1227-1252页
作者: Yongwang Yuan Xiangwei Liu Ke Lu School of Mathematics and Big Data Anhui University of Science and TechnologyHuainan232001China School of Economics and Management Anhui University of Science and TechnologyHuainan232001China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji UniversityShanghai201804China
Predictive Business Process Monitoring(PBPM)is a significant research area in Business Process Management(BPM)aimed at accurately forecasting future behavioral *** present,deep learning methods are widely cited in PBP... 详细信息
来源: 评论
On the Security of Smart Home Systems:A Survey
收藏 引用
Journal of Computer science & technology 2023年 第2期38卷 228-247页
作者: 袁斌 万俊 吴宇晗 邹德清 金海 School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Distributed System Security Huazhong University of Science and Technology Wuhan 430074China Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan 430074China National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen 518057China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t... 详细信息
来源: 评论
A circuit area optimization of MK-3 S-box
收藏 引用
Cybersecurity 2025年 第1期8卷 61-71页
作者: Yanjun Li Weiguo Zhang Yiping Lin Jian Zou Jian Liu Information Industry Information Security Evaluation Center The 15th Research Institute of China Electronic Technology Group CorporationBeijing 100083China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China Beijing Electronic Science and Technology Institute No.7 Fufeng RoadFengtai DistricBeijing 100083China College of Computer and Data Science Fuzhou UniversityFuzhou 350108China
In MILCOM 2015,Kelly et *** the authentication encryption algorithm MK-3,which applied the 16-bit *** paper aims to implement the 16-bit S-box with less circuit ***,we classifed the irreducible polynomials over F_(2n)... 详细信息
来源: 评论
Glare-SNet: Unsupervised Glare Suppression Balance network  27th
Glare-SNet: Unsupervised Glare Suppression Balance Network
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Li, Pei Zuo, Chengyu Wei, Wangjuan Pan, Xiaoying Wang, Zhanhao School of Computer Science and Technology Xi’an University of Posts and Telecommunications Xi’an710121 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an China Shaanxi Key Laboratory of Intelligent Media Computing and interaction Xi’an China Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’an China
In light of the problems associated with glare and halo effects in low-light images, as well as the inadequacy of existing processing algorithms in handling details, a glare suppression balance network based on unsupe... 详细信息
来源: 评论
Thematic Event Extraction Based on Event-Related Sentence Detection  1
Thematic Event Extraction Based on Event-Related Sentence De...
收藏 引用
1st IEEE International Conference on Medical Artificial Intelligence, MedAI 2023
作者: Zhang, Xing Guo, Yucan Jin, Xiaolong Liang, Haozhe Guan, Saiping School of Computer Science and Technology University of Chinese Academy of Sciences China Institute of Computing Technology Chinese Academy of Sciences Cas Key Laboratory of Network Data Science and Technology China Institute of Systems Engineering Academy of Military Science Australia
Existing works in event extraction typically extract event arguments within the sentence scope. However, besides the sentence level, events may also be naturally presented at the document level. A document-level event... 详细信息
来源: 评论
A survey for light field super-resolution
收藏 引用
High-Confidence computing 2024年 第1期4卷 118-129页
作者: Mingyuan Zhao Hao Sheng Da Yang Sizhe Wang Ruixuan Cong Zhenglong Cui Rongshan Chen Tun Wang Shuai Wang Yang Huang Jiahao Shen State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and EngineeringBeihang UniversityBeijing 100191China Key Laboratory of Data Science and Intelligent Computing International Innovation InstituteBeihang UniversityHangzhou 311115China State Key Laboratory of Software Development Environment School of Computer Science and EngineeringBeihang UniversityBeijing 100191China
Compared to 2D imaging data,the 4D light field(LF)data retains richer scene’s structure information,which can significantly improve the computer’s perception capability,including depth estimation,semantic segmentati... 详细信息
来源: 评论
Multiuser Computation Offloading for Long-Term Sequential Tasks in Mobile Edge computing Environments
收藏 引用
Tsinghua science and technology 2023年 第1期28卷 93-104页
作者: Huanhuan Xu Jingya Zhou Wenqi Wei Baolei Cheng School of Computer Science and Technology Soochow UniversitySuzhou 215006China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214125China Provincial Key Laboratory for Computer Information Processing Technology Soochow UniversitySuzhou 215006China School of Computer Science Georgia Institute of TechnologyAtlantaGA 30332USA
Mobile edge computing has shown its potential in serving emerging latency-sensitive mobile applications in ultra-dense 5G networks via offloading computation workloads from the remote cloud data center to the nearby n... 详细信息
来源: 评论
A Progressive Skip Reasoning Fusion Method for Multi-Modal Classification  24
A Progressive Skip Reasoning Fusion Method for Multi-Modal C...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Guo, Qian Liang, Xinyan Qian, Yuhua Cui, Zhihua Wen, Jie Shanxi Key Laboratory of Big Data Analysis and Parallel Computing Taiyuan University of Science and Technology Taiyuan China Institute of Big Data Science and Industry Shanxi University Taiyuan China
In multi-modal classification tasks, a good fusion algorithm can effectively integrate and process multi-modal data, thereby significantly improving its performance. Researchers often focus on the design of complex fu... 详细信息
来源: 评论
NeuVSA: A Unified and Efficient Accelerator for Neural Vector Search  31
NeuVSA: A Unified and Efficient Accelerator for Neural Vecto...
收藏 引用
31st IEEE International Symposium on High Performance Computer Architecture, HPCA 2025
作者: Yuan, Ziming Dai, Lei Li, Wen Zhang, Jie Liang, Shengwen Wang, Ying Liu, Cheng Li, Huawei Li, Xiaowei Guo, Jiafeng Wang, Peng Chen, Renhai Zhang, Gong Shanxi University School of Computer and Information Technology China Peking University School of Computer Science China Institute of Computing Technology CAS State Key Lab of Processors China University of Chinese Academy of Sciences China Zhongguancun National Laboratory Beijing China Institute of Computing Technology CAS Key Lab of Network Data Science and Technology China Huawei Technologies Co. Ltd. China
Neural Vector Search (NVS) has exhibited superior search quality over traditional key-based strategies for information retrieval tasks. An effective NVS architecture requires high recall, low latency, and high through... 详细信息
来源: 评论
A Technique for Ensured Cross Chain IBC Transactions Using TPM  2
A Technique for Ensured Cross Chain IBC Transactions Using T...
收藏 引用
2nd International Conference on Big data and Privacy computing, BDPC 2024
作者: Wang, YiChuan Yan, YiLiang Liu, XiaoXue Gao, Wen Wang, ZiYan School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
Cross chain contact across several blockchains becomes increasingly significant in importance with the increased use of blockchain technology. However, security cannot be assured when producing equivalent outputs thro... 详细信息
来源: 评论