咨询与建议

限定检索结果

文献类型

  • 862 篇 会议
  • 793 篇 期刊文献

馆藏范围

  • 1,655 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,110 篇 工学
    • 692 篇 计算机科学与技术...
    • 586 篇 软件工程
    • 234 篇 信息与通信工程
    • 135 篇 生物工程
    • 134 篇 控制科学与工程
    • 117 篇 电气工程
    • 109 篇 核科学与技术
    • 108 篇 电子科学与技术(可...
    • 91 篇 光学工程
    • 78 篇 机械工程
    • 76 篇 生物医学工程(可授...
    • 51 篇 仪器科学与技术
    • 48 篇 化学工程与技术
    • 42 篇 材料科学与工程(可...
    • 36 篇 动力工程及工程热...
    • 33 篇 网络空间安全
    • 31 篇 交通运输工程
    • 29 篇 建筑学
  • 702 篇 理学
    • 325 篇 物理学
    • 280 篇 数学
    • 147 篇 生物学
    • 92 篇 统计学(可授理学、...
    • 50 篇 化学
    • 41 篇 系统科学
  • 261 篇 管理学
    • 138 篇 管理科学与工程(可...
    • 126 篇 图书情报与档案管...
    • 40 篇 工商管理
  • 63 篇 医学
    • 49 篇 临床医学
    • 44 篇 基础医学(可授医学...
  • 42 篇 法学
    • 36 篇 社会学
  • 20 篇 教育学
  • 19 篇 经济学
  • 19 篇 农学
  • 9 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 100 篇 hadron colliders
  • 46 篇 deep learning
  • 38 篇 semantics
  • 35 篇 feature extracti...
  • 32 篇 training
  • 29 篇 w & z bosons
  • 28 篇 higgs bosons
  • 26 篇 data mining
  • 24 篇 computational mo...
  • 22 篇 graph neural net...
  • 21 篇 machine learning
  • 21 篇 accuracy
  • 20 篇 data models
  • 18 篇 convolutional ne...
  • 17 篇 object detection
  • 17 篇 convolution
  • 16 篇 relativistic hea...
  • 16 篇 computer vision
  • 16 篇 forecasting
  • 15 篇 conferences

机构

  • 139 篇 irfu cea univers...
  • 132 篇 yerevan physics ...
  • 129 篇 national and kap...
  • 129 篇 centro brasileir...
  • 129 篇 istanbul technic...
  • 127 篇 university of sp...
  • 127 篇 indian institute...
  • 126 篇 universidad iber...
  • 125 篇 brunel universit...
  • 125 篇 charles universi...
  • 124 篇 università di to...
  • 124 篇 academy of scien...
  • 124 篇 infn sezione di ...
  • 123 篇 department of ph...
  • 122 篇 zhejiang univers...
  • 121 篇 infn sezione di ...
  • 121 篇 department of ph...
  • 120 篇 imperial college...
  • 120 篇 university of de...
  • 118 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 1,450 篇 英文
  • 173 篇 其他
  • 42 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory on Computer Technology Application"
1655 条 记 录,以下是1411-1420 订阅
排序:
Mathematical Models, GRASP Algorithms and Fitness Landscape Analysis for Aircraft Gate Assignment Problem
Mathematical Models, GRASP Algorithms and Fitness Landscape ...
收藏 引用
International Conference on Computational Intelligence and Security
作者: Yajie Pi Xueyan Song Jizhou Sun School of Computer Software Tianjin Key Laboratory of Cognitive Computing and Application Tianjin China School of Computer Science and Technology Tianjin Key Laboratory of Cognitive Computing and Application Tianjin China
The assignment of the airline planes to appropriate gates is complex combinatorial optimization. Most of the research works in previous literatures take the passengers' walking distance as the optimization objecti... 详细信息
来源: 评论
Dynamic analysis of human behavior based on user log of ACM
Dynamic analysis of human behavior based on user log of ACM
收藏 引用
2014 International Conference on Applied Sciences, Engineering and technology, ICASET 2014
作者: Long, Zi Yuan Han, Xu Wang, Wen Jun Tianjin Key Laboratory of Cognitive Computing and Application School of Computer Science and Technology Tianjin University Tianjin 300000 China The population management office of Tianjin Municipal Public Security Bureau Tianjin 300000 China
Human behavior is one kind of complicated phenomena. Comprehensive and profound understanding of their behavioral characteristics has been the direction of the tireless efforts of people. In recent years, studies have... 详细信息
来源: 评论
Empirical analysis on human dynamics of QQ group communication
Empirical analysis on human dynamics of QQ group communicati...
收藏 引用
2014 International Conference on Applied Sciences, Engineering and technology, ICASET 2014
作者: Tian, Rui Han, Xu Wang, Wen Jun Tianjin Key Laboratory of Cognitive Computing and Application School of Computer Science and Technology Tianjin University Tianjin 300072 China The population management office of Tianjin Municipal Public Security Bureau Tianjin 300000 China
The understanding of the temporal patterns of individual human interactions is essential in explaining many characteristics of human behavior. The instant communication tool QQ is developing rapidly on the network in ... 详细信息
来源: 评论
Analysis of city traffic characteristics from GPS data
Analysis of city traffic characteristics from GPS data
收藏 引用
2014 International Conference on Applied Sciences, Engineering and technology, ICASET 2014
作者: Dong, Jiang Yuan Han, Xu Wang, Wen Jun Tianjin Key Laboratory of Cognitive Computing and Application School of Computer Science and Technology Tianjin University Tianjin 300000 China The population management office of Tianjin Municipal Public Security Bureau Tianjin 300000 China
With the city urbanization and increase in the number of motor vehicle, Study of the city traffic pattern from taxi GPS data has become the research hotspot. This paper analyzes two city taxi GPS data;calculate the pe... 详细信息
来源: 评论
Locality preserving hashing method for image retrieval  14
Locality preserving hashing method for image retrieval
收藏 引用
6th International Conference on Internet Multimedia Computing and Service, ICIMCS 2014
作者: Li, Qiang Han, Yahong Dang, Jianwu School of Computer Science and Technology Tianjin University Tianjin 300072 China Tianjin Key Laboratory of Cognitive Computing and Application Tianjin University China School of Information Science Japan Advanced Institute of Science and Technology Ishikawa 923-1192 Japan
Binary hashing is widely used in efficient similarity computing for image/video search. In this work, we propose a Locality Preserving Hashing (LPH) method to improve the image retrieval performance, we first project ... 详细信息
来源: 评论
Analysis of urban traffic based on taxi GPS data
Analysis of urban traffic based on taxi GPS data
收藏 引用
5th FTRA International Conference on computer Science and its applications, CSA 2013
作者: Li, Meng Li, Ru-Tong Xia, Yong Qin, Zhi-Guang School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731 China Key Laboratory of Calculation and Application Service of Shenzhen Popular High Performance Computers of Guangdong Province Shenzhen 518000 China
Recently, the problem of traffic jam in major cities is getting worse. By leveraging the taxi GPS data of Shenzhen, this paper analyzes the urban traffic status and proposes rational suggestions for urban traffic mana... 详细信息
来源: 评论
An Extended UML Method for the Verification of Security Protocols
An Extended UML Method for the Verification of Security Prot...
收藏 引用
IEEE International Conference on Engineering of Complex computer Systems
作者: Gang Shen Xiaohong Li Ruitao Feng Guangquan Xu Jing Hu Zhiyong Feng School of Computer Science and Technology Tianjin Key Laboratory of Cognitive Computing and Application Tianjin China
This paper presents a formal modeling method of security protocols based on the extended UML framework. In order to simplify the process and reduce the difficulty of security protocol modelling, extending mechanisms f... 详细信息
来源: 评论
OOPN-SRAM: A Novel Method for Software Risk Assessment
OOPN-SRAM: A Novel Method for Software Risk Assessment
收藏 引用
IEEE International Conference on Engineering of Complex computer Systems
作者: Xiaofei Wu Xiaohong Li Ruitao Feng Guangquan Xu Jing Hu Zhiyong Feng School of Computer Science and Technology Tianjin Key Laboratory of Cognitive Computing and Application Tianjin China
This paper proposes a Software Risk Assessment Method based on Object-Oriented Petri Net (OOPN-SRAM), in which risk assessment procedure is divided into four steps, expressed as four corresponding objects, including a... 详细信息
来源: 评论
The design and implementation of a campus network automatic certification in a router
The design and implementation of a campus network automatic ...
收藏 引用
2014 2nd International Conference on Frontiers in computer Education(ICFCE 2014)
作者: Ting Zhao XiHan Li Lei Zhang Gang Zhang School of Computer Science and Technology Tianjin University Tianjin Key Laboratory of Cognitive Computing and Application
Against the tedious process of PPPoE campus network access authentication on the web page,the logic flow of the client used in the router to complete the automatic certification,and part of the kernel technology are g... 详细信息
来源: 评论
Bayesian statistical inference-based estimation of distribution algorithm for the re-entrant job-shop scheduling problem with sequence-dependent setup times
Bayesian statistical inference-based estimation of distribut...
收藏 引用
10th International Conference on Intelligent Computing, ICIC 2014
作者: Chen, Shao-Feng Qian, Bin Liu, Bo Hu, Rong Zhang, Chang-Sheng Department of Automation Kunming University of Science and Technology Kunming 650500 China Key Laboratory of Computer Technologies Application of Yunnan Province Kunming 650500 China Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing 100190 China
In this paper, a bayesian statistical inference-based estimation of distribution algorithm (BEDA) is proposed for the re-entrant job-shop scheduling problem with sequence-dependent setup times (RJSSPST) to minimize th... 详细信息
来源: 评论