咨询与建议

限定检索结果

文献类型

  • 6,301 篇 期刊文献
  • 5,340 篇 会议
  • 58 册 图书

馆藏范围

  • 11,699 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,491 篇 工学
    • 4,647 篇 计算机科学与技术...
    • 3,757 篇 软件工程
    • 1,527 篇 信息与通信工程
    • 1,104 篇 电气工程
    • 970 篇 电子科学与技术(可...
    • 847 篇 控制科学与工程
    • 791 篇 生物工程
    • 680 篇 光学工程
    • 581 篇 生物医学工程(可授...
    • 567 篇 化学工程与技术
    • 503 篇 机械工程
    • 477 篇 材料科学与工程(可...
    • 382 篇 动力工程及工程热...
    • 340 篇 仪器科学与技术
    • 268 篇 力学(可授工学、理...
    • 213 篇 交通运输工程
    • 201 篇 网络空间安全
  • 5,179 篇 理学
    • 2,567 篇 数学
    • 2,076 篇 物理学
    • 886 篇 生物学
    • 829 篇 统计学(可授理学、...
    • 650 篇 化学
    • 420 篇 系统科学
    • 217 篇 地球物理学
  • 1,671 篇 管理学
    • 1,006 篇 管理科学与工程(可...
    • 717 篇 图书情报与档案管...
    • 387 篇 工商管理
  • 463 篇 医学
    • 398 篇 临床医学
    • 343 篇 基础医学(可授医学...
    • 235 篇 药学(可授医学、理...
  • 210 篇 法学
  • 128 篇 经济学
  • 117 篇 农学
  • 70 篇 教育学
  • 39 篇 军事学
  • 26 篇 文学
  • 21 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 215 篇 computational mo...
  • 211 篇 laboratories
  • 206 篇 feature extracti...
  • 182 篇 semantics
  • 176 篇 deep learning
  • 163 篇 computer science
  • 139 篇 machine learning
  • 124 篇 computer archite...
  • 109 篇 optimization
  • 107 篇 neural networks
  • 106 篇 predictive model...
  • 105 篇 image segmentati...
  • 93 篇 training
  • 87 篇 application soft...
  • 85 篇 data mining
  • 82 篇 visualization
  • 81 篇 resource managem...
  • 80 篇 real time system...
  • 79 篇 grid computing
  • 76 篇 costs

机构

  • 183 篇 key laboratory o...
  • 183 篇 university of ch...
  • 126 篇 university of sc...
  • 114 篇 college of compu...
  • 98 篇 shandong provinc...
  • 96 篇 tianfu cosmic ra...
  • 96 篇 school of comput...
  • 89 篇 department of ph...
  • 88 篇 hebei normal uni...
  • 87 篇 hubei key labora...
  • 86 篇 center for quant...
  • 86 篇 real-time comput...
  • 85 篇 state key labora...
  • 83 篇 school of inform...
  • 82 篇 yunnan observato...
  • 82 篇 peng cheng labor...
  • 72 篇 key laboratory f...
  • 67 篇 key laboratory o...
  • 66 篇 shandong provinc...
  • 63 篇 state key labora...

作者

  • 102 篇 bastieri d.
  • 96 篇 k.g. shin
  • 81 篇 zheng wei-shi
  • 78 篇 niyato dusit
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 77 篇 axikegu
  • 74 篇 li xin
  • 72 篇 jiang k.
  • 70 篇 kuleshov d.
  • 69 篇 liu d.
  • 68 篇 li cheng
  • 67 篇 chen m.j.
  • 67 篇 liu s.m.
  • 65 篇 huang d.h.
  • 64 篇 dai h.l.
  • 62 篇 min z.
  • 56 篇 heller m.
  • 53 篇 guo y.q.
  • 52 篇 pang b.y.

语言

  • 11,007 篇 英文
  • 515 篇 其他
  • 189 篇 中文
  • 3 篇 德文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Laboratory of Computing Science and Engineering"
11699 条 记 录,以下是61-70 订阅
排序:
On greedy randomized coordinate updating iteration methods for solving symmetric eigenvalue problems
收藏 引用
Applied Numerical Mathematics 2025年 216卷 76-97页
作者: Bai, Zhong-Zhi State Key Laboratory of Mathematical Sciences Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing100190 China State Key Laboratory of Scientific/Engineering Computing Institute of Computational Mathematics and Scientific/Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of Sciences P.O. Box 2719 Beijing100190 China School of Mathematical Sciences University of Chinese Academy of Sciences Beijing100049 China
In order to compute the smallest eigenvalue and its corresponding eigenvector of a large-scale, real, and symmetric matrix, we propose a class of greedy randomized coordinate updating iteration methods based on the pr... 详细信息
来源: 评论
On the complete weight distributions of quantum error-correcting codes
收藏 引用
Chinese Physics B 2023年 第5期32卷 272-287页
作者: 杜超 马智 熊茂胜 State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenghzhou 450001China Henan Key Laboratory of Network Cryptography Technology Zhenghzhou 450001China Department of Mathematics Hong Kong University of Science and TechnologyHong KongChina
In a recent paper, Hu et al. defined the complete weight distributions of quantum codes and proved the Mac Williams identities, and as applications they showed how such weight distributions may be used to obtain the s... 详细信息
来源: 评论
Multiscale method for identifying and marking the multiform fractures from visible-light rock-mass images
收藏 引用
Underground Space 2024年 第3期16卷 279-300页
作者: Yongbo Pan Junzhi Cui Zhenhao Xu School of Mathematics and Statistics Zhengzhou UniversityZhengzhou 450001China The State Key Laboratory of Scientific and Engineering Computing Academy of Mathematics and Systems Science Chinese Academy of SciencesBeijing 100190China Geotechnical and Structural Engineering Research Center Shandong UniversityJinan 250100China
Multiform fractures have a direct impact on the mechanical performance of rock *** accurately identify multiform fractures,the distribution patterns of grayscale and the differential features of fractures in their nei... 详细信息
来源: 评论
Wearable Aromatherapy Feedback System for Sleep Monitoring and Intervention: Using Single-Channel EEG and a Lightweight Model
Wearable Aromatherapy Feedback System for Sleep Monitoring a...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Gu, Chengwei Tian, Fuze Jiang, Hua Zhao, Qinglin Hu, Bin Lanzhou University Gansu Provincial Key Laboratory of Wearable Computing School of Information Science and Engineering Lanzhou China
Sleep is a daily activity essential for well-being, yet many modern individuals experience sleep problems, and prolonged poor sleep negatively impacts both physiological and psychological health. Aromatherapy, an emer... 详细信息
来源: 评论
Nitrous oxide therapy-induced changes in brain modules of treatment-resistant depression: A randomized controlled study
Nitrous oxide therapy-induced changes in brain modules of tr...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Li, Na Wang, Ziyi Huang, Jun Sun, Shuting Zhu, Jing Li, Xiaowei Hu, Bin Lanzhou University Gansu Provincial Key Laboratory of Wearable Computing School of Information Science and Engineering Lanzhou China
Currently, treatment options for patients with treatment-resistant depression (TRD) are extremely limited. Although the rapid antidepressant effects of nitrous oxide have been preliminarily validated, the underlying n... 详细信息
来源: 评论
Application of meta-learning in cyberspace security:a survey
收藏 引用
Digital Communications and Networks 2023年 第1期9卷 67-78页
作者: Aimin Yang Chaomeng Lu Jie Li Xiangdong Huang Tianhao Ji Xichang Li Yichao Sheng Hebei Key Laboratory of Data Science and Application North China University of Science and TechnologyTangshan063000China Hebei Engineering Research Center for the Intelligentization of Iron Ore Optimization and Ironmaking Raw Materials Preparation Processes North China University of Science and TechnologyTangshan063000China The Key Laboratory of Engineering Computing in Tangshan City North China University of Science and TechnologyTangshan063000China
In recent years,machine learning has made great progress in intrusion detection,network protection,anomaly detection,and other issues in ***,these traditional machine learning algorithms usually require a lot of data ... 详细信息
来源: 评论
Massively parallel algorithms for fully dynamic all-pairs shortest paths
收藏 引用
Frontiers of Computer science 2024年 第4期18卷 201-203页
作者: Chilei WANG Qiang-Sheng HUA Hai JIN Chaodong ZHENG National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China
1 Introduction In recent years,the Massively Parallel Computation(MPC)model has gained significant ***,most of distributed and parallel graph algorithms in the MPC model are designed for static graphs[1].In fact,the g... 详细信息
来源: 评论
Multi-Scale Time Series Segmentation Network Based on Eddy Current Testing for Detecting Surface Metal Defects
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第3期12卷 528-538页
作者: Xiaorui Li Xiaojuan Ban Haoran Qiao Zhaolin Yuan Hong-Ning Dai Chao Yao Yu Guo Mohammad S.Obaidat George Q.Huang the School of Intelligence Science and Technology University of Science and Technology Beijing the Beijing Advanced Innovation Center for Materials Genome Engineering the Key Laboratory of Intelligent Bionic Unmanned Systems and the Institute of Materials Intelligent Technology Liaoning Academy of Materials IEEE the Department of Computer Science Hong Kong Baptist University the School of Computer and Communication Engineering Key Laboratory of Advanced Materials and Devices for Post-Moore Chips Ministry of Education University of Science and Technology Beijing the Beijing Advanced Innovation Center for Materials Genome Engineering University of Science and Technology Beijing the School of Computer and Communication Engineering University of Science and Technology Beijing the King Abdullah Ⅱ School of Information Technology The University of Jordan the Department of Computational Intelligence the School of Computing SRM University the School of Engineering The Amity University The Hong Kong Polytechnic University
In high-risk industrial environments like nuclear power plants, precise defect identification and localization are essential for maintaining production stability and safety. However, the complexity of such a harsh env... 详细信息
来源: 评论
Generating Adversarial Patterns in Facial Recognition with Visual Camouflage
收藏 引用
Journal of Shanghai Jiaotong University (science) 2024年 1-12页
作者: Bao, Qirui Mei, Haiyang Wei, Huilin Lü, Zheng Wang, Yuxin Yang, Xin Key Laboratory of Social Computing and Cognitive Intelligence of Ministry of Education School of Control Science and EngineeringSchool of Computer Science and Technology Dalian University of Technology Liaoning Dalian116024 China Systems Engineering Institute Academy of Military Sciences Beijing100141 China
Deep neural networks, especially face recognition models, have been shown to be vulnerable to adversarial examples. However, existing attack methods for face recognition systems either cannot attack black-box models, ... 详细信息
来源: 评论
Analysis and Classification of Fake News Using Sequential Pattern Mining
收藏 引用
Big Data Mining and Analytics 2024年 第3期7卷 942-963页
作者: M.Zohaib Nawaz M.Saqib Nawaz Philippe Fournier-Viger Yulin He College of Computer Science and Software Engineering Shenzhen UniversityShenzhen 518060 Guangdong Laboratory of Artificial Intelligence and Digital Economy(SZ) Shenzhen 518107China Department of Computer Science Faculty of Computing and Information TechnologyUnivesity of SargodhaSargodha 40100Pakistan
Disinformation,often known as fake news,is a major issue that has received a lot of attention *** researchers have proposed effective means of detecting and addressing *** machine and deep learning based methodologies... 详细信息
来源: 评论