咨询与建议

限定检索结果

文献类型

  • 2,177 篇 期刊文献
  • 1,596 篇 会议
  • 1 册 图书

馆藏范围

  • 3,774 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,526 篇 工学
    • 1,355 篇 计算机科学与技术...
    • 1,098 篇 软件工程
    • 504 篇 信息与通信工程
    • 382 篇 电气工程
    • 310 篇 电子科学与技术(可...
    • 290 篇 控制科学与工程
    • 272 篇 生物工程
    • 265 篇 化学工程与技术
    • 215 篇 生物医学工程(可授...
    • 193 篇 光学工程
    • 179 篇 机械工程
    • 174 篇 材料科学与工程(可...
    • 151 篇 仪器科学与技术
    • 128 篇 动力工程及工程热...
    • 96 篇 交通运输工程
    • 94 篇 土木工程
    • 81 篇 网络空间安全
    • 80 篇 建筑学
  • 1,630 篇 理学
    • 769 篇 数学
    • 551 篇 物理学
    • 322 篇 生物学
    • 246 篇 化学
    • 220 篇 统计学(可授理学、...
    • 136 篇 系统科学
    • 83 篇 地球物理学
  • 492 篇 管理学
    • 277 篇 管理科学与工程(可...
    • 237 篇 图书情报与档案管...
    • 104 篇 工商管理
  • 163 篇 医学
    • 131 篇 临床医学
    • 113 篇 基础医学(可授医学...
  • 74 篇 农学
  • 53 篇 法学
  • 37 篇 经济学
  • 15 篇 教育学
  • 9 篇 军事学
  • 6 篇 艺术学
  • 2 篇 文学
  • 1 篇 历史学

主题

  • 96 篇 semantics
  • 76 篇 feature extracti...
  • 58 篇 training
  • 56 篇 deep learning
  • 50 篇 accuracy
  • 49 篇 computational mo...
  • 43 篇 neural networks
  • 42 篇 optimization
  • 39 篇 machine learning
  • 37 篇 object detection
  • 35 篇 image segmentati...
  • 34 篇 data mining
  • 31 篇 predictive model...
  • 30 篇 simulation
  • 28 篇 correlation
  • 28 篇 privacy
  • 27 篇 visualization
  • 27 篇 federated learni...
  • 27 篇 measurement
  • 27 篇 data models

机构

  • 193 篇 key laboratory o...
  • 155 篇 school of comput...
  • 137 篇 key laboratory o...
  • 98 篇 university of sc...
  • 98 篇 university of ch...
  • 95 篇 hebei normal uni...
  • 95 篇 state key labora...
  • 94 篇 yunnan observato...
  • 93 篇 tianfu cosmic ra...
  • 87 篇 key laboratory o...
  • 86 篇 key laboratory f...
  • 86 篇 school of physic...
  • 85 篇 department of ph...
  • 84 篇 center for astro...
  • 84 篇 college of physi...
  • 83 篇 institute of fro...
  • 83 篇 school of physic...
  • 82 篇 school of physic...
  • 81 篇 national space s...
  • 80 篇 moscow institute...

作者

  • 82 篇 axikegu
  • 77 篇 fang j.
  • 77 篇 feng c.f.
  • 76 篇 bastieri d.
  • 76 篇 jiang k.
  • 74 篇 danzengluobu
  • 71 篇 kuleshov d.
  • 71 篇 liu d.
  • 70 篇 chen m.j.
  • 70 篇 liu s.m.
  • 70 篇 huang d.h.
  • 70 篇 dai h.l.
  • 69 篇 guo y.q.
  • 68 篇 li xin
  • 68 篇 bao y.w.
  • 67 篇 li cheng
  • 67 篇 liu b.
  • 66 篇 hu h.b.
  • 64 篇 min z.
  • 63 篇 liu h.d.

语言

  • 3,511 篇 英文
  • 193 篇 其他
  • 80 篇 中文
检索条件"机构=Ministry of Education Key Laboratory in Scientific and Engineering Computing"
3774 条 记 录,以下是131-140 订阅
排序:
Adaptive delay-energy balanced partial offloading strategy in Mobile Edge computing networks
收藏 引用
Digital Communications and Networks 2023年 第6期9卷 1310-1318页
作者: Shumei Liu Yao Yu Lei Guo Phee Lep Yeoh Branka Vucetic Yonghui Li School of Computer Science and Engineering Northeastern UniversityShenyang110819China Key Laboratory of Intelligent Computing in Medical Image Ministry of EducationNortheastern UniversityShenyang110819China School of Communication and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing400065China School of Electrical and Information Engineering University of SydneySydneyNSW2006Australia
Mobile Edge computing(MEC)-based computation offloading is a promising application paradigm for serving large numbers of users with various delay and energy *** this paper,we propose a flexible MECbased requirement-ad... 详细信息
来源: 评论
MECNet: Multi-Scale Exposure-Consistency Learning via Fourier Transform for Exposure Correction
MECNet: Multi-Scale Exposure-Consistency Learning via Fourie...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Qiao, Gaofei Zhang, Zhibin He, Liqiang Inner Mongolia University Key Laboratory of Wireless Networks and Mobile Computing Engineering Research Center of Ecological Big Data Ministry of Education Hohhot010021 China Geomechanica Inc Canada
In the real world, due to various challenging lighting conditions such as low light, underexposure, and overexposure, captured images often exhibit undesirable appearances. Given that images with different exposure le... 详细信息
来源: 评论
An ultra-wideband high-isolation dual-port MIMO antenna design
An ultra-wideband high-isolation dual-port MIMO antenna desi...
收藏 引用
2024 International Applied Computational Electromagnetics Society Symposium, ACES-China 2024
作者: Cao, Shuangqing Li, Minquan Zi, Zhenfa Li, Zhonghui Anhui University Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Hefei230601 China Hefei Normal University School of Physics and Materials Engineering Hefei230601 China
In this paper, an antenna for ultra-wideband multiple-input and multiple-output (UWB-MIMO) is designed. The design comprises two hexagonal monopole antennas. In order to achieve ultra-wideband characteristics and miti... 详细信息
来源: 评论
A Dual-band Low-profile Quadrifilar-Helix Antenna for Satellite Navigation System
A Dual-band Low-profile Quadrifilar-Helix Antenna for Satell...
收藏 引用
2023 IEEE International Workshop on Electromagnetics: Applications and Student Innovation Competition, iWEM 2023
作者: Wang, Jiahong Qi, Junwei Li, Yingsong Harbin Engineering University College of Information and Communication Engineering Harbin150001 China Anhui University Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education China
A new dual-band low-profile quadrifilar-helical antenna (QHA) was presented. The spiral radiation arm of QHA is printed to three circular dielectric plates to reduce the antenna height. In this case, the radiation arm... 详细信息
来源: 评论
DAEA: Enhancing Entity Alignment in Real-World Knowledge Graphs Through Multi-Source Domain Adaptation  31
DAEA: Enhancing Entity Alignment in Real-World Knowledge Gra...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Yang, Linyan Zhou, Shiqiao Cheng, Jingwei Zhang, Fu Wan, Jizheng Wang, Shou Lee, Mark School of Computer Science and Engineering Northeastern University China School of Computer Science University of Birmingham United Kingdom Key Laboratory of Intelligent Computing in Medical Image of Ministry of Education Northeastern University China
Entity Alignment (EA) is a critical task in Knowledge Graph (KG) integration, aimed at identifying and matching equivalent entities that represent the same real-world objects. While EA methods based on knowledge repre... 详细信息
来源: 评论
Maximizing Area Coverage in Privacy-Preserving Worker Recruitment: A Prior Knowledge-Enhanced Geo-indistinguishable Approach
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 5138-5151页
作者: Zhang, Pengfei Cheng, Xiang Zhang, Zhikun Zhu, Youwen Zhang, Ji Anhui University of Science and Technology State Key Laboratory of Digital Intelligent Technology for Unmanned Coal Mining the School of Computer Science and Engineering Anhui University of Science and Technology Huainan232001 China Yunnan University of Finance and Economics Yunnan Key Laboratory of Service Computing Yunnan 650221 China Key Laboratory of Equipment Data Security and Guarantee Technology Ministry of Education Key Laboratory of Computing Power Network and Information Security Ministry of Education China Beijing University of Posts and Telecommunications China Zhejiang University China Nanjing University of Aeronautics and Astronautics China University of Southern Queensland China
Worker recruitment for area coverage maximization, typically requires participants to upload location information, which can deter potential participation without proper protection. While existing studies resort to ge... 详细信息
来源: 评论
Adaptive Step-Size Sparse Millimeter Wave Imaging Algorithm Based on Approximate Observations  11
Adaptive Step-Size Sparse Millimeter Wave Imaging Algorithm ...
收藏 引用
11th IEEE International Conference on Computer Science and Network Technology, ICCSNT 2023
作者: Wang, Dianhao Huang, Xinqi Yu, Canping Mao, Qi Li, Yingsong College of Information and Communication Engineering Harbin Engineering University Harbin150001 China Anhui University Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education China
The currently constructed millimeter wave imaging system has the problems of long sampling time and more sampling points of antenna units, and the use of compressed perception algorithm can improve the imaging quality... 详细信息
来源: 评论
Improving Adversarial Transferability with Ghost Samples  26
Improving Adversarial Transferability with Ghost Samples
收藏 引用
26th European Conference on Artificial Intelligence, ECAI 2023
作者: Zhao, Yi Mou, Ningping Ge, Yunjie Wang, Qian The Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Hubei Wuhan430072 China
Adversarial transferability presents an intriguing phenomenon, where adversarial examples designed for one model can effectively deceive other models. By exploiting this property, various transfer-based methods are pr... 详细信息
来源: 评论
Affine-Projection Maximum Asymmetric Correntropy Criterion Algorithm Under System Identifications  11
Affine-Projection Maximum Asymmetric Correntropy Criterion A...
收藏 引用
11th IEEE International Conference on Computer Science and Network Technology, ICCSNT 2023
作者: Peng, Yan Huang, Xinqi Yu, Canping Mao, Qi Li, Yingsong College of Information and Communication Engineering Harbin Engineering University Harbin150001 China Anhui University Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education China
The Affine-Projection Maximum Asymmetric Correntropy Criterion (APMACC) is constructed, drawing upon the fundamental principles of the maximum asymmetric correntropy criterion and an affine-projection scheme. The APMA... 详细信息
来源: 评论
Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM  25th
Block Ciphers Classification Based on Randomness Test Stati...
收藏 引用
25th International Conference on Information and Communications Security, ICICS 2023
作者: Liu, Sijia Luo, Min Peng, Cong He, Debiao Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China Jinan China
Cryptographic algorithms classification, which can detect the underlying encryption algorithm on sufficient large ciphertexts, is essential to encrypted traffic analysis and protocol compliance detection. Previous stu... 详细信息
来源: 评论