咨询与建议

限定检索结果

文献类型

  • 1,210 篇 会议
  • 845 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 2,060 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,471 篇 工学
    • 1,179 篇 计算机科学与技术...
    • 984 篇 软件工程
    • 270 篇 信息与通信工程
    • 192 篇 控制科学与工程
    • 143 篇 生物工程
    • 91 篇 电子科学与技术(可...
    • 87 篇 电气工程
    • 83 篇 机械工程
    • 78 篇 光学工程
    • 62 篇 生物医学工程(可授...
    • 50 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 35 篇 建筑学
    • 31 篇 土木工程
    • 31 篇 网络空间安全
    • 29 篇 安全科学与工程
  • 643 篇 理学
    • 401 篇 数学
    • 150 篇 生物学
    • 121 篇 统计学(可授理学、...
    • 120 篇 物理学
    • 86 篇 系统科学
    • 50 篇 化学
  • 438 篇 管理学
    • 261 篇 管理科学与工程(可...
    • 193 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 42 篇 医学
    • 39 篇 临床医学
    • 34 篇 基础医学(可授医学...
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 51 篇 semantics
  • 43 篇 laboratories
  • 39 篇 wireless sensor ...
  • 39 篇 feature extracti...
  • 31 篇 optimization
  • 30 篇 software
  • 29 篇 data mining
  • 28 篇 software testing
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 27 篇 web services
  • 24 篇 routing
  • 24 篇 image segmentati...
  • 24 篇 software enginee...
  • 24 篇 testing
  • 24 篇 accuracy
  • 23 篇 monitoring
  • 23 篇 training

机构

  • 527 篇 state key labora...
  • 222 篇 department of co...
  • 131 篇 national key lab...
  • 108 篇 state key labora...
  • 79 篇 state key lab. f...
  • 56 篇 national key lab...
  • 55 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 state key lab fo...
  • 48 篇 national key lab...
  • 40 篇 department of co...
  • 37 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 computer vision ...
  • 27 篇 department of co...
  • 26 篇 school of electr...
  • 25 篇 department of co...
  • 23 篇 nanjing universi...
  • 22 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 31 篇 shen furao
  • 31 篇 zhang lijun
  • 30 篇 zhao jian
  • 30 篇 lu tong
  • 29 篇 gao yang
  • 29 篇 tong lu
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 24 篇 qi lianyong
  • 23 篇 xu xiaolong
  • 23 篇 zhang xuyun
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 chen guihai
  • 22 篇 palaiahnakote sh...
  • 21 篇 xuandong li

语言

  • 1,903 篇 英文
  • 94 篇 其他
  • 62 篇 中文
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2060 条 记 录,以下是901-910 订阅
排序:
Fast rates of ERM and stochastic approximation: adaptive to error bound conditions  18
Fast rates of ERM and stochastic approximation: adaptive to ...
收藏 引用
Proceedings of the 32nd International Conference on Neural Information Processing Systems
作者: Mingrui Liu Xiaoxuan Zhang Lijun Zhang Rong Jin Tianbao Yang Department of Computer Science The University of Iowa Iowa City IA National Key Laboratory for Novel Software Technology Nanjing University China Machine Intelligence Technology Alibaba Group Bellevue WA
Error bound conditions (EBC) are properties that characterize the growth of an objective function when a point is moved away from the optimal set. They have recently received increasing attention for developing optimi...
来源: 评论
MFPR: A Personalized Ranking Recommendation with Multiple Feedback
收藏 引用
ACM Transactions on Social Computing 2018年 第2期1卷 1–22页
作者: Shi, Chuan Liu, Jian Zhang, Yiding Hu, Binbin Liu, Shenghua Yu, Philip S. Beijing Key Lab of Intelligent Telecommunication Software and Multimedia Beijing University of Posts and Telecommunications No. 10 Xi Tu Cheng Road Beijing China Cas Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences No.6 Kexueyuan South Road Zhongguancun Beijing China Department of Computer Science University of Illinois at Chicago 851 South Morgan Street Chicago United States
Recently, recommender systems have played an important role in improving web user experiences and increasing profits. Recommender systems exploit users' behavioral history (i.e., feedback on items) to build models... 详细信息
来源: 评论
Combining Word Embedding and Knowledge-Based Topic Modeling for Entity Summarization
Combining Word Embedding and Knowledge-Based Topic Modeling ...
收藏 引用
International Conference on Semantic Computing
作者: Seyedamin Pouriyeh Mehdi Allahyari Krys Kochut Gong Cheng Hamid Reza Arabnia Computer Science Department University of Georgia Athens GA USA Computer Science Department Georgia Southern University Statesboro USA National Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Word embedding is becoming more popular in the Semantic Web community as an effective approach for capturing semantics in various contexts. In this paper, we combine word embedding and topic modeling to model RDF data... 详细信息
来源: 评论
Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs
收藏 引用
science China(Information sciences) 2018年 第3期61卷 118-130页
作者: Wei LI Vincent RIJMEN Zhi TAO Qingju WANG Hua CHEN Yunwen LIU Chaoyun LI Ya LIU School of Computer Science and Technology Donghua University imec-COSIC KU Leuven Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Department of Computer Science and Engineering Shanghai Jiao Tong University Department of Applied Mathematics and Computer Science Technical University of Denmark Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences College of Science National University of Defense Technology Department of Computer Science and Engineering University of Shanghai for Science and Technology
With the expansion of wireless technology, vehicular ad-hoc networks(VANETs) are emerging as a promising approach for realizing smart cities and addressing many serious traffic problems, such as road safety, convenien... 详细信息
来源: 评论
Secure Beamforming Design for MISO SWIPT Systems: An Indirectly Optimized Approach
Secure Beamforming Design for MISO SWIPT Systems: An Indirec...
收藏 引用
2019 IEEE Global Communications Conference (GLOBECOM)
作者: Yao Yu Siyu Wang Shumei Liu Lei Guo Zhaolong Ning Shimin Gong Mohammad S. Obaidat School of Computer Science and Engineering Northeastern University Shenyang China Chongqing University of Posts and Telecommunications China State Key Laboratory for Novel Software Technology Nanjing University China School of Intelligent Systems Engineering Sun Yat-sen University China ECE Department Nazarbayev University Astana Kazakhstan College of Computing and Informatics University of Sharjah UAE The King Abdullah II School of Information Technology The University of Jordan Amman Jordan University of Science and Technology Beijing China
By considering the Simultaneous Wireless Information and Power Transfer (SWIPT) schemes, this paper focuses on secure transmission model design in multiple-input-single-output (MISO) channels. In these channels, the c... 详细信息
来源: 评论
Secure keyboards against motion based keystroke inference attack  12th
Secure keyboards against motion based keystroke inference at...
收藏 引用
12th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2016
作者: Du, Shaoyong Gao, Yue Hua, Jingyu Zhong, Sheng State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Nowadays, attackers seek various covert channels to access the users’ privacy on the mobile devices. Recent research has demonstrated that the built-in motion sensors can be exploited to monitor the users’ screen ta... 详细信息
来源: 评论
A Hybrid Replacement Strategy for MOEA/D  13th
A Hybrid Replacement Strategy for MOEA/D
收藏 引用
13th International Conference on Bio-Inspired Computing: Theories and Applications, BIC-TA 2018
作者: Chen, Xiaoji Shi, Chuan Zhou, Aimin Xu, Siyong Wu, Bin Beijing Key Lab of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing100876 China Shanghai Key Laboratory of Multidimensional Information Processing Department of Computer Science and Technology East China Normal University Shanghai200062 China
In MOEA/D, the replacement strategy plays a key role in balancing diversity and convergence. However, existing adaptive replacement strategies either focus on neighborhood or global replacement strategy, which may hav... 详细信息
来源: 评论
Deep Learning in Digital Breast Tomosynthesis: Current Status, Challenges, and Future Trends
MedComm
收藏 引用
MedComm 2025年 第6期6卷 e70247页
作者: Wang, Ruoyun Chen, Fanxuan Chen, Haoman Lin, Chenxing Shuai, Jincen Wu, Yutong Ma, Lixiang Hu, Xiaoqu Wu, Min Wang, Jin Zhao, Qi Shuai, Jianwei Pan, Jingye Oujiang Laboratory (Zhejiang Lab for Regenerative Medicine Vision and Brain Health) Wenzhou Institute University of Chinese Academy of Sciences Wenzhou China Wenzhou Medical University Wenzhou China UCSC Baskin School of Engineering University of California Santa Cruz CA United States Key Laboratory of Intelligent Treatment and Life Support for Critical Diseases of Zhejiang Province Wenzhou China Department of Anatomy Histology & Embryology School of Basic Medical Sciences Fudan University Shanghai China Department of Medicine Harvard Medical School and Brigham and Women's Hospital Boston MA United States Joint Research Centre on Medicine The Affiliated Xiangshan Hospital of Wenzhou Medical University Ningbo China Stony Brook University Stony Brook NY United States School of Computer Science and Software Engineering University of Science and Technology Liaoning Anshan China Department of Big Data in Health Science The First Affiliated Hospital of Wenzhou Medical University Wenzhou China Zhejiang Engineering Research Center for Hospital Emergency and Process Digitization Wenzhou China
The high-resolution three-dimensional (3D) images generated with digital breast tomosynthesis (DBT) in the screening of breast cancer offer new possibilities for early disease diagnosis. Early detection is especially ... 详细信息
来源: 评论
Attitude Control of Rigid Body with Inertia Uncertainty and Saturation Input
收藏 引用
Tsinghua science and technology 2017年 第1期22卷 83-91页
作者: Xi Ma Fuchun Sun Hongbo Li Bing He Department of Computer Science and Technology Tsinghua UniversityState Key Lab of Intelligent Technology and Systemsand Tsinghua National Laboratory for Information Scienceand Technology (TNList) Department of Aerospace Engineering High-Tech Institute of Xi’an
In this paper, the attitude control problem of rigid body is addressed with considering inertia uncertainty,bounded time-varying disturbances, angular velocity-free measurement, and unknown non-symmetric saturation in... 详细信息
来源: 评论
Segmentation Guided HEp-2 Cell Classification with Adversarial Networks
Segmentation Guided HEp-2 Cell Classification with Adversari...
收藏 引用
Computing, Communications and Applications Conference (ComComAp)
作者: Hai Xie Yejun He Haijun Lei Jong Yih Kuo Baiying Lei Guangdong Engineering Research Center of Base Station Antennas and Propagation Shenzhen Key Lab of Antennas and Propagation College of Electronics and Information Engineering Shenzhen University China Guangdong Province Key Laboratory of Popular High-performance Computers School of Computer and Software Engineering Shenzhen University Computer Science and Information Engineering National Taipei University of Technology Taiwan China National-Regional Key Technology Engineering Laboratory for Medical Ultrasound Guangdong Key Laboratory for Biomedical Measurements and Ultrasound Imaging School of Biomedical Engineering Health Science Center Shenzhen University China
The analysis of indirect immuno fluorescence (IIF) on human epithelial type 2 (HEp-2) cells is of paramount importance for the autoimmune diseases diagnosis. Essentially, accurate segmentation masks can generate rich ... 详细信息
来源: 评论