咨询与建议

限定检索结果

文献类型

  • 3,450 篇 会议
  • 3,360 篇 期刊文献
  • 65 册 图书

馆藏范围

  • 6,875 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,807 篇 工学
    • 3,325 篇 计算机科学与技术...
    • 2,799 篇 软件工程
    • 1,054 篇 信息与通信工程
    • 715 篇 生物工程
    • 673 篇 控制科学与工程
    • 524 篇 电气工程
    • 514 篇 生物医学工程(可授...
    • 500 篇 电子科学与技术(可...
    • 464 篇 光学工程
    • 341 篇 机械工程
    • 279 篇 化学工程与技术
    • 249 篇 仪器科学与技术
    • 204 篇 动力工程及工程热...
    • 145 篇 材料科学与工程(可...
    • 121 篇 交通运输工程
    • 110 篇 建筑学
  • 2,758 篇 理学
    • 1,308 篇 数学
    • 808 篇 物理学
    • 789 篇 生物学
    • 412 篇 统计学(可授理学、...
    • 308 篇 化学
    • 281 篇 系统科学
  • 1,265 篇 管理学
    • 726 篇 管理科学与工程(可...
    • 569 篇 图书情报与档案管...
    • 329 篇 工商管理
  • 477 篇 医学
    • 406 篇 临床医学
    • 347 篇 基础医学(可授医学...
    • 241 篇 药学(可授医学、理...
    • 130 篇 公共卫生与预防医...
  • 207 篇 法学
    • 182 篇 社会学
  • 104 篇 经济学
  • 71 篇 教育学
  • 69 篇 农学
  • 38 篇 文学
  • 24 篇 艺术学
  • 19 篇 军事学
  • 5 篇 哲学
  • 1 篇 历史学

主题

  • 137 篇 machine learning
  • 127 篇 semantics
  • 120 篇 deep learning
  • 95 篇 feature extracti...
  • 87 篇 training
  • 85 篇 computational mo...
  • 84 篇 artificial intel...
  • 77 篇 computer science
  • 73 篇 deep neural netw...
  • 65 篇 accuracy
  • 64 篇 data mining
  • 62 篇 visualization
  • 60 篇 object detection
  • 56 篇 reinforcement le...
  • 55 篇 neural networks
  • 53 篇 computer vision
  • 53 篇 forecasting
  • 52 篇 computer archite...
  • 51 篇 internet of thin...
  • 50 篇 optimization

机构

  • 210 篇 department of co...
  • 78 篇 department of co...
  • 56 篇 tencent ai lab
  • 49 篇 department of co...
  • 44 篇 department of co...
  • 43 篇 college of compu...
  • 38 篇 department of co...
  • 38 篇 department of el...
  • 37 篇 department of co...
  • 37 篇 pazhou lab
  • 37 篇 department of co...
  • 35 篇 peng cheng labor...
  • 32 篇 huawei noah's ar...
  • 31 篇 tsinghua univers...
  • 30 篇 university of sc...
  • 30 篇 state key lab on...
  • 29 篇 institute for ar...
  • 29 篇 department of co...
  • 28 篇 state key lab on...
  • 26 篇 department of co...

作者

  • 71 篇 sun maosong
  • 52 篇 liu zhiyuan
  • 43 篇 sun fuchun
  • 41 篇 bhowmik biswajit
  • 36 篇 zhu jun
  • 33 篇 huang minlie
  • 31 篇 huang wenbing
  • 30 篇 biswajit bhowmik
  • 27 篇 liu yang
  • 26 篇 timofte radu
  • 25 篇 yu kai
  • 24 篇 zhang min
  • 22 篇 liu qun
  • 21 篇 zhang lei
  • 21 篇 chen hao
  • 20 篇 fuchun sun
  • 18 篇 qinghua zheng
  • 18 篇 zheng qinghua
  • 17 篇 liu xin
  • 17 篇 zhao hai

语言

  • 6,551 篇 英文
  • 250 篇 其他
  • 77 篇 中文
  • 2 篇 日文
检索条件"机构=Programming Technology Lab Computer Science Department"
6875 条 记 录,以下是421-430 订阅
排序:
A Decode-and-Forward Scheme for LDPC Coded Three-Way Relay Fading Channels
收藏 引用
China Communications 2015年 第8期12卷 46-54页
作者: YE Xia GAO Feifei Department of Computer Science & Information Management Wenzhou Medical University Department of Automation Tsinghua University State Key Lab of Intelligent Technologies and Systems Tsinghua National Laboratory for Information Science and Technology (TNList)
In this paper a low-density pairwise check(LDPC) coded three-way relay system is considered, where three user nodes desire to exchange messages with the help of one relay node. Since physical-layer network coding is a... 详细信息
来源: 评论
A Multi-Channel Salience Based Detail Exaggeration Technique for 3D Relief Surfaces
收藏 引用
Journal of computer science & technology 2012年 第6期27卷 1100-1109页
作者: 缪永伟 冯结青 王金荣 Renato Pajarola College of Computer Science and Technology Zhejiang University of Technology State Key Lab of CAD & CG Zhejiang University Department of Informatics University of Zürich
Visual saliency can always persuade the viewer's visual attention to fine-scale mesostructure of 3D complex shapes. Owing to the multi-channel salience measure and salience-domain shape modeling technique, a novel vi... 详细信息
来源: 评论
Disjoint-Path and Golden-Pin Based Irregular PCB Routing with Complex Constraints  23
Disjoint-Path and Golden-Pin Based Irregular PCB Routing wit...
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Qinghai Liu Qinfei Tang Jiarui Chen Chuandong Chen Ziran Zhu Huan He Jianli Chen Yao-Wen Chang Center for Discrete Mathematics Fuzhou University Fuzhou China and Fujian Science & Technology Innovation Laboratory for Optoelectronic Information of China Fuzhou China Center for Discrete Mathematics Fuzhou University Fuzhou China College of Computer and Date Science Fuzhou University Fuzhou China Department of Microelectronics Fuzhou University Fuzhou China Department of Microelectronics Southeast University Nanjing China Hangzhou Huawei Enterprises Telecommunication Technologies Co. Ltd Hangzhou China State Key Lab of ASIC & System Fudan University Shanghai China Graduate Institute of Electronics Engineering National Taiwan University Taipei Taiwan and Department of Electrical Engineering National Taiwan University Taipei Taiwan
PCB routing becomes time-consuming as the complexity of PCB design increases. Unlike traditional schemes that treat the two essential PCB routing processes separately, namely, escape and bus routing, we consider the c... 详细信息
来源: 评论
On-demand content delivery grid
On-demand content delivery grid
收藏 引用
5th International Conference on Information technology and Applications, ICITA 2008
作者: Luk, Vincent Wing-Hei Chan, Jacky Ng, Kam-Wing Wong, Albert Kai-Sun Department of Electronic and Computer Engineering Hong Kong University of Science and Technology Hong Kong Programming Practices Laboratory Department of Computer Science and Engineering Chinese University of Hong Kong Hong Kong Department of Computer Science and Engineering Chinese University of Hong Kong Hong Kong
In this paper, we propose an On-Demand Content Delivery Grid system that supplements the traditional content delivery network to deal with problems such as the huge influx of network traffic in a short period of time ... 详细信息
来源: 评论
Optimizing Steering Angle Predictive Convolutional Neural Network for Autonomous Car
收藏 引用
computers, Materials & Continua 2022年 第5期71卷 2285-2302页
作者: Hajira Saleem Faisal Riaz Asadullah Shaikh Khairan Rajab Adel Rajab Muhammad Akram Mana Saleh Al Reshan Control Automotive and Robotics Lab Affiliated lab of National Center of Robotics and Automation(NCRA HEC Pakistan)and with the Department of Computer Science and Information TechnologyMirpur University of Science and Technology(MUST)Mirpur Azad Kashmir10250Pakistan College of Computer Science and Information System Najran UniversityNajran61441Saudi Arabia College of Computer Science and Engineering University of South FloridaTampa33620United States
Deep learning techniques,particularly convolutional neural networks(CNNs),have exhibited remarkable performance in solving visionrelated problems,especially in unpredictable,dynamic,and challenging *** autonomous vehi... 详细信息
来源: 评论
Classification of Phishing Email Using Word Embedding and Machine Learning Techniques
收藏 引用
Journal of Cyber Security and Mobility 2022年 第3期11卷 279-320页
作者: Somesha, M. Pais, Alwyn R. Information Security Research Lab Department of Computer Science and Engineering National Institute of Technology karnataka Karnataka Surathkal575025 India
Email phishing is a cyber-attack, bringing substantial financial damage to corporate and commercial organizations. A phishing email is a special type of spamming, used to trick the user to disclose personal informatio... 详细信息
来源: 评论
Designing modularity architecture for multithread programming
Designing modularity architecture for multithread programmin...
收藏 引用
4th International Conference on Communications and Information technology, CIT'10
作者: Netinant, Paniti Computer Science Department Bangkok University Bangkok Thailand Concurrent Programming Research Group Illinois Institute of Technology Chicago IL United States
Multithreaded Object-Oriented programming in concurrency environment using object-oriented technology is a complex activity. Programmers need to be aware of issues unrelated to their domain of problem, and are often u... 详细信息
来源: 评论
Dipper Throated Optimization for Detecting Black-Hole Attacks inMANETs
收藏 引用
computers, Materials & Continua 2023年 第1期74卷 1905-1921页
作者: Reem Alkanhel El-Sayed M.El-kenawy Abdelaziz A.Abdelhamid Abdelhameed Ibrahim Mostafa Abotaleb Doaa Sami Khafaga Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Department of Communications and Electronics Delta Higher Institute of Engineering and TechnologyMansoura35111Egypt Faculty of Artificial Intelligence Delta University for Science and TechnologyMansoura35712Egypt Department of Computer Science Faculty of Computer and Information SciencesAin Shams UniversityCairo11566Egypt Department of Computer Science College of Computing and Information TechnologyShaqra University11961Saudi Arabia Computer Engineering and Control Systems Department Faculty of EngineeringMansoura UniversityMansoura35516Egypt Department of System Programming South Ural State UniversityChelyabinsk454080Russia Department of Computer Sciences College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia
In terms of security and privacy,mobile ad-hoc network(MANET)continues to be in demand for additional debate and *** more MANET applications become data-oriented,implementing a secure and reliable data transfer protoc... 详细信息
来源: 评论
Generalized pigeon-inspired optimization algorithms
收藏 引用
science China(Information sciences) 2019年 第7期62卷 120-130页
作者: Shi CHENG Xiujuan LEI Hui LU Yong ZHANG Yuhui SHI School of Computer Science Shaanxi Normal University School of Electronic and Information Engineering Beihang University School of Information and Electronic Engineering China University of Mining and TechnologyXuzhou Shenzhen Key Lab of Computational Intelligence Department of Computer Science and EngineeringSouthern University of Science and Technology
Dear editor,We propose a generalized pigeon-inspired optimization (GPIO) algorithm to enhance the exploitation ability of the original pigeon-inspired optimization (PIO) algorithm. Three variants of the PIO algorithms... 详细信息
来源: 评论
An efficient non-transferable proxy re-encryption scheme  8th
An efficient non-transferable proxy re-encryption scheme
收藏 引用
8th International Conference on Applications and Techniques in Information Security, ATIS 2017
作者: Sharmila Deva Selvi, S. Paul, Arinjita Pandu Rangan, C. Theoretical Computer Science Lab Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai India
Proxy re-encryption (PRE) allows re-encryption of a ciphertext for Alice (delegator) into a ciphertext for Bob (delegatee) via a semi-trusted proxy, who should not obtain the underlying plaintext. Alice generates a re... 详细信息
来源: 评论