咨询与建议

限定检索结果

文献类型

  • 3,445 篇 会议
  • 3,325 篇 期刊文献
  • 65 册 图书

馆藏范围

  • 6,835 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,774 篇 工学
    • 3,309 篇 计算机科学与技术...
    • 2,788 篇 软件工程
    • 1,047 篇 信息与通信工程
    • 714 篇 生物工程
    • 665 篇 控制科学与工程
    • 512 篇 生物医学工程(可授...
    • 508 篇 电气工程
    • 491 篇 电子科学与技术(可...
    • 457 篇 光学工程
    • 336 篇 机械工程
    • 277 篇 化学工程与技术
    • 247 篇 仪器科学与技术
    • 202 篇 动力工程及工程热...
    • 139 篇 材料科学与工程(可...
    • 120 篇 交通运输工程
    • 108 篇 建筑学
  • 2,735 篇 理学
    • 1,302 篇 数学
    • 796 篇 物理学
    • 784 篇 生物学
    • 407 篇 统计学(可授理学、...
    • 305 篇 化学
    • 281 篇 系统科学
  • 1,260 篇 管理学
    • 723 篇 管理科学与工程(可...
    • 567 篇 图书情报与档案管...
    • 329 篇 工商管理
  • 468 篇 医学
    • 403 篇 临床医学
    • 342 篇 基础医学(可授医学...
    • 240 篇 药学(可授医学、理...
    • 126 篇 公共卫生与预防医...
  • 208 篇 法学
    • 183 篇 社会学
  • 103 篇 经济学
  • 72 篇 教育学
  • 69 篇 农学
  • 38 篇 文学
  • 24 篇 艺术学
  • 19 篇 军事学
  • 5 篇 哲学
  • 1 篇 历史学

主题

  • 136 篇 machine learning
  • 127 篇 semantics
  • 115 篇 deep learning
  • 95 篇 feature extracti...
  • 86 篇 training
  • 85 篇 computational mo...
  • 82 篇 artificial intel...
  • 77 篇 computer science
  • 73 篇 deep neural netw...
  • 65 篇 accuracy
  • 64 篇 data mining
  • 62 篇 visualization
  • 59 篇 object detection
  • 56 篇 reinforcement le...
  • 55 篇 neural networks
  • 54 篇 forecasting
  • 52 篇 computer archite...
  • 51 篇 internet of thin...
  • 51 篇 computer vision
  • 50 篇 optimization

机构

  • 210 篇 department of co...
  • 78 篇 department of co...
  • 56 篇 tencent ai lab
  • 49 篇 department of co...
  • 44 篇 department of co...
  • 43 篇 college of compu...
  • 38 篇 department of co...
  • 38 篇 department of el...
  • 37 篇 department of co...
  • 37 篇 pazhou lab
  • 37 篇 department of co...
  • 36 篇 peng cheng labor...
  • 32 篇 huawei noah's ar...
  • 31 篇 tsinghua univers...
  • 30 篇 university of sc...
  • 30 篇 state key lab on...
  • 30 篇 department of co...
  • 29 篇 institute for ar...
  • 28 篇 state key lab on...
  • 26 篇 department of co...

作者

  • 71 篇 sun maosong
  • 52 篇 liu zhiyuan
  • 43 篇 sun fuchun
  • 40 篇 bhowmik biswajit
  • 36 篇 zhu jun
  • 33 篇 huang minlie
  • 31 篇 huang wenbing
  • 30 篇 biswajit bhowmik
  • 27 篇 liu yang
  • 25 篇 yu kai
  • 25 篇 timofte radu
  • 24 篇 zhang min
  • 22 篇 liu qun
  • 21 篇 zhang lei
  • 21 篇 chen hao
  • 20 篇 fuchun sun
  • 19 篇 qinghua zheng
  • 18 篇 zheng qinghua
  • 17 篇 liu xin
  • 17 篇 zhao hai

语言

  • 6,517 篇 英文
  • 245 篇 其他
  • 76 篇 中文
  • 2 篇 日文
检索条件"机构=Programming Technology Lab Computer Science Department"
6835 条 记 录,以下是511-520 订阅
排序:
On sequential composition, action prefixes and process prefix
收藏 引用
Formal Aspects of Computing 1994年 第3期6卷 250-268页
作者: Baeten, J.C.M. Bergstra, J.A. Department of Mathematics and Computer Science Eindhoven University of Technology MB Eindhoven 5600 PO Box 513 Netherlands Programming Research Group University of Amsterdam Amsterdam Netherlands Department of Philosophy Utrecht University Utrecht Netherlands
We illustrate the difference between sequential composition in process algebra axiomatisations like ACP and action prefixing in process calculi like CCS. We define both early and late input in a general framework exte... 详细信息
来源: 评论
Dynamic S-Box Generation Using Novel Chaotic Map with Nonlinearity Tweaking
收藏 引用
computers, Materials & Continua 2023年 第5期75卷 3011-3026页
作者: Amjad Hussain Zahid Muhammad Junaid Arshad Musheer Ahmad Naglaa F.Soliman Walid El-Shafai School of Systems and Technology University of Management and TechnologyLahore54700Pakistan Department of Computer Science University of Engineering and TechnologyLahore54700Pakistan Department of Computer Engineering Jamia Millia IslamiaNew Delhi110025India Department of Information Technology College of Computer and Information SciencesPrincess Nourah bint Abdulrahman UniversityP.O.Box 84428Riyadh11671Saudi Arabia Security Engineering Lab Computer Science DepartmentPrince Sultan UniversityRiyadh11586Saudi Arabia Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt
A substitution box(S-Box)is a crucial component of contemporary cryptosystems that provide data protection in block *** the moment,chaotic maps are being created and extensively used to generate these SBoxes as a chao... 详细信息
来源: 评论
Design and testing tool for a safe monitoring system for neurodegenerative disorder patients  3
Design and testing tool for a safe monitoring system for neu...
收藏 引用
3rd International Conference on Advances in Computational Tools for Engineering Applications, ACTEA 2016
作者: Halabi, Nashaat El Achkar, Roger Daou, Roy Abi Zeid Hayek, Ali Borcsok, Josef Department of Computer and Communications Engineering Faculty of Engineering American University of Science and Technology Beirut Lebanon Department of Biomedical Technologies Faculty of Public Health Lebanese German University Sahel Alma Lebanon Department of Computer Architecture and System Programming Faculty of Electrical Engineering/Computer Science University of Kassel Kassel Germany
This paper aims to develop a sensor based monitoring and analyzing system for Neuro-Degenerative Disorder patients (NDD);this may consist on SpO2 sensor, Electrophysiological sensors, NIBP, Motion Capture sensors and ... 详细信息
来源: 评论
Brute-force attack mitigation on remote access services via software-defined perimeter
收藏 引用
Scientific reports 2025年 第1期15卷 18599页
作者: Francis A Ruambo Elijah E Masanga Beston Lufyagila Abdelhamied A Ateya Ahmed A Abd El-Latif May Almousa Bassem Abd-El-Atty School of Computer Science and Technology Huazhong University of Science and Technology Wuhan 430074 China. College of Information Communication and Technology Mbeya University of Science and Technology (MUST) P.O Box 131 Mbeya Tanzania. Research and Development Department Aifrruis Laboratories Mbeya Tanzania. EIAS Data Science Lab College of Computer and Information Sciences Prince Sultan University 11586 Riyadh Saudi Arabia. Department of Electronics and Communications Engineering Zagazig University Zagazig 44519 Sharqia Egypt. EIAS Data Science Lab College of Computer and Information Sciences Prince Sultan University 11586 Riyadh Saudi Arabia. aabdellatif@psu.edu.sa. Center of Excellence in Quantum and Intelligent Computing Prince Sultan University 11586 Riyadh Saudi Arabia. aabdellatif@psu.edu.sa. Department of Mathematics and Computer Science Faculty of Science Menoufia University Shibin Al Kawm 32511 Egypt. aabdellatif@psu.edu.sa. Information Technology Department College of Computer and Information Sciences Princess Nourah bint Abdulrahman University Riyadh Saudi Arabia. Department of Computer Science Faculty of Computers and Information Luxor University Luxor 85957 Egypt. bassem.abdelatty@fci.luxor.edu.eg.
Remote Access Services (RAS)-including protocols such as Remote Desktop Protocol (RDP), Secure Shell (SSH), Virtual Network Computing (VNC), Telnet, File Transfer Protocol (FTP), and Secure File Transfer Protocol (SFT... 详细信息
来源: 评论
A proof-theoretic approach to logic programming: II. Programs as definitions
收藏 引用
Journal of Logic and Computation 1991年 第5期1卷 635-660页
作者: Hallnäs, Lars Schroeder-Heister, Peter Programming Methodology Group Department of Computer Science Chalmers University of Technology Sweden Universitä Tübingen 7400 Tübingen Germany University Göteborg 412 96 Göteborg Sweden
We introduce a definitional extension of logic programming by means of an inference schema (Ph), which, in acertain sense, is dual to the (1-P) schema of rule application discussed in Part I. In the operational semant...
来源: 评论
STAR-RIS and UAV Combination in MEC Networks: Simultaneous Task Offloading and Communications
收藏 引用
IEEE Transactions on Communications 2025年
作者: Xiao, Han Hu, Xiaoyan Wang, Wenjie Su, Zhou Wong, Kai-Kit Yang, Kun Xi'an Jiaotong University School of Information and Communications Engineering Xi'an710049 China Southeast University National Mobile Communications Research Laboratory Nanjing210096 China Xi'an Jiaotong University School of Cyber Science and Engineering Xi'an710049 China University College London Department of Electronic and Electrical Engineering Torrington Place LondonWC1E 7JE United Kingdom Yonsei University Yonsei Frontier Lab Seoul Korea Republic of Nanjing University State Key Laboratory of Novel Software Technology Nanjing210008 China School of Intelligent Software and Engineering Suzhou215163 China University of Essex School of Computer Science and Electronic Engineering Essex United Kingdom
This paper explores a simultaneous tasks offloading and communications (STOC) scheme in mobile edge computing (MEC) networks, supported by the combination of simultaneously transmitting and reflecting reconfigurable i... 详细信息
来源: 评论
CCA secure certificateless encryption schemes based on RSA
CCA secure certificateless encryption schemes based on RSA
收藏 引用
作者: Vivek, S. Sree Deva Selvi, S. Sharmila Rangan, C. Pandu Theoretical Computer Science Lab Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai India
Certificateless cryptography, introduced by Al-Riyami and Paterson eliminates the key escrow problem inherent in identity based cryptosystem. In this paper, we present two novel and completely different RSA based adap... 详细信息
来源: 评论
Multi-Domain Sentiment Classification with Classifier Combination
收藏 引用
Journal of computer science & technology 2011年 第1期26卷 25-33页
作者: 李寿山 黄居仁 宗成庆 NLP Lab School of Computer Science and TechnologySoochow University Department of Chinese and Bilingual Studies The Hong Kong Polytechnic University National Laboratory of Pattern Recognition Institute of AutomationChinese Academy of Sciences
State-of-the-arts studies on sentiment classification are typically domain-dependent and domain-restricted. In this paper, we aim to reduce domain dependency and improve overall performance simultaneously by proposing... 详细信息
来源: 评论
The content pollution in peer-to-peer live streaming systems: Analysis and implications
The content pollution in peer-to-peer live streaming systems...
收藏 引用
37th International Conference on Parallel Processing, ICPP 2008
作者: Yang, Sirui Jin, Hai Li, Bo Liao, Xiaofei Yao, Hong Tu, Xuping Services Computing Technology and System Lab. School of Computer Science and Technology Huazhong University of Science and Technology China Department of Computer Science Hong Kong University of Science and Technology Clear Water Bay Kowloon Hong Kong
There has been significant progress in the development and deployment of Peer-to-Peer (P2P) live video streaming systems. However, there has been little study on the security aspect in such systems. Our prior experien... 详细信息
来源: 评论
Two Will Do: CNN with Asymmetric Loss, Self-Learning label Correction, and Hand-Crafted Features for Imbalanced Multi-label ECG Data Classification
Two Will Do: CNN with Asymmetric Loss, Self-Learning Label C...
收藏 引用
2021 Computing in Cardiology, CinC 2021
作者: Vazquez, Cristina Gallego Breuss, Alexander Gnarra, Oriella Portmann, Julian Da Poian, Giulia Lab Department of Health Sciences and Technology Switzerland ETH Zurich Department of Computer Science Switzerland Switzerland
In this work, we present a machine learning approach that is able to classify 30 cardiac abnormalities from an arbitrary number of electrocardiogram (ECG) leads. Features extracted by a deep convolutional neural netwo... 详细信息
来源: 评论