咨询与建议

限定检索结果

文献类型

  • 12,846 篇 期刊文献
  • 10,679 篇 会议
  • 101 册 图书

馆藏范围

  • 23,625 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 14,925 篇 工学
    • 8,601 篇 计算机科学与技术...
    • 6,890 篇 软件工程
    • 3,068 篇 信息与通信工程
    • 2,352 篇 电子科学与技术(可...
    • 2,283 篇 电气工程
    • 1,981 篇 生物工程
    • 1,855 篇 光学工程
    • 1,846 篇 控制科学与工程
    • 1,696 篇 生物医学工程(可授...
    • 1,198 篇 化学工程与技术
    • 999 篇 机械工程
    • 916 篇 材料科学与工程(可...
    • 887 篇 仪器科学与技术
    • 691 篇 动力工程及工程热...
    • 433 篇 力学(可授工学、理...
    • 390 篇 土木工程
  • 10,311 篇 理学
    • 4,801 篇 物理学
    • 3,708 篇 数学
    • 2,375 篇 生物学
    • 1,420 篇 化学
    • 1,323 篇 统计学(可授理学、...
    • 683 篇 系统科学
  • 3,278 篇 管理学
    • 1,968 篇 管理科学与工程(可...
    • 1,342 篇 图书情报与档案管...
    • 827 篇 工商管理
  • 1,772 篇 医学
    • 1,461 篇 临床医学
    • 1,200 篇 基础医学(可授医学...
    • 733 篇 药学(可授医学、理...
    • 515 篇 公共卫生与预防医...
  • 532 篇 法学
    • 416 篇 社会学
  • 356 篇 农学
  • 310 篇 经济学
  • 248 篇 教育学
  • 98 篇 文学
  • 56 篇 军事学
  • 36 篇 艺术学
  • 2 篇 哲学
  • 2 篇 历史学

主题

  • 481 篇 deep learning
  • 314 篇 machine learning
  • 293 篇 computer science
  • 286 篇 feature extracti...
  • 261 篇 training
  • 211 篇 image segmentati...
  • 204 篇 computational mo...
  • 200 篇 accuracy
  • 197 篇 semantics
  • 182 篇 optimization
  • 158 篇 neural networks
  • 158 篇 data mining
  • 152 篇 internet of thin...
  • 150 篇 reinforcement le...
  • 131 篇 magnetic resonan...
  • 128 篇 support vector m...
  • 128 篇 deep neural netw...
  • 126 篇 computer archite...
  • 116 篇 wireless communi...
  • 109 篇 three-dimensiona...

机构

  • 1,082 篇 cavendish labora...
  • 1,015 篇 department of ph...
  • 974 篇 physikalisches i...
  • 962 篇 oliver lodge lab...
  • 633 篇 university of ch...
  • 595 篇 fakultät physik ...
  • 569 篇 school of physic...
  • 527 篇 iccub universita...
  • 519 篇 horia hulubei na...
  • 516 篇 school of physic...
  • 508 篇 department of ph...
  • 500 篇 imperial college...
  • 499 篇 center for high ...
  • 495 篇 nikhef national ...
  • 493 篇 stfc rutherford ...
  • 489 篇 h.h. wills physi...
  • 486 篇 physik-institut ...
  • 485 篇 infn laboratori ...
  • 479 篇 school of physic...
  • 478 篇 school of physic...

作者

  • 273 篇 beiter a.
  • 271 篇 barter w.
  • 268 篇 a. gomes
  • 257 篇 bellee v.
  • 249 篇 c. alexa
  • 249 篇 c. amelung
  • 247 篇 j. m. izen
  • 247 篇 g. bella
  • 247 篇 j. strandberg
  • 247 篇 d. calvet
  • 245 篇 g. spigo
  • 241 篇 f. siegert
  • 240 篇 s. chen
  • 233 篇 bowcock t.j.v.
  • 229 篇 brundu d.
  • 228 篇 blake t.
  • 224 篇 y. tayalati
  • 217 篇 r. ströhmer
  • 217 篇 m. rijssenbeek
  • 213 篇 s. jin

语言

  • 21,706 篇 英文
  • 1,525 篇 其他
  • 387 篇 中文
  • 18 篇 日文
  • 6 篇 德文
  • 2 篇 法文
  • 2 篇 荷兰文
  • 1 篇 捷克文
  • 1 篇 西班牙文
  • 1 篇 朝鲜文
  • 1 篇 斯洛文尼亚文
检索条件"机构=School of Computer Science and Engineering Center for CyberSecurity"
23626 条 记 录,以下是31-40 订阅
排序:
Resource investment for DDoS attack resistant SDN: a practical assessment
收藏 引用
science China(Information sciences) 2023年 第7期66卷 112-129页
作者: Bin YUAN Fan ZHANG Jun WAN Huan ZHAO Shui YU Deqing ZOU Qiangsheng HUA Hai JIN School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Shenzhen Huazhong University of Science and Technology Research Institute School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science University of Technology Sydney
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of servi... 详细信息
来源: 评论
Deep Learning Based Face Detection and Identification of Criminal Suspects
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2331-2343页
作者: S.Sandhya A.Balasundaram Ayesha Shaik School of Computer Science and Engineering Vellore Institute of Technology(VIT)Chennai600127India School of Computer Science and Engineering Center for Cyber Physical SystemsVellore Institute of Technology(VIT)Chennai600127India
Occurrence of crimes has been on the constant rise despite the emerging discoveries and advancements in the technological field in the past *** of the most tedious tasks is to track a suspect once a crime is *** most ... 详细信息
来源: 评论
supported by the National Natural science Foundation of China(Nos.62172051,61772085,and 61877005)and Jiangsu Agriculture science and Technology Innovation Fund(***(18)3054).
收藏 引用
Tsinghua science and Technology 2023年 第1期28卷 82-92页
作者: Jinghui Zhang Yuchen Wang Tianyu Huang Fang Dong Wei Zhao Dian Shen School of Computer Science and Engineering Southeast UniversityNanjing 211189China Hefei Comprehensive National Science Center Hefei 231299China School of Computer Science and Technology Anhui University of TechnologyHefei 230026China Department of Computer Science&Engineering The Chinese University of Hong KongHong Kong 999077China
Numerous neural network(NN)applications are now being deployed to mobile *** applications usually have large amounts of calculation and data while requiring low inference latency,which poses challenges to the computin... 详细信息
来源: 评论
RE-SEGNN:recurrent semantic evidence-aware graph neural network for temporal knowledge graph forecasting
收藏 引用
science China(Information sciences) 2025年 第2期68卷 103-119页
作者: Wenyu CAI Mengfan LI Xuanhua SHI Yuanxin FAN Quntao ZHU Hai JIN National Engineering Research Center for Big Data Technology and System Services Computing Technology and System LabCluster and Grid Computing LabSchool of Computer Science and TechnologyHuazhong University of Science and Technology
Temporal knowledge graph(TKG) reasoning, has seen widespread use for modeling real-world events, particularly in extrapolation settings. Nevertheless, most previous studies are embedded models, which require both enti... 详细信息
来源: 评论
A fast anomaly network traffic detection method based on the constrained k-nearest neighbor  13
A fast anomaly network traffic detection method based on the...
收藏 引用
13th International Conference on Cloud Computing, Data science and engineering, Confluence 2023
作者: Zhu, Zhiguang Xie, Ying Yang, Xu Hu, Wei University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu China Southwest Minzu University School of Computer Science and Engineering Chengdu China National Engineering Research Center of Classified Protection Safeguard Technology for Cybersecurity Beijing China
The k-nearest neighbor algorithm has been widely used in network anomaly detection works, but its query efficiency decreases significantly when the number of samples and feature dimensions increase. To meet the demand... 详细信息
来源: 评论
Multi-Dimensional Training Optimization for Efficient Federated Synergy Learning
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第7期24卷 6243-6258页
作者: Fu, Shucun Dong, Fang Chen, Runze Shen, Dian Zhang, Jinghui He, Qiang Southeast University School of Computer Science and Engineering Nanjing China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan China
Edge learning (EL) is an end-to-edge collaborative learning paradigm enabling devices to participate in model training and data analysis, opening countless opportunities for edge intelligence. As a promising EL framew... 详细信息
来源: 评论
Transfer Learning Based Yogic Posture Recognition System Using Deep Pre-trained Features
收藏 引用
SN computer science 2024年 第6期5卷 746页
作者: Rajendran, Arun Kumar Sethuraman, Sibi Chakkaravarthy School of Computer Science and Engineering VIT-AP University School of Computer Science & amp Engineering and Center of Excellence Artificial Intelligence and Robotics (AIR) VIT-AP University
Yoga is a healthy exercise that focuses on physical, psychological, and divine connections. However, engaging in yoga while adopting poor postures might result in health issues like muscle discomfort and sprains. Disc... 详细信息
来源: 评论
Towards High-Performance Graph Processing: From a Hardware/Software Co-Design Perspective
收藏 引用
Journal of computer science & Technology 2024年 第2期39卷 245-266页
作者: 廖小飞 赵文举 金海 姚鹏程 黄禹 王庆刚 赵进 郑龙 张宇 邵志远 National Engineering Research Center for Big Data Technology and System School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Laboratory School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Laboratory School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhan 430074China Zhejiang Lab Hangzhou 311121China
Graph processing has been widely used in many scenarios,from scientific computing to artificial *** processing exhibits irregular computational parallelism and random memory accesses,unlike traditional ***,running gra... 详细信息
来源: 评论
Hardware Acceleration for Embedded Scripting Programming Language ‘mruby/c’
Computer Software
收藏 引用
computer Software 2024年 第2期41卷 60-79页
作者: Maeda, Hiroyuki Tanaka, Kazuaki Fukuoka Industrial Technology Center Japan Graduate School of Computer Science and Systems Engineering Kyushu Institute of Technology Japan
In this paper, we propose hardware acceleration to improve a performance of scripting programming languages for embedded developments. Scripting programming languages enable more efficient software developments and sc... 详细信息
来源: 评论
Combinatorial Kinetic Dualistic Auction Model for Metaverse Service Allocation  1
Combinatorial Kinetic Dualistic Auction Model for Metaverse ...
收藏 引用
IEEE AITU: 1st International Student Conference: "Digital Generation", AITU 2024
作者: Singh, Raj Sarkar, Pritam Bandyopadhyay, Anjan Swain, Sujata Sardar, Tanvir Habib Pandey, Bishwajeet School of Computer Engineering KIIT 751024 India Department of Computer Science GITAM University Bengaluru India Department of Intelligent System and Cybersecurity Astana IT University Kazakhstan
The focus of this research work revolves around the utilization of a specialized"Combinatorial Kinetic Dualistic Auction Model" designed specifically for"metaverse Services." The main goal is to im... 详细信息
来源: 评论