咨询与建议

限定检索结果

文献类型

  • 37,242 篇 会议
  • 22,904 篇 期刊文献
  • 553 册 图书
  • 1 篇 学位论文

馆藏范围

  • 60,700 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 38,852 篇 工学
    • 27,900 篇 计算机科学与技术...
    • 22,625 篇 软件工程
    • 10,067 篇 信息与通信工程
    • 5,734 篇 控制科学与工程
    • 4,390 篇 电气工程
    • 4,353 篇 生物工程
    • 4,041 篇 电子科学与技术(可...
    • 2,876 篇 机械工程
    • 2,731 篇 光学工程
    • 2,717 篇 生物医学工程(可授...
    • 1,895 篇 仪器科学与技术
    • 1,763 篇 化学工程与技术
    • 1,661 篇 动力工程及工程热...
    • 1,518 篇 网络空间安全
    • 1,420 篇 安全科学与工程
    • 1,397 篇 交通运输工程
  • 20,352 篇 理学
    • 11,202 篇 数学
    • 5,406 篇 物理学
    • 4,834 篇 生物学
    • 3,628 篇 统计学(可授理学、...
    • 2,141 篇 系统科学
    • 1,892 篇 化学
  • 11,141 篇 管理学
    • 6,721 篇 管理科学与工程(可...
    • 4,873 篇 图书情报与档案管...
    • 2,702 篇 工商管理
  • 2,617 篇 医学
    • 2,126 篇 临床医学
    • 1,916 篇 基础医学(可授医学...
    • 1,134 篇 药学(可授医学、理...
    • 1,090 篇 公共卫生与预防医...
  • 1,751 篇 法学
    • 1,387 篇 社会学
  • 990 篇 经济学
  • 769 篇 教育学
  • 732 篇 农学
  • 270 篇 文学
  • 180 篇 军事学
  • 167 篇 艺术学
  • 15 篇 哲学
  • 11 篇 历史学

主题

  • 1,653 篇 feature extracti...
  • 1,432 篇 computer science
  • 1,225 篇 deep learning
  • 1,209 篇 training
  • 1,198 篇 accuracy
  • 1,117 篇 computational mo...
  • 943 篇 machine learning
  • 917 篇 semantics
  • 828 篇 data mining
  • 747 篇 optimization
  • 669 篇 internet of thin...
  • 645 篇 predictive model...
  • 591 篇 educational inst...
  • 590 篇 support vector m...
  • 587 篇 data models
  • 548 篇 artificial intel...
  • 526 篇 information tech...
  • 517 篇 cloud computing
  • 493 篇 neural networks
  • 492 篇 security

机构

  • 651 篇 school of comput...
  • 557 篇 school of comput...
  • 479 篇 maharishi school...
  • 324 篇 school of comput...
  • 276 篇 faculty of scien...
  • 274 篇 department of ph...
  • 261 篇 department of ph...
  • 256 篇 faculté des scie...
  • 256 篇 departamento de ...
  • 255 篇 department of co...
  • 252 篇 school of comput...
  • 245 篇 school of comput...
  • 233 篇 department of ph...
  • 225 篇 department for p...
  • 219 篇 department of ph...
  • 216 篇 department of ph...
  • 216 篇 school of comput...
  • 215 篇 physics division...
  • 214 篇 department of ph...
  • 212 篇 computer school ...

作者

  • 266 篇 c. alexa
  • 266 篇 j. m. izen
  • 266 篇 g. bella
  • 266 篇 j. strandberg
  • 266 篇 d. calvet
  • 266 篇 c. amelung
  • 266 篇 g. spigo
  • 265 篇 f. siegert
  • 264 篇 a. c. könig
  • 263 篇 m. klein
  • 263 篇 r. ströhmer
  • 260 篇 h. a. gordon
  • 256 篇 h. sakamoto
  • 256 篇 m. rijssenbeek
  • 247 篇 s. jin
  • 243 篇 y. tayalati
  • 241 篇 g. gaudio
  • 239 篇 d. guest
  • 227 篇 niyato dusit
  • 207 篇 s. mohapatra

语言

  • 57,318 篇 英文
  • 2,277 篇 其他
  • 1,071 篇 中文
  • 75 篇 日文
  • 7 篇 德文
  • 7 篇 法文
  • 4 篇 斯洛文尼亚文
  • 3 篇 朝鲜文
  • 2 篇 荷兰文
检索条件"机构=School of Computer Science and Information Technology"
60700 条 记 录,以下是4911-4920 订阅
排序:
Manipulating Piezoelectric and Electro-Strain Properties of BiFeO3-BaTiO3-Based Ceramics Through Chemical Doping-Controlled Domain-Size Engineering
SSRN
收藏 引用
SSRN 2025年
作者: Lin, Jiamin Liu, Bing Liu, Mengxiang Yang, Shan Zhou, Linming Hong, Zijian Zhu, Xiaoli Wu, Yongjun Li, Juan Huang, Yuhui School of Materials Science and Engineering State Key Laboratory of Silicon and Advanced Semiconductor Materials Cyrus Tang Center for Sensor Materials and Applications Institute of Fundamental and Transdisciplinary Research Zhejiang University Hangzhou310027 China Nanhu Brain-computer Interface Institute Zhejiang Hangzhou311100 China College of Electronic Information and Engineering Hangzhou Dianzi University Zhejiang Hangzhou310018 China Zhejiang Key Laboratory of Advanced Solid State Energy Storage Technology and Applications Taizhou Institute of Zhejiang University Zhejiang Taizhou318000 China School of Engineering Hangzhou City University Zhejiang Hangzhou310015 China College of Materials and Science Engineering Zhejiang University of Technology Zhejiang Hangzhou310006 China
Ferroelectric domains are crucial for the performance of piezoelectric ceramics, as the size and switching dynamics affect polarization response directly, manipulating both ferroelectric and piezoelectric properties. ... 详细信息
来源: 评论
BOOTSTRAPPING FOR EXTRACTING RELATIONS FROM LARGE CORPORA
收藏 引用
Journal of Electronics(China) 2008年 第1期25卷 89-96页
作者: Li Weigang Liu Ting Li Sheng Information Retrieval Laboratory School of Computer Science and Technology Harbin Institute of Technology Harbin 150001 China
A new approach of relation extraction is described in this paper. It adopts a bootstrap- ping model with a novel iteration strategy, which generates more precise examples of specific relation. Compared with previous m... 详细信息
来源: 评论
A fault recognition method based on clustering linear regression
收藏 引用
High technology Letters 2023年 第4期29卷 406-415页
作者: 陈雷 SHI Jiaqi ZHANG Ting Computer School Beijing Information Science and Technology UniversityBeijing 100101P.R.China Faculty of Information Technology Beijing University of TechnologyBeijing 100124P.R.China
Aiming at the problems of low accuracy,long time consumption,and failure to obtain quantita-tive fault identification results of existing automatic fault identification technic,a fault recognition method based on clus... 详细信息
来源: 评论
Unleashing the power of pseudo-code for binary code similarity analysis
收藏 引用
Cybersecurity 2023年 第2期6卷 44-61页
作者: Weiwei Zhang Zhengzi Xu Yang Xiao Yinxing Xue School of Computer Science and Engineering University of Science and Technology of ChinaHefeiChina School of Computer Science and Engineering Nanyang Technological UniversitySingaporeSingapore Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina
Code similarity analysis has become more popular due to its significant applicantions,including vulnerability detection,malware detection,and patch *** the source code of the software is difficult to obtain under most... 详细信息
来源: 评论
TagCombine: Recommending Tags to Contents in Software information Sites
收藏 引用
Journal of computer science & technology 2015年 第5期30卷 1017-1035页
作者: 王新宇 夏鑫 David Lo 1.College of Computer Science and Technology Zhejiang University Hangzhou 310027 China 2.School of Information Systems Singapore Management University Singapore Singapore
Nowadays, software engineers use a variety of online media to search and become informed of new and interesting technologies, and to learn from and help one another. We refer to these kinds of online media which help ... 详细信息
来源: 评论
Threshold quantum secure direct communication without entanglement
收藏 引用
science China(Physics,Mechanics & Astronomy) 2008年 第2期51卷 176-183页
作者: YANG YuGuang1,3 & WEN QiaoYan2 1 College of computer science and technology, Beijing University of technology, Beijing 100022, China 2 school of science, Beijing University of Posts and Telecommunications, Beijing 100876, China 3 State Key Laboratory of information Security (Graduate school of Chinese Academy of sciences), Beijing 100049, China College of Computer Science and Technology Beijing University of Technology Beijing China State Key Laboratory of Information Security (Graduate School of Chinese Academy of Sciences) Beijing China School of Science Beijing University of Posts and Telecommunications Beijing China
For the first time, a threshold quantum secure direct communication (TQSDC) scheme is presented. Similar to the classical Shamir's secret sharing scheme, the sender makes n shares, S1, …, Sn of secret key K and e... 详细信息
来源: 评论
Towards effective bug triage with software data reduction techniques
收藏 引用
IEEE Transactions on Knowledge and Data Engineering 2015年 第1期27卷 264-280页
作者: Xuan, Jifeng Jiang, He Hu, Yan Ren, Zhilei Zou, Weiqin Luo, Zhongxuan Wu, Xindong School of Software Dalian University of Technology Dalian China INRIA Lille-Nord Europe Lille France Jiangxi University of Science and Technology Nanchang China School of Computer Science and Information Engineering Hefei University of Technology Hefei China Department of Computer Science University of Vermont United States
Software companies spend over 45 percent of cost in dealing with software bugs. An inevitable step of fixing bugs is bug triage, which aims to correctly assign a developer to a new bug. To decrease the time cost in ma... 详细信息
来源: 评论
Early detection of cotton Verticillium wilt based on generative adversarial networks and hyperspectral imaging technology
收藏 引用
Industrial Crops and Products 2025年 231卷
作者: Tan, Fei Cang, Hao Gao, Xiuwen Wu, Nianyi Di, Ruoyu Zhang, Yuan Gao, Pan Lv, Xin Zhang, Chu College of Information Science and Technology Shihezi University Shihezi832003 China College of Mechanical and Electrical Engineering Shihezi University Shihezi832003 China School of Computer Science and Technology Soochow University Suzhou215006 China College of Agriculture Shihezi University Shihezi832003 China School of Information Engineering Huzhou University Huzhou313000 China
Cotton is one of most important economic crops in the world. Cotton yield has been significantly affected by frequent infestations of Verticillium wilt (VW). Currently, most detection methods for cotton VW are impleme... 详细信息
来源: 评论
Fuzzy Knowledge Distillation Model for Incomplete Multi-modality Data and Its Application to Brain Network Analysis
Fuzzy Knowledge Distillation Model for Incomplete Multi-moda...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Qi, Xiaoyu Huang, Jiashuang Cheng, Xueyun Wang, Mingliang Ding, Weiping Nantong University School of Information Science and Technology Nantong China Nanjing University of Information Science and Technology School of Computer and Software Nanjing China
Knowledge distillation (KD) techniques have been employed to tackle the issue of incomplete multi-modality data, aiming to enhance the performance of the student model (i.e., using unimodal data) as close as possible ... 详细信息
来源: 评论
A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution
收藏 引用
science China(information sciences) 2017年 第4期60卷 60-70页
作者: Weidong FANG Wuxiong ZHANG Yang YANG Yang LIU Wei CHEN Key Laboratory of Wireless Sensor Network & Communication Shanghai Institute of Microsystem and Information Technology Chinese Academy of Sciences Shanghai Research Center for Wireless Communication School of Computer Science and Technology China University of Mining and Technology
Compared with the encryption and the authentication which can prevent the external attacks,the trust management schemes are the better approaches for defending against the internal attacks in wireless sensor network(W... 详细信息
来源: 评论