咨询与建议

限定检索结果

文献类型

  • 2,061 篇 期刊文献
  • 1,853 篇 会议
  • 1 册 图书

馆藏范围

  • 3,915 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,593 篇 工学
    • 1,673 篇 计算机科学与技术...
    • 1,354 篇 软件工程
    • 657 篇 信息与通信工程
    • 356 篇 电气工程
    • 293 篇 电子科学与技术(可...
    • 283 篇 生物工程
    • 280 篇 控制科学与工程
    • 254 篇 光学工程
    • 195 篇 机械工程
    • 186 篇 生物医学工程(可授...
    • 155 篇 化学工程与技术
    • 125 篇 仪器科学与技术
    • 87 篇 网络空间安全
    • 83 篇 动力工程及工程热...
    • 70 篇 交通运输工程
    • 65 篇 材料科学与工程(可...
    • 62 篇 安全科学与工程
    • 61 篇 建筑学
  • 1,496 篇 理学
    • 705 篇 数学
    • 562 篇 物理学
    • 310 篇 生物学
    • 222 篇 统计学(可授理学、...
    • 165 篇 化学
    • 100 篇 系统科学
  • 602 篇 管理学
    • 346 篇 管理科学与工程(可...
    • 269 篇 图书情报与档案管...
    • 115 篇 工商管理
  • 160 篇 医学
    • 128 篇 临床医学
    • 108 篇 基础医学(可授医学...
    • 67 篇 药学(可授医学、理...
  • 90 篇 法学
  • 45 篇 教育学
  • 41 篇 农学
  • 35 篇 经济学
  • 13 篇 军事学
  • 12 篇 文学
  • 11 篇 艺术学

主题

  • 129 篇 feature extracti...
  • 112 篇 semantics
  • 95 篇 deep learning
  • 80 篇 training
  • 79 篇 accuracy
  • 74 篇 computational mo...
  • 55 篇 neural networks
  • 53 篇 federated learni...
  • 50 篇 convolution
  • 48 篇 data mining
  • 48 篇 data models
  • 42 篇 object detection
  • 40 篇 image segmentati...
  • 40 篇 visualization
  • 39 篇 contrastive lear...
  • 38 篇 convolutional ne...
  • 37 篇 optimization
  • 37 篇 predictive model...
  • 37 篇 cryptography
  • 36 篇 machine learning

机构

  • 269 篇 iccub universita...
  • 269 篇 university of ch...
  • 265 篇 department of ph...
  • 263 篇 infn sezione di ...
  • 261 篇 universiteit maa...
  • 261 篇 school of physic...
  • 257 篇 infn sezione di ...
  • 257 篇 cavendish labora...
  • 257 篇 infn sezione di ...
  • 254 篇 h.h. wills physi...
  • 253 篇 van swinderen in...
  • 253 篇 infn sezione di ...
  • 250 篇 horia hulubei na...
  • 243 篇 department of ph...
  • 236 篇 imperial college...
  • 236 篇 institute of par...
  • 233 篇 stfc rutherford ...
  • 225 篇 shandong provinc...
  • 218 篇 infn sezione di ...
  • 207 篇 ds4ds la salle u...

作者

  • 181 篇 barter w.
  • 180 篇 brundu d.
  • 160 篇 aliouche z.
  • 160 篇 blake t.
  • 160 篇 betancourt c.
  • 160 篇 belin s.
  • 160 篇 amato s.
  • 159 篇 borsato m.
  • 159 篇 birch m.
  • 159 篇 boettcher t.
  • 158 篇 bellee v.
  • 158 篇 atzeni m.
  • 156 篇 cali s.
  • 153 篇 andreianov a.
  • 152 篇 boelhauve j.a.
  • 152 篇 beck a.
  • 151 篇 bowcock t.j.v.
  • 150 篇 barbetti m.
  • 150 篇 byczynski w.
  • 150 篇 bencivenni g.

语言

  • 3,497 篇 英文
  • 331 篇 其他
  • 94 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Technology Shaanxi Provincial Key Laboratory of Computer Networks"
3915 条 记 录,以下是3601-3610 订阅
排序:
A Component Model Based on Semantic for E-Commerce PaaS Platform
A Component Model Based on Semantic for E-Commerce PaaS Plat...
收藏 引用
Web Information Systems and Applications Conference (WISA)
作者: Zhenchao Zhang Wei He Qingzhong Li School of Computer Science and Technology Shandong Provincial Key Laboratory of Software Engineering Jinan China
As one of the most important patterns of cloud service, PaaS provides an entire development, deployment and runtime platform for SaaS applications. In a specific PaaS environment such as e-commerce platform, there are... 详细信息
来源: 评论
Parallel Construction of Binomial-Like Independent Spanning Trees on Twisted Cubes
Parallel Construction of Binomial-Like Independent Spanning ...
收藏 引用
International Conference on computer sciences and Applications (CSA)
作者: Yan Wang Jianxi Fan Wenjun Liu Baolei Cheng Provincial Key Laboratory for Computer Information Processing Technology Soochow University School of Computer Science and Technology Soochow University Suzhou China
Independent spanning trees(ISTs) have increasing applications in fault-tolerance, reliable communication protocols and secure message distribution. In this paper, we propose an O(N) parallel algorithm to construct n B... 详细信息
来源: 评论
Analyzing mechanism-based attacks in privacy-preserving data publishing
收藏 引用
Optik 2013年 第24期124卷 6939-6945页
作者: Hongtao Li Jianfeng Ma Shuai Fu School of Computer Science and Technology Xidian University Xi’an 710071 China Key Laboratory of Computer Networks and Information Security Ministry of Education (Xidian University) Xi’an 710071 China
Privacy-preserving data publishing (PPDP) deals with data publishing while preserving individual's privacy in the data. Recent researches show that knowledge of mechanism of anonymization provides a loophole for a... 详细信息
来源: 评论
An approach of real-time vehicle detection based on improved Adaboost algorithm and frame differencing rule
收藏 引用
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of science and technology (Natural science Edition) 2013年 第SUPPL.I期41卷 379-382页
作者: Liu, Yang Wang, Haihui Xiang, Yunlu Lu, Peilei School of Computer Science and Engineering Wuhan Institute of Technology Wuhan 430205 China Hubei Provincial Key Laboratory of Intelligent Robot Wuhan Institute of Technology Wuhan 430205 China
The methods of moving vehicles detection were normally difficult to count the correct numbers of the vehicles and they may not be able to reach the real-time requirement. To solve those problems, a vehicle detection a... 详细信息
来源: 评论
A regression test case generation method guided with branch probability
收藏 引用
Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (science and technology) 2013年 第SUPPL.2期44卷 317-322页
作者: Yu, Lechen Wang, Haijun Zheng, Qinghua Liu, Ting Huang, Xiaolong Yang, Zijiang Wei, Wei MOE Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an 710049 China Department of Computer Science and Technology Xi'an Jiaotong University Xi'an 710049 China School of Computer Science and Engineering Xi'an University of Technology Xi'an 710049 China
A novel method was proposed to generate regression test cases guided by the branch possibility (GBP). The symbolic execution was applied to search the paths of the program and generate control dependence graph of the ... 详细信息
来源: 评论
Software survivability evaluation method based on software calling structure
收藏 引用
Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (science and technology) 2013年 第SUPPL.1期44卷 443-448页
作者: Hou, Yuqiao Qu, Yu Liu, Linfeng Zheng, Qinghua Liu, Ting Zheng, Chao Yang, Zijiang Key Laboratory for Intelligent Networks and Network Security Ministry of Education Xi'an Jiaotong University Xi'an 710049 China Department of Computer Science and Technology Xi'an Jiaotong University Xi'an 710049 China School of Computer Science and Engineering Xi'an University of Technology Xi'an 710048 China
A new method was proposed to evaluate the survivability of the software system based on the calling structure of the software. Firstly, the interactions among the components of the software were obtained using the sta... 详细信息
来源: 评论
TimSim: A Timestep-based Wireless Ad-hoc Network Simulator
TimSim: A Timestep-based Wireless Ad-hoc Network Simulator
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications
作者: Chong Yan Zhiping Jia Lei Ju Hui Xia Huaqiang Xu School of Computer Science and Technology Shandong University Shandong Provincial Key Laboratory of Software Engineering Jinan Shandong China
Wireless hosts can communicate with each other without a fixed infrastructure in wireless ad-hoc networks. Deploying and monitoring a large number of hosts in such networks involves high cost and intensive labor. As a... 详细信息
来源: 评论
Penetration of authority under cloud environment based on RBAC
收藏 引用
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of science and technology (Natural science Edition) 2013年 第SUPPL.2期41卷 68-71页
作者: Zou, Jiashun Zhang, Yongsheng Gao, Yan School of Information Science and Engineering Shandong Normal University Jinan 250014 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Shandong Normal University Jinan 250014 China
A research was made on the weak security of access control model based on the role, which was showed in the cross-domain access of cloud computing. An access control strategy based on the hops was put forward by intro... 详细信息
来源: 评论
Geographic multipath routing in duty-cycled wireless sensor networks with energy harvesting
Geographic multipath routing in duty-cycled wireless sensor ...
收藏 引用
2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, GreenCom-iThings-CPSCom 2013
作者: Han, Guangjie Dong, Yuhui Shu, Lei Guo, Hui Niu, Jianwei Nantong Ocean and Coastal Engineering Research Institute Hohai University China Key Laboratory of Sensor Networks and Environmental Sensing Changzhou China Department of Information and Communication Engineering Hohai University Changzhou China Patent Examination Cooperation Center SIPO Jiangsu China College of Electronic Information and Computer Guangdong University of Petrochemical Technology China School of Computer Science and Engineering Beihang University Beijing China
With developments of energy harvesting technolo-gies, rechargeable Wireless Sensor networks (WSNs) are in-creasing. This paper introduces the energy renewable property and further proposes a novel 2-hop geographic nod... 详细信息
来源: 评论
Orthogonal particle swarm optimization algorithm and its application in circuit design
收藏 引用
Telkomnika - Indonesian Journal of Electrical Engineering 2013年 第6期11卷 2926-2932页
作者: Yan, Xuesong Wu, Qinghua Liu, Hammin School of Computer Science China University of Geosciences Wuhan China Hubei Provincial Key Laboratory of Intelligent Robot Wuhan Institute of Technology Wuhan China School of Computer Science and Engineering Wuhan Institute of Technology Wuhan China Wuhan Institute of Shipbuilding Technology Wuhan China
In this paper, aim at the disadvantages of standard Particle Swarm Optimization (PSO) algorithm like being trapped easily into a local optimum, we improves the standard PSO and proposes a new algorithm to solve the ov... 详细信息
来源: 评论