咨询与建议

限定检索结果

文献类型

  • 2,005 篇 期刊文献
  • 1,807 篇 会议
  • 1 册 图书

馆藏范围

  • 3,813 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,507 篇 工学
    • 1,601 篇 计算机科学与技术...
    • 1,333 篇 软件工程
    • 639 篇 信息与通信工程
    • 333 篇 电气工程
    • 281 篇 电子科学与技术(可...
    • 280 篇 生物工程
    • 252 篇 光学工程
    • 240 篇 控制科学与工程
    • 194 篇 机械工程
    • 181 篇 生物医学工程(可授...
    • 154 篇 化学工程与技术
    • 124 篇 仪器科学与技术
    • 84 篇 网络空间安全
    • 83 篇 动力工程及工程热...
    • 70 篇 交通运输工程
    • 63 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 61 篇 安全科学与工程
  • 1,465 篇 理学
    • 688 篇 数学
    • 555 篇 物理学
    • 306 篇 生物学
    • 219 篇 统计学(可授理学、...
    • 164 篇 化学
    • 100 篇 系统科学
  • 597 篇 管理学
    • 345 篇 管理科学与工程(可...
    • 266 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 156 篇 医学
    • 127 篇 临床医学
    • 106 篇 基础医学(可授医学...
    • 67 篇 药学(可授医学、理...
  • 89 篇 法学
  • 45 篇 教育学
  • 41 篇 农学
  • 35 篇 经济学
  • 13 篇 军事学
  • 12 篇 文学
  • 11 篇 艺术学

主题

  • 128 篇 feature extracti...
  • 111 篇 semantics
  • 93 篇 deep learning
  • 79 篇 accuracy
  • 79 篇 training
  • 74 篇 computational mo...
  • 55 篇 neural networks
  • 52 篇 federated learni...
  • 50 篇 convolution
  • 48 篇 data mining
  • 48 篇 data models
  • 40 篇 object detection
  • 40 篇 visualization
  • 38 篇 image segmentati...
  • 37 篇 optimization
  • 37 篇 predictive model...
  • 37 篇 cryptography
  • 37 篇 convolutional ne...
  • 36 篇 machine learning
  • 34 篇 contrastive lear...

机构

  • 271 篇 university of ch...
  • 269 篇 iccub universita...
  • 265 篇 department of ph...
  • 263 篇 infn sezione di ...
  • 261 篇 universiteit maa...
  • 261 篇 school of physic...
  • 258 篇 infn sezione di ...
  • 257 篇 infn sezione di ...
  • 257 篇 cavendish labora...
  • 254 篇 h.h. wills physi...
  • 254 篇 infn sezione di ...
  • 253 篇 van swinderen in...
  • 250 篇 horia hulubei na...
  • 245 篇 department of ph...
  • 239 篇 institute of par...
  • 238 篇 imperial college...
  • 237 篇 stfc rutherford ...
  • 223 篇 shandong provinc...
  • 222 篇 infn sezione di ...
  • 208 篇 infn sezione di ...

作者

  • 181 篇 barter w.
  • 180 篇 brundu d.
  • 160 篇 aliouche z.
  • 160 篇 blake t.
  • 160 篇 betancourt c.
  • 160 篇 belin s.
  • 160 篇 amato s.
  • 159 篇 borsato m.
  • 159 篇 birch m.
  • 159 篇 boettcher t.
  • 158 篇 bellee v.
  • 158 篇 atzeni m.
  • 156 篇 cali s.
  • 154 篇 andreianov a.
  • 152 篇 boelhauve j.a.
  • 152 篇 beck a.
  • 152 篇 bencivenni g.
  • 151 篇 bowcock t.j.v.
  • 151 篇 byczynski w.
  • 150 篇 barbetti m.

语言

  • 3,528 篇 英文
  • 198 篇 其他
  • 93 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Technology Shaanxi Provincial Key Laboratory of Computer Networks"
3813 条 记 录,以下是3711-3720 订阅
排序:
Leakage-resilient identity-based encryption scheme
Leakage-resilient identity-based encryption scheme
收藏 引用
作者: Luo, Xizhao Qian, Peide Zhu, Yanqin Wang, Shangping School of Computer Science and Technology Soochow University Suzhou 215006 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou 215006 China School of Science Xiaqn University of Technology Xi'an 710048 ShaanXi China
We present an identity-based encryption in the relative-leakage model. In our construction, we firstly make use of a notion of new cryptographic primitive, identity-based hash proof system(IB-HPS), to construct a leak... 详细信息
来源: 评论
An extension of texture spectrum using local structure and variance
An extension of texture spectrum using local structure and v...
收藏 引用
International Symposium on Photonics and Optoelectronics, SOPO 2010
作者: Sun, Junding Zhu, Shisong Wu, Xiaosheng School of Computer Science and Technology Henan Polytechnic University Provincial Opening Laboratory for Control Engineering Key Disciplines Jiaozuo 454003 China School of Computer Science and Technology Henan Polytechnic University Jiaozuo 454003 China
In order to improve the performance of the region texture spectrum descriptors, an improved operator, called ID-LBP is discussed firstly. Then, three rotation invariant texture descriptors, named CS-LBPV, D-LBPV and I... 详细信息
来源: 评论
An approach for design and formal verification of safety-critical software
An approach for design and formal verification of safety-cri...
收藏 引用
2010 International Conference on computer Application and System Modeling, ICCASM 2010
作者: Ma, Wei-Gang Hei, Xin-Hong School of Computer Science and Engineering Xi'an University of Technology Xi'an Shaanxi 710071 China Key Laboratory of Computer Networks and Information Security Xidian University Ministry of Education Xi'an Shaanxi 710071 China State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing 100044 China
A modeling and verification methodology is presented for railway interlocking system which is regarded as a safety-critical system. The methodology utilizes UML (Unified Modeling Language) to model the function requir... 详细信息
来源: 评论
Reverse extraction of early-age hydration kinetic equation from observed data of Portland cement
收藏 引用
science China(Technological sciences) 2010年 第6期53卷 1540-1553页
作者: WANG Lin1,YANG Bo2,ZHAO XiuYang1,2,CHEN YueHui2 & CHANG Jun3 1 school of computer science and technology,Shandong University,Jinan 250101,China 2 provincial key laboratory for Network-based Intelligent Computing,University of Jinan,Jinan 250022,China 3 school of Material science and Engineering,University of Jinan,Jinan 250022,China 1. School of Computer Science and Technology Shandong University Jinan 250101 China2. Provincial Key Laboratory for Network-based Intelligent Computing University of Jinan Jinan 250022 China3. School of Material Science and Engineering University of Jinan Jinan 250022 China
The early-age hydration of Portland cement paste has an important impact on the formation of microstructure and development of ***,manual derivation of hydration kinetic equation is very difficult because there are mu... 详细信息
来源: 评论
The research on portfolio optimization Model and strategy for multiple objectives
The research on portfolio optimization Model and strategy fo...
收藏 引用
IEEE Symposium on Web Society
作者: Shang, Zhaoxia Liu, Hong School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology 250014 China
Application of multi-objective optimization method, the issue of portfolio risk is analyzed and simulated and the feasibility of the scheme is validated under the uncertain investment environment. Proposed the use of ... 详细信息
来源: 评论
Image retrieval based on an improved CS-LBP descriptor
Image retrieval based on an improved CS-LBP descriptor
收藏 引用
2010 2nd IEEE International Conference on Information Management and Engineering, ICIME 2010
作者: Junding, Sun Shisong, Zhu Xiaosheng, Wu School of Computer Science and Technology Henan Polytechnic University Jiaozuo China Provincial Opening Laboratory for Control Engineering Key Disciplines Jiaozuo China
The texture spectrum descriptors, center-symmetric local binary pattern (CS-LBP) and its extension D-LBP are effective for region description. However, they discard the low frequency information of a region. A novel i... 详细信息
来源: 评论
RETRACTED ARTICLE: Fuzzy value-at-risk and fuzzy conditional value-at-risk: Two risk measures under fuzzy uncertainty
RETRACTED ARTICLE: Fuzzy value-at-risk and fuzzy conditional...
收藏 引用
作者: Shang, Zhaoxia Liu, Hong Ma, Xiaoxian Liu, Yanmin School of Information Science and Engineering Shandong Normal University Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology 250014 China
This paper deals with two risk management tools and their application on Economical crisis management. Next points out some problems in their research and application and the direction of research, introduced some con... 详细信息
来源: 评论
Security analysis of projected C*- scheme
Security analysis of projected C*- scheme
收藏 引用
International Conference on Multimedia Information Networking and Security
作者: Yuan, Feng Hu, Yupu Wang, Yan Key Laboratory of Computer Networks and Information Security Xidian University Xi'an China School of Science Xi'an University of Architecture and Technology Xi'an China
This paper investigates the security of the projected C*- cryptographic scheme, and presents a method to attack the scheme. The basic idea of the attack is to utilize the affine part of the private keys and the weakne... 详细信息
来源: 评论
Rough knowledge mining algorithm based on extension decision rule lattice for electronic patient record
Rough knowledge mining algorithm based on extension decision...
收藏 引用
International Conference on Artificial Intelligence and Computational Intelligence
作者: Ding, Weiping Wang, Jiandong Guan, Zhijing Zhu, Hao Shi, Quan College of Information Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China School of Computer Science and Technology Nantong University Nantong China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China
Electronic patient record mining deals with the implicit and useful medical information stored in the electronic patient record *** this technology the useful knowledge is extracted and the scientific and auxiliary de... 详细信息
来源: 评论
Web services security policy
Web services security policy
收藏 引用
2010 2nd International Conference on Multimedia Information Networking and Security, MINES 2010
作者: Zhang, Yongsheng Sun, Cuicui Yang, Jing Wang, Ying School of Information Science and Engineering Shandong Normal University Ji'nan 250014 China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Ji'nan 250014 China
Security has become an important issue in Web Services application, which has been widely concerned. This paper introduces several security policy models that widely applied and analyzes the basic principles. And then... 详细信息
来源: 评论