咨询与建议

限定检索结果

文献类型

  • 2,005 篇 期刊文献
  • 1,807 篇 会议
  • 1 册 图书

馆藏范围

  • 3,813 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,507 篇 工学
    • 1,601 篇 计算机科学与技术...
    • 1,333 篇 软件工程
    • 639 篇 信息与通信工程
    • 333 篇 电气工程
    • 281 篇 电子科学与技术(可...
    • 280 篇 生物工程
    • 252 篇 光学工程
    • 240 篇 控制科学与工程
    • 194 篇 机械工程
    • 181 篇 生物医学工程(可授...
    • 154 篇 化学工程与技术
    • 124 篇 仪器科学与技术
    • 84 篇 网络空间安全
    • 83 篇 动力工程及工程热...
    • 70 篇 交通运输工程
    • 63 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 61 篇 安全科学与工程
  • 1,465 篇 理学
    • 688 篇 数学
    • 555 篇 物理学
    • 306 篇 生物学
    • 219 篇 统计学(可授理学、...
    • 164 篇 化学
    • 100 篇 系统科学
  • 597 篇 管理学
    • 345 篇 管理科学与工程(可...
    • 266 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 156 篇 医学
    • 127 篇 临床医学
    • 106 篇 基础医学(可授医学...
    • 67 篇 药学(可授医学、理...
  • 89 篇 法学
  • 45 篇 教育学
  • 41 篇 农学
  • 35 篇 经济学
  • 13 篇 军事学
  • 12 篇 文学
  • 11 篇 艺术学

主题

  • 128 篇 feature extracti...
  • 111 篇 semantics
  • 93 篇 deep learning
  • 79 篇 accuracy
  • 79 篇 training
  • 74 篇 computational mo...
  • 55 篇 neural networks
  • 52 篇 federated learni...
  • 50 篇 convolution
  • 48 篇 data mining
  • 48 篇 data models
  • 40 篇 object detection
  • 40 篇 visualization
  • 38 篇 image segmentati...
  • 37 篇 optimization
  • 37 篇 predictive model...
  • 37 篇 cryptography
  • 37 篇 convolutional ne...
  • 36 篇 machine learning
  • 34 篇 contrastive lear...

机构

  • 271 篇 university of ch...
  • 269 篇 iccub universita...
  • 265 篇 department of ph...
  • 263 篇 infn sezione di ...
  • 261 篇 universiteit maa...
  • 261 篇 school of physic...
  • 258 篇 infn sezione di ...
  • 257 篇 infn sezione di ...
  • 257 篇 cavendish labora...
  • 254 篇 h.h. wills physi...
  • 254 篇 infn sezione di ...
  • 253 篇 van swinderen in...
  • 250 篇 horia hulubei na...
  • 245 篇 department of ph...
  • 239 篇 institute of par...
  • 238 篇 imperial college...
  • 237 篇 stfc rutherford ...
  • 223 篇 shandong provinc...
  • 222 篇 infn sezione di ...
  • 208 篇 infn sezione di ...

作者

  • 181 篇 barter w.
  • 180 篇 brundu d.
  • 160 篇 aliouche z.
  • 160 篇 blake t.
  • 160 篇 betancourt c.
  • 160 篇 belin s.
  • 160 篇 amato s.
  • 159 篇 borsato m.
  • 159 篇 birch m.
  • 159 篇 boettcher t.
  • 158 篇 bellee v.
  • 158 篇 atzeni m.
  • 156 篇 cali s.
  • 154 篇 andreianov a.
  • 152 篇 boelhauve j.a.
  • 152 篇 beck a.
  • 152 篇 bencivenni g.
  • 151 篇 bowcock t.j.v.
  • 151 篇 byczynski w.
  • 150 篇 barbetti m.

语言

  • 3,528 篇 英文
  • 198 篇 其他
  • 93 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Technology Shaanxi Provincial Key Laboratory of Computer Networks"
3813 条 记 录,以下是3741-3750 订阅
排序:
Notice of Retraction: Fuzzy Value-at-Risk and Fuzzy Conditional Value-at-Risk: Two risk measures under fuzzy uncertainty
Notice of Retraction: Fuzzy Value-at-Risk and Fuzzy Conditio...
收藏 引用
IEEE Symposium on Web Society, SWS
作者: Zhaoxia Shang Hong Liu Xiaoxian Ma Yanmin Liu School of Information Science and Engineering Provincial Key Laboratory of Distributed Computer Software Novel Technology Shandong Normal University Shandong China
This article has been retracted by the publisher.
来源: 评论
PAPR Reduction in All-optical OFDM Systems Based on Phase Pre-emphasis
收藏 引用
Journal of Physics: Conference Series 2011年 第1期276卷
作者: Zhou He Wei Li Zhiyong Tao Ji ng Shao Xiaojun Liang Zhuanhua Deng Dexiu Huang Wuhan National Lab for Optoelectronics Department of Optoelectronics Engineering Huazhong University of Science and Technology Wuhan 430074 P.R.China State Key Laboratory of Optical Communication Technologies and Networks Wuhan Research Institute of Posts and Telecommunications Wuhan 430074 P.R.China School of Computer Science and Technology Hubei University of Economics Wuhan 430205 P.R.China
This paper investigates the peak-to-average power ratio (PAPR) theory in all-optical orthogonal frequency division multiplexing (OFDM) optical fibre communication systems. We find out that phase pre-emphasis could eff...
来源: 评论
Security Analysis of Projected C*- Scheme
Security Analysis of Projected C*- Scheme
收藏 引用
International Conference on Multimedia Information Networking and Security (MINES)
作者: Feng Yuan Yupu Hu Yan Wang Key Laboratory of Computer Networks and Information Security Xidian University Xi'an China School of Science Xi'an University of Architecture and Technology Xi'an China
This paper investigates the security of the projected C* - cryptographic scheme, and presents a method to attack the scheme. The basic idea of the attack is to utilize the affine part of the private keys and the weak... 详细信息
来源: 评论
Rough Knowledge Mining Algorithm Based on Extension Decision Rule Lattice for Electronic Patient Record
Rough Knowledge Mining Algorithm Based on Extension Decision...
收藏 引用
International Conference on Artificial Intelligence and Computational Intelligence (AICI)
作者: Weiping Ding Jiandong Wang Zhijing Guan Hao Zhu Quan Shi College of Information Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China School of Computer Science and Technology Nantong University Nantong China Provincial Key Laboratory of Computer Information Processing Technology Soochow University Suzhou China
Electronic patient record mining deals with the implicit and useful medical information stored in the electronic patient record database. By this technology the useful knowledge is extracted and the scientific and aux... 详细信息
来源: 评论
A novel algorithm for routing in wireless sensor networks considering mobility of node
收藏 引用
Dongbei Daxue Xuebao/Journal of Northeastern University 2010年 第SUPPL. 2期31卷 173-175+179页
作者: Qi, Xiao-Gang Liu, Li-Fang Zheng, Geng-Zhong Department of Applied Mathematics Xidian University Xi'an 710071 China State Key Laboratory of Integrated Service Networks Xidian University Xi'an 710071 China School of Computer Science and Technology Xidian University Xi'an 710071 China
According to the static protocols for wireless sensor networks, sensor nodes near the sink node consume more energy for sending more information than the other nodes, so the lifetime of the network is shorten. To solv... 详细信息
来源: 评论
A Low Jitter Scheduling Scheme for Combined-Input-Crosspoint-Queued Switch
A Low Jitter Scheduling Scheme for Combined-Input-Crosspoint...
收藏 引用
The 2010 2nd International Conference on Future computer and Communication(第二届未来计算机与通信国际会议 ICFCC 2010)
作者: Ning Xu Xueshun Wang School of Computer Science and Technology Huazhong University of Science and Techhnology Wuhan Research Ins.of Posts and Telecoms State Key Laboratory for New Optical Communication Technologies and Networks
In this paper, we study the low jitter scheduling problem for the Combined-Input-Crosspoint-queued (CICQ) switches. Considering the existing low jitter scheduling schemes for Input-Queued Switches and the features of ... 详细信息
来源: 评论
Web Services Security Policy
Web Services Security Policy
收藏 引用
International Conference on Multimedia Information Networking and Security (MINES)
作者: Yongsheng Zhang Cuicui Sun Yang Jing Wang Ying School of Information Science Engineering of Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Ji'nan China
Security has become an important issue in Web Services application, which has been widely concerned. This paper introduces several security policy models that widely applied and analyzes the basic principles. And then... 详细信息
来源: 评论
Camera Calibration Using Lengths of Corresponding Line Segments
Camera Calibration Using Lengths of Corresponding Line Segme...
收藏 引用
Pacific-Rim Symposium on Image and Video technology (PSIVT)
作者: Ruiyan Wang Guang Jiang Long Quan Chengke Wu State Key Laboratory of Integrated Service Networks School of Telecommunications Engineering Xidian University Xi'an China The Department of Computer Science Hong Kong University of Science and Technology Hong Kong China
Camera calibration using patterns is widely used in computer vision and industry. The accuracy of calibration depends on the accuracy of the pattern. A high accuracy pattern is usually difficult to manufacture in labs... 详细信息
来源: 评论
Neural network modeling on evolution of hydration reaction for Portland cement
Neural network modeling on evolution of hydration reaction f...
收藏 引用
International Conference on Bio-Inspired Computing: Theories and Applications, BICTA
作者: Lin Wang Bo Yang Yuehui Chen Xiuyang Zhao Jun Chang Haiyang Wang School of Computer Science and Technology Shandong University Jinan China Provincial Key Laboratory of Network based Intelligent Computing University of Ji''nan Jinan China School of Material Science and Engineering University of Ji''nan Jinan China
The hydration reaction of Portland cement paste has an important impact on the formation of microstructure and development of strength. However, simulating the evolution of hydration reaction is very difficult because... 详细信息
来源: 评论
3D FACE REPRESENTATION AND RECOGNITION BY INTRINSIC SHAPE DESCRIPTION MAPS
3D FACE REPRESENTATION AND RECOGNITION BY INTRINSIC SHAPE DE...
收藏 引用
IEEE International Conference on Acoustics, Speech, and Signal Processing
作者: Zhe Guo Yanning Zhang Yong Xia Zenggang Lin Dagan Feng Shaanxi Provincial Key Lab of Speech & Image Information Processing (SAIIP) School of Computer Science Northwestern Polytechnical University Xi'an China Biomedical and Multimedia Information Technology (BMIT) Research Group School of Information Technologies University of Sydney Australia
We present a novel method for 3D face recognition, in which the 3D facial surface is first mapped into a 2D domain with specified resolution through a global optimization by constrained conformal geometric maps. The I... 详细信息
来源: 评论