咨询与建议

限定检索结果

文献类型

  • 2,005 篇 期刊文献
  • 1,807 篇 会议
  • 1 册 图书

馆藏范围

  • 3,813 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,507 篇 工学
    • 1,601 篇 计算机科学与技术...
    • 1,333 篇 软件工程
    • 639 篇 信息与通信工程
    • 333 篇 电气工程
    • 281 篇 电子科学与技术(可...
    • 280 篇 生物工程
    • 252 篇 光学工程
    • 240 篇 控制科学与工程
    • 194 篇 机械工程
    • 181 篇 生物医学工程(可授...
    • 154 篇 化学工程与技术
    • 124 篇 仪器科学与技术
    • 84 篇 网络空间安全
    • 83 篇 动力工程及工程热...
    • 70 篇 交通运输工程
    • 63 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 61 篇 安全科学与工程
  • 1,465 篇 理学
    • 688 篇 数学
    • 555 篇 物理学
    • 306 篇 生物学
    • 219 篇 统计学(可授理学、...
    • 164 篇 化学
    • 100 篇 系统科学
  • 597 篇 管理学
    • 345 篇 管理科学与工程(可...
    • 266 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 156 篇 医学
    • 127 篇 临床医学
    • 106 篇 基础医学(可授医学...
    • 67 篇 药学(可授医学、理...
  • 89 篇 法学
  • 45 篇 教育学
  • 41 篇 农学
  • 35 篇 经济学
  • 13 篇 军事学
  • 12 篇 文学
  • 11 篇 艺术学

主题

  • 128 篇 feature extracti...
  • 111 篇 semantics
  • 93 篇 deep learning
  • 79 篇 accuracy
  • 79 篇 training
  • 74 篇 computational mo...
  • 55 篇 neural networks
  • 52 篇 federated learni...
  • 50 篇 convolution
  • 48 篇 data mining
  • 48 篇 data models
  • 40 篇 object detection
  • 40 篇 visualization
  • 38 篇 image segmentati...
  • 37 篇 optimization
  • 37 篇 predictive model...
  • 37 篇 cryptography
  • 37 篇 convolutional ne...
  • 36 篇 machine learning
  • 34 篇 contrastive lear...

机构

  • 271 篇 university of ch...
  • 269 篇 iccub universita...
  • 265 篇 department of ph...
  • 263 篇 infn sezione di ...
  • 261 篇 universiteit maa...
  • 261 篇 school of physic...
  • 258 篇 infn sezione di ...
  • 257 篇 infn sezione di ...
  • 257 篇 cavendish labora...
  • 254 篇 h.h. wills physi...
  • 254 篇 infn sezione di ...
  • 253 篇 van swinderen in...
  • 250 篇 horia hulubei na...
  • 245 篇 department of ph...
  • 239 篇 institute of par...
  • 238 篇 imperial college...
  • 237 篇 stfc rutherford ...
  • 223 篇 shandong provinc...
  • 222 篇 infn sezione di ...
  • 208 篇 infn sezione di ...

作者

  • 181 篇 barter w.
  • 180 篇 brundu d.
  • 160 篇 aliouche z.
  • 160 篇 blake t.
  • 160 篇 betancourt c.
  • 160 篇 belin s.
  • 160 篇 amato s.
  • 159 篇 borsato m.
  • 159 篇 birch m.
  • 159 篇 boettcher t.
  • 158 篇 bellee v.
  • 158 篇 atzeni m.
  • 156 篇 cali s.
  • 154 篇 andreianov a.
  • 152 篇 boelhauve j.a.
  • 152 篇 beck a.
  • 152 篇 bencivenni g.
  • 151 篇 bowcock t.j.v.
  • 151 篇 byczynski w.
  • 150 篇 barbetti m.

语言

  • 3,528 篇 英文
  • 198 篇 其他
  • 93 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Technology Shaanxi Provincial Key Laboratory of Computer Networks"
3813 条 记 录,以下是3761-3770 订阅
排序:
Compact and broadband waveguide taper based on partial bandgap photonic crystals
收藏 引用
Chinese Optics Letters 2009年 第4期7卷 309-311页
作者: 侯金 郜定山 吴华明 周治平 Wuhan National Laboratory for Optoelectronics College of Optoelectronic Science and EngineeringHuazhong University of Science and Technology State Key Laboratory on Advanced Optical Communication Systems and Networks Peking University School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta
Partial bandgap characteristics of parallelogram lattice photonic crystals are proposed to suppress the radiation modes in a compact dielectric waveguide taper so as to obtain high transmittance in a large wavelength ... 详细信息
来源: 评论
Improvement of McCullagh-Barreto key agreement with KCI-security
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2009年 第2期16卷 68-71,79页
作者: WANG Xiao-fen DONG Qing-kuan ZHOU Yu XIAO Guo-zhen School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 China National Key Laboratory of Integrated Service Networks Xidian University Xi'an 710071 China
McCullagh-Barreto key agreement protocol and its variant achieve perfect forward security and key generation center (KGC) forward security, but provide no resistance to key compromise impersonation attack (KCI att... 详细信息
来源: 评论
Improved meet-in-the-middle attacks on 7-round AES-192 and 8-round AES-256
收藏 引用
Tongxin Xuebao/Journal on Communications 2010年 第9 A期31卷 197-201页
作者: Dong, Xiao-Li Hu, Yu-Pu Chen, Jie Li, Shun-Bo Yang, Yang Key Laboratory of Computer Networks and Information Security of Ministry of Education Xidian University Xi'an 710071 China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing 100049 China School of Science Xi'an University of Architecture and Technology Xi'an 710055 China
A new variant of 5-round distinguisher of meet-in-the-middle attack on AES was constructed by exploiting the properties of the round transform of AES. Based on the variant of distinguisher, meet-in-the-middle attacks ... 详细信息
来源: 评论
Exact thresholds for low-density parity-check codes over the binary erasure channel
收藏 引用
Progress in Natural science:Materials International 2009年 第7期19卷 897-900页
作者: Jianjun Mu a, Xiaopeng Jiao a, Xinmei Wangb a school of computer science and technology, Xidian University, Xi’an 710071, China b State key laboratory of Integrated Service networks, Xidian University, Xi’an 710071, China [a]School of Computer Science and Technology Xidian University Xi’an 710071 China [b]State Key Laboratory of Integrated Service Networks Xidian University Xi’an 710071 China
A simple method for determining the threshold of irregular LDPC codes over the binary erasure channel (BEC) under message-passing decoding is proposed. An exact formula for calculating the threshold of irregular LDPC ... 详细信息
来源: 评论
A new contour corner detector based on curvature scale space
A new contour corner detector based on curvature scale space
收藏 引用
6th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2009
作者: Sun, Junding Zhang, Zhaosheng School of Computer Science and Technology Henan Polytechnic University Jiaozuo 454003 China Provincial Key Laboratory of Computer Information Processing Technology Suzhou University 215006 China
Corner detection is a main concern in many computer vision applications like object recognition or image matching. Furthermore, detection is usually performed over the contour of the objects. This paper presents a nov... 详细信息
来源: 评论
A novel accelerometer based on microring resonator
收藏 引用
Chinese Optics Letters 2009年 第9期7卷 798-801页
作者: 莫文琴 吴华明 郜定山 周治平 Wuhan National Laboratory for Optoelectronics College of Optoelectronie Science and Engineering Huazhong University of Science and Technology Faculty of Mechanical and Electronic Information China University of Geosciences Wuhan National Laboratory for Optoelectronics College of Optoelectronic Science and EngineeringHuazhong University of Science and Technology State Key Laboratory on Advanced Optical Communication Systems and Networks Peking University School of Electrical and Computer Engineering Georgia Institute of Technology
A novel microring resonator accelerometer is proposed. It is realized by a suspended straight waveguide coupled with a microring resonator. Under the external acceleration, the coupling coefficient is a function of ga... 详细信息
来源: 评论
Contour-Shape recognition and retrieval based on chain code
Contour-Shape recognition and retrieval based on chain code
收藏 引用
2009 International Conference on Computational Intelligence and Security, CIS 2009
作者: Sun, Junding Xu, Heli School of Computer Science and Technology Henan Polytechnic University Jiaozuo 454003 China Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou 215006 China
The direction chain code has been widely used in image coding and recognition for its simplicity and low storage requirement. However, the researches on how to use chain code for shape retrieval are few. The tradition... 详细信息
来源: 评论
An effective texture spectrum descriptor
An effective texture spectrum descriptor
收藏 引用
5th International Conference on Information Assurance and Security, IAS 2009
作者: Xiaosheng, Wu Junding, Sun School of Computer Science and Technology Henan Polytechnic University Jiaozuo 454003 China Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou 215006 China
The center-symmetric local binary pattern (CS-LBP) is an effective extension to local binary pattern (LBP) operator. However, it discards some important texture information because of the ignorance of the center pixel... 详细信息
来源: 评论
Location-based reliability differentiated service for wireless sensor networks
收藏 引用
Frontiers of Electrical and Electronic Engineering in China 2009年 第2期4卷 166-172页
作者: Yong ZENG Jianfeng MA School of Computer Science and Technology Xidian UniversityXi’an 710071China Key Laboratory of Computer Networks and Information Security Ministry of EducationXi’an 710071China College of Computer Technology and Automation Tianjin Polytechnic UniversityTianjin 300160China
Designing reliability differentiated services for missions with different reliability requirements has become a hot topic in wireless sensor *** with a location-based routing mechanism,a quantified model without full ... 详细信息
来源: 评论
Synthesis constraints optimized genetic algorithm for autonomous task planning and allocating in MAS
Synthesis constraints optimized genetic algorithm for autono...
收藏 引用
7th ACIS International Conference on Software Engineering Research, Management and Applications, SERA09
作者: Zhang, Kailong Zhou, Xingshe Zhao, Chongqing Yao, Yuan School of Computer Northwestern Polytechnical University Xi'an 710072 China Shaanxi Provincial Key Laboratory of Embedded System Technology Northwestern Polytechnical University Xi'an 710072 China
Now, autonomous tasks planning and allocating (TPA) in Multi Agent System (MAS) has been one key and fundamental problem to promote the intelligent level of such system. Autonomous TPA means that, all tasks should be ... 详细信息
来源: 评论