咨询与建议

限定检索结果

文献类型

  • 2,061 篇 期刊文献
  • 1,853 篇 会议
  • 1 册 图书

馆藏范围

  • 3,915 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,593 篇 工学
    • 1,673 篇 计算机科学与技术...
    • 1,354 篇 软件工程
    • 657 篇 信息与通信工程
    • 356 篇 电气工程
    • 293 篇 电子科学与技术(可...
    • 283 篇 生物工程
    • 280 篇 控制科学与工程
    • 254 篇 光学工程
    • 195 篇 机械工程
    • 186 篇 生物医学工程(可授...
    • 155 篇 化学工程与技术
    • 125 篇 仪器科学与技术
    • 87 篇 网络空间安全
    • 83 篇 动力工程及工程热...
    • 70 篇 交通运输工程
    • 65 篇 材料科学与工程(可...
    • 62 篇 安全科学与工程
    • 61 篇 建筑学
  • 1,496 篇 理学
    • 705 篇 数学
    • 562 篇 物理学
    • 310 篇 生物学
    • 222 篇 统计学(可授理学、...
    • 165 篇 化学
    • 100 篇 系统科学
  • 602 篇 管理学
    • 346 篇 管理科学与工程(可...
    • 269 篇 图书情报与档案管...
    • 115 篇 工商管理
  • 160 篇 医学
    • 128 篇 临床医学
    • 108 篇 基础医学(可授医学...
    • 67 篇 药学(可授医学、理...
  • 90 篇 法学
  • 45 篇 教育学
  • 41 篇 农学
  • 35 篇 经济学
  • 13 篇 军事学
  • 12 篇 文学
  • 11 篇 艺术学

主题

  • 129 篇 feature extracti...
  • 112 篇 semantics
  • 95 篇 deep learning
  • 80 篇 training
  • 79 篇 accuracy
  • 74 篇 computational mo...
  • 55 篇 neural networks
  • 53 篇 federated learni...
  • 50 篇 convolution
  • 48 篇 data mining
  • 48 篇 data models
  • 42 篇 object detection
  • 40 篇 image segmentati...
  • 40 篇 visualization
  • 39 篇 contrastive lear...
  • 38 篇 convolutional ne...
  • 37 篇 optimization
  • 37 篇 predictive model...
  • 37 篇 cryptography
  • 36 篇 machine learning

机构

  • 269 篇 iccub universita...
  • 269 篇 university of ch...
  • 265 篇 department of ph...
  • 263 篇 infn sezione di ...
  • 261 篇 universiteit maa...
  • 261 篇 school of physic...
  • 257 篇 infn sezione di ...
  • 257 篇 cavendish labora...
  • 257 篇 infn sezione di ...
  • 254 篇 h.h. wills physi...
  • 253 篇 van swinderen in...
  • 253 篇 infn sezione di ...
  • 250 篇 horia hulubei na...
  • 243 篇 department of ph...
  • 236 篇 imperial college...
  • 236 篇 institute of par...
  • 233 篇 stfc rutherford ...
  • 225 篇 shandong provinc...
  • 218 篇 infn sezione di ...
  • 207 篇 ds4ds la salle u...

作者

  • 181 篇 barter w.
  • 180 篇 brundu d.
  • 160 篇 aliouche z.
  • 160 篇 blake t.
  • 160 篇 betancourt c.
  • 160 篇 belin s.
  • 160 篇 amato s.
  • 159 篇 borsato m.
  • 159 篇 birch m.
  • 159 篇 boettcher t.
  • 158 篇 bellee v.
  • 158 篇 atzeni m.
  • 156 篇 cali s.
  • 153 篇 andreianov a.
  • 152 篇 boelhauve j.a.
  • 152 篇 beck a.
  • 151 篇 bowcock t.j.v.
  • 150 篇 barbetti m.
  • 150 篇 byczynski w.
  • 150 篇 bencivenni g.

语言

  • 3,497 篇 英文
  • 331 篇 其他
  • 94 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Technology Shaanxi Provincial Key Laboratory of Computer Networks"
3915 条 记 录,以下是3871-3880 订阅
排序:
Synthesis constraints optimized genetic algorithm for autonomous task planning and allocating in MAS
Synthesis constraints optimized genetic algorithm for autono...
收藏 引用
7th ACIS International Conference on Software Engineering Research, Management and Applications, SERA09
作者: Zhang, Kailong Zhou, Xingshe Zhao, Chongqing Yao, Yuan School of Computer Northwestern Polytechnical University Xi'an 710072 China Shaanxi Provincial Key Laboratory of Embedded System Technology Northwestern Polytechnical University Xi'an 710072 China
Now, autonomous tasks planning and allocating (TPA) in Multi Agent System (MAS) has been one key and fundamental problem to promote the intelligent level of such system. Autonomous TPA means that, all tasks should be ... 详细信息
来源: 评论
Leveled Group key Management with Efficient Revocations for Wireless Sensor networks
收藏 引用
电子学报(英文版) 2009年 第3期18卷 494-499页
作者: LI Fenghua YAN Junzhi MA Jianfeng WANG Wei Key Laboratory of Computer Networks and Information Security (Ministry of Education) Xidian University Xi'an 710071 China Graduate School Beijing Electronic Science and Technology Institute Beijing 100070 China No.36 Research Institute of CETC Jiaxing 314033 China
Wireless sensor networks are often deployed in hostile environments. Protecting the communication against node capture is one of the most important design objectives. Focused on the revocations of resource constrained... 详细信息
来源: 评论
Extending Weight-Balanced key Tree without Adjustment-Propagation
收藏 引用
电子学报(英文版) 2009年 第1期18卷 79-83页
作者: WANG Wei ZHAO Wenhong LI Fenghua MA Jianfeng No. 36 Research Institute of CETC Jiaxing 314033 China Key Laboratory of Computer Networks and Information Security (Ministry of Education) Xidian University Xi'an 710071 China Graduate School Beijing Electronic Science and Technology Institute Beijing 100070 China
An Extending weight-balanced tree (EWB tree) for group key managements is presented. By introducing a special path in the weight-balanced key tree, the EWB tree does not cause adjustment-propagation after member addin... 详细信息
来源: 评论
Corrections to “A Spatio-Temporal Auto Regressive Model for Frame Rate Up-Conversion” [Sep 09 1289-1301]
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2010年 第1期20卷 161-161页
作者: Yongbing Zhang Debin Zhao Xiangyang Ji Ronggang Wang Wen Gao Department of Computer Science Harbin Institute of Technology Harbin China Broadband Networks and Digital Media Laboratory Department of Automation Tsinghua University Beijing China France Telecom Research and Development Beijing Company Limited Beijing China Key Laboratory of Machine Perception School of Electronic Engineering and Computer Science Peking University Beijing China
In the above titled paper (ibid., vol. 19, no. 9, pp. 1289-1301, Sep. 09), the column under 3-DRS in Table II is incorrect due to the author's table editing error. The correct table is presented here.
来源: 评论
Microring resonator for glucose sensing applications
收藏 引用
Frontiers of Optoelectronics 2009年 第3期2卷 304-307页
作者: Yao CHEN Zhengyu LI Huaxiang YI Zhiping ZHOU Jun YU Department of Electronic Science and Technology Huazhong University of Science and Technology Wuhan National Laboratory for Optoelectronics Huazhong University of Science and Technology State Key Laboratory on Advanced Optical Communication Systems and Networks Peking University School of Electrical and Computer Engineering Georgia Institute of Technology
Silicon nitride microring resonators were demonstrated as chemical sensors. The microring devices,with diameter of 100 μm, were fabricated using complementary metal oxide semiconductor(CMOS)-compatible technology, ... 详细信息
来源: 评论
Secure and efficient VSS scheme based on partial broadcast channels
收藏 引用
Journal of Computational Information Systems 2009年 第3期5卷 1149-1155页
作者: Wang, Jialing Zhu, Yanqin Luo, Xizhao School of Computer Science and Technology Soochow University Suzhou 215006 China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou 215006 China
In the conventional verifiable secret sharing scheme, a dealer uses point-to-point secure channels to distribute the shares of a secret to a number of participants. Rei and Wang proposed a secret sharing scheme based ... 详细信息
来源: 评论
Extracting Protein-Protein Interaction from Biomedical Text Using Additional Shallow Parsing Information
Extracting Protein-Protein Interaction from Biomedical Text ...
收藏 引用
International Conference on BioMedical Engineering and Informatics (BMEI)
作者: Huanhuan Yu Longhua Qian Guodong Zhou Qiaoming Zhu Jiangsu Provincial Key Laboratory of Computer Information Processing Technology School of Computer Science and Technology Soochow University Suzhou China
This paper explores protein-protein interaction extraction from biomedical literature using support vector machines (SVM). Besides common lexical features, various overlap features and base phrase chunking information... 详细信息
来源: 评论
Simple technique to fabricate microscale and nanoscale silicon waveguide devices
收藏 引用
Frontiers of Optoelectronics 2009年 第3期2卷 308-311页
作者: Yao CHEN Junbo FENG Zhiping ZHOU Christopher J.SUMMERS David S.CITRIN Jun YU Department of Electronic Science and Technology Huazhong University of Science and Technology Wuhan National Laboratory for Optoelectronics Huazhong University of Science and Technology State Key Laboratory on Advanced Optical Communication Systems and Networks Peking University School of Electrical and Computer Engineering Georgia Institute of Technology School of Materials Science and Engineering Georgia Institute of Technology Unité Mixte Internationale 2958 Georgia Tech-CNRS Georgia Tech Lorraine
Fabrication of microscale and nanoscale silicon waveguide devices requires patterning silicon, but until recently, exploitation of the technology has been restricted by the difficulty of forming ever-small features wi... 详细信息
来源: 评论
Democratic Group Signatures with Threshold Traceability
收藏 引用
Journal of Shanghai Jiaotong university(science) 2009年 第1期14卷 98-101页
作者: 李祥学 钱海峰 李建华 School of Information Security Engineering Shanghai Jiaotong UniversityShanghai 200240China State Key Lab of Information Security Graduate School of Chinese Academy of SciencesBeijing 100039China State Key Laboratory of Integrated Service Networks Xidian UniversityXi'an 710071China Computer Science and Technology Department East China Normal UniversityShanghai 200241China
This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a... 详细信息
来源: 评论
A policy language for expressing access control properties in PDAC model
A policy language for expressing access control properties i...
收藏 引用
International Conference on computer science & Education (ICCSE)
作者: Xian Wu Peide Qian School of Computer Science and Technology Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China School of Computer Science and Technology Soochow University Suzhou China
An access control policy defines what is authorized, and an access control mechanism implements the policy to ensure that all accesses are in accordance with the underlying policy. Nowadays, many researcher are workin... 详细信息
来源: 评论