咨询与建议

限定检索结果

文献类型

  • 2,061 篇 期刊文献
  • 1,853 篇 会议
  • 1 册 图书

馆藏范围

  • 3,915 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,593 篇 工学
    • 1,673 篇 计算机科学与技术...
    • 1,354 篇 软件工程
    • 657 篇 信息与通信工程
    • 356 篇 电气工程
    • 293 篇 电子科学与技术(可...
    • 283 篇 生物工程
    • 280 篇 控制科学与工程
    • 254 篇 光学工程
    • 195 篇 机械工程
    • 186 篇 生物医学工程(可授...
    • 155 篇 化学工程与技术
    • 125 篇 仪器科学与技术
    • 87 篇 网络空间安全
    • 83 篇 动力工程及工程热...
    • 70 篇 交通运输工程
    • 65 篇 材料科学与工程(可...
    • 62 篇 安全科学与工程
    • 61 篇 建筑学
  • 1,496 篇 理学
    • 705 篇 数学
    • 562 篇 物理学
    • 310 篇 生物学
    • 222 篇 统计学(可授理学、...
    • 165 篇 化学
    • 100 篇 系统科学
  • 602 篇 管理学
    • 346 篇 管理科学与工程(可...
    • 269 篇 图书情报与档案管...
    • 115 篇 工商管理
  • 160 篇 医学
    • 128 篇 临床医学
    • 108 篇 基础医学(可授医学...
    • 67 篇 药学(可授医学、理...
  • 90 篇 法学
  • 45 篇 教育学
  • 41 篇 农学
  • 35 篇 经济学
  • 13 篇 军事学
  • 12 篇 文学
  • 11 篇 艺术学

主题

  • 129 篇 feature extracti...
  • 112 篇 semantics
  • 95 篇 deep learning
  • 80 篇 training
  • 79 篇 accuracy
  • 74 篇 computational mo...
  • 55 篇 neural networks
  • 53 篇 federated learni...
  • 50 篇 convolution
  • 48 篇 data mining
  • 48 篇 data models
  • 42 篇 object detection
  • 40 篇 image segmentati...
  • 40 篇 visualization
  • 39 篇 contrastive lear...
  • 38 篇 convolutional ne...
  • 37 篇 optimization
  • 37 篇 predictive model...
  • 37 篇 cryptography
  • 36 篇 machine learning

机构

  • 269 篇 iccub universita...
  • 269 篇 university of ch...
  • 265 篇 department of ph...
  • 263 篇 infn sezione di ...
  • 261 篇 universiteit maa...
  • 261 篇 school of physic...
  • 257 篇 infn sezione di ...
  • 257 篇 cavendish labora...
  • 257 篇 infn sezione di ...
  • 254 篇 h.h. wills physi...
  • 253 篇 van swinderen in...
  • 253 篇 infn sezione di ...
  • 250 篇 horia hulubei na...
  • 243 篇 department of ph...
  • 236 篇 imperial college...
  • 236 篇 institute of par...
  • 233 篇 stfc rutherford ...
  • 225 篇 shandong provinc...
  • 218 篇 infn sezione di ...
  • 207 篇 ds4ds la salle u...

作者

  • 181 篇 barter w.
  • 180 篇 brundu d.
  • 160 篇 aliouche z.
  • 160 篇 blake t.
  • 160 篇 betancourt c.
  • 160 篇 belin s.
  • 160 篇 amato s.
  • 159 篇 borsato m.
  • 159 篇 birch m.
  • 159 篇 boettcher t.
  • 158 篇 bellee v.
  • 158 篇 atzeni m.
  • 156 篇 cali s.
  • 153 篇 andreianov a.
  • 152 篇 boelhauve j.a.
  • 152 篇 beck a.
  • 151 篇 bowcock t.j.v.
  • 150 篇 barbetti m.
  • 150 篇 byczynski w.
  • 150 篇 bencivenni g.

语言

  • 3,497 篇 英文
  • 331 篇 其他
  • 94 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Computer Science and Technology Shaanxi Provincial Key Laboratory of Computer Networks"
3915 条 记 录,以下是3891-3900 订阅
排序:
Tunable Omnidirectional Surface Plasmon Resonance in Cylindrical Plasmonic Structure
收藏 引用
Chinese Physics Letters 2008年 第12期25卷 4388-4390页
作者: 汪毅 王冰 周治平 Wuhan National Laboratory for Optoelectronics Huazhong University of Science and Technology Wuhan 430074 State Key Laboratory on Advanced Optical Communication Systems and Networks Peking University Beijing 100871 School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta Georgia 30332 USA
The tunable omnidirectional surface plasmon resonance in the optical range is theoretically demonstrated in a cylindrical plasmonic crystal by using rigorous coupled-wave analysis. The cylindrical plasmonic crystal co... 详细信息
来源: 评论
Loss temporal dependency characteristic inference in wireless sensor network
收藏 引用
Journal of Computational Information Systems 2008年 第5期4卷 2303-2308页
作者: Li, Yongjun Ji, Wenli Dai, Yafei Computer Networks and Distributed Systems Laboratory Peking University Beijing 100871 China School of Computer Science Northwestern Polytechnical University Xi'an 710072 China School of Communication Engineering Xi'an University of Science and Technology Xi'an 710075 China State Key Lab. for Adv. Opt. Commun Syst and Networks Beijing 1000871 China
The internal link loss characteristic inference has become an increasingly important issue for operating and evaluating a wireless sensor network. Due to the inherent stringent bandwidth and energy constraints, it is ... 详细信息
来源: 评论
Efficient certificate-based signcryption scheme from bilinear pairings
收藏 引用
International Journal of computers and Applications 2008年 第2期30卷 129-133页
作者: Li, F. Xin, X. Hu, Y. School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054 China Department of Information and Computing Science Zhengzhou University of Light Industry Zhengzhou 450002 China Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China
Signcryption is a public key cryptographic primitive that performs digital signature and public key encryption simultaneously, at lower computational costs and communication overheads than the signature-then-encryptio... 详细信息
来源: 评论
Loss cumulate generating function inference and application in wireless sensor network
收藏 引用
Journal of Computational Information Systems 2008年 第4期4卷 1399-1407页
作者: Li, Yongjun Ji, Wenli Dai, Yafei Computer Networks and Distributed Systems Laboratory Peking University Beijing 100871 China School of Computer Science Northwestern Polytechnical University Xi'an 710072 China School of Communication Engineering Xi'an University of Science and Technology Xi'an 710075 China State Key Lab. for Adv. Opt Commun. Syst. and Networks Beijing 1000871 China
The internal link loss characteristic inference has become an increasingly important issue for operating and evaluating a wireless sensor network. Due to the inherent stringent bandwidth and energy constraints of sens... 详细信息
来源: 评论
Democratic Group Signatures with Linkability from Gap Diffie-Hellman Group
收藏 引用
Journal of Shanghai Jiaotong university(science) 2008年 第6期13卷 688-691页
作者: 刘彦宾 李祥学 钱海峰 张文政 Department of Computer Science ZunYi Normal CollegeZunyi 563002China School of Information Security Engineering Shanghai Jiaotong UniversityShanghai 200240China State Key Laboratory of Integrated Service Networks Xidian UniversityXi'an 710071China Computer Science and Technology Department East China Normal UniversityShanghai 200062China National Laboratory for Modern Communications Chengdu 610041China
Democratic group signatures (DGSs) attract many researchers due to their appealing properties, i.e., anonymity, traceability and no group manager. Security results of existing work are based on decisional Diffie-Hel... 详细信息
来源: 评论
Integration of signature encryption and key exchange
Integration of signature encryption and key exchange
收藏 引用
2008 International Conference on Computational Intelligence and Security, CIS 2008
作者: Yong, Ding Ya-hui, Li School of Mathematics and Computational Science Guilin University of Electronic Technology Guilin 541004 China Ministry of Education Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China Department of Computer Science City University of Hong Kong Hong Kong Hong Kong
Signature, encryption and key exchange are some of the most important and foundational cryptographical tools. In most cases, they are all needed to provide different secure functions. There exist called authenticated ... 详细信息
来源: 评论
Design and implementation of scalable IPv4-IPv6 internetworking gateway
Design and implementation of scalable IPv4-IPv6 internetwork...
收藏 引用
Network Architectures, Management, and Applications VI
作者: Guo-sheng, Zhu Shao-hua, Yu Jin-you, Dai School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China Wuhan Research Ins. of Posts and Telecoms Wuhan 430074 China State Key Laboratory for New Optical Communication Technologies and Networks Wuhan 430074 China
This paper proposed a scalable architecture of IPv4-IPv6 internetworking gateway based on EZchip 10Gbps network processor NP-1c. The Application Layer Gateway(ALG) of control plane can be upgraded without needing to m... 详细信息
来源: 评论
Tree Kernel-Based Semantic Relation Extraction Using Unified Dynamic Relation Tree
Tree Kernel-Based Semantic Relation Extraction Using Unified...
收藏 引用
International Conference on Advanced Language Processing and Web Information technology (ALPIT)
作者: Longhua Qian Guodong Zhou Fang Kong Qiaomin Zhu Peide Qian Jiangsu Provincial Key Laboratory for Computer Information Processing Technology School of Computer Science and Technology Soochow University Suzhou China
This paper proposes a unified dynamic relation tree (DRT) span for tree kernel-based semantic relation extraction between entity names. The basic idea is to apply a variety of linguistics-driven rules to dynamically p... 详细信息
来源: 评论
An efficient and provably secure ID-based threshold signcryption scheme
An efficient and provably secure ID-based threshold signcryp...
收藏 引用
International Conference on Communications, Circuits and Systems (ICCCAS)
作者: Fagen Li Yong Yu School of Computer Science and Engineering University of Electronic Science and Technology Chengdu China Key Laboratory of Computer Networks and Information Security Xidian University Xi'an China
Signcryption is a cryptographic primitive that performs digital signature and public key encryption simultaneously, at a lower computational costs and communication overheads than the signature-then-encryption approac... 详细信息
来源: 评论
Universally composable Secure RFID communication protocol in supply chains
收藏 引用
Jisuanji Xuebao/Chinese Journal of computers 2008年 第10期31卷 1754-1767页
作者: Zhang, Fan Sun, Xuan Ma, Jian-Feng Cao, Chun-Jie Zhu, Jian-Ming Key Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China Institute of Beijing Computer Technology and Application Second Academy China Aerospace Science and Industry Corporation Beijing 100854 China Huhhot Railway Bureau Huhhot 010020 China School of Information Central University of Finance Economics Beijing 100081 China
Supply chain management is the major field for RFID application. However, little work has been conducted to address the security issues in this context. Existing RFID solutions cannot be applied directly in this field... 详细信息
来源: 评论