咨询与建议

限定检索结果

文献类型

  • 1,767 篇 期刊文献
  • 1,316 篇 会议
  • 20 册 图书

馆藏范围

  • 3,103 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,123 篇 工学
    • 1,530 篇 计算机科学与技术...
    • 1,200 篇 软件工程
    • 461 篇 信息与通信工程
    • 295 篇 生物工程
    • 280 篇 电气工程
    • 262 篇 控制科学与工程
    • 240 篇 光学工程
    • 220 篇 电子科学与技术(可...
    • 214 篇 生物医学工程(可授...
    • 111 篇 机械工程
    • 104 篇 化学工程与技术
    • 100 篇 仪器科学与技术
    • 70 篇 材料科学与工程(可...
    • 66 篇 网络空间安全
    • 58 篇 动力工程及工程热...
  • 1,239 篇 理学
    • 523 篇 数学
    • 485 篇 物理学
    • 324 篇 生物学
    • 172 篇 统计学(可授理学、...
    • 159 篇 化学
    • 87 篇 系统科学
    • 56 篇 地球物理学
  • 499 篇 管理学
    • 291 篇 管理科学与工程(可...
    • 219 篇 图书情报与档案管...
    • 118 篇 工商管理
  • 202 篇 医学
    • 174 篇 临床医学
    • 144 篇 基础医学(可授医学...
    • 85 篇 药学(可授医学、理...
    • 75 篇 公共卫生与预防医...
  • 86 篇 法学
    • 65 篇 社会学
  • 42 篇 农学
  • 39 篇 经济学
  • 31 篇 教育学
  • 10 篇 文学
  • 10 篇 艺术学
  • 3 篇 军事学

主题

  • 82 篇 deep learning
  • 77 篇 semantics
  • 77 篇 feature extracti...
  • 68 篇 machine learning
  • 67 篇 computational mo...
  • 58 篇 training
  • 42 篇 federated learni...
  • 42 篇 accuracy
  • 39 篇 data models
  • 38 篇 deep neural netw...
  • 36 篇 graph neural net...
  • 35 篇 artificial intel...
  • 33 篇 computer science
  • 32 篇 image segmentati...
  • 31 篇 data mining
  • 30 篇 convolution
  • 30 篇 servers
  • 30 篇 predictive model...
  • 29 篇 optimization
  • 28 篇 cloud computing

机构

  • 103 篇 national enginee...
  • 80 篇 school of comput...
  • 51 篇 school of comput...
  • 44 篇 infn sezione di ...
  • 44 篇 north-west unive...
  • 44 篇 université de st...
  • 43 篇 institut univers...
  • 43 篇 tno technical sc...
  • 42 篇 university of ch...
  • 41 篇 department of ph...
  • 41 篇 faculty of scien...
  • 41 篇 departamento de ...
  • 41 篇 department for p...
  • 41 篇 department of ph...
  • 41 篇 yerevan physics ...
  • 41 篇 national centre ...
  • 40 篇 kirchhoff-instit...
  • 40 篇 graduate school ...
  • 40 篇 institute of phy...
  • 39 篇 dipartimento di ...

作者

  • 81 篇 hai jin
  • 77 篇 jin hai
  • 44 篇 chen a.
  • 44 篇 benoit d.m.
  • 44 篇 ferrara g.
  • 44 篇 ardid m.
  • 44 篇 calvo d.
  • 44 篇 eddymaoui a.
  • 41 篇 gagliardini s.
  • 39 篇 gal t.
  • 39 篇 bozza c.
  • 39 篇 díaz a.f.
  • 39 篇 boumaaza j.
  • 38 篇 coleiro a.
  • 38 篇 gozzini s.r.
  • 38 篇 dallier r.
  • 38 篇 benhassi m.
  • 38 篇 boettcher m.
  • 37 篇 enzenhöfer a.
  • 37 篇 celli s.

语言

  • 2,750 篇 英文
  • 317 篇 其他
  • 41 篇 中文
  • 1 篇 日文
检索条件"机构=School of Computer Science and Technology and Hopcroft Center on Computing Science"
3103 条 记 录,以下是2801-2810 订阅
排序:
The Adaptive Multicast Data Origin Authentication Protocol
The Adaptive Multicast Data Origin Authentication Protocol
收藏 引用
第二届中国互联网学术年会
作者: Liehuang Zhu Hao Yang Zhenghe Yang Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application School of Computer Science and Technology Beijing Institute of Technology China Beijing
Most multicast data origin authentication schemes work under the fixed parameters without taking the problem of changeable network environment into ***,the network conditions will obviously influence the efficiency of... 详细信息
来源: 评论
A Dynamic Replication Mechanism to Reduce Response-Time of I/O Operations in High Performance computing Clusters
A Dynamic Replication Mechanism to Reduce Response-Time of I...
收藏 引用
IEEE International Conference on Social computing (SocialCom)
作者: Ehsan Mousavi Khaneghah Seyedeh Leili Mirtaheri Lucio Grandinetti Amir Saman Memaripour Mohsen Sharifi Center of High Performance Computing for Parallel and Distributed Processing University of Calabria Rende Italy School of Computer Engineering Iran University of Science and Technology Tehran Iran
Extraordinary large datasets of high performance computing applications require improvement in existing storage and retrieval mechanisms. Moreover, enlargement of the gap between data processing and I/O operations'... 详细信息
来源: 评论
A mathematical model for empowerment of Beowulf clusters for exascale computing
A mathematical model for empowerment of Beowulf clusters for...
收藏 引用
International Conference on High Performance computing & Simulation (HPCS)
作者: Seyedeh Leili Mirtaheri Ehsan Mousavi Khaneghah Lucio Grandinetti Mohsen Sharifi Center of High Performance Computing for Parallel and Distributed Processing University of Calabria Rende Italy School of Computer Engineering Iran University of Science and Technology Tehran Iran
High-performance computing (HPC) clusters are currently faced with two major challenges - namely, the dynamic nature of new generation of applications and the heterogeneity of platforms - if they are going to be usefu... 详细信息
来源: 评论
Architecture for resource controllable NVE to meet service providers' dynamic QoS demands
Architecture for resource controllable NVE to meet service p...
收藏 引用
International Conference on the Network of the Future (NOF)
作者: Masayoshi Shimamura Hiroaki Yamanaka Yoshiyuki Uratani Akira Nagata Shuji Ishii Katsuyoshi Iida Eiji Kawai Masato Tsuru Global Scientific Information and Computing Center Tokyo Institute of Technology Network Testbed Research and Development Promotion Center National Institute of Information and Communications Technology Graduate School of Computer Science and Systems Engineering
To accommodate a wide variety of application services, the network virtualization environment (NVE) has received much attention. In an NVE, infrastructure providers (InPs) provide service providers (SPs) with virtual ... 详细信息
来源: 评论
Efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks  1
收藏 引用
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013
作者: Liu, Shengli Weng, Jian Zhao, Yunlei Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240 China Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University China Software School Fudan University Shanghai 201203 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China Shanghai Key Laboratory of Scalable Computing and Systems Shanghai China
Leakage-resilient public key encryption (PKE) schemes are designed to resist "memory attacks", i.e., the adversary recovers the cryptographic key in the memory adaptively, but subject to constraint that the ... 详细信息
来源: 评论
Undo the codebook bias by linear transformation for visual applications  13
Undo the codebook bias by linear transformation for visual a...
收藏 引用
21st ACM International Conference on Multimedia, MM 2013
作者: Zhang, Chunjie Zhang, Yifan Wang, Shuhui Pang, Junbiao Liang, Chao Huang, Qingming Tian, Qi School of Computer and Control Engineering University of Chinese Academy of Sciences 100049 Beijing China National Laboratory of Pattern Recognition Institute of Automation Chinese Academy of Sciences Beijing China Key Lab of Intell. Info. Process Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China College of Computer Science and Technology Beijing University of Technology 100124 Beijing China School of Computer National Engineering Research Center for Multimedia Software Wuhan University 430072 Wuhan China Department of Computer Sciences University of Texas at San Antonio San Antonio TX 78249 United States
The bag of visual words model (BoW) and its variants have demonstrate their effectiveness for visual applications and have been widely used by researchers. The BoW model first extracts local features and generates the... 详细信息
来源: 评论
Pre-Ictal phase detection algorithm based on one dimensional EEG signals and two dimensional formed images analysis
Pre-Ictal phase detection algorithm based on one dimensional...
收藏 引用
2013 11th International Conference on High Performance computing and Simulation, HPCS 2013
作者: Zeljkovic, Vesna Valev, Ventzeslav Tameze, Claude Bojic, Milena School of Engineering and Computing Sciences New York Institute of Technology Nanjing Campus United States Institute of Mathematics and Informatics Bulgarian Academy of Sciences Sofia Bulgaria Department of Mathematics and Computer Science Lincoln University PA United States University Clinic for Internal Diseases Clinical Hospital Center 'Dr Dragisa Misovic - Dedinje Belgrade Serbia
Over 50 million persons worldwide are affected by epilepsy. It can affect equally young babies as well as old people. Epilepsy is a brain disorder characterized by the neurobiological, cognitive, psychological and soc... 详细信息
来源: 评论
ONSTR: The ontology for newborn screening follow-up and translational research  4
ONSTR: The ontology for newborn screening follow-up and tran...
收藏 引用
4th International Conference on Biomedical Ontology, ICBO 2013
作者: Nikolic, Snezana Shankar, Prabhu Arabandi, Sivaram Dhawan, Akshaye Sunderraman, Rajshekhar Navathe, Sham Malhotra, Kunal Singh, Rani H. Deparment of Human Genetics Emory University School of Medicine AtlantaGA United States Department of Pediatrics Emory University School of Medicine AtlantaGA United States Emory Children's Center Emory University Children's Healthcare of Atlanta AtlantaGA United States OntoPro LLC HoustonTX United States Department of Mathematics and Computer Science Ursinus College CollegevillePA United States Department of Computer Science Georgia State University AtlantaGA United States College of Computing Georgia Institute of Technology AtlantaGA United States
Translational research in the field of newborn screening system requires integration of data generated during various phases of life long treatment of patients identified and diagnosed through newborn dried blood spot... 详细信息
来源: 评论
DoS and DDoS in Named Data Networking
DoS and DDoS in Named Data Networking
收藏 引用
International Conference on computer Communications and Networks (ICCCN)
作者: Paolo Gasti Gene Tsudik Ersin Uzun Lixia Zhang School of Engineering and Computing Sciences New York Institute of Technology USA School of Information and Computer Sciences University of California Irvine USA Palo Alto Research Center USA Computer Science Department University of California Los Angeles USA
With the growing realization that current Internet protocols are reaching the limits of their senescence, several on-going research efforts aim to design potential next-generation Internet architectures. Although they... 详细信息
来源: 评论
An efficient similarity comparison based on core API calls  13
An efficient similarity comparison based on core API calls
收藏 引用
28th Annual ACM Symposium on Applied computing, SAC 2013
作者: Jang, Minwoo Kook, Joongjin Ryu, Samin Lee, Kahyun Shin, Sung Kim, Ahreum Park, Youngsu Cho, Eig Hyun School of Computing Soongsil University Seoul Korea Republic of Realistic Media Platform Research Center Korea Electronics Technology Institute Seoul Korea Republic of Mobile Communication Company LG Electronics Seoul Korea Republic of Infra. Solution Development Group Samsung SDS Seoul Korea Republic of Department of Electrical Engineering and Computer Science South Dakota State University Brookings SD 57006 United States
Software birthmarks are unique and native characteristics of a binary executable program that can be used for detecting software piracy. API (Application Programming Interface) calls in an MS Windows binary executable... 详细信息
来源: 评论