咨询与建议

限定检索结果

文献类型

  • 13,970 篇 会议
  • 10,954 篇 期刊文献
  • 138 册 图书

馆藏范围

  • 25,062 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,793 篇 工学
    • 9,931 篇 计算机科学与技术...
    • 8,095 篇 软件工程
    • 4,499 篇 信息与通信工程
    • 2,340 篇 电子科学与技术(可...
    • 2,254 篇 控制科学与工程
    • 2,100 篇 电气工程
    • 1,645 篇 生物工程
    • 1,343 篇 光学工程
    • 1,217 篇 机械工程
    • 1,038 篇 仪器科学与技术
    • 904 篇 生物医学工程(可授...
    • 832 篇 化学工程与技术
    • 804 篇 动力工程及工程热...
    • 623 篇 网络空间安全
    • 571 篇 材料科学与工程(可...
    • 567 篇 交通运输工程
    • 505 篇 安全科学与工程
  • 9,137 篇 理学
    • 4,151 篇 数学
    • 3,491 篇 物理学
    • 1,845 篇 生物学
    • 1,427 篇 统计学(可授理学、...
    • 941 篇 化学
    • 755 篇 系统科学
  • 3,888 篇 管理学
    • 2,586 篇 管理科学与工程(可...
    • 1,447 篇 图书情报与档案管...
    • 947 篇 工商管理
  • 990 篇 医学
    • 762 篇 临床医学
    • 676 篇 基础医学(可授医学...
    • 429 篇 公共卫生与预防医...
  • 613 篇 法学
    • 509 篇 社会学
  • 336 篇 经济学
  • 222 篇 农学
  • 148 篇 教育学
  • 109 篇 文学
  • 94 篇 军事学
  • 69 篇 艺术学
  • 5 篇 历史学
  • 2 篇 哲学

主题

  • 511 篇 deep learning
  • 489 篇 feature extracti...
  • 391 篇 accuracy
  • 369 篇 internet of thin...
  • 348 篇 training
  • 315 篇 computational mo...
  • 291 篇 simulation
  • 287 篇 computer science
  • 287 篇 optimization
  • 278 篇 semantics
  • 246 篇 wireless communi...
  • 222 篇 machine learning
  • 205 篇 real-time system...
  • 189 篇 reinforcement le...
  • 189 篇 support vector m...
  • 175 篇 image segmentati...
  • 173 篇 object detection
  • 165 篇 neural networks
  • 164 篇 computer archite...
  • 163 篇 educational inst...

机构

  • 1,098 篇 cavendish labora...
  • 1,032 篇 department of ph...
  • 1,001 篇 school of comput...
  • 991 篇 physikalisches i...
  • 969 篇 oliver lodge lab...
  • 789 篇 university of ch...
  • 611 篇 fakultät physik ...
  • 561 篇 school of physic...
  • 552 篇 iccub universita...
  • 548 篇 horia hulubei na...
  • 539 篇 school of physic...
  • 529 篇 department of ph...
  • 527 篇 imperial college...
  • 523 篇 nikhef national ...
  • 520 篇 h.h. wills physi...
  • 519 篇 stfc rutherford ...
  • 516 篇 physik-institut ...
  • 508 篇 school of physic...
  • 508 篇 school of physic...
  • 503 篇 henryk niewodnic...

作者

  • 287 篇 barter w.
  • 270 篇 a. gomes
  • 267 篇 beiter a.
  • 251 篇 bellee v.
  • 250 篇 c. alexa
  • 250 篇 c. amelung
  • 248 篇 j. m. izen
  • 248 篇 g. bella
  • 248 篇 j. strandberg
  • 248 篇 d. calvet
  • 248 篇 bowcock t.j.v.
  • 247 篇 g. spigo
  • 246 篇 blake t.
  • 246 篇 s. chen
  • 244 篇 f. siegert
  • 242 篇 brundu d.
  • 228 篇 betancourt c.
  • 227 篇 borsato m.
  • 225 篇 y. tayalati
  • 222 篇 amato s.

语言

  • 23,439 篇 英文
  • 1,033 篇 其他
  • 591 篇 中文
  • 7 篇 法文
  • 6 篇 德文
  • 5 篇 日文
  • 3 篇 荷兰文
  • 1 篇 朝鲜文
检索条件"机构=School of Computer and Communication Engineering University of Science and Technology Beijing"
25062 条 记 录,以下是81-90 订阅
排序:
Separate Least Mean Square Based Equalizer with Joint Optimization for Multi-CAP Visible Light communication
收藏 引用
China communications 2022年 第1期19卷 264-273页
作者: Jianli Jin Jianping Wang Huimin Lu Danyang Chen School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China
Visible light communication(VLC) is expected to be a potential candidate of the key technologies in the sixth generation(6G) wireless communication system to support Internet of Things(IoT) applications. In this work,... 详细信息
来源: 评论
Survey and Tutorial on Hybrid Human-Artificial Intelligence
收藏 引用
Tsinghua science and technology 2023年 第3期28卷 486-499页
作者: Feifei Shi Fang Zhou Hong Liu Liming Chen Huansheng Ning School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China School of Computer Science and Software Engineering East China Normal UniversityShanghai 200062China Faculty of Computing Ulster UniversityNewtownabbey BT370QBUK
The growing computing power,easy acquisition of large-scale data,and constantly improved algorithms have led to a new wave of artificial intelligence(AI)applications,which change the ways we live,manufacture,and do **... 详细信息
来源: 评论
A secure double spectrum auction scheme
收藏 引用
Digital communications and Networks 2024年 第5期10卷 1415-1427页
作者: Jiaqi Wang Ning Lu Ziyang Gong Wenbo Shi Chang Choi School of Computer Science and Engineering Northeastern UniversityShenyang110004China School of Computer Science and Technology Xidian UniversityXi©anChina Dept.of Computer Engineering Gachon University1342Seongnam-daeroSujeong-guSeongnam-si13120G School of Computer and Communication Engineering Northeastern UniversityQinhuangdao066004China
With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum *** auctions came into being,which can effectively utilize spectrum *** of the complexity of ... 详细信息
来源: 评论
Node Search Contributions Based Long-Term Follow-Up Specific Individual Searching Model
收藏 引用
Tsinghua science and technology 2023年 第4期28卷 729-742页
作者: Yayong Shi Fei Chang Yetao Sun Guangcheng Yang Rui Wang Yuan Yao School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100183China Institute for Hospital Management Research Chinese PLA General HospitalBeijing 100853China
In this paper,we introduce a long-term follow-up specific individual searching(SIS)*** model introduces the concept of node search contributions by considering the characteristics of the network structure.A node searc... 详细信息
来源: 评论
QARF: A Novel Malicious Traffic Detection Approach via Online Active Learning for Evolving Traffic Streams
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 645-656页
作者: Zequn NIU Jingfeng XUE Yong WANG Tianwei LEI Weijie HAN Xianwei GAO School of Computer Science and Technology Beijing Institute of Technology School of Space Information Space Engineering University
In practical abnormal traffic detection scenarios,traffic often appears as drift,imbalanced and rare labeled streams,and how to effectively identify malicious traffic in such complex situations has become a challenge ... 详细信息
来源: 评论
Transformer-Based Person Re-Identification: A Comprehensive Review
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on Intelligent Vehicles 2024年 第7期9卷 1-19页
作者: Sarker, Prodip Kumar Zhao, Qingjie Uddin, Md. Kamal School of Computer Science and Technology Beijing Institute of Technology China Department of Computer Science and Telecommunication Engineering Noakhali Science and Technology University Bangladesh
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of acc... 详细信息
来源: 评论
WAS:improved white-box cryptographic algorithm over AS iteration
收藏 引用
Cybersecurity 2025年 第1期8卷 142-152页
作者: Yatao Yang Yuying Zhai Hui Dong Yanshuo Zhang Department of Electronic and Communication Engineering Beijing Electronic Science and Technology InstituteBeijing 100070China School of Telecommunication Engineering Xidian UniversityXi’an 710071China
The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution *** order to solve the issues of high storage cost and inadequate security ab... 详细信息
来源: 评论
Real-time holographic camera for obtaining real 3D scene hologram
收藏 引用
Light(science & Applications) 2025年 第3期14卷 789-799页
作者: Zhao-Song Li Chao Liu Xiao-Wei Li Yi Zheng Qian Huang Yi-Wei Zheng Ye-Hao Hou Chen-Liang Chang Da-Wei Zhang Song-Lin Zhuang Di Wang Qiong-Hua Wang School of Instrumentation and Optoelectronic Engineering Beihang UniversityBeijing100191China School of Optical-Electrical and Computer Engineering University of Shanghai for Science and TechnologyShanghai 200093China
As a frontier technology,holography has important research values in fields such as bio-micrographic imaging,light feld modulation and data ***,the real-time acquisition of 3D scenes and high-fidelity reconstruction t... 详细信息
来源: 评论
A new model for efficiency estimation and evaluation: DEA-RA-inverted DEA model
收藏 引用
International Journal of Applied Decision sciences 2024年 第6期17卷 733-748页
作者: Zhang, Bingjiang Su, Shilan Gong, Qizhou School of Applied Science Beijing Information Science and Technology University Beijing100096 China School of Mathematics and Computer Science Shaanxi University of Technology Shaanxi Hanzhong723001 China School of Journalism and Communication Beijing Normal University Beijing100875 China
Data envelopment analysis (DEA) is widely used in various fields and for various models. Inverted data envelopment analysis (inverted DEA) is an extended model of DEA. Regression analysis (RA) is a statistical process... 详细信息
来源: 评论
Energy-efficient computation offloading assisted by RIS-based UAV
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2024年 第1期31卷 37-48页
作者: Li Linpei Zhao Chuan Su Yu Huo Jiahao Huang Yao Li Haojin School of Intelligence Science and Technology University of Science and Technology BeijingBeijing 100083China Institute of Artificial Intelligence University of Science and Technology BeijingBeijing 100083China Shunde Innovation School University of Science and Technology BeijingFoshan 528399China School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China Research Department of 5G and Drone China Mobile(Chengdu)Institute of Research and DevelopmentChengdu 610200China College of Communication Engineering Chengdu University of Information TechnologyChengdu 610225China Research and Development Center Sony(China)LimitedBeijing 100027China
The new applications surge with the rapid evolution of the mobile *** explosive growth of the data traffic aroused by the new applications has posed great computing pressure on the local *** is essential to innovate t... 详细信息
来源: 评论