咨询与建议

限定检索结果

文献类型

  • 13,929 篇 会议
  • 10,934 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 24,867 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15,788 篇 工学
    • 9,943 篇 计算机科学与技术...
    • 8,129 篇 软件工程
    • 4,517 篇 信息与通信工程
    • 2,330 篇 电子科学与技术(可...
    • 2,252 篇 控制科学与工程
    • 2,103 篇 电气工程
    • 1,646 篇 生物工程
    • 1,347 篇 光学工程
    • 1,214 篇 机械工程
    • 1,038 篇 仪器科学与技术
    • 906 篇 生物医学工程(可授...
    • 837 篇 化学工程与技术
    • 803 篇 动力工程及工程热...
    • 623 篇 网络空间安全
    • 574 篇 材料科学与工程(可...
    • 568 篇 交通运输工程
    • 508 篇 安全科学与工程
  • 9,149 篇 理学
    • 4,159 篇 数学
    • 3,490 篇 物理学
    • 1,847 篇 生物学
    • 1,434 篇 统计学(可授理学、...
    • 947 篇 化学
    • 757 篇 系统科学
  • 3,901 篇 管理学
    • 2,593 篇 管理科学与工程(可...
    • 1,455 篇 图书情报与档案管...
    • 952 篇 工商管理
  • 993 篇 医学
    • 767 篇 临床医学
    • 682 篇 基础医学(可授医学...
    • 432 篇 公共卫生与预防医...
  • 615 篇 法学
    • 510 篇 社会学
  • 338 篇 经济学
  • 221 篇 农学
  • 152 篇 教育学
  • 110 篇 文学
  • 94 篇 军事学
  • 69 篇 艺术学
  • 5 篇 历史学
  • 2 篇 哲学

主题

  • 506 篇 deep learning
  • 486 篇 feature extracti...
  • 385 篇 accuracy
  • 370 篇 internet of thin...
  • 334 篇 training
  • 317 篇 computational mo...
  • 291 篇 simulation
  • 287 篇 computer science
  • 286 篇 optimization
  • 272 篇 semantics
  • 249 篇 wireless communi...
  • 215 篇 machine learning
  • 204 篇 real-time system...
  • 189 篇 reinforcement le...
  • 187 篇 support vector m...
  • 175 篇 image segmentati...
  • 172 篇 object detection
  • 169 篇 neural networks
  • 167 篇 educational inst...
  • 165 篇 computer archite...

机构

  • 1,098 篇 cavendish labora...
  • 1,032 篇 department of ph...
  • 997 篇 school of comput...
  • 993 篇 physikalisches i...
  • 969 篇 oliver lodge lab...
  • 788 篇 university of ch...
  • 611 篇 fakultät physik ...
  • 558 篇 school of physic...
  • 552 篇 iccub universita...
  • 550 篇 horia hulubei na...
  • 539 篇 school of physic...
  • 529 篇 department of ph...
  • 527 篇 imperial college...
  • 523 篇 nikhef national ...
  • 521 篇 h.h. wills physi...
  • 519 篇 stfc rutherford ...
  • 516 篇 physik-institut ...
  • 508 篇 school of physic...
  • 508 篇 school of physic...
  • 503 篇 henryk niewodnic...

作者

  • 287 篇 barter w.
  • 271 篇 a. gomes
  • 267 篇 beiter a.
  • 252 篇 c. alexa
  • 252 篇 c. amelung
  • 251 篇 bellee v.
  • 250 篇 j. m. izen
  • 250 篇 g. bella
  • 250 篇 j. strandberg
  • 250 篇 d. calvet
  • 249 篇 g. spigo
  • 248 篇 bowcock t.j.v.
  • 247 篇 s. chen
  • 246 篇 f. siegert
  • 246 篇 blake t.
  • 242 篇 brundu d.
  • 229 篇 betancourt c.
  • 227 篇 y. tayalati
  • 227 篇 borsato m.
  • 222 篇 amato s.

语言

  • 23,229 篇 英文
  • 1,049 篇 其他
  • 590 篇 中文
  • 7 篇 法文
  • 6 篇 德文
  • 5 篇 日文
  • 3 篇 荷兰文
  • 1 篇 朝鲜文
检索条件"机构=School of Computer and Communication Engineering of University of Science and Technology Beijing"
24867 条 记 录,以下是4991-5000 订阅
排序:
End-to-end Optimized Lossy Compression for Neural-morphic Spiking Camera Captured Data
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年
作者: Feng, Kexiang Jia, Chuanmin Pan, Jingshan Ma, Siwei Gao, Wen Chinese Academy of Sciences Institute of Computing Technology Beijing100190 China University of Chinese Academy of Sciences Beijing100049 China Peking University National Engineering Research Center of Visual Technology Beijing100871 China Peking University Wangxuan Institute of Computer Technology Beijing100080 China Shandong Computer Science Center National Supercomputer in Jinan Jinan250014 China Peking University National Engineering Research Center of Visual Technology School of Computer Science Beijing100871 China Peng Cheng Laboratory Shenzhen518055 China
Recently, the bio-inspired spike camera with continuous motion recording capability has attracted tremendous attention due to its ultra high temporal resolution imaging characteristic. Such imaging feature results in ... 详细信息
来源: 评论
783-MHz fundamental repetition rate CNT mode-locked all Er-doped fiber ring laser
783-MHz fundamental repetition rate CNT mode-locked all Er-d...
收藏 引用
2024 Conference on Lasers and Electro-Optics, CLEO 2024
作者: Dai, Maolin Liu, Bowen Ma, Yifan Shirahata, Takuma Yang, Ruoao Zhang, Zhigang Set, Sze Yun Yamashita, Shinji Department of Electrical Engineering and Information Systems The University of Tokyo Bunkyo-ku Tokyo113-8656 Japan Research Center for Advanced Science and Technology The University of Tokyo Meguro-ku Tokyo153-8904 Japan State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Center for Quantum Information Technology Peking University Beijing100871 China
We realize 783-MHz fundamental repetition rate in a carbon-nanotubes (CNT) modelocked Er-doped fiber ring laser with all active fibers. The proposed laser self-starts mode-locking at 108-mW pump power and delivers 623... 详细信息
来源: 评论
Power Allocation Strategy for Secret Key Generation Method in Wireless communications
收藏 引用
computers, Materials & Continua 2021年 第8期68卷 2179-2188页
作者: Bin Zhang Muhammad Waqas Shanshan Tu Syed Mudassir Hussain Sadaqat Ur Rehman School of Electronics and Information Engineering Hunan University of Science and EngineeringYongzhou425199China Engineering Research Center of Intelligent Perception and Autonomous Control Faculty of Information TechnologyBeijing University of TechnologyBeijing100124China Faculty of Computer Science and Engineering Ghulam Ishaq Khan(GIK)Institute of Engineering Sciences and TechnologyTopi23460Pakistan Department of Electronics Engineering FICTBalochistan University of Information TechnologyEngineering and Management SciencesQuetta87300Pakistan Department of Computer Science Namal InstituteMianwali42200Pakistan
Secret key generation(SKG)is an emerging technology to secure wireless communication from ***,the SKG at the physical layer is an alternate solution over traditional cryptographic methods due to wireless channels’***... 详细信息
来源: 评论
PCNET: PARALLELLY CONQUER THE LARGE VARIANCE OF PERSON RE-IDENTIFICATION
PCNET: PARALLELLY CONQUER THE LARGE VARIANCE OF PERSON RE-ID...
收藏 引用
28th IEEE International Conference on Image Processing, ICIP 2021
作者: Wang, Jianyuan You, Meiyue Leng, Biao Jiang, Ming Song, Guanglu School of Automation Science and Electrical Engineering Beihang University Beijing100191 China School of Information Science and Technology Beijing University of Chemical Technology Beijing100029 China School of Computer Science and Engineering Beihang University Beijing100191 China
Person re-identification has a wide range of applications, and many state-of-the-art methods are proposed to solve the problem under specific scenarios. However, it is still a challenging issue because of the large va... 详细信息
来源: 评论
Dynamic Spectrum Access in Cognitive Radio Networks: A Game-Theoretic Approach  15
Dynamic Spectrum Access in Cognitive Radio Networks: A Game-...
收藏 引用
15th International Conference on Computing communication and Networking Technologies, ICCCNT 2024
作者: Dhabliya, Dharmesh Vigenesh, M. Minhas, Deepak Shalini, M. Das, Sidhant Renukajyothi, S. Vishwakarma Institute of Information Technology Department of Information Technology Maharashtra Pune India Karpagam Academy of Higher Education Department of Computer Science Engineering Coimbatore641021 India Chitkara University Institute of Engineering and Technology Chitkara University Centre for Interdisciplinary Research for Business and Technology Punjab India Prince Shri Venkateshwara Padmavathy Engineering College Department of Electronics and Communication Engineering Chennai127 India Chitkara University Chitkara Centre for Research and Development Himachal Pradesh 174103 India School of Sciences Department of Biotechnology and Genetics Karnataka Bangalore India
Cognitive radio networks (CRNs) are a promising technology which could offer better spectrum efficiency and utilization via permitting dynamic spectrum get right of entry to (DSA). Game idea has been an increasing num... 详细信息
来源: 评论
Oral Squamous Cell Carcinoma Diagnosis Using Spotted Hyena Optimizer Combined with Transfer Learning Approaches  15th
Oral Squamous Cell Carcinoma Diagnosis Using Spotted Hyena O...
收藏 引用
15th International Conference on Soft Computing and Pattern Recognition, SoCPaR 2023 and 14th World Congress on Nature and Biologically Inspired Computing, NaBIC 2023
作者: Balakrishnan, Roshni M. Bharanidharan, N. Chakravarthy, S. R. Sannasi Kumar, V. Vinoth Patil, Swetha Rajaguru, Harikumar Department of Computer Science and Engineering Amrita School of Computing Bengaluru Amrita Vishwa Vidhyapeetham Bengaluru India School of Computer Science Engineering and Information Systems Vellore Institute of Technology Vellore India Department of Electronics and Communication Engineering Bannari Amman Institute of Technology Sathyamangalam India Department of Computer Science and Engineering PES University EC Campus Bengaluru India
Histopathological oral images are one of the popular methodologies to diagnose oral squamous cell carcinoma. computerized diagnostic systems need to be developed in order to process huge number of histopathological or... 详细信息
来源: 评论
Investigating Vision Transformer Models for Low-Resolution Medical Image Recognition  18
Investigating Vision Transformer Models for Low-Resolution M...
收藏 引用
18th International computer Conference on Wavelet Active Media technology and Information Processing, ICCWAMTIP 2021
作者: Adjei-Mensah, Isaac Zhang, Xiaoling Baffour, Adu Asare Agyemang, Isaac Osei Yussif, Sophyani Banaamwini Agbley, Bless Lord Y. Sey, Collins University of Electronic Science and Technology of China School of Information and Communication Engineering China University of Electronic Science and Technology of China School of Information and Software Engineering China University of Electronic Science and Technology of China School of Computer Science and Engineering China
Vision Transformers use self-attention techniques to learn long-range spatial relations to focus on the relevant parts of an image. They have achieved state-of-the-art results in many computer vision tasks. Recently, ... 详细信息
来源: 评论
Backstepping-Based Interception Control for an Underactuated ASV with Experimental Validation
Backstepping-Based Interception Control for an Underactuated...
收藏 引用
Chinese Automation Congress (CAC)
作者: Bin Lin Zhihuan Hu Kairong Duan Zhijian Sun Wei Xie Weidong Zhang Defeng Wu Shangkun Zhong Department of Automation Shanghai Jiao Tong University Shanghai China School of Computer and Communication Engineering University of Science and Technology Beijing Beijing China Department of Automation Shanghai Jiao Tong University Crossocean of Suzhou Technology Co. ITD Shanghai China Department of Automation School of Information and Communication Engineering Hainan University Shanghai Jiao Tong University Haikou China School of Marine Engineering Jimei University Xiamen China
This article puts forward an interception control system designed specifically for an Autonomous Surface Vehicle (ASV). The prime goal of this system is to capture a moving target whose speed may vary, even when there... 详细信息
来源: 评论
Unsupervised Martian Dust Storm Removal via Disentangled Representation Learning
收藏 引用
Research in Astronomy and Astrophysics 2022年 第9期22卷 255-266页
作者: Dong Zhao Jia Li Hongyu Li Long Xu State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and EngineeringBeihang UniversityBejing 100191China State Key Laboratory of Space Weather National Space Science CenterChinese Academy of SciencesBeijing 100190China Peng Cheng Laboratory Shenzhen 518000China
Mars exploration has become a hot spot in recent years and is still advancing rapidly. However, Mars has massive dust storms that may cover many areas of the planet and last for weeks or even months. The local/global ... 详细信息
来源: 评论
TransferFuzz: Fuzzing with Historical Trace for Verifying Propagated Vulnerability Code
arXiv
收藏 引用
arXiv 2024年
作者: Li, Siyuan Li, Yuekang Chen, Zuxin Dong, Chaopeng Wang, Yongpan Li, Hong Chen, Yongle Zhu, Hongsong Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Computer Science and Engineering The University of New South Wales Sydney Australia College of Computer Science and Technology Taiyuan University of Technology Shanxi China
Code reuse in software development frequently facilitates the spread of vulnerabilities, making the scope of affected software in CVE reports imprecise. Traditional methods primarily focus on identifying reused vulner... 详细信息
来源: 评论