咨询与建议

限定检索结果

文献类型

  • 114,577 篇 会议
  • 61,651 篇 期刊文献
  • 1,128 册 图书
  • 1 篇 学位论文

馆藏范围

  • 177,357 篇 电子文献
  • 3 种 纸本馆藏

日期分布

学科分类号

  • 109,665 篇 工学
    • 76,541 篇 计算机科学与技术...
    • 62,223 篇 软件工程
    • 25,704 篇 信息与通信工程
    • 16,778 篇 控制科学与工程
    • 12,085 篇 生物工程
    • 12,020 篇 电气工程
    • 11,558 篇 电子科学与技术(可...
    • 8,557 篇 机械工程
    • 8,057 篇 生物医学工程(可授...
    • 8,053 篇 光学工程
    • 5,758 篇 化学工程与技术
    • 5,497 篇 仪器科学与技术
    • 4,836 篇 动力工程及工程热...
    • 3,984 篇 网络空间安全
    • 3,749 篇 交通运输工程
    • 3,634 篇 安全科学与工程
    • 3,555 篇 材料科学与工程(可...
  • 59,318 篇 理学
    • 31,546 篇 数学
    • 16,800 篇 物理学
    • 13,422 篇 生物学
    • 10,004 篇 统计学(可授理学、...
    • 6,171 篇 化学
    • 6,003 篇 系统科学
  • 30,407 篇 管理学
    • 18,579 篇 管理科学与工程(可...
    • 13,129 篇 图书情报与档案管...
    • 7,383 篇 工商管理
  • 7,461 篇 医学
    • 6,120 篇 临床医学
    • 5,376 篇 基础医学(可授医学...
    • 3,286 篇 药学(可授医学、理...
  • 4,637 篇 法学
    • 3,771 篇 社会学
  • 2,848 篇 经济学
  • 2,246 篇 农学
  • 1,994 篇 教育学
  • 783 篇 文学
  • 401 篇 军事学
  • 401 篇 艺术学
  • 28 篇 历史学
  • 26 篇 哲学

主题

  • 5,016 篇 feature extracti...
  • 5,001 篇 computer science
  • 4,326 篇 accuracy
  • 4,097 篇 training
  • 3,995 篇 computational mo...
  • 3,855 篇 deep learning
  • 2,985 篇 semantics
  • 2,945 篇 machine learning
  • 2,516 篇 optimization
  • 2,443 篇 data mining
  • 2,332 篇 predictive model...
  • 2,217 篇 data models
  • 1,973 篇 neural networks
  • 1,924 篇 support vector m...
  • 1,775 篇 image segmentati...
  • 1,732 篇 real-time system...
  • 1,720 篇 convolutional ne...
  • 1,699 篇 educational inst...
  • 1,655 篇 internet of thin...
  • 1,597 篇 algorithm design...

机构

  • 2,921 篇 school of comput...
  • 2,477 篇 school of comput...
  • 1,590 篇 school of comput...
  • 1,525 篇 school of comput...
  • 1,365 篇 school of comput...
  • 1,356 篇 school of comput...
  • 1,313 篇 school of comput...
  • 1,272 篇 school of comput...
  • 1,121 篇 school of comput...
  • 1,100 篇 department of co...
  • 1,071 篇 cavendish labora...
  • 1,035 篇 university of ch...
  • 978 篇 department of ph...
  • 960 篇 school of comput...
  • 878 篇 oliver lodge lab...
  • 868 篇 physikalisches i...
  • 842 篇 school of comput...
  • 811 篇 school of comput...
  • 703 篇 school of comput...
  • 693 篇 college of compu...

作者

  • 266 篇 niyato dusit
  • 256 篇 barter w.
  • 252 篇 a. gomes
  • 229 篇 c. alexa
  • 229 篇 blake t.
  • 226 篇 bowcock t.j.v.
  • 225 篇 s. chen
  • 223 篇 j. m. izen
  • 223 篇 bellee v.
  • 223 篇 amato s.
  • 221 篇 betancourt c.
  • 217 篇 brundu d.
  • 217 篇 borsato m.
  • 215 篇 boettcher t.
  • 214 篇 beiter a.
  • 210 篇 bencivenni g.
  • 208 篇 bay a.
  • 207 篇 g. bella
  • 205 篇 j. strandberg
  • 204 篇 d. calvet

语言

  • 162,815 篇 英文
  • 10,949 篇 其他
  • 3,604 篇 中文
  • 176 篇 日文
  • 15 篇 德文
  • 15 篇 法文
  • 10 篇 朝鲜文
  • 9 篇 斯洛文尼亚文
  • 5 篇 西班牙文
  • 2 篇 荷兰文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
检索条件"机构=School of Computer and Technology Science and Technology"
177357 条 记 录,以下是121-130 订阅
排序:
Accuracy optimization of virtual iterative reduction algorithm under time constraint
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2023年 第2期30卷 49-60页
作者: Luo Zhiyong Liu Xintong Xu haifeng Xie Zhiqiang Li Jie School of Computer Science and Technology Harbin University of Science and TechnologyHarbin 150080China
The factors like production accuracy and completion time are the determinants of the optimal scheduling of the complex products work-flow,so the main research direction of modern work-flow technology is how to assure ... 详细信息
来源: 评论
B+-Tree-Quantization-Based Shared Secret Key Extraction Scheme From Atmospheric Optical Wireless Channel
收藏 引用
IEEE Transactions on Communications 2025年 第5期73卷 3394-3408页
作者: Pan, Gang Chen, Chunyi Changchun University of Science and Technology School of Computer Science and Technology Changchun130022 China Changchun University of Science and Technology School of Computer Science and Technology Key Laboratory of Photoelectric Measurement & Control and Optical Information Transfer Technology Changchun130022 China Chongqing Research Institute Changchun University of Science and Technology Chongqing401135 China
To reduce key disagreement rate and increase key generation rate, this paper proposes a lightweight and robust shared secret key extraction scheme from atmospheric optical wireless channel. A conception of grouping sa... 详细信息
来源: 评论
Expert Recommendation in Community Question Answering via Heterogeneous Content Network Embedding
收藏 引用
computers, Materials & Continua 2023年 第4期75卷 1687-1709页
作者: Hong Li Jianjun Li Guohui Li Rong Gao Lingyu Yan School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China College of Computer Science and Technology Hubei University of TechnologyWuhan 430068China
ExpertRecommendation(ER)aims to identify domain experts with high expertise and willingness to provide answers to questions in Community Question Answering(CQA)web *** to model questions and users in the heterogeneous... 详细信息
来源: 评论
YOLO-MFD:Remote Sensing Image Object Detection with Multi-Scale Fusion Dynamic Head
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2547-2563页
作者: Zhongyuan Zhang Wenqiu Zhu School of Computer Science Hunan University of TechnologyZhuzhou412007China
Remote sensing imagery,due to its high altitude,presents inherent challenges characterized by multiple scales,limited target areas,and intricate *** inherent traits often lead to increased miss and false detection rat... 详细信息
来源: 评论
Workflow optimization algorithm based on virtualization and nonlinear production quality under time constraints
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2023年 第4期30卷 55-66页
作者: Luo Zhiyong Tan Shanxin Xu Haifeng Liu Xintong School of Computer Science and Technology Harbin University of Science and TechnologyHarbin 150080China
Balancing time,cost,and quality is crucial in intelligent ***,finding the optimal value of production parameters is a challengingnon-deterministic polynomial(NP)-hard *** the actual production process,the production p... 详细信息
来源: 评论
Research on security situation awareness algorithm of Markov differential game block-chain model
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2023年 第4期30卷 105-120页
作者: Luo Zhiyong Wang Shuyi Song Weiwei Liu Jiahui Wang Jianming School of Computer Science and Technology Harbin University of Science and TechnologyHarbin 150080China
To analyze the impact of solar eclipse attacks on the block-chain network and comprehensively and accurately evaluate the security of the current system,a method based on the Markov differential is proposed to solve t... 详细信息
来源: 评论
BECHAIN: A Sharding Blockchain With Higher Security
收藏 引用
IEEE Transactions on Network and Service Management 2025年 第3期22卷 2702-2714页
作者: Guo, Xiaochang Liu, Gang Ling, Haoyan Meng, Lei Wang, Tao School of Computer Science and Technology Xidian University Xi’an China
Sharding technology achieves parallel processing of transactions by dividing the network into multiple independent parts, namely shards, significantly increasing the throughput of the blockchain system and reducing tr... 详细信息
来源: 评论
Boosting Adaptive Weighted Broad Learning System for Multi-Label Learning
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2024年 第11期11卷 2204-2219页
作者: Yuanxin Lin Zhiwen Yu Kaixiang Yang Ziwei Fan C.L.Philip Chen the School of Computer Science and Engineering in South China University of Technology IEEE the Pengcheng Laboratory
Multi-label classification is a challenging problem that has attracted significant attention from researchers, particularly in the domain of image and text attribute annotation. However, multi-label datasets are prone... 详细信息
来源: 评论
Endogenous Security Formal Definition,Innovation Mechanisms,and Experiment Research in Industrial Internet
收藏 引用
Tsinghua science and technology 2024年 第2期29卷 492-505页
作者: Hongsong Chen Xintong Han Yiying Zhang School of Computer and Communication Engineering University of Science and Technology BeijingBeijing 100083China
With the rapid development of information technologies,industrial Internet has become more open,and security issues have become more *** endogenous security mechanism can achieve the autonomous immune mechanism withou... 详细信息
来源: 评论
Applying an Improved Dung Beetle Optimizer Algorithm to Network Traffic Identification
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 4091-4107页
作者: Qinyue Wu Hui Xu Mengran Liu School of Computer Science Hubei University of TechnologyWuhan430068China
Network traffic identification is critical for maintaining network security and further meeting various demands of network ***,network traffic data typically possesses high dimensionality and complexity,leading to pra... 详细信息
来源: 评论