咨询与建议

限定检索结果

文献类型

  • 114,789 篇 会议
  • 60,827 篇 期刊文献
  • 1,128 册 图书

馆藏范围

  • 176,744 篇 电子文献
  • 2 种 纸本馆藏

日期分布

学科分类号

  • 108,969 篇 工学
    • 75,765 篇 计算机科学与技术...
    • 61,908 篇 软件工程
    • 25,434 篇 信息与通信工程
    • 16,251 篇 控制科学与工程
    • 12,036 篇 生物工程
    • 11,817 篇 电气工程
    • 11,531 篇 电子科学与技术(可...
    • 8,535 篇 机械工程
    • 8,017 篇 生物医学工程(可授...
    • 7,936 篇 光学工程
    • 5,740 篇 化学工程与技术
    • 5,469 篇 仪器科学与技术
    • 4,798 篇 动力工程及工程热...
    • 3,930 篇 网络空间安全
    • 3,708 篇 交通运输工程
    • 3,632 篇 材料科学与工程(可...
    • 3,603 篇 安全科学与工程
  • 58,897 篇 理学
    • 31,366 篇 数学
    • 16,696 篇 物理学
    • 13,380 篇 生物学
    • 10,011 篇 统计学(可授理学、...
    • 6,112 篇 化学
    • 5,990 篇 系统科学
  • 30,257 篇 管理学
    • 18,477 篇 管理科学与工程(可...
    • 13,069 篇 图书情报与档案管...
    • 7,365 篇 工商管理
  • 7,374 篇 医学
    • 6,062 篇 临床医学
    • 5,336 篇 基础医学(可授医学...
    • 3,284 篇 药学(可授医学、理...
  • 4,637 篇 法学
    • 3,780 篇 社会学
  • 2,838 篇 经济学
  • 2,243 篇 农学
  • 2,002 篇 教育学
  • 779 篇 文学
  • 405 篇 艺术学
  • 401 篇 军事学
  • 28 篇 历史学
  • 26 篇 哲学

主题

  • 5,064 篇 feature extracti...
  • 4,994 篇 computer science
  • 4,398 篇 accuracy
  • 4,118 篇 training
  • 4,047 篇 computational mo...
  • 3,854 篇 deep learning
  • 2,979 篇 semantics
  • 2,948 篇 machine learning
  • 2,541 篇 optimization
  • 2,445 篇 data mining
  • 2,343 篇 predictive model...
  • 2,262 篇 data models
  • 1,977 篇 neural networks
  • 1,938 篇 support vector m...
  • 1,797 篇 real-time system...
  • 1,791 篇 image segmentati...
  • 1,768 篇 convolutional ne...
  • 1,702 篇 educational inst...
  • 1,665 篇 internet of thin...
  • 1,580 篇 algorithm design...

机构

  • 2,848 篇 school of comput...
  • 2,471 篇 school of comput...
  • 1,597 篇 school of comput...
  • 1,520 篇 school of comput...
  • 1,373 篇 school of comput...
  • 1,324 篇 school of comput...
  • 1,319 篇 school of comput...
  • 1,240 篇 school of comput...
  • 1,120 篇 department of co...
  • 1,115 篇 school of comput...
  • 1,074 篇 cavendish labora...
  • 1,027 篇 university of ch...
  • 979 篇 department of ph...
  • 975 篇 school of comput...
  • 879 篇 oliver lodge lab...
  • 870 篇 physikalisches i...
  • 831 篇 school of comput...
  • 814 篇 school of comput...
  • 722 篇 school of comput...
  • 697 篇 college of compu...

作者

  • 263 篇 niyato dusit
  • 261 篇 barter w.
  • 253 篇 a. gomes
  • 236 篇 blake t.
  • 230 篇 c. alexa
  • 230 篇 bowcock t.j.v.
  • 227 篇 bellee v.
  • 225 篇 amato s.
  • 223 篇 j. m. izen
  • 223 篇 betancourt c.
  • 223 篇 s. chen
  • 219 篇 brundu d.
  • 219 篇 borsato m.
  • 219 篇 boettcher t.
  • 216 篇 beiter a.
  • 212 篇 bencivenni g.
  • 207 篇 bay a.
  • 206 篇 c. amelung
  • 205 篇 g. bella
  • 204 篇 j. strandberg

语言

  • 152,543 篇 英文
  • 20,817 篇 其他
  • 3,537 篇 中文
  • 176 篇 日文
  • 23 篇 法文
  • 22 篇 德文
  • 13 篇 斯洛文尼亚文
  • 10 篇 朝鲜文
  • 4 篇 西班牙文
  • 2 篇 荷兰文
  • 1 篇 阿拉伯文
  • 1 篇 意大利文
  • 1 篇 葡萄牙文
  • 1 篇 俄文
检索条件"机构=School of Computer and Technology Science and Technology"
176744 条 记 录,以下是271-280 订阅
排序:
Quantum search with prior knowledge
收藏 引用
science China(Information sciences) 2024年 第9期67卷 321-329页
作者: Xiaoyu HE Xiaoming SUN Jialing ZHANG State Key Lab of Processors Institute of Computing Technology Chinese Academy of Sciences School of Computer Science and Technology University of Chinese Academy of Sciences
The combination of contextual side information and search is a powerful paradigm in the scope of artificial intelligence. The prior knowledge enables the identification of possible solutions but may be imperfect. Cont... 详细信息
来源: 评论
Verification of quantum networks using the GHZ paradox
收藏 引用
Communications in Theoretical Physics 2024年 第10期76卷 55-61页
作者: Huan Ye Xue Yang Ming-Xing Luo School of Information Science and Technology Southwest Jiaotong UniversityChengdu 610031China School of Computer Science and Cyber Security Chengdu University of TechnologyChengdu 610059China
The Greenberger–Horne–Zeilinger(GHZ)paradox shows that it is possible to create a multipartite state involving three or more particles in which the measurement outcomes of the particles are correlated in a way that ... 详细信息
来源: 评论
Coarse-to-fine lightweight meta-embedding for ID-based recommendations
收藏 引用
science China(Information sciences) 2025年 第4期68卷 82-97页
作者: Yang WANG Haipeng LIU Zeqian YI Biao QIAN Meng WANG School of Computer Science and Information Engineering Hefei University of Technology College of Information and Intelligence Hunan Agricultural University
State-of-the-art recommender systems are increasingly focused on optimizing implementation efficiency, such as enabling on-device recommendations under memory constraints. Current methods commonly use lightweight embe... 详细信息
来源: 评论
Identifying malicious traffic under concept drift based on intraclass consistency enhanced variational autoencoder
收藏 引用
science China(Information sciences) 2024年 第8期67卷 238-252页
作者: Xiang LUO Chang LIU Gaopeng GOU Gang XIONG Zhen LI Binxing FANG Institute of Information Engineering Chinese Academy of Sciences School of Cyber Security University of Chinese Academy of Sciences School of Computer Science and Technology Harbin Institute of Technology (Shenzhen)
Accurate identification of malicious traffic is crucial for implementing effective defense countermeasures and has led to extensive research efforts. However, the continuously evolving techniques employed by adversari... 详细信息
来源: 评论
Algorithms for online fault tolerance server consolidation
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 514-523页
作者: Boyu Li Bin Wu Meng Shen Hao Peng Weisheng Li Hong Zhang Jie Gan Zhihong Tian Guangquan Xu College of Intelligence and Computing Tianjin UniversityTianjin 300350China School of Cyberspace Science and Technology Beijing Institute of TechnologyBeijing 100081China School of Computer Science and Technology Zhejiang Normal UniversityJinhua 321004China School of Computer Science and Technology Chongqing University of Posts and TelecommunicationsChongqing 400054China School of Astronautics Beihang UniversityBeijing100191China School of Computer Science University of SydneySydneyNSW 20528Australia Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhou 511370China
We study a novel replication mechanism to ensure service continuity against multiple simultaneous server *** this mechanism,each item represents a computing task and is replicated intoξ+1 servers for some integerξ≥... 详细信息
来源: 评论
TextFormer: A Query-based End-to-end Text Spotter with Mixed Supervision
收藏 引用
Machine Intelligence Research 2024年 第4期21卷 704-717页
作者: Yukun Zhai Xiaoqiang Zhang Xiameng Qin Sanyuan Zhao Xingping Dong Jianbing Shen School of Computer Science Beijing Institute of TechnologyBeijing 100081China Department of Computer Vision Technology Baidu Inc.Beijing 100193China
End-to-end text spotting is a vital computer vision task that aims to integrate scene text detection and recognition into a unified *** methods heavily rely on region-of-interest(Rol)operations to extract local featur... 详细信息
来源: 评论
Research on lightweight pavement disease detection model based on YOLOv7
收藏 引用
Journal of Intelligent and Fuzzy Systems 2024年 第4期46卷 10573-10589页
作者: Wang, Chishe Li, Jun Wang, Jie Zhao, Weikang School of Computer Science and Engineering Anhui University of Science and Technology Huainan China Jinling Institute of Technology Nanjing China
Rapid urbanization has made road construction and maintenance imperative, but detecting road diseases has been time-consuming with limited accuracy. To overcome these challenges, we propose an efficient YOLOv7 road di... 详细信息
来源: 评论
Modeling and Analysis of OFDMA-NOMA-RA Protocol Considering Imperfect SIC in Multi-User Uplink WLANs
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 5273-5294页
作者: Hailing Yang Suoping Li Duo Peng School of Science Lanzhou University of TechnologyLanzhou730050China School of Computer&Communication Lanzhou University of TechnologyLanzhou730050China
To address the problems of network congestion and spectrum resources shortage in multi-user large-scale scenarios,this paper proposes a twice random access OFDMA-NOMA-RA protocol combining the advantages of orthogonal... 详细信息
来源: 评论
Real-time all-frequency global llumination with radiance caching
收藏 引用
Computational Visual Media 2024年 第5期10卷 923-936页
作者: Youxin Xing Gaole Pan Xiang Chen Ji Wu Lu Wang Beibei Wang School of Software Shandong UniversityJinan 250101China School of Computer Science and Engineering Nanjing University of Science and TechnologyNanjing 210094China
Global illumination(GI)plays a crucial role in rendering realistic results for virtual exhibitions,such as virtual car *** scenarios usually include all-frequency bidirectional reflectance distribution functions(BRDFs... 详细信息
来源: 评论
DedupChain: A secure Blockchain-enabled Storage System with Deduplication for Zero-Trust Network
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2070-2086页
作者: Qi, Saiyu Wang, Qiuhao Wei, Wei Yang, Xu Zhao, Hongguang Liu, Yuhao Yang, Xu Qi, Yong Xi'an Jiaotong University School of Computer Science and Technology China Xi'an University of Technology School of Computer Science and Engineering China Alibaba Group China Northwestern Polytechnical University School of Electronics and Information China
Permissioned blockchain is a promising methodology to build zero-trust storage foundation with trusted data storage and sharing for the zero-trust network. However, the inherent full-backup feature of the permissioned... 详细信息
来源: 评论