咨询与建议

限定检索结果

文献类型

  • 837 篇 期刊文献
  • 332 篇 会议
  • 12 册 图书

馆藏范围

  • 1,181 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 703 篇 理学
    • 493 篇 物理学
    • 126 篇 数学
    • 75 篇 生物学
    • 51 篇 统计学(可授理学、...
    • 26 篇 化学
    • 25 篇 系统科学
  • 559 篇 工学
    • 299 篇 计算机科学与技术...
    • 239 篇 软件工程
    • 101 篇 信息与通信工程
    • 71 篇 核科学与技术
    • 61 篇 控制科学与工程
    • 60 篇 生物工程
    • 57 篇 光学工程
    • 56 篇 电子科学与技术(可...
    • 55 篇 电气工程
    • 41 篇 生物医学工程(可授...
    • 38 篇 机械工程
    • 31 篇 仪器科学与技术
    • 24 篇 土木工程
    • 23 篇 动力工程及工程热...
    • 21 篇 建筑学
    • 21 篇 化学工程与技术
    • 20 篇 安全科学与工程
  • 111 篇 管理学
    • 68 篇 管理科学与工程(可...
    • 36 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 62 篇 医学
    • 52 篇 临床医学
    • 40 篇 基础医学(可授医学...
    • 21 篇 公共卫生与预防医...
  • 24 篇 法学
    • 21 篇 社会学
  • 19 篇 农学
  • 12 篇 经济学
  • 12 篇 教育学
  • 4 篇 军事学
  • 4 篇 艺术学
  • 3 篇 文学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 53 篇 relativistic hea...
  • 47 篇 proton-proton in...
  • 45 篇 higgs bosons
  • 44 篇 hadron colliders
  • 35 篇 large hadron col...
  • 35 篇 deep learning
  • 35 篇 standard model (...
  • 29 篇 collisions (nucl...
  • 29 篇 hadron-hadron in...
  • 29 篇 nuclear counters
  • 23 篇 quarks
  • 22 篇 accuracy
  • 21 篇 quark & gluon je...
  • 20 篇 cross sections (...
  • 20 篇 particle correla...
  • 20 篇 top quark
  • 20 篇 nuclear reaction...
  • 19 篇 supersymmetric m...
  • 19 篇 leptons (nuclear...
  • 19 篇 machine learning

机构

  • 280 篇 faculty of scien...
  • 278 篇 department for p...
  • 278 篇 department of ph...
  • 272 篇 departamento de ...
  • 271 篇 department of ph...
  • 265 篇 department of ph...
  • 262 篇 department of ph...
  • 259 篇 kirchhoff-instit...
  • 254 篇 faculté des scie...
  • 252 篇 dipartimento di ...
  • 251 篇 yerevan physics ...
  • 249 篇 institute of phy...
  • 242 篇 fakultät für phy...
  • 242 篇 institute of phy...
  • 235 篇 instituto de fís...
  • 226 篇 physics departme...
  • 225 篇 institut für ast...
  • 219 篇 department of ph...
  • 219 篇 department of ph...
  • 214 篇 physics division...

作者

  • 264 篇 c. alexa
  • 264 篇 g. bella
  • 264 篇 d. calvet
  • 264 篇 c. amelung
  • 263 篇 j. m. izen
  • 263 篇 j. strandberg
  • 262 篇 g. spigo
  • 261 篇 f. siegert
  • 261 篇 a. c. könig
  • 258 篇 m. klein
  • 257 篇 r. ströhmer
  • 256 篇 m. rijssenbeek
  • 255 篇 h. a. gordon
  • 253 篇 h. sakamoto
  • 252 篇 s. jin
  • 245 篇 g. gaudio
  • 241 篇 d. guest
  • 240 篇 s. mohapatra
  • 239 篇 y. tayalati
  • 238 篇 y. nagasaka

语言

  • 1,119 篇 英文
  • 55 篇 其他
  • 8 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=School of Information Technology and Engineering Computer Architecture Research Group"
1181 条 记 录,以下是81-90 订阅
排序:
A novel Cross-Layer Protocols for Resource Allocation in Mobile Networks  15
A novel Cross-Layer Protocols for Resource Allocation in Mob...
收藏 引用
15th International Conference on Computing Communication and Networking Technologies, ICCCNT 2024
作者: Giri, Rakesh Kumar Vittapu, Mani Sarma Dev, Anoop Shewale, Chaitali R. Majid, Mohd Aliff Abdul Kulkarni, Nandini Sunrise University Alwar Department of Computer Science and Engineering India Mallareddy Engineering College and Management Sciences Department of Computer Science and Engineering Kistapur Village Medchal Telangana Hyderabad India Chitkara University Centre of Research Impact and Outcome Punjab Rajpura India Vishwakarma Institute of Technology Department of Information Technology Pune India University Teknology MARA Faculty of Hotel and Tourism Management Department of Foodservice Management Malaysia Symbiosis International University Department of Symbiosis School of Planning Architecture and Design Nagpur Nagpur India
Cross-layer Protocols for proper resource Allocation in Mobile Networks are a singular technique to enhance the efficiency of wireless networks. The method utilizes multiple layers of the radio protocol stack better t... 详细信息
来源: 评论
LowResIR-Net: Lightweight Residual Network for ADL Recognition Using Low-Resolution Infrared Sensor Data  16
LowResIR-Net: Lightweight Residual Network for ADL Recogniti...
收藏 引用
16th International Conference on ENTERprise information Systems, CENTERIS 2024 - 12th International Conference on Project MANagement, ProjMAN 2024 - 14th International Conference on Health and Social Care information Systems and Technologies, HCist 2024
作者: Mekruksavanich, Sakorn Phaphan, Wikanda Jitpattanakul, Anuchit Department of Computer Engineering School of Information and Communication Technology University of Phayao Phayao56000 Thailand Research Group in Statistical Learning and Inference Department of Applied Statistics Faculty of Applied Science King Mongkut's University of Technology North Bangkok Bangkok10800 Thailand Intelligent and Nonlinear Dynamic Innovations Research Center Department of Mathematics Faculty of Applied Science King Mongkut's University of Technology North Bangkok Bangkok10800 Thailand
Detecting activities of daily living (ADL) is crucial for supported living and medical monitoring. Traditional approaches rely on high-resolution sensors and computationally intensive algorithms, limiting their scalab... 详细信息
来源: 评论
Blockchain-based security solutions for IOT networks: Analysing efficacy and implementation challenges
Blockchain-based security solutions for IOT networks: Analys...
收藏 引用
2025 International Conference on Pervasive Computational Technologies, ICPCT 2025
作者: Kumar, Gotte Ranjith Chamaraju, Y.S. Mulani, Umar M Naveenkumar, R. Datta, Auadhati Kanwer, Budesh Sr University School of Cs & Ai Telangana Warangal India Govt Cpc Polytechnic Department of Electronics & Communication Engineering Karnataka Mysore570007 India Kj College of Engineering and Management Research Pune India Chandigarh Group of Colleges Jhanjeri Chandigarh Colleges of Engineering Department of Computer Science and Engineering Punjab Mohali140307 India Vignan's Institute of Information Technology Department of Management Studies Andhra Pradesh Duvvada India Poornima Institute of Engineering and Technology Rajasthan Jaipur India
Blockchain innovation has gathered significant attention from both scholars and industry professionals after years of development. This technology enables the creation of smart contracts, which facilitate automated de... 详细信息
来源: 评论
TG-LLaVA: Text Guided LLaVA via Learnable Latent Embeddings  39
TG-LLaVA: Text Guided LLaVA via Learnable Latent Embeddings
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Yan, Dawei Li, Pengcheng Li, Yang Chen, Hao Chen, Qingguo Luo, Weihua Dong, Wei Yan, Qingsen Zhang, Haokui Shen, Chunhua School of Cybersecurity Northwestern Polytechnical University China AI Business Alibaba Group China College of Computer Science and Technology Zhejiang University China College of Information and Control Engineering Xi’an University of Architecture and Technology China School of Computer Science Northwestern Polytechnical University China
Currently, inspired by the success of vision-language models (VLMs), an increasing number of researchers are focusing on improving VLMs and have achieved promising results. However, most existing methods concentrate o...
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed System Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
Nanoarchitectonics of point-of-care diagnostics for sweat biomarkers analysis
收藏 引用
Nano Materials Science 2024年 第6期6卷 647-671页
作者: Xuan Lin Arya Vasanth Aditya Ashok Hoang-Phuong Phan Kevin M.Koo Mohammed A.Amin Yusuf Valentino Kaneti Carlos Salomon Md Shahriar A.Hossain Yusuke Yamauchi Mostafa Kamal Masud School of Chemistry and Molecular Biosciences The University of QueenslandBrisbaneQLD4072Australia Australian Institute of Bioengineering and Nanotechnology The University of QueenslandBrisbaneQLD4076Australia Graduate School of Biomedical Engineering The University of New South WalesSydneyNSW2052Australia The University of Queensland Centre for Clinical Research(UQCCR) HerstonQueensland4029Australia Department of Chemistry College of ScienceTaif UniversityP.O.Box 11099Taif21944Saudi Arabia Translational Extracellular Vesicles in Obstetrics and Gynae-Oncology Group University of Queensland Centre for Clinical ResearchFaculty of MedicineThe University of QueenslandBrisbaneQLD 4029Australia School of Mechanical and Mining Engineering Faculty of EngineeringArchitecture and Information Technology(EAIT)The University of QueenslandBrisbaneQLD4072Australia Department of Materials Process Engineering Graduate School of EngineeringNagoya UniversityFuro-choChikusa-kuNagoyaAichi464-8603Japan Department of Chemical and Biomolecular Engineering Yonsei UniversitySeoul 03722South Korea
Sweat contains numerous vital biomarkers such as metabolites,electrolytes,proteins,nucleic acids and antigens that reflect hydration status,exhaustion,nutrition,and physiological *** healthcare diagnosis relies on dis... 详细信息
来源: 评论
A Privacy-Aware and Time-Limited Data Access Control Scheme with Large Universe and Public Traceability for Cloud-Based IoD  1
收藏 引用
4th EAI International Conference on Security and Privacy in New Computing Environments, SPNCE 2021
作者: Zhang, Jiawei Yang, Yanbo Lu, Ning Liu, Zhiwei Ma, Jianfeng School of Cyber Engineering Xidian University Xi’an China School of Information Engineering Inner Mongolia University of Science and Technology Baotou China College of Computer Science and Engineering Northeastern University Shenyang China The 27th Research Institute of China Electronics Technology Group Corporation Beijing China
Recently, the rapid development of Internet of things (IoT) and 5G techniques has greatly facilitated the emerging applications of Unmanned Aerial Vehicles (UAVs) and the Internet of Drones (IoD). Moreover, Cloud-base... 详细信息
来源: 评论
The Future of Multimedia: Micro Facial Recognition in Advanced Systems  9
The Future of Multimedia: Micro Facial Recognition in Advanc...
收藏 引用
9th IEEE International Conference for Convergence in technology, I2CT 2024
作者: Preethi, Thakkalapally Choudalla, Saila Ram Govathoti, Sudeepthi Rajasri, K. Mohsen, Karrar Shareef Prakash, Dudi Bhanu Sai Kumar, K. And Ai&ds India Andhra Pradesh Surampalem India Gitam Deemed-to-be-University Dept of Cse Gitam School of Technology Telangana Hyderabad India Mlr Institute of Technology Department of Electrical And Electronics Engineering Telangana Hyderabad India Al-Ayen University Information And Communication Technology Research Group Scientific Research Center Thi-Qar Iraq Cvr College of Engineering Department of Ece Hyderabad India Koneru Lakshmaiah Education Foundation Computer Science Green Fields Andhra Pradesh Vaddeswaram522302 India
Paper attendance systems are still widely used at many universities, consuming significant amounts of valuable classroom time. Furthermore, the system is likely to fail due to the possibility of human mistake and the ... 详细信息
来源: 评论
A Review on the need of Clustering Techniques Used for Wireless Sensor Networks  2
A Review on the need of Clustering Techniques Used for Wirel...
收藏 引用
2nd International Conference on Business Analytics for technology and Security, ICBATS 2023
作者: Bharany, Salil Rehman, Ateeq Ur Tariq Sadiq, M. Farrukh, Muhammad Alharbi, Meshal Hussain, Amjad Issa, Ghassan F. CET and Technology Department Amritsar India Government College University Department of Electrical Engineering Lahore Pakistan University of Brighton School of Architecture & Engineering United Kingdom Minhaj University Department of Computer Science Lahore Pakistan Prince Sattam Bin Abdulaziz University College of Computer Engineering and Sciences Department of Computer Science Alkharj11942 Saudi Arabia School of Computer Science NCBA&E Lahore Pakistan Applied Science Private University Applied Science Research Center Amman11937 Jordan Skyline University College School of Information Technology Sharjah United Arab Emirates
Wireless sensor networks have been implemented in various software to help gather and analyze data from the physical world. Wireless sensor networks are networks of multiple tiny sensors powered by low-energy batterie... 详细信息
来源: 评论
A Novel Hybrid Clustering Based Transmission Protocol for Wireless Body Area Networks
收藏 引用
computers, Materials & Continua 2021年 第11期69卷 2459-2473页
作者: Neelam Sharma Harshita Chadha Karan Singh B.M.Singh Nitish Pathak Research Scholar Computer Science and EngineeringUttarakhand Technical University(UTU)DehradunIndia Computer Science and Engineering Maharaja Agrasen Institute of TechnologyNew DelhiIndia School of Computer&Systems Sciences Jawaharlal Nehru University(JNU)DelhiIndia College of Engineering Roorkee UTUDehradunIndia Department of Information Technology KIET Group of InstitutionsGhaziabadIndia
Wireless sensor networks are a collection of intelligent sensor devices that are connected to one another and have the capability to exchange information packets amongst *** recent years,this field of research has bec... 详细信息
来源: 评论