咨询与建议

限定检索结果

文献类型

  • 36,351 篇 期刊文献
  • 32,055 篇 会议
  • 285 册 图书

馆藏范围

  • 68,691 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 44,910 篇 工学
    • 18,440 篇 计算机科学与技术...
    • 14,701 篇 软件工程
    • 8,660 篇 电子科学与技术(可...
    • 8,545 篇 信息与通信工程
    • 7,300 篇 电气工程
    • 6,029 篇 控制科学与工程
    • 5,628 篇 化学工程与技术
    • 5,278 篇 材料科学与工程(可...
    • 4,910 篇 光学工程
    • 4,155 篇 机械工程
    • 3,696 篇 仪器科学与技术
    • 3,393 篇 生物工程
    • 2,794 篇 动力工程及工程热...
    • 2,519 篇 生物医学工程(可授...
    • 1,812 篇 冶金工程
    • 1,702 篇 力学(可授工学、理...
    • 1,352 篇 航空宇航科学与技...
    • 1,305 篇 土木工程
    • 1,279 篇 交通运输工程
  • 29,514 篇 理学
    • 14,307 篇 物理学
    • 10,638 篇 数学
    • 5,132 篇 化学
    • 4,112 篇 生物学
    • 3,588 篇 统计学(可授理学、...
    • 2,482 篇 系统科学
  • 7,781 篇 管理学
    • 5,281 篇 管理科学与工程(可...
    • 2,662 篇 图书情报与档案管...
    • 2,047 篇 工商管理
  • 2,565 篇 医学
    • 2,067 篇 临床医学
    • 1,617 篇 基础医学(可授医学...
  • 1,072 篇 法学
  • 957 篇 农学
  • 885 篇 经济学
  • 409 篇 教育学
  • 273 篇 军事学
  • 167 篇 文学
  • 101 篇 艺术学
  • 9 篇 哲学
  • 5 篇 历史学

主题

  • 938 篇 feature extracti...
  • 767 篇 deep learning
  • 746 篇 training
  • 649 篇 laboratories
  • 628 篇 accuracy
  • 548 篇 optimization
  • 545 篇 computational mo...
  • 535 篇 simulation
  • 532 篇 machine learning
  • 496 篇 semantics
  • 405 篇 computer science
  • 362 篇 neural networks
  • 350 篇 wireless communi...
  • 340 篇 robustness
  • 317 篇 predictive model...
  • 302 篇 conferences
  • 302 篇 data mining
  • 299 篇 internet of thin...
  • 293 篇 bandwidth
  • 292 篇 data models

机构

  • 684 篇 university of ch...
  • 489 篇 university of sc...
  • 428 篇 institute of hig...
  • 336 篇 department of ph...
  • 276 篇 budker institute...
  • 266 篇 dipartimento di ...
  • 262 篇 center of materi...
  • 255 篇 peng cheng labor...
  • 236 篇 department of ph...
  • 222 篇 indian institute...
  • 221 篇 faculté des scie...
  • 215 篇 institute for th...
  • 207 篇 department of ph...
  • 203 篇 physikalisches i...
  • 201 篇 indian institute...
  • 200 篇 national mobile ...
  • 195 篇 novosibirsk stat...
  • 194 篇 infn laboratori ...
  • 193 篇 kto karatay univ...
  • 191 篇 department of ph...

作者

  • 239 篇 j. m. izen
  • 233 篇 c. alexa
  • 230 篇 g. bella
  • 227 篇 j. strandberg
  • 226 篇 d. calvet
  • 226 篇 c. amelung
  • 211 篇 s. h. kim
  • 204 篇 g. spigo
  • 203 篇 h. a. gordon
  • 199 篇 f. siegert
  • 190 篇 a. c. könig
  • 188 篇 y. tayalati
  • 177 篇 a. ishikawa
  • 175 篇 m. klein
  • 167 篇 r. ströhmer
  • 166 篇 f. pastore
  • 162 篇 m. starič
  • 160 篇 n. orlando
  • 160 篇 h. sakamoto
  • 157 篇 y. unno

语言

  • 60,031 篇 英文
  • 6,120 篇 其他
  • 2,408 篇 中文
  • 111 篇 日文
  • 33 篇 法文
  • 27 篇 德文
  • 3 篇 斯洛文尼亚文
  • 2 篇 朝鲜文
  • 2 篇 俄文
检索条件"机构=Science and Technology Laboratory on Information Systems Engineering"
68691 条 记 录,以下是4871-4880 订阅
排序:
A Random Reversible Watermarking Scheme for Relational Data  1
收藏 引用
18th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2022
作者: Liu, Qiang Xian, Hequ Zhang, Jiancheng Liu, Kunpeng College of Computer Science and Technology Qingdao University Qingdao China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China Shandong Computer Science Center Jinan China Shandong Zhengzhong Information Technology Co. Ltd. Jinan China
In the era of Big Data, relational data is at risk of piracy and misuse when distributed, shared and used. The use of digital watermarking technology is a reliable way to protect the copyright of relational data. In o... 详细信息
来源: 评论
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus  33
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Mul...
收藏 引用
33rd USENIX Security Symposium, USENIX Security 2024
作者: Wei, Jianghong Tian, Guohua Wang, Ding Guo, Fuchun Susilo, Willy Chen, Xiaofeng Xidian University China State Key Laboratory of Mathematical Engineering and Advanced Computing China College of Cyber Science Nankai University China School of Computing and Information Technology University of Wollongong Australia
Multi-signature schemes have attracted considerable attention in recent years due to their popular applications in PoS blockchains. However, the use of general multi-signature schemes poses a critical threat to the se... 详细信息
来源: 评论
Fictitious Play in Markov Games with Single Controller  22
Fictitious Play in Markov Games with Single Controller
收藏 引用
23rd ACM Conference on Economics and Computation, EC 2022
作者: Sayin, Muhammed O. Zhang, Kaiqing Ozdaglar, Asuman Electrical and Electronics Engineering Bilkent University Turkey Laboratory for Information and Decision Systems Massachusetts Institute of Technology United States
Certain but important classes of strategic-form games, including zero-sum and identical-interest games, have thefictitious-play-property (FPP), i.e., beliefs formed in fictitious play dynamics always converge to a Nas... 详细信息
来源: 评论
Design of a lightweight and easy-to-wear hand glove with multi-modal tactile perception for digital human
Design of a lightweight and easy-to-wear hand glove with mul...
收藏 引用
作者: Pan, Zhigeng Ren, Hongyi Liu, Chang Chen, Ming Mukherjee, Mithun Yang, Wenzhen School of Artificial Intelligence Nanjing University of Information Science and Technology Nanjing China Center for Space-based Computing Systems Zhejiang Laboratory Hangzhou China College of Mechanical Engineering Zhejiang Sci-Tech University Zhejiang Sci-Tech University Hangzhou China Center for Intelligent Manufacturing Computing Zhejiang Laboratory Hangzhou China
Within the field of human–computer interaction, data gloves play an essential role in establishing a connection between virtual and physical environments for the realization of digital human. To enhance the credibili... 详细信息
来源: 评论
Simulation and analysis of a dual-passband active tunable frequency selective structure  12
Simulation and analysis of a dual-passband active tunable fr...
收藏 引用
12th IEEE Asia-Pacific Conference on Antennas and Propagation, APCAP 2024
作者: Qian, Wang Junxia, Tian School of Information Science and Engineering Shandong Weihai264209 China Avic Research Institute for Special Structures of Aeronautical Composite Aviation Key Laboratory of Science and Technology on High Performance Electromagnetic Windows Shandong Jinan250023 China
In order to meet the technical requirements of radar stealth, a dual-passband active tunable frequency selective structure (TDB FSS) is simulated. The antenna adopts a three-layer CLC composite structure and loads var... 详细信息
来源: 评论
Joint Optimization of Transmission and Computation for Multi-source MEC System Based on Deep Reinforcement Learning  20th
Joint Optimization of Transmission and Computation for Mu...
收藏 引用
20th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2024
作者: Zhang, Qi Zhu, Jianhang Gong, Jie School of Computer Science and Engineering Sun Yat-sen University Guangzhou51006 China School of Science and Engineering The Chinese University of Hong Kong Shenzhen Shenzhen518172 China Guangdong Key Laboratory of Information Security and Technology Sun Yat-sen University Guangzhou51006 China
Due to the limitation of computing resources in end nodes, computation tasks in Internet of Things (IoT) can be offloaded to mobile edge servers. To measure the effectiveness and timeliness of data, Age of information... 详细信息
来源: 评论
Safety Benefits Evaluation of Mixed Traffic Flow with Connected and Automated Vehicles under Snowy Conditions  7
Safety Benefits Evaluation of Mixed Traffic Flow with Connec...
收藏 引用
7th IEEE International Conference on Transportation information and Safety, ICTIS 2023
作者: Lu, Zhaoyou Ding, Naikan Gao, Jin Fu, Chuanyun Zhang, Hui Key Laboratory of Operation Safety Technology on Transport Vehicles Ministry of Transport Beijing China School of Transportation Science and Engineering Harbin Institute of Technology Beijing China Intelligent Transportation Systems Research Center Wuhan University of Technology Wuhan China Engineering Research Center of Transportation Information and Safety Ministry of Education Wuhan China
Connected and automated vehicles are widely agreed to bring tremendous benefits to the traffic system. But the understanding of them is still challenging due to the complexity of the mixed traffic flow of human-driven... 详细信息
来源: 评论
Analysis and Simulation of Interference Effects on CSK Modulation systems  15
Analysis and Simulation of Interference Effects on CSK Modul...
收藏 引用
15th International Congress on Image and Signal Processing, BioMedical engineering and Informatics, CISP-BMEI 2022
作者: Guan, Lele Xu, Zhan Tian, Lu Shi, Chenrui School of Information and Communication Engineering Beijing Information Science and Technology University Key Laboratory of Modern Measurement and Control Technology Ministry of Education Beijing China
As the space environment of information transmission becomes more and more complex, the accuracy of communication becomes a new challenge. In order to study the anti-jamming performance of code shift keying (CSK), thi... 详细信息
来源: 评论
Modeling of atmospheric radiative transfer with polarization effects using scattering phase matrix  29
Modeling of atmospheric radiative transfer with polarization...
收藏 引用
Remote Sensing of Clouds and the Atmosphere XXIX 2024
作者: Zou, Mengfan Li, Jianhua Xu, Xiaojian He, Xiaoyu School of Electronic and Information Engineering Beihang University 37 Xueyuan Road Beijing100191 China National Key Laboratory of Science and Technology on Test Physics & Numerical Mathematics Beijing100076 China
Solar radiation will be scattered by atmospheric molecules and aerosol particles when it transfers through the Earth atmosphere. The scattered radiance with different polarization state can be used to characterize atm... 详细信息
来源: 评论
An Efficient and Lightweight Commitment Scheme for IoT Data Streams  19
An Efficient and Lightweight Commitment Scheme for IoT Data ...
收藏 引用
19th Annual International Conference on Distributed Computing in Smart systems and the Internet of Things, DCOSS-IoT 2023
作者: Katsika, Angeliki Papageorgiou, Konstantinos Fakis, Alexandros Plagianakos, Vassilis Spathoulas, Georgios University of Thessaly Department of Computer Science and Biomedical Informatics Lamia Greece University of the Aegean Department of Information and Communication Systems Engineering Samos Greece Department of Information Security and Communication Technology Gjøvik Norway
Data integrity is a crucial property for offering Internet of Things (IoT) services. Usually, this is achieved by assuming a high level of trust in the service provider, a practice that induces negative implications. ... 详细信息
来源: 评论