咨询与建议

限定检索结果

文献类型

  • 36,691 篇 期刊文献
  • 32,025 篇 会议
  • 286 册 图书
  • 1 篇 科技报告

馆藏范围

  • 69,003 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 45,059 篇 工学
    • 18,662 篇 计算机科学与技术...
    • 14,794 篇 软件工程
    • 8,619 篇 信息与通信工程
    • 8,604 篇 电子科学与技术(可...
    • 7,325 篇 电气工程
    • 6,172 篇 控制科学与工程
    • 5,693 篇 化学工程与技术
    • 5,168 篇 材料科学与工程(可...
    • 5,059 篇 光学工程
    • 4,202 篇 机械工程
    • 3,708 篇 仪器科学与技术
    • 3,414 篇 生物工程
    • 2,846 篇 动力工程及工程热...
    • 2,553 篇 生物医学工程(可授...
    • 1,827 篇 冶金工程
    • 1,717 篇 力学(可授工学、理...
    • 1,351 篇 航空宇航科学与技...
    • 1,319 篇 土木工程
    • 1,293 篇 交通运输工程
  • 29,784 篇 理学
    • 14,414 篇 物理学
    • 10,589 篇 数学
    • 5,207 篇 化学
    • 4,157 篇 生物学
    • 3,512 篇 统计学(可授理学、...
    • 2,495 篇 系统科学
  • 7,855 篇 管理学
    • 5,327 篇 管理科学与工程(可...
    • 2,685 篇 图书情报与档案管...
    • 2,049 篇 工商管理
  • 2,625 篇 医学
    • 2,109 篇 临床医学
    • 1,639 篇 基础医学(可授医学...
  • 1,071 篇 法学
  • 968 篇 农学
  • 886 篇 经济学
  • 406 篇 教育学
  • 272 篇 军事学
  • 168 篇 文学
  • 101 篇 艺术学
  • 9 篇 哲学
  • 5 篇 历史学

主题

  • 930 篇 feature extracti...
  • 773 篇 deep learning
  • 746 篇 training
  • 646 篇 laboratories
  • 599 篇 accuracy
  • 546 篇 machine learning
  • 543 篇 computational mo...
  • 536 篇 optimization
  • 531 篇 simulation
  • 492 篇 semantics
  • 407 篇 computer science
  • 361 篇 neural networks
  • 347 篇 wireless communi...
  • 337 篇 robustness
  • 316 篇 predictive model...
  • 299 篇 conferences
  • 298 篇 data mining
  • 293 篇 bandwidth
  • 293 篇 data models
  • 291 篇 internet of thin...

机构

  • 676 篇 university of ch...
  • 485 篇 university of sc...
  • 431 篇 institute of hig...
  • 330 篇 department of ph...
  • 276 篇 budker institute...
  • 267 篇 dipartimento di ...
  • 265 篇 center of materi...
  • 257 篇 peng cheng labor...
  • 235 篇 department of ph...
  • 223 篇 faculté des scie...
  • 220 篇 indian institute...
  • 215 篇 institute for th...
  • 203 篇 department of ph...
  • 202 篇 indian institute...
  • 199 篇 national mobile ...
  • 198 篇 physikalisches i...
  • 197 篇 novosibirsk stat...
  • 194 篇 infn laboratori ...
  • 191 篇 kto karatay univ...
  • 190 篇 department of ph...

作者

  • 240 篇 j. m. izen
  • 234 篇 c. alexa
  • 230 篇 g. bella
  • 228 篇 j. strandberg
  • 227 篇 d. calvet
  • 226 篇 c. amelung
  • 209 篇 s. h. kim
  • 206 篇 h. a. gordon
  • 204 篇 g. spigo
  • 196 篇 f. siegert
  • 189 篇 a. c. könig
  • 187 篇 y. tayalati
  • 178 篇 a. ishikawa
  • 173 篇 m. klein
  • 166 篇 r. ströhmer
  • 165 篇 f. pastore
  • 162 篇 m. starič
  • 159 篇 n. orlando
  • 159 篇 h. sakamoto
  • 157 篇 y. unno

语言

  • 63,308 篇 英文
  • 3,251 篇 其他
  • 2,296 篇 中文
  • 110 篇 日文
  • 25 篇 法文
  • 20 篇 德文
  • 3 篇 斯洛文尼亚文
  • 2 篇 朝鲜文
  • 2 篇 俄文
  • 1 篇 葡萄牙文
检索条件"机构=Science and Technology On Information Systems Engineering Laboratory"
69003 条 记 录,以下是4741-4750 订阅
排序:
Optimal impurity distribution model and experimental verification of variation of lateral doping termination
收藏 引用
Chinese Physics B 2023年 第4期32卷 724-729页
作者: 任敏 叶昶宇 周建宇 张新 郑芳 马荣耀 李泽宏 张波 State key Laboratory of Electronic Thin Films and Integrated Devices University of Electronic Science and Technology of ChinaChengdu 610054China Guangdong Institute of Electronic Information Engineering University of Electronic Science and Technology of ChinaDongguan 523808China Wuxi China Resources Huajing Microelectronics Co.LTD Wuxi 214061China
Based on the charge balance principle,an optimal impurity distribution variation of lateral doping termination(OIDVLD)and its ion-injection mask design method are proposed and *** comparative simulations and experimen... 详细信息
来源: 评论
Prediction-Based Thunderstorm Path Recovery Method Using CNN-BiLSTM
收藏 引用
Intelligent Automation & Soft Computing 2023年 第8期37卷 1637-1654页
作者: Xu Yang Ling Zhuang Yuqiang Sun Wenjie Zhang School of Electronics and Information Engineering Nanjing University of Information Science and TechnologyNanjing210044China Department of Electrical and Computer Engineering University of AlbertaEdmontonAB T6G 2R3Canada CCCC Highway Consultants Co. Ltd.Beijing100101China School of Geographical Sciences Nanjing University of Information Science and TechnologyNanjing210044China State Key Laboratory of Resources and Environmental Information System Institute of Geographic Sciences and Natural Resources ResearchChinese Academy of SciencesBeijing100101China
The loss of three-dimensional atmospheric electric field(3DAEF)data has a negative impact on thunderstorm *** paper proposes a method for thunderstorm point charge path *** on the relation-ship between a point charge ... 详细信息
来源: 评论
Digital Twin-Based Service System Platform
Digital Twin-Based Service System Platform
收藏 引用
TEPEN International Workshop on Fault Diagnostics and Prognostics, TEPEN-IWFDP 2024
作者: Ma, Zeyu Wang, Hongjun Zhang, Mingliang School of Mechanical Electrical Engineering Beijing University of Information Science and Technology Beijing100192 China Beijing International Science Cooperation Base of High-End Equipment Intelligent Perception Beijing100192 China Key Laboratory of Modern Measurement and Control Technology Ministry of Education Beijing100192 China Beijing Institute of Radio Measurement Beijing100854 China School of Information Management Beijing Information Science and Technology University Beijing100192 China
This paper discusses the integration and application of digital twin technology within the manufacturing sector, underscoring its pivotal role in advancing the Industry 4.0 revolution. Digital twin technology, which c... 详细信息
来源: 评论
Fictitious Play in Markov Games with Single Controller  22
Fictitious Play in Markov Games with Single Controller
收藏 引用
23rd ACM Conference on Economics and Computation, EC 2022
作者: Sayin, Muhammed O. Zhang, Kaiqing Ozdaglar, Asuman Electrical and Electronics Engineering Bilkent University Turkey Laboratory for Information and Decision Systems Massachusetts Institute of Technology United States
Certain but important classes of strategic-form games, including zero-sum and identical-interest games, have thefictitious-play-property (FPP), i.e., beliefs formed in fictitious play dynamics always converge to a Nas... 详细信息
来源: 评论
Identifying Influential Spreaders in Complex Networks Using Neighborhood Network Structure  35
Identifying Influential Spreaders in Complex Networks Using ...
收藏 引用
35th International Conference on Software engineering and Knowledge engineering, SEKE 2023
作者: Zhang, Ziyi Yan, Rong Yuan, Wei College of Computer Science Inner Mongolia University Inner Mongolia Key Laboratory of Mongolian Information Processing Technology National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Hohhot010021 China
Identifying influential spreaders is a hot topic in complex network research. While centrality-based algorithms are easy to implement, they often have lower accuracy. Topology-based algorithms are effective for identi... 详细信息
来源: 评论
Joint Optimization of Transmission and Computation for Multi-source MEC System Based on Deep Reinforcement Learning  20th
Joint Optimization of Transmission and Computation for Mu...
收藏 引用
20th IFIP WG 10.3 International Conference on Network and Parallel Computing, NPC 2024
作者: Zhang, Qi Zhu, Jianhang Gong, Jie School of Computer Science and Engineering Sun Yat-sen University Guangzhou51006 China School of Science and Engineering The Chinese University of Hong Kong Shenzhen Shenzhen518172 China Guangdong Key Laboratory of Information Security and Technology Sun Yat-sen University Guangzhou51006 China
Due to the limitation of computing resources in end nodes, computation tasks in Internet of Things (IoT) can be offloaded to mobile edge servers. To measure the effectiveness and timeliness of data, Age of information... 详细信息
来源: 评论
Assessing Susceptibility Factors of Confirmation Bias in News Feed Reading  25
Assessing Susceptibility Factors of Confirmation Bias in New...
收藏 引用
2025 CHI Conference on Human Factors in Computing systems, CHI 2025
作者: Boonprakong, Nattapat Pareek, Saumya Tag, Benjamin Goncalves, Jorge Dingler, Tilman School of Computing and Information Systems University of Melbourne Parkville VIC Australia School of Computing and Information Systems University of Melbourne Melbourne VIC Australia School of Computer Science and Engineering University of New South Wales Sydney NSW Australia School of Computing and Information Systems University of Melbourne Melbourne Australia Industrial Design Engineering Delft University of Technology Delft Netherlands
Individuals tend to apply preferences and beliefs as heuristics to effectively sift through the sheer amount of information available online. Such tendencies, however, often result in cognitive biases, which can skew ... 详细信息
来源: 评论
FairCoRe: Fairness-Aware Recommendation Through Counterfactual Representation Learning
收藏 引用
IEEE Transactions on Knowledge and Data engineering 2025年 第7期37卷 4049-4062页
作者: Bin, Chenzhong Liu, Wenqiang Zhang, Feng Chang, Liang Gu, Tianlong Guilin University of Electronic Technology School of Computer Science and Information Security Guilin541004 China Guilin University of Electronic Technology School of Business Guilin541004 China Guilin University of Electronic Technology Guangxi Key Laboratory of Trusted Software Guilin541004 China Jinan University College of Cyber Security Engineering Research Center of Trustworthy AI Ministry of Education Guangzhou510632 China
Eliminating bias from data representations is crucial to ensure fairness in recommendation. Existing studies primarily focus on weakening the correlation between data representations and sensitive attributes, yet may ... 详细信息
来源: 评论
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus  33
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Mul...
收藏 引用
33rd USENIX Security Symposium, USENIX Security 2024
作者: Wei, Jianghong Tian, Guohua Wang, Ding Guo, Fuchun Susilo, Willy Chen, Xiaofeng Xidian University China State Key Laboratory of Mathematical Engineering and Advanced Computing China College of Cyber Science Nankai University China School of Computing and Information Technology University of Wollongong Australia
Multi-signature schemes have attracted considerable attention in recent years due to their popular applications in PoS blockchains. However, the use of general multi-signature schemes poses a critical threat to the se... 详细信息
来源: 评论
Matching Knowledge Graphs in Entity Embedding Spaces: An Experimental Study [Extended Abstract]
Matching Knowledge Graphs in Entity Embedding Spaces: An Exp...
收藏 引用
International Conference on Data engineering
作者: Weixin Zeng Xiang Zhao Zhen Tan Jiuyang Tang Xueqi Cheng Laboratory for Big Data and Decision National University of Defense Technology China Science and Technology on Information Systems Engineering Laboratory National University of Defense Technology China Institute of Computing Technology CAS China
Entity alignment (EA) identifies equivalent entities that locate in different knowledge graphs (KGs), and has attracted growing research interests over the last few years with the advancement of KG embedding technique... 详细信息
来源: 评论