咨询与建议

限定检索结果

文献类型

  • 2,387 篇 会议
  • 1,956 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,359 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,834 篇 工学
    • 1,933 篇 计算机科学与技术...
    • 1,510 篇 软件工程
    • 583 篇 信息与通信工程
    • 352 篇 电气工程
    • 349 篇 控制科学与工程
    • 314 篇 电子科学与技术(可...
    • 256 篇 生物工程
    • 218 篇 机械工程
    • 202 篇 光学工程
    • 164 篇 生物医学工程(可授...
    • 151 篇 仪器科学与技术
    • 142 篇 动力工程及工程热...
    • 140 篇 化学工程与技术
    • 98 篇 交通运输工程
    • 91 篇 网络空间安全
    • 89 篇 材料科学与工程(可...
    • 81 篇 土木工程
    • 79 篇 安全科学与工程
  • 1,428 篇 理学
    • 703 篇 数学
    • 385 篇 物理学
    • 308 篇 生物学
    • 209 篇 统计学(可授理学、...
    • 152 篇 化学
    • 144 篇 系统科学
  • 754 篇 管理学
    • 503 篇 管理科学与工程(可...
    • 280 篇 图书情报与档案管...
    • 200 篇 工商管理
  • 175 篇 医学
    • 145 篇 临床医学
    • 114 篇 基础医学(可授医学...
  • 117 篇 法学
    • 77 篇 社会学
  • 73 篇 经济学
  • 52 篇 农学
  • 24 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 101 篇 feature extracti...
  • 92 篇 semantics
  • 78 篇 computational mo...
  • 72 篇 computer science
  • 72 篇 deep learning
  • 66 篇 training
  • 64 篇 computer archite...
  • 59 篇 cloud computing
  • 56 篇 laboratories
  • 56 篇 optimization
  • 56 篇 servers
  • 54 篇 accuracy
  • 53 篇 scalability
  • 52 篇 grid computing
  • 50 篇 protocols
  • 49 篇 predictive model...
  • 48 篇 bandwidth
  • 45 篇 data models
  • 43 篇 resource managem...
  • 43 篇 analytical model...

机构

  • 129 篇 school of comput...
  • 101 篇 national enginee...
  • 94 篇 hubei province k...
  • 90 篇 school of comput...
  • 77 篇 department of co...
  • 55 篇 services computi...
  • 49 篇 services computi...
  • 49 篇 school of softwa...
  • 45 篇 hubei province k...
  • 45 篇 services computi...
  • 45 篇 national enginee...
  • 44 篇 state key labora...
  • 42 篇 school of cyber ...
  • 39 篇 huazhong univers...
  • 38 篇 tsinghua nationa...
  • 35 篇 school of inform...
  • 35 篇 national enginee...
  • 34 篇 school of comput...
  • 34 篇 university of ch...
  • 33 篇 key laboratory o...

作者

  • 235 篇 hai jin
  • 187 篇 jin hai
  • 53 篇 xiaofei liao
  • 37 篇 liao xiaofei
  • 33 篇 niyato dusit
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 shi xuanhua
  • 29 篇 zou deqing
  • 27 篇 shen linlin
  • 27 篇 song wu
  • 25 篇 hu shengshan
  • 24 篇 wang wei
  • 21 篇 li peng
  • 19 篇 liu yang
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 zhang xiaolong
  • 18 篇 liu jun
  • 18 篇 li bo

语言

  • 3,762 篇 英文
  • 463 篇 其他
  • 148 篇 中文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4359 条 记 录,以下是1061-1070 订阅
排序:
R-calculus for post three-valued description logic  7
R-calculus for post three-valued description logic
收藏 引用
7th International Conference on Fuzzy systems and Data Mining, FSDM 2021
作者: Cao, Cungen Hu, Lanxi Sui, Yuefei Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences China School of Computer Science and Technology University of Chinese Academy of Sciences China
R-calculus is a belief revision operator satisfying AGM postulates, and belief revision in ontology engineering is ontology revision, which based logic is description logics. In Post three-valued description logic, a ... 详细信息
来源: 评论
Formal Modeling and Defense Methods for 5G Network Endpoint Access Denial of Service Attacks
Formal Modeling and Defense Methods for 5G Network Endpoint ...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Tong Zhang Wei Wei Yichuan Wang Xi Deng Lei Zhu Wenjiang Ji School of Computer Science and Engineering Xi'an University of Technology Xi'an China Shaanxi Key Laboratory for Network Computing and Security Technolog Xi'an China School of Computer Science Xi'an Shiyou University Xi'an China
5G terminal access denial-of-service attack is one of the more common types of 5G signaling network attacks. It manifests itself as a large number of abnormal access requests occupying core network resources. Normal r...
来源: 评论
A HRI Framework Based on Eye Tracking
A HRI Framework Based on Eye Tracking
收藏 引用
作者: Zhao, Xiaodong Liu, Zheng Cheng, Shiwei Zhejiang University of Technology School of Computer Science Hangzhou310023 China Zhejiang Provincial Key Laboratory of Integration of Healthy Smart Kitchen System Ningbo315336 China China Academy of Art Hangzhou310000 China
Existing human-robot interaction (HRI) technologies are not intuitive or effective enough for the disabled. Most of them can neither express their explicit intent (voice, posture, touch, etc.), nor communicate based o... 详细信息
来源: 评论
Dockformer: A transformer-based molecular docking paradigm for large-scale virtual screening
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Zhangfan Ji, Junkai He, Shan Li, Jianqiang He, Tiantian Bai, Ruibin Zhu, Zexuan Ong, Yew Soon School of Computer Science University of Nottingham Ningbo Ningbo315199 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Singapore138632 Singapore School of Computer Science University of Birmingham BirminghamB15 2TT United Kingdom School of Computer Science and Engineering Nanyang Technological University Nanyang Avenue 639798 Singapore
Molecular docking is a crucial step in drug development, which enables the virtual screening of compound libraries to identify potential ligands that target proteins of interest. However, the computational complexity ... 详细信息
来源: 评论
Research on the design of indoor air quality monitoring system based on cloud-side-end collaboration
Research on the design of indoor air quality monitoring syst...
收藏 引用
International Conference on computer Engineering and Applications (ICCEA)
作者: Liang Yu Yuting Lin Haonan Xu Jiabao Yang Guotong Zhao College of Computer Guangdong University of Science and Technology DongGuan China AIoT Edge Computing Engineering Technology Research Center of Dongguan City Guangdong AIoT Application Innovation Joint Laboratory School of Information Technology & Engineering Guangzhou College of Commerce Guangzhou China
Given that individuals spend more than 90% of their time indoors, research indicates a direct correlation between indoor air quality and overall health and well-being. With the rise of respiratory illnesses and increa... 详细信息
来源: 评论
Merging Clinical Knowledge into Large Language Models for Medical Research and Applications: A Survey
arXiv
收藏 引用
arXiv 2025年
作者: Li, Qiyuan Liu, Haijiang Guo, Caicai Chen, Deyu Wang, Meng Gao, Feng Gu, Jinguang College of Computer Science and Technology Wuhan University of Science and Technology Hubei Wuhan430065 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Hubei Wuhan430065 China The Key Laboratory of Rich-Media Knowledge Organization Service of Digital Publishing Content Institute of Scientific and Technical Information of China Beijing100038 China School of Computer Science and Technology Huazhong University of Science and Technology Hubei Wuhan430074 China School of Cyber Science and Engineering Wuhan University Hubei Wuhan430072 China
Clinical knowledge is the collection of information learned from studies on the causes, prognosis, diagnosis, and treatment of diseases. This type of knowledge can improve curing performances, and promote physical hea... 详细信息
来源: 评论
Reliability Analysis of Heterogeneous Sensor-Cloud systems against Targeted Attacks
收藏 引用
China Communications 2022年 第8期19卷 181-197页
作者: Hao Peng Zhen Qian Guangquan Xu Kejie Mao Kangtian Li Dandan Zhao Department of Computer Science and Engineering Zhejiang Normal UniversityJinhua Zhejiang 321004China Key Laboratory of Intelligent Education Technology and Application of Zhejiang Province Zhejiang Normal UniversityJinhua Zhejiang 321004China The Big Data School Qingdao Huanghai UniversityQingdao Shandong 266427China College of Intelligence and Computing Tianjin UniversityTianjin 300072China
Based on the wide application of cloud computing and wireless sensor networks in various fields,the Sensor-Cloud system(SCS)plays an indispensable role between the physical world and the network ***,due to the close c... 详细信息
来源: 评论
A Blockchain-based PHR Sharing Scheme with Attribute Privacy Protection
A Blockchain-based PHR Sharing Scheme with Attribute Privacy...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Chaohe Lu Zhongyuan Yu Guijuan Wang Anming Dong Xiang Tian School of Computer Science Qufu Normal University Rizhao China School of Information Science and Engineering Lanzhou University Lanzhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
With the rapid advancement and application of the Internet of Medical Things (IoMT), personal health records (PHRs) are now increasingly comprised of data collected by Internet of Things (IoT) devices and medical reco... 详细信息
来源: 评论
Automated Injury Detection and Alert systems in Public Transportation Integrating IoT with Convolutional Neural Networks  2
Automated Injury Detection and Alert Systems in Public Trans...
收藏 引用
2nd International Conference on Self Sustainable Artificial Intelligence systems, ICSSAS 2024
作者: Vimal, S.P. Peter, John Benito Jesudasan Kavitha, U. Bhuvaneswari, G. Manikandan, G. Thamizhamuthu, R. Sri Ramakrishna Engineering College Department of Electronics and Communication Engineering Tamil Nadu Coimbatore India Capital One Services Llc RichmondVA United States Vel Tech RangarajanDr.Sagunthala R&d Institute of Science and Technology School of Commerce Tamil Nadu Chennai India Saveetha Engineering College Department of Computer Science and Engineering Tamil Nadu Chennai India Rmk Engineering College Department of Artificial Intelligence and Data Science Tamil Nadu Chennai India Srm Institute of Science and Technology Department of Computing Technologies Kattankulathur Campus-Chengalpattu Tamil Nadu Chennai India
Innovative methods to improve public transportation safety and response mechanisms have emerged due to Internet of Things (IoT) and artificial intelligence (AI) technologies. IoT devices and Convolutional Neural Netwo... 详细信息
来源: 评论
Improving Smart Contract Security with Contrastive Learning-Based Vulnerability Detection
Improving Smart Contract Security with Contrastive Learning-...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Yizhou Chen Zeyu Sun Zhihao Gong Dan Hao Key Lab of HCST (PKU) MOE School of Computer Science Peking University Beijing China Science & Technology on Integrated Information System Laboratory Institute of Software Chinese Academy of Sciences Beijing China
Currently, smart contract vulnerabilities (SCVs) have emerged as a major factor threatening the transaction security of blockchain. Existing state-of-the-art methods rely on deep learning to mitigate this threat. They... 详细信息
来源: 评论