咨询与建议

限定检索结果

文献类型

  • 4,147 篇 会议
  • 1,890 篇 期刊文献
  • 39 册 图书

馆藏范围

  • 6,076 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,766 篇 工学
    • 2,736 篇 计算机科学与技术...
    • 2,255 篇 软件工程
    • 949 篇 信息与通信工程
    • 589 篇 控制科学与工程
    • 451 篇 生物工程
    • 365 篇 电气工程
    • 323 篇 电子科学与技术(可...
    • 318 篇 生物医学工程(可授...
    • 280 篇 机械工程
    • 278 篇 光学工程
    • 217 篇 网络空间安全
    • 187 篇 化学工程与技术
    • 176 篇 仪器科学与技术
    • 168 篇 动力工程及工程热...
    • 161 篇 安全科学与工程
    • 146 篇 交通运输工程
  • 2,050 篇 理学
    • 999 篇 数学
    • 643 篇 物理学
    • 489 篇 生物学
    • 336 篇 统计学(可授理学、...
    • 205 篇 系统科学
    • 186 篇 化学
  • 1,109 篇 管理学
    • 658 篇 管理科学与工程(可...
    • 497 篇 图书情报与档案管...
    • 254 篇 工商管理
  • 288 篇 医学
    • 228 篇 临床医学
    • 220 篇 基础医学(可授医学...
    • 137 篇 公共卫生与预防医...
    • 125 篇 药学(可授医学、理...
  • 202 篇 法学
    • 165 篇 社会学
  • 105 篇 农学
  • 103 篇 经济学
  • 69 篇 教育学
  • 36 篇 文学
  • 28 篇 军事学
  • 13 篇 艺术学

主题

  • 204 篇 accuracy
  • 172 篇 deep learning
  • 152 篇 computational mo...
  • 146 篇 feature extracti...
  • 133 篇 machine learning
  • 123 篇 training
  • 100 篇 hadron colliders
  • 98 篇 convolutional ne...
  • 95 篇 data models
  • 94 篇 predictive model...
  • 93 篇 semantics
  • 89 篇 support vector m...
  • 89 篇 real-time system...
  • 86 篇 data mining
  • 85 篇 computer applica...
  • 79 篇 optimization
  • 78 篇 internet of thin...
  • 74 篇 artificial intel...
  • 68 篇 wireless sensor ...
  • 68 篇 security

机构

  • 134 篇 yerevan physics ...
  • 131 篇 national and kap...
  • 131 篇 centro brasileir...
  • 131 篇 istanbul technic...
  • 129 篇 university of sp...
  • 129 篇 indian institute...
  • 128 篇 universidad iber...
  • 127 篇 brunel universit...
  • 126 篇 università di to...
  • 126 篇 academy of scien...
  • 126 篇 infn sezione di ...
  • 125 篇 charles universi...
  • 125 篇 zhejiang univers...
  • 124 篇 department of ph...
  • 123 篇 infn sezione di ...
  • 122 篇 university of de...
  • 120 篇 rwth aachen univ...
  • 119 篇 imperial college...
  • 117 篇 department of ph...
  • 111 篇 università di ca...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 5,768 篇 英文
  • 218 篇 其他
  • 92 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Technology of Computer Application"
6076 条 记 录,以下是1-10 订阅
排序:
Heap Memory Vulnerability Detection and Protection in Embedded Real-Time Operating Systems  24
Heap Memory Vulnerability Detection and Protection in Embedd...
收藏 引用
8th International Conference on Electronic Information technology and computer Engineering, EITCE 2024
作者: Zhang, Jinyuan Yao, Rui Zhang, Yang Beijing Institute of Computer Technology and Application Beijing China
In application software development, memory defects are difficult to detect. Traditional memory defect detection tools generally face issues of high performance overhead and excessive memory consumption, which limits ... 详细信息
来源: 评论
UniTrans:Unified Parameter-Efficient Transfer Learning and Multimodal Alignment for Large Multimodal Foundation Model
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 219-238页
作者: Jiakang Sun Ke Chen Xinyang He Xu Liu Ke Li Cheng Peng Chengdu Institute of Computer Application Chinese Academy of SciencesChengdu610213China School of Computer Science and Technology University of Chinese Academy of SciencesBeijing101499China
With the advancements in parameter-efficient transfer learning techniques,it has become feasible to leverage large pre-trained language models for downstream tasks under low-cost and low-resource ***,applying this tec... 详细信息
来源: 评论
Platform-specific code generation method for the tyche embedded operating system based on AADL models  3
Platform-specific code generation method for the tyche embed...
收藏 引用
3rd International Conference on Algorithms, Network, and Communication technology, ICANCT 2024
作者: Chen, Li Jia, Zhangtao An, Heng Li, Haoyu Beijing Computer Technology and Application Research Institute Beijing China
The Tyche Embedded Operating System is a highly customized real-time embedded operating system, widely applied in fields such as aerospace, medical devices, and industrial automation. Renowned for its robust support f... 详细信息
来源: 评论
Designing blockchain based secure autonomous vehicular internet of things (IoT) architecture with efficient smart contracts
收藏 引用
International Journal of Information technology (Singapore) 2025年 第2期17卷 1207-1223页
作者: Hemani Singh, Dayashankar Dwivedi, Rajendra Kumar Department of Information Technology and Computer Application Madan Mohan Malaviya University of Technology UP Gorakhpur India
The future of autonomous vehicles is exciting and holds significant potential for transforming transportation. The future is bright, but these vehicles require a high degree of connectivity complex software to functio... 详细信息
来源: 评论
An Interactive Framework for Personalized Navigation Based on Metacosmic Cultural Tourism and Large Model Fine-tuning
收藏 引用
IEEE Access 2025年 13卷 81450-81461页
作者: Guo, Hang Liu, Zhiqiang Tang, Chuanqian Zhang, Xiaodan Qinghai University School of Computer Technology and Application Xining China Qinghai University Qinghai Provincial Intelligent Computing and Application Laboratory Xining China
With the wide application of Large Language models (LLMs) and the rapid growth of metaverse tourism demand, the digital tour and personalized interaction of historical sites have become the key to improving users’ di... 详细信息
来源: 评论
application of adaptive guard channel reservation under hard handoff constraint in wireless cellular network
收藏 引用
International Journal of Wireless and Mobile Computing 2025年 第2期28卷 170-185页
作者: Sahu, Promod Kumar Pati, Hemanta Kumar Pradha, Sateesh Kumar Department of Computer Science and Application Utkal University Vani Vihar Odisha Bhubaneswar India Department of Computer Science and Engineering International Institute of Information Technology Bhubaneswar Odisha Bhubaneswar India
Voice is the king of communication in wireless cellular network (WCN). Again, WCNs provide two types of calls, i.e., new call (NC) and handoff call (HC). Generally, HCs have higher priority than NCs because call dropp... 详细信息
来源: 评论
HRAM-VITON: High-Resolution Virtual Try-On with Attention Mechanism
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2753-2768页
作者: Yue Chen Xiaoman Liang Mugang Lin Fachao Zhang Huihuang Zhao College of Computer Science and Technology Hengyang Normal UniversityHengyang421002China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002China
The objective of image-based virtual try-on is to seamlessly integrate clothing onto a target image, generating a realistic representation of the character in the specified attire. However, existing virtual try-on met... 详细信息
来源: 评论
application of computer Virtual Simulation technology in Network Information Security Teaching
Application of Computer Virtual Simulation Technology in Net...
收藏 引用
2018 3rd ISSGBM International Conference on Information and Business Management(ISSGBM-IB 2018)
作者: Gen Li Shanshan Liu Guangdong College of Business and Technology Department of Computer Application Technology South China Business Trade College Dean's Office
At present, the application of information technology and network technology has been popularized, and it has become an indispensable part of people's life and the development of various national undertakings. How... 详细信息
来源: 评论
Framework for classifying gait disorders and fall prevention
Framework for classifying gait disorders and fall prevention
收藏 引用
2025 International Conference on computer, Electrical and Communication Engineering, ICCECE 2025
作者: Saha, Rupa Karmakar, Koushik Biswas, Suparna Narula Institute of Technology Department of Computer Application India Narula Institute of Technology Department of Computer Science and Technology India Department of Computer Science & Engineering Makaut W B India
One of the crucial approaches that use tracking and analyzing human movement for the identification of functional disorders and illnesses of the human body is known as the gait analysis method. This method helps diagn... 详细信息
来源: 评论
Optimized graph transformer with molecule attention network based multi class attack detection framework for enhancing privacy and security in WSN
收藏 引用
Multimedia Tools and applications 2025年 第15期84卷 14273-14304页
作者: Anoop, M. Mary, L. William Wilson, Allan J. Kiran, W.S. Department of Computer Science and Application SRM Institute of Science and Technology Ramapuram campus Chennai600089 India Department of Electronics and Communication Engineering Amrita College of Engineering and Technology Nagercoil India
In today's rapidly evolving network landscape, cybersecurity has become increasingly crucial. However, wireless sensor networks face unique challenges due to their limited resources and diverse composition, high c... 详细信息
来源: 评论