咨询与建议

限定检索结果

文献类型

  • 319,861 篇 会议
  • 156,548 篇 期刊文献
  • 3,758 册 图书
  • 2,841 篇 学位论文
  • 514 篇 专利
  • 141 篇 科技报告

馆藏范围

  • 483,658 篇 电子文献
  • 30 种 纸本馆藏

日期分布

学科分类号

  • 310,053 篇 工学
    • 223,427 篇 计算机科学与技术...
    • 149,140 篇 软件工程
    • 52,233 篇 电气工程
    • 44,712 篇 信息与通信工程
    • 32,248 篇 控制科学与工程
    • 27,672 篇 电子科学与技术(可...
    • 20,455 篇 机械工程
    • 16,395 篇 材料科学与工程(可...
    • 15,165 篇 化学工程与技术
    • 14,400 篇 生物工程
    • 12,469 篇 动力工程及工程热...
    • 12,088 篇 仪器科学与技术
    • 11,099 篇 生物医学工程(可授...
    • 10,725 篇 光学工程
    • 10,373 篇 力学(可授工学、理...
    • 10,031 篇 土木工程
    • 8,032 篇 建筑学
    • 6,641 篇 交通运输工程
    • 6,489 篇 安全科学与工程
  • 131,381 篇 理学
    • 65,408 篇 数学
    • 41,665 篇 物理学
    • 20,393 篇 生物学
    • 16,933 篇 化学
    • 14,237 篇 统计学(可授理学、...
    • 11,072 篇 系统科学
  • 59,351 篇 管理学
    • 40,395 篇 管理科学与工程(可...
    • 20,958 篇 图书情报与档案管...
    • 17,066 篇 工商管理
  • 16,719 篇 医学
    • 12,167 篇 临床医学
    • 8,267 篇 基础医学(可授医学...
  • 7,476 篇 法学
  • 6,863 篇 教育学
  • 6,333 篇 经济学
  • 5,753 篇 农学
  • 1,693 篇 文学
  • 887 篇 军事学
  • 646 篇 艺术学
  • 147 篇 哲学
  • 95 篇 历史学

主题

  • 27,545 篇 computer science
  • 19,620 篇 application soft...
  • 14,962 篇 software
  • 10,769 篇 computational mo...
  • 10,187 篇 software enginee...
  • 10,152 篇 computer archite...
  • 9,648 篇 hardware
  • 6,407 篇 costs
  • 6,387 篇 parallel process...
  • 6,230 篇 feature extracti...
  • 5,724 篇 testing
  • 5,692 篇 data mining
  • 5,672 篇 deep learning
  • 5,398 篇 educational inst...
  • 5,316 篇 training
  • 5,306 篇 algorithm design...
  • 5,144 篇 protocols
  • 5,125 篇 semantics
  • 5,005 篇 machine learning
  • 4,714 篇 concurrent compu...

机构

  • 3,546 篇 nanjing univ sta...
  • 2,522 篇 shenzhen univ co...
  • 1,624 篇 state key labora...
  • 1,612 篇 university of ch...
  • 1,353 篇 nanjing univ inf...
  • 1,222 篇 college of compu...
  • 1,175 篇 tsinghua univ sc...
  • 1,081 篇 department of co...
  • 1,072 篇 univ chinese aca...
  • 976 篇 chinese acad sci...
  • 960 篇 norwegian univer...
  • 956 篇 dalian univ tech...
  • 899 篇 chinese acad sci...
  • 857 篇 univ elect sci &...
  • 750 篇 shandong univ sc...
  • 740 篇 school of softwa...
  • 711 篇 school of inform...
  • 711 篇 beihang univ sta...
  • 678 篇 university of sc...
  • 647 篇 school of comput...

作者

  • 663 篇 wang wei
  • 468 篇 wang lei
  • 410 篇 liu yang
  • 387 篇 zhang lei
  • 327 篇 li li
  • 320 篇 yang yang
  • 280 篇 liu jie
  • 273 篇 wang hao
  • 269 篇 liu wei
  • 254 篇 zhang wei
  • 213 篇 chen chen
  • 212 篇 li bo
  • 210 篇 wang jian
  • 205 篇 gao yang
  • 204 篇 shen linlin
  • 199 篇 yin baocai
  • 193 篇 wang tao
  • 184 篇 wang qing
  • 179 篇 leung victor c. ...
  • 175 篇 li yang

语言

  • 460,646 篇 英文
  • 14,664 篇 其他
  • 6,867 篇 中文
  • 860 篇 日文
  • 293 篇 德文
  • 80 篇 法文
  • 65 篇 俄文
  • 59 篇 朝鲜文
  • 45 篇 西班牙文
  • 20 篇 葡萄牙文
  • 15 篇 意大利文
  • 10 篇 荷兰文
  • 10 篇 土耳其文
  • 8 篇 阿拉伯文
  • 8 篇 斯洛文尼亚文
  • 6 篇 乌克兰文
  • 1 篇 拉托维亚文(列托)
  • 1 篇 波兰文
检索条件"机构=(Laboratory of Parallel Software and Computational Science)"
483663 条 记 录,以下是731-740 订阅
排序:
Pattern Shifting or Knowledge Losing? A Forgetting Perspective for Understanding the Effect of Instruction Fine-Tuning  23rd
Pattern Shifting or Knowledge Losing? A Forgetting Perspect...
收藏 引用
23rd China National Conference on computational Linguistics, CCL 2024
作者: Zhang, Chunkang Cao, Boxi Lu, Yaojie Lin, Hongyu Cao, Liu Zeng, Ke Wan, Guanglu Cai, Xunliang Han, Xianpei Sun, Le Chinese Information Processing Laboratory Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Meituan Beijing China
Instruction Fine-Tuning (IFT) emerges as an essential step of training large language models to robustly carry out tasks of interest. However, there lacks a systematic investigation about the underlying mechanisms of ... 详细信息
来源: 评论
Benchmarking Hallucination in Large Language Models based on Unanswerable Math Word Problem  30
Benchmarking Hallucination in Large Language Models based on...
收藏 引用
Joint 30th International Conference on computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Sun, Yuhong Yin, Zhangyue Guo, Qipeng Wu, Jiawen Qiu, Xipeng Zhao, Hui Software Engineering Institute East China Normal University China School of Computer Science Fudan University China Shanghai AI Laboratory China Shanghai Key Laboratory of Trustworthy Computing Shanghai China
Large language models (LLMs) are highly effective in various natural language processing (NLP) tasks. However, they are susceptible to producing unreliable conjectures in ambiguous contexts called hallucination. This ... 详细信息
来源: 评论
机器学习方法及应用:光电半导体材料计算设计
收藏 引用
science China Materials 2024年 第4期67卷 1042-1081页
作者: 杨晓雨 周琨 贺欣 张立军 State Key Laboratory of Integrated Optoelectronics Key Laboratory of Automobile Materials of MOEKey Laboratory of Material Simulation Methods&Software of MOEand School of Materials Science and EngineeringJilin UniversityChangchun 130012China
高通量计算与材料数据库推动了数据驱动的机器学习方法的发展.机器学习已经成为材料计算研究的重要方法,在分析材料数据、加速材料计算、预测材料性质、推进新材料发现、筛选和设计等方面展现出极大的潜力.众多与材料计算相交叉的机器... 详细信息
来源: 评论
ONNXPruner: ONNX-Based General Model Pruning Adapter
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 第7期47卷 5806-5817页
作者: Ren, Dongdong Li, Wenbin Ding, Tianyu Wang, Lei Fan, Qi Huo, Jing Pan, Hongbing Gao, Yang Nanjing University School of Electronic Science and Engineering China Nanjing University State Key Laboratory for Novel Software Technology School of Intelligence Science and Technology China Microsoft Corporation Applied Sciences Group RedmondWA98052 United States University of Wollongong School of Computing and Information Technology NSW2522 Australia
Recent advancements in model pruning have focused on developing new algorithms and improving upon benchmarks. However, the practical application of these algorithms across various models and platforms remains a signif... 详细信息
来源: 评论
CLIP-Flow:Decoding images encoded in CLIP space
收藏 引用
computational Visual Media 2024年 第6期10卷 1157-1168页
作者: Hao Ma Ming Li Jingyuan Yang Or Patashnik Dani Lischinski Daniel Cohen-Or Hui Huang Visual Computing Research Center College of Computer Science and Software EngineeringShenzhen UniversityShenzhen 518060China Department of Computer Science Tel Aviv UniversityTel Aviv 6997801Israel School of Computer Science and Engineering the Hebrew University of JerusalemJerusalem 91904Israel
This study introduces CLIP-Flow,a novel network for generating images from a given image or *** effectively utilize the rich semantics contained in both modalities,we designed a semantics-guided methodology for image-... 详细信息
来源: 评论
Beating Posits at Their Own Game: Takum Arithmetic  5th
Beating Posits at Their Own Game: Takum Arithmetic
收藏 引用
5th International Conference for Next Generation Arithmetic
作者: Hunhold, Laslo Univ Cologne Parallel & Distributed Syst Grp Cologne Germany
Recent evaluations have highlighted the tapered posit number format as a promising alternative to the uniform precision IEEE 754 floating-point numbers, which suffer from various deficiencies. Although the posit encod... 详细信息
来源: 评论
IIN-FFD:Intra-Inter Network for Face Forgery Detection
收藏 引用
Tsinghua science and Technology 2024年 第6期29卷 1839-1850页
作者: Qihua Zhou Zhili Zhou Zhipeng Bao Weina Niu Yuling Liu School of Software Nanjing University of Information Science and TechnologyNanjing 210044China Institute of Artificial Intelligence Guangzhou UniversityGuangzhou 510006China School of Computer Science University of Electronic Science and Technology of ChinaChengdu 611731SichuanChina School of Computer Science Hunan UniversityChangsha 410082HunanChina
Since different kinds of face forgeries leave similar forgery traces in videos,learning the common features from different kinds of forged faces would achieve promising generalization ability of forgery ***,to accurat... 详细信息
来源: 评论
SWPFOPLD: A Profiling and Optimizing Loader for SW26010Pro Processors  8
SWPFOPLD: A Profiling and Optimizing Loader for SW26010Pro P...
收藏 引用
8th International Conference on Computer and Communication Systems, ICCCS 2023
作者: Qian, Hong Wu, Wei Zhu, Qi Wang, Fei Zhao, Jinwei Zheng, Yan School of Computer Science and Technology University of Science and Technology of China Hefei China Jiangnan Institute of Computing Technology System Software Research Department Wuxi China Tsinghua University Department of Computer Science and Technology Beijing China National Research Center of Parallel Computer Engineering and Technology Beijing China
The Sunway family supercomputers have achieved a series of remarkable achievements. However, the toolchains provided by them are not perfect, which has brought great challenges to the development of high-performance a... 详细信息
来源: 评论
Event-Driven Attention Network:A Cross-Modal Framework for Efficient Image-Text Retrieval in Mass Gathering Events
收藏 引用
Computers, Materials & Continua 2025年 第5期83卷 3277-3301页
作者: Kamil Yasen Heyan Jin Sijie Yang Li Zhan Xuyang Zhang Ke Qin Ye Li School of Computer Science and Engineering University of Electronic Science and Technology of ChinaChengdu611731China School of Information and Software Engineering University of Electronic Science and Technology ofChinaChengdu611731China Kashi Institute of Electronics and Information Industry Kashi844508China
Research on mass gathering events is critical for ensuring public security and maintaining social ***,most of the existing works focus on crowd behavior analysis areas such as anomaly detection and crowd counting,and ... 详细信息
来源: 评论
Dissect Black Box: Interpreting for Rule-Based Explanations in Unsupervised Anomaly Detection  38
Dissect Black Box: Interpreting for Rule-Based Explanations ...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhang, Yu Li, Ruoyu Wu, Nengwu Li, Qing Lin, Xinhan Hu, Yang Li, Tao Jiang, Yong Shanghai Artificial Intelligence Laboratory China Peng Cheng Laboratory China College of Computer Science and Software Engineering Shenzhen University China Tsinghua University China Tsinghua Shenzhen International Graduate School China Hunan University of Science and Technology China
In high-stakes sectors such as network security, IoT security, accurately distinguishing between normal and anomalous data is critical due to the significant implications for operational success and safety in decision...
来源: 评论