咨询与建议

限定检索结果

文献类型

  • 838 篇 期刊文献
  • 513 篇 会议
  • 4 册 图书

馆藏范围

  • 1,355 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 958 篇 工学
    • 587 篇 计算机科学与技术...
    • 458 篇 软件工程
    • 222 篇 信息与通信工程
    • 138 篇 电气工程
    • 132 篇 控制科学与工程
    • 125 篇 电子科学与技术(可...
    • 81 篇 机械工程
    • 80 篇 光学工程
    • 68 篇 生物工程
    • 56 篇 仪器科学与技术
    • 56 篇 动力工程及工程热...
    • 52 篇 生物医学工程(可授...
    • 47 篇 交通运输工程
    • 40 篇 材料科学与工程(可...
    • 36 篇 化学工程与技术
    • 33 篇 土木工程
    • 26 篇 航空宇航科学与技...
  • 538 篇 理学
    • 295 篇 数学
    • 151 篇 物理学
    • 100 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 57 篇 系统科学
    • 37 篇 化学
  • 279 篇 管理学
    • 164 篇 管理科学与工程(可...
    • 120 篇 图书情报与档案管...
    • 62 篇 工商管理
  • 66 篇 医学
    • 57 篇 临床医学
    • 42 篇 基础医学(可授医学...
    • 26 篇 药学(可授医学、理...
  • 35 篇 法学
    • 29 篇 社会学
  • 23 篇 经济学
  • 16 篇 农学
  • 5 篇 军事学
  • 4 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 35 篇 data mining
  • 33 篇 computer science
  • 33 篇 laboratories
  • 22 篇 multimedia syste...
  • 20 篇 information syst...
  • 20 篇 feature extracti...
  • 20 篇 clustering algor...
  • 19 篇 deep learning
  • 17 篇 bandwidth
  • 16 篇 optimization
  • 15 篇 semantics
  • 15 篇 protocols
  • 13 篇 complex networks
  • 13 篇 machine learning
  • 12 篇 resource managem...
  • 12 篇 quality of servi...
  • 11 篇 application soft...
  • 11 篇 real time system...
  • 11 篇 neural networks
  • 11 篇 wireless sensor ...

机构

  • 59 篇 college of infor...
  • 41 篇 the key laborato...
  • 37 篇 school of inform...
  • 27 篇 department of co...
  • 22 篇 department of el...
  • 22 篇 distributed mult...
  • 20 篇 key laboratory f...
  • 18 篇 department of el...
  • 17 篇 distributed mult...
  • 15 篇 university of ch...
  • 15 篇 national enginee...
  • 14 篇 key laboratory f...
  • 13 篇 department of el...
  • 13 篇 school of comput...
  • 11 篇 department of au...
  • 11 篇 key laboratory o...
  • 11 篇 department of co...
  • 10 篇 college of compu...
  • 10 篇 the key laborato...
  • 10 篇 college of infor...

作者

  • 43 篇 ren jiadong
  • 24 篇 mei-ling shyu
  • 24 篇 shu-ching chen
  • 19 篇 chen shu-ching
  • 19 篇 yang yang
  • 18 篇 niyato dusit
  • 18 篇 shyu mei-ling
  • 16 篇 han zhu
  • 16 篇 dong jun
  • 14 篇 huang guoyan
  • 14 篇 chen mingzhe
  • 13 篇 guo jingfeng
  • 13 篇 he yulan
  • 13 篇 zhou deyu
  • 13 篇 liu yongshan
  • 12 篇 kang li
  • 12 篇 yunhao liu
  • 12 篇 ai bo
  • 10 篇 he haitao
  • 9 篇 wu hongfei

语言

  • 1,235 篇 英文
  • 77 篇 其他
  • 44 篇 中文
检索条件"机构=Advanced System Integration Laboratory Department of Computer Science and Information Engineering"
1355 条 记 录,以下是121-130 订阅
排序:
SCOPE: Optimizing Key-Value Cache Compression in Long-context Generation
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Jialong Wang, Zhenglin Zhang, Linhai Lai, Yilong He, Yulan Zhou, Deyu School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China Department of Informatics King’s College London United Kingdom The Alan Turing Institute United Kingdom
Key-Value (KV) cache has become a bottleneck of LLMs for long-context generation. Despite the numerous efforts in this area, the optimization for the decoding phase is generally ignored. However, we believe such optim... 详细信息
来源: 评论
Causal Prompting: Debiasing Large Language Model Prompting based on Front-Door Adjustment
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Congzhi Zhang, Linhai Wu, Jialong He, Yulan Zhou, Deyu School of Computer Science and Engineering Key Laboratory of Computer Network and Information Integration Ministry of Education Southeast University China Department of Informatics King’s College London United Kingdom The Alan Turing Institute United Kingdom
Despite the notable advancements of existing prompting methods, such as In-Context Learning and Chain-of-Thought for Large Language Models (LLMs), they still face challenges related to various biases. Traditional debi... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed system Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
BAT: Mining Binary-API Topic for Multi-service Application Development
BAT: Mining Binary-API Topic for Multi-service Application D...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Pengfei He Linlin Liu Dianlong You Limin Shen Zhen Chen School of Information Science and Engineering Yanshan University Qinhuangdao China National Science Libraries Chinese Academy of Sciences Beijing China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
With the growing popularity of API-driven multiservice application (mashup) development, the burgeoning web APIs have left developers drowning in the sea of web API selections. Matching developers with the most approp...
来源: 评论
Continual Reinforcement Learning for Digital Twin Synchronization Optimization
arXiv
收藏 引用
arXiv 2025年
作者: Tong, Haonan Chen, Mingzhe Zhao, Jun Hu, Ye Yang, Zhaohui Liu, Yuchen Yin, Changchuan The Beijing Key Laboratory of Network System Architecture and Convergence The Beijing Advanced Information Network Laboratory Beijing University of Posts and Telecommunications Beijing China Singapore The Department of Electrical and Computer Engineering Frost Institute for Data Science and Computing University of Miami Coral GablesFL33146 United States The Department of Industrial and Systems Engineering University of Miami Coral GablesFL33146 United States The College of Information Science and Electronic Engineering Zhejiang University Zhejiang Hangzhou310027 China The Department of Computer Science North Carolina State University RaleighNC27695 United States The Beijing Key Laboratory of Network System Architecture and Convergence China The Beijing Advanced Information Network Laboratory Beijing University of Posts and Telecommunications Beijing100876 China
This article investigates the adaptive resource allocation scheme for digital twin (DT) synchronization optimization over dynamic wireless networks. In our considered model, a base station (BS) continuously collects f... 详细信息
来源: 评论
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-Preserving Talking Face Synthesis
arXiv
收藏 引用
arXiv 2024年
作者: Deng, Kaijun Zheng, Dezhi Xie, Jindong Wang, Jinbao Xie, Weicheng Shen, Linlin Song, Siyang Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China Department of Computer Science University of Exeter United Kingdom
Accurately synthesizing talking face videos and capturing fine facial features for individuals with long hair presents a significant challenge. To tackle these challenges in existing methods, we propose a decomposed p... 详细信息
来源: 评论
Short-term multi-step-ahead sector-based traffic flow prediction based on the attention-enhanced graph convolutional LSTM network (AGC-LSTM)
收藏 引用
Neural Computing and Applications 2024年 1-20页
作者: Zhang, Ying Xu, Shimin Zhang, Linghui Jiang, Weiwei Alam, Sameer Xue, Dabin College of General Aviation and Flight Nanjing University of Aeronautics and Astronautics Nanjing China State Key Laboratory of Air Traffic Management System Nanjing China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Air Traffic Management Research Institute School of Mechanical & ampAerospace Engineering Nanyang Technological University Singapore Singapore Department of Land Surveying and Geo-Informatics The Hong Kong Polytechnic University Hong Kong
Accurate sector-based air traffic flow predictions are essential for ensuring the safety and efficiency of the air traffic management (ATM) system. However, due to the inherent spatial and temporal dependencies of air... 详细信息
来源: 评论
Candidate Evaluation with Multimodal Data-Driven for Recruitment  27th
Candidate Evaluation with Multimodal Data-Driven for Recru...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Wu, Xing Liu, Kehong Wang, Jianjia Yao, Junfeng Deng, Bin Lv, Rongqi Song, Jun School of Computer Engineering and Science Shanghai University Shanghai200444 China Shanghai Institute for Advanced Communication and Data Science Shanghai University Shanghai200444 China School of AI and Advanced Computing XJTLU Entrepreneur College Xi’an Jiaotong-Liverpool University Suzhou215412 China CSSC Seago System Technology Co. Ltd. Shanghai200010 China Science and Technology on Near-Surface Detection Laboratory Jangsu Wuxi214035 China Department of Geography Hong Kong Baptist University 999077 Hong Kong
In the field of intelligent recruitment, automated resume matching and non-contact interviews have significantly improved the efficiency of companies in finding suitable candidates. This corresponds to the techniques ... 详细信息
来源: 评论
Streamflow Prediction in the Mekong River Basin Using Deep Neural Networks
收藏 引用
IEEE Access 2023年 11卷 97930-97943页
作者: Nguyen, Thi-Thu-Ha Vu, Duc-Quang Mai, Son T. Dang, Thanh Duc National Taiwan University Department of Bioenvironmental Systems Engineering Taipei10617 Taiwan National Central University Department of Computer Science and Information System Taoyuan320317 Taiwan Thai Nguyen University of Education Thai Nguyen250000 Viet Nam Queen's University Belfast School of Electronics Electrical Engineering and Computer Science BelfastBT7 1NN United Kingdom Institute for Computational Science and Artificial Intelligence Van Lang University Laboratory of Environmental Sciences and Climate Change Ho Chi Minh City70000 Viet Nam Van Lang University Faculty of Environment Ho Chi Minh City70000 Viet Nam
In recent years, the Mekong River Basin (MRB), one of the largest river basins in Southeast Asia, has experienced severe impacts from extreme droughts and floods. Streamflow forecasting has become crucial for effectiv... 详细信息
来源: 评论
Enhancing Security in OpenID Connect Single Sign-On (SSO) systems: A Comprehensive Vulnerability Analysis and Mitigation Approach  4
Enhancing Security in OpenID Connect Single Sign-On (SSO) Sy...
收藏 引用
4th International Conference on Distributed Sensing and Intelligent systems, ICDSIS 2023
作者: Al-Shabi, Mohamed Bennour, Akram Al-Sarem, Mahamed Khalaf, Osama Ibrahim Sikder, Rajesh Algburi, Sameer Department of management Information system Taibah University Medina Saudi Arabia "LAMIS" Laboratory Echahid Chikh Larbi Tebessi University Tebessa Algeria College of Computer Science and Engineering Taibah University Medina Saudi Arabia Al-Nahrain University Jadriya Baghdad Iraq Information Technology University of the Cumberlands United States Al-Kitab University College of Engineering Techniques Kirkuk Iraq
Single Sign-On (SSO) systems have become popular for simplifying the login process by allowing users to authenticate with a single identity provider (IDP). However, the widespread use of these systems raises concerns ... 详细信息
来源: 评论