咨询与建议

限定检索结果

文献类型

  • 671 篇 期刊文献
  • 579 篇 会议

馆藏范围

  • 1,250 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 768 篇 工学
    • 518 篇 计算机科学与技术...
    • 433 篇 软件工程
    • 173 篇 信息与通信工程
    • 134 篇 生物工程
    • 92 篇 电气工程
    • 86 篇 控制科学与工程
    • 83 篇 电子科学与技术(可...
    • 75 篇 光学工程
    • 66 篇 生物医学工程(可授...
    • 44 篇 化学工程与技术
    • 43 篇 机械工程
    • 36 篇 仪器科学与技术
    • 27 篇 动力工程及工程热...
    • 23 篇 材料科学与工程(可...
    • 23 篇 土木工程
    • 22 篇 建筑学
  • 563 篇 理学
    • 275 篇 数学
    • 179 篇 物理学
    • 151 篇 生物学
    • 92 篇 统计学(可授理学、...
    • 47 篇 化学
    • 46 篇 地球物理学
    • 42 篇 系统科学
  • 208 篇 管理学
    • 111 篇 图书情报与档案管...
    • 105 篇 管理科学与工程(可...
    • 37 篇 工商管理
  • 58 篇 医学
    • 44 篇 临床医学
    • 42 篇 基础医学(可授医学...
    • 28 篇 药学(可授医学、理...
  • 27 篇 法学
    • 27 篇 社会学
  • 12 篇 农学
  • 10 篇 经济学
  • 6 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 43 篇 feature extracti...
  • 37 篇 deep learning
  • 35 篇 training
  • 33 篇 computational mo...
  • 32 篇 semantics
  • 28 篇 predictive model...
  • 28 篇 machine learning
  • 28 篇 data models
  • 27 篇 accuracy
  • 16 篇 cosmology
  • 16 篇 adaptation model...
  • 15 篇 reinforcement le...
  • 15 篇 convolution
  • 15 篇 artificial intel...
  • 15 篇 forecasting
  • 14 篇 analytical model...
  • 13 篇 deep neural netw...
  • 13 篇 task analysis
  • 13 篇 big data
  • 13 篇 data mining

机构

  • 62 篇 national enginee...
  • 53 篇 university of ch...
  • 53 篇 beijing advanced...
  • 40 篇 shenzhen researc...
  • 33 篇 chongqing key la...
  • 32 篇 institute of com...
  • 23 篇 peng cheng labor...
  • 22 篇 college of compu...
  • 21 篇 school of cyber ...
  • 19 篇 shenyang institu...
  • 19 篇 icsc - centro na...
  • 19 篇 ifpu institute f...
  • 18 篇 national enginee...
  • 18 篇 shenzhen institu...
  • 18 篇 school of data s...
  • 17 篇 institute of inf...
  • 17 篇 center for data ...
  • 16 篇 school of comput...
  • 16 篇 secure computing...
  • 16 篇 beijing advanced...

作者

  • 30 篇 shen linlin
  • 24 篇 huang qingming
  • 20 篇 xu qianqian
  • 19 篇 zhao weisheng
  • 17 篇 wu baoyuan
  • 15 篇 yang zhiyong
  • 15 篇 weisheng zhao
  • 14 篇 cao xiaochun
  • 14 篇 liu ya-feng
  • 14 篇 linlin shen
  • 12 篇 shang mingsheng
  • 12 篇 xin luo
  • 12 篇 li zhen
  • 12 篇 xu yong
  • 12 篇 li haizhou
  • 12 篇 jin hai
  • 11 篇 li yang
  • 11 篇 nurain ibrahim
  • 11 篇 trotta roberto
  • 11 篇 li qian

语言

  • 1,161 篇 英文
  • 79 篇 其他
  • 19 篇 中文
检索条件"机构=Big Data and Computing Institute"
1250 条 记 录,以下是161-170 订阅
排序:
Dynamic Formation Tracking of Multi-agent Systems with Bounded Unknown Leader Input  5th
Dynamic Formation Tracking of Multi-agent Systems with Bou...
收藏 引用
5th Chinese Conference on Swarm Intelligence and Cooperative Control, CCSICC 2021
作者: Su, Piaoyi Dong, Xiwang Zhao, Qin Li, Qingdong Ren, Zhang School of Automation Science and Electronic Engineering Science and Technology on Aircraft Control Laboratory Beihang University Beijing100191 China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100191 China Beijing Institute of Control and Electronics Technology Beijing100038 China
This literature investigate the dynamic formation tracking problem of multiple Lagrange systems with linear nonautonomous leader over directed topology. In order to estimate the leader system, a distributed control sc... 详细信息
来源: 评论
Question-Answer Cross Language Image Matching for Weakly Supervised Semantic Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Deng, Songhe Zhuo, Wei Xie, Jinheng Shen, Linlin Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China
Class Activation Map (CAM) has emerged as a popular tool for weakly supervised semantic segmentation (WSSS), allowing the localization of object regions in an image using only image-level labels. However, existing CAM... 详细信息
来源: 评论
Biogas Fermentation Monitoring Research Based on Borderline-SMOTE Algorithm and Stacking Ensemble Learning  13
Biogas Fermentation Monitoring Research Based on Borderline-...
收藏 引用
13th International Conference of Information and Communication Technology, ICTech 2024
作者: Xiu, Pengfei Fu, Lijun Sun, Yukun Wang, Hongliang Li, Xuerao Shenyang Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Liaoning Province Human-Computer Interaction System Engineering Research Center Based on Digital Twin Shenyang China Shandong University Big Data Technology and Cognitive Intelligence Laboratory University of Chinese Academy of Sciences Shenyang China Shenyang Institute of Computing Technology Chinese Academy of Sciences Liaoning Province Human-Computer Interaction System Engineering Research Center Based on Digital Twin Shenyang China
Anaerobic fermentation is the most important link to gas production, this paper solves the current problem with the help of the current complete machine learning technology, combining perception and intelligent proces... 详细信息
来源: 评论
SD-MVS: Segmentation-Driven Deformation Multi-View Stereo with Spherical Refinement and EM optimization
arXiv
收藏 引用
arXiv 2024年
作者: Yuan, Zhenlong Cao, Jiakai Li, Zhaoxin Jiang, Hao Wang, Zhaoqi Institute of Computing Technology Chinese Academy of Sciences China Agricultural Information Institute Chinese Academy of Agricultural Sciences China Key Laboratory of Agricultural Big Data Ministry of Agriculture and Rural Affairs China
In this paper, we introduce Segmentation-Driven Deformation Multi-View Stereo (SD-MVS), a method that can effectively tackle challenges in 3D reconstruction of textureless areas. We are the first to adopt the Segment ... 详细信息
来源: 评论
Co-training partial domain adaptation networks for industrial Fault Diagnosis
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Gecheng Luo, Chengwen Li, Jianqiang Chen, Xinkai The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China The Department of Electronic Information Systems Shibaura Institute of Technology Saitama337-8570 Japan
The partial domain adaptation (PDA) challenge is a prevalent issue in industrial fault diagnosis. Current PDA approaches primarily rely on adversarial learning for domain adaptation and use reweighting strategies to e... 详细信息
来源: 评论
Research on intelligent penetration mechanism of netgap data based on database adaptive matching  3
Research on intelligent penetration mechanism of netgap data...
收藏 引用
3rd International Conference on Electronic Information Engineering, big data, and Computer Technology, EIBDCT 2024
作者: Wu, Rutao Xu, Zhiwei Liu, Xuyang Liu, Wenjing Liu, Limin School of Data Science and Application Inner Mongolia University of Technology Huhehaote010000 China Inner Mongolia Autonomous Reg. Software Eng. Serv. Eng. Technology Research Center Based on Big Data Huhehaote010000 China Inner Mongolia Autonomous Region Product Quality Inspection and Research Institute Huhehaote010070 China Haihe Laboratory of Information Technology Application Innovation Tianjin300450 China Institute of Computing Technology of the Chinese Academy of Sciences Beijing100080 China
The purpose of data penetration is to achieve timely exchange of data information while ensuring the security of network isolation environment. The current research mainly focuses on protecting data privacy and develo... 详细信息
来源: 评论
SCC-YOLO: An Improved Object Detector for Assisting in Brain Tumor Diagnosis
arXiv
收藏 引用
arXiv 2025年
作者: Bai, Runci Xu, Guibao Shi, Yanze Institute of Cloud Computing and Big Data China Academy of Information and Communications Technology Beijing100080 China School of Information and Control Engineering China University of Mining and Technology Xuzhou221000 China
Brain tumors can lead to neurological dysfunction, cognitive and psychological changes, increased intracranial pressure, and seizures, posing significant risks to health. The You Only Look Once (YOLO) series has shown... 详细信息
来源: 评论
A Review of Multimedia Video Services Based on Serverless Cloud computing
A Review of Multimedia Video Services Based on Serverless Cl...
收藏 引用
IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB)
作者: Yue Su Liu Sang Weibo Zhao Wei Li Changqing Yuan Cloud Computing & Big Data Research Institute China Academy of Information and Communications Technology Beijing China Academy of Telecommunications Technology Beijing China
Cloud computing technology has achieved rapid growth in recent years. Serverless cloud computing has been applied in more and more scenarios due to its pay-as-you-go, event-driven, and flexible features. This article ...
来源: 评论
Enhanced Semantic Head for Cascade Instance Segmentation
Enhanced Semantic Head for Cascade Instance Segmentation
收藏 引用
2022 IEEE International Conference on Multimedia and Expo, ICME 2022
作者: Huang, Xuerong Su, Li Li, Guorong Zhang, Xinfeng Qing, Laiyun Huang, Qingming University of Chinese Academy of Sciences Beijing China Cas Key Lab of Big Data Mining and Knowledge Management Beijing China Institute of Computing Technology Cas Key Lab of Intelligent Information Processing Beijing China
Recently, cascade instance segmentation inspired by cascade object detection has achieved notable performance. Due to the lack of global information, many methods suffer from incomplete segmentation such as missing ed... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed System Security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论