咨询与建议

限定检索结果

文献类型

  • 686 篇 期刊文献
  • 602 篇 会议

馆藏范围

  • 1,288 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 807 篇 工学
    • 548 篇 计算机科学与技术...
    • 445 篇 软件工程
    • 179 篇 信息与通信工程
    • 139 篇 生物工程
    • 101 篇 控制科学与工程
    • 100 篇 电气工程
    • 86 篇 电子科学与技术(可...
    • 77 篇 光学工程
    • 71 篇 生物医学工程(可授...
    • 45 篇 化学工程与技术
    • 43 篇 机械工程
    • 36 篇 仪器科学与技术
    • 28 篇 动力工程及工程热...
    • 24 篇 土木工程
    • 23 篇 材料科学与工程(可...
    • 23 篇 建筑学
  • 577 篇 理学
    • 281 篇 数学
    • 183 篇 物理学
    • 153 篇 生物学
    • 93 篇 统计学(可授理学、...
    • 51 篇 化学
    • 47 篇 地球物理学
    • 42 篇 系统科学
  • 213 篇 管理学
    • 113 篇 图书情报与档案管...
    • 108 篇 管理科学与工程(可...
    • 39 篇 工商管理
  • 62 篇 医学
    • 48 篇 临床医学
    • 42 篇 基础医学(可授医学...
    • 28 篇 药学(可授医学、理...
  • 29 篇 法学
    • 28 篇 社会学
  • 12 篇 农学
  • 10 篇 经济学
  • 6 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 45 篇 feature extracti...
  • 40 篇 deep learning
  • 35 篇 training
  • 34 篇 computational mo...
  • 32 篇 semantics
  • 28 篇 predictive model...
  • 28 篇 machine learning
  • 28 篇 accuracy
  • 28 篇 data models
  • 16 篇 reinforcement le...
  • 16 篇 convolution
  • 16 篇 cosmology
  • 16 篇 adaptation model...
  • 15 篇 artificial intel...
  • 15 篇 forecasting
  • 14 篇 analytical model...
  • 13 篇 deep neural netw...
  • 13 篇 task analysis
  • 13 篇 big data
  • 13 篇 data mining

机构

  • 67 篇 national enginee...
  • 55 篇 university of ch...
  • 53 篇 beijing advanced...
  • 40 篇 shenzhen researc...
  • 34 篇 chongqing key la...
  • 34 篇 institute of com...
  • 24 篇 peng cheng labor...
  • 23 篇 college of compu...
  • 21 篇 school of cyber ...
  • 20 篇 center for data ...
  • 19 篇 shenyang institu...
  • 19 篇 icsc - centro na...
  • 19 篇 national enginee...
  • 18 篇 shenzhen institu...
  • 18 篇 school of data s...
  • 18 篇 ifpu institute f...
  • 17 篇 school of comput...
  • 17 篇 institute of inf...
  • 16 篇 secure computing...
  • 16 篇 guangdong provin...

作者

  • 33 篇 shen linlin
  • 25 篇 huang qingming
  • 21 篇 xu qianqian
  • 19 篇 zhao weisheng
  • 17 篇 wu baoyuan
  • 16 篇 yang zhiyong
  • 15 篇 weisheng zhao
  • 14 篇 cao xiaochun
  • 14 篇 liu ya-feng
  • 14 篇 linlin shen
  • 12 篇 shang mingsheng
  • 12 篇 xin luo
  • 12 篇 li zhen
  • 12 篇 xu yong
  • 12 篇 li haizhou
  • 12 篇 jin hai
  • 11 篇 li yang
  • 11 篇 nurain ibrahim
  • 11 篇 trotta roberto
  • 11 篇 li qian

语言

  • 1,136 篇 英文
  • 141 篇 其他
  • 19 篇 中文
检索条件"机构=Big Data and Computing Institute"
1288 条 记 录,以下是731-740 订阅
排序:
Loophole-free test of macroscopic realism via high-order correlations of measurement
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Ping Chen, Chong Liao, Hao Vorobyov, Vadim V. Wrachtrup, Jörg Liu, Ren-Bao College of Education for the Future Beijing Normal University Zhuhai519087 China Department of Physics The Chinese University of Hong Kong New Territories Shatin Hong Kong Centre for Quantum Coherence The Chinese University of Hong Kong New Territories Shatin Hong Kong The Hong Kong Institute of Quantum Information Science and Technology The Chinese University of Hong Kong New Territories Shatin Hong Kong National Engineering Laboratory on Big Data System Computing Technology Guangdong Province Engineering Center of China-made High Performance Data Computing System College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China 3rd Institute of Physics Research Center SCoPE and IQST University of Stuttgart Stuttgart70569 Germany New Cornerstone Science Laboratory The Chinese University of Hong Kong New Territories Shatin Hong Kong
Test of macroscopic realism (MR) is key to understanding the foundation of quantum mechanics. Due to the existence of the non-invasive measurability loophole and other interpretation loopholes, however, such test rema... 详细信息
来源: 评论
Adaptive Surrogate Model for Failure Probability Estimation  21
Adaptive Surrogate Model for Failure Probability Estimation
收藏 引用
5th International Conference on Computer Science and Application Engineering, CSAE 2021
作者: Qin, Yi Zhang, Yue Liu, Zexin Zhu, Xueyu Wang, Peng School of Mathematical Sciences Beihang University Haidian District Beijing China School of Integrated Circuit Science and Engineering Beihang University Haidian District Beijing China Department of Mathematics University of Utah Salt Lake CityUtah United States Scientific Computing and Imaging Institute University of Utah Salt Lake CityUtah United States Department of Mathematics University of Iowa Iowa City United States Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Haidian District Beijing China
Estimating failure probability becomes a fundamental task in many complex engineering designs and optimizations. Yet, evaluation of failure probability via direct sampling from a given system can be computationally ex... 详细信息
来源: 评论
Z16b,a natural compound from Ganoderma cochlear is a novel RyR2 stabilizer preventing catecholaminergic polymorphic ventricular tachycardia
收藏 引用
中国药理学报(英文版) 2022年 第9期43卷 2340-2350页
作者: Jiang-fan Wan Gang Wang Fu-ying Qin Dan-ling Huang Yan Wang Ai-ling Su Hai-ping Zhang Yang Liu Shao-yin Zeng Chao-liang Wei Yong-xian Cheng Jie Liu Guangdong Key Laboratory of Genome Stability and Human Disease Prevention Department of PathophysiologySchool of MedicineShenzhen UniversityShenzhen 518000China College of Physics and Optoelectronic Engineering Shenzhen UniversityShenzhen 518060China Guangdong Key Laboratory of Genome Stability and Human Disease Prevention Department of PathophysiologySchool of MedicineShenzhen UniversityShenzhen 518000China School of Pharmaceutical Sciences Shenzhen University Health Science CenterShenzhen 518000China Center for Translation Medicine Research and Development Shenzhen Institute of Advanced TechnologyChinese Academy of SciencesShenzhen 518000China Center for High Performance Computing Joint Engineering Research Center for Health Big Data Intelligent Analysis TechnologyShenzhen Institutes of Advanced TechnologyChinese Academy of SciencesShenzhen 518000China Guangdong Cardiovascular Institute Guangdong Provincial People's HospitalGuangdong Academy of Medical SciencesGuangzhou 510000China Guangdong Provincial key laboratory of South China Structure Heart Disease Department of Pediatric CardiologyGuangdong Cardiovascular InstituteGuangdong Provincial People's HospitalGuangdong Academy of Medical SciencesGuangzhou 510000China
Catecholaminergic polymorphic ventricular tachycardia(CPVT)is an inherited,lethal ventricular arrhythmia triggered by *** in genes that encode cardiac ryanodine receptor(RyR2)and proteins that regulate RyR2 activity c... 详细信息
来源: 评论
High-Frequency Stereo Matching Network
High-Frequency Stereo Matching Network
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Haoliang Zhao Huizhou Zhou Yongjun Zhang Jie Chen Yitong Yang Yong Zhao Text Computing & Cognitive Intelligence Engineering Research Center of National Education Ministry State Key Laboratory of Public Big Data College of Computer Science and Technology Institute of Artificial Intelligence Guizhou University Guiyang Guizhou China Ghost-Valley AI Technology Shenzhen Guangdong China School of Physics and Optoelectronic Engineering Guangdong University of Technology Guangzhou China The Key Laboratory of Integrated Microsystems Shenzhen Graduate School Peking University China
In the field of binocular stereo matching, remarkable progress has been made by iterative methods like RAFT-Stereo and CREStereo. However, most of these methods lose information during the iterative process, making it...
来源: 评论
Grammars and a random generator for deterministic chain regular expressions  46
Grammars and a random generator for deterministic chain regu...
收藏 引用
46th International Conference on Current Trends in Theory and Practice of Computer Science Doctoral Student Research Forum, SOFSEM-SRF 2020
作者: Chu, Xinyu Lu, Ping Chen, Haiming State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing100190 China University of Chinese Academy of Sciences China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing100191 China
Deterministic regular expressions (DREs) are a core part of XML Schema and widely used in other applications. There are context-free grammars for DREs, which are not efficient for being used and also lead to the probl... 详细信息
来源: 评论
A novel in-memory computing scheme based on toggle spin torque MRAM  20
A novel in-memory computing scheme based on toggle spin torq...
收藏 引用
30th Great Lakes Symposium on VLSI, GLSVLSI 2020
作者: Bai, Yining Zhang, Yue Wang, Jinkai Wang, Guanda Zhang, Zhizhong Zheng, Zhenyi Zhang, Kun Zhao, Weisheng Fert Beijing Institute School of Microelectronics Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University China Nanoelectronics Science and Technology Center Hefei Innovation Research Institute Beihang University Hefei China School of Electronics Engineering Beihang University Beijing China
This paper proposes a novel in-memory computing (IMC) scheme based on toggle spin torque magnetic random access memory (TST-MRAM), called TST-IMC, which makes full use of the unique TST writing mechanism. In this sche... 详细信息
来源: 评论
Federated Learning for Medical Image Classification: Advances, Challenges and Opportunities
SSRN
收藏 引用
SSRN 2023年
作者: Zhang, Xiaobo Zhao, Xiaole Wu, Yunyang Zheng, Hailong Li, Yang School of Computing and Artificial Intelligence Southwest Jiaotong University Chengdu611756 China Artificial Intelligence Research Institute Southwest Jiaotong University Chengdu611756 China National Engineering Laboratory of Integrated Transportation Big Data Application Technology Southwest Jiaotong University Chengdu611756 China Engineering Research Center of Sustainable Urban Intelligent Transportation Ministry of Education China School of Automation Science and Electrical Engineering Beihang University Beijing100191 China
Medical images are private integrations comprising private patient information owned by various hospitals and relevant research institutes, and the generated image data can be utilized to infer physical health conditi... 详细信息
来源: 评论
The 3D projection function on NetPad  15
The 3D projection function on NetPad
收藏 引用
15th International Conference on Computer Science and Education, ICCSE 2020
作者: Zhou, Qixin Li, Chuanzhong Cai, Ruiqi Li, Miaoxuan Zhang, Chuanjun Guan, Hao Guangzhou University Institute of Computing Science and Technology Guangzhou China Guangzhou University School of Computer Science and Cyber Engineering Guangzhou China Guizhou Education University School of Mathematics and Big Data Guiyang China Chinese Academy of Science Chengdu Institute of Computer Application Chengdu China
Projection of 3D geometric graphics is an introduction to solid geometry, which has indispensable functional requirements for 3D Dynamic Geometry Software. To optimize the 3D dynamic geometry software in the construct... 详细信息
来源: 评论
Cryptomania v.s. Minicrypt in a Quantum World
arXiv
收藏 引用
arXiv 2025年
作者: Li, Longcheng Li, Qian Li, Xingjian Liu, Qipeng State Key Lab of Processors Institute of Computing Technology Chinese Academy of Sciences China Shenzhen International Center For Industrial And Applied Mathematics Shenzhen Research Institute of Big Data China Tsinghua University China University of California San Diego United States
We prove that it is impossible to construct perfect-complete quantum public-key encryption (QPKE) with classical keys from quantumly secure one-way functions (OWFs) in a black-box manner, resolving a long-standing ope...
来源: 评论
A Large-scale Multiple-objective Method for Black-box Attack against Object Detection
arXiv
收藏 引用
arXiv 2022年
作者: Liang, Siyuan Li, Longkang Fan, Yanbo Jia, Xiaojun Li, Jingzhi Wu, Baoyuan Cao, Xiaochun State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Data Science Secure Computing Lab of Big Data The Chinese University of Hong Kong Shenzhen China Tencent AI Lab Shenzhen China School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University Shenzhen China
Recent studies have shown that detectors based on deep models are vulnerable to adversarial examples, even in the black-box scenario where the attacker cannot access the model information. Most existing attack methods... 详细信息
来源: 评论