咨询与建议

限定检索结果

文献类型

  • 200 篇 期刊文献
  • 172 篇 会议

馆藏范围

  • 372 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 250 篇 工学
    • 207 篇 计算机科学与技术...
    • 179 篇 软件工程
    • 54 篇 信息与通信工程
    • 35 篇 生物工程
    • 18 篇 控制科学与工程
    • 11 篇 电子科学与技术(可...
    • 11 篇 化学工程与技术
    • 10 篇 光学工程
    • 10 篇 电气工程
    • 7 篇 交通运输工程
    • 7 篇 网络空间安全
    • 6 篇 生物医学工程(可授...
    • 5 篇 机械工程
    • 4 篇 安全科学与工程
  • 133 篇 理学
    • 77 篇 数学
    • 36 篇 生物学
    • 27 篇 统计学(可授理学、...
    • 26 篇 物理学
    • 10 篇 化学
    • 9 篇 系统科学
  • 105 篇 管理学
    • 81 篇 图书情报与档案管...
    • 26 篇 管理科学与工程(可...
    • 11 篇 工商管理
  • 12 篇 法学
    • 10 篇 社会学
  • 6 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 3 篇 文学
    • 3 篇 中国语言文学

主题

  • 19 篇 semantics
  • 13 篇 deep learning
  • 11 篇 knowledge graph
  • 11 篇 graph neural net...
  • 10 篇 information retr...
  • 9 篇 convolution
  • 8 篇 generative adver...
  • 8 篇 forecasting
  • 8 篇 training
  • 7 篇 machine learning
  • 6 篇 learning systems
  • 6 篇 computational mo...
  • 6 篇 feature extracti...
  • 5 篇 conferences
  • 5 篇 deep neural netw...
  • 5 篇 signal encoding
  • 5 篇 computational li...
  • 5 篇 natural language...
  • 4 篇 surveys
  • 4 篇 computer archite...

机构

  • 128 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 63 篇 cas key laborato...
  • 23 篇 school of comput...
  • 17 篇 data intelligenc...
  • 12 篇 institute for ai...
  • 11 篇 institute of com...
  • 10 篇 key lab. of inte...
  • 10 篇 state key lab of...
  • 9 篇 school of comput...
  • 9 篇 key laboratory o...
  • 7 篇 key lab of intel...
  • 7 篇 peng cheng labor...
  • 7 篇 school of cyber ...
  • 6 篇 data intelligenc...
  • 6 篇 semiconductor ne...
  • 6 篇 alibaba group
  • 5 篇 data intelligenc...
  • 5 篇 institute of inf...
  • 5 篇 key laboratory o...

作者

  • 134 篇 cheng xueqi
  • 103 篇 guo jiafeng
  • 48 篇 lan yanyan
  • 40 篇 shen huawei
  • 35 篇 fan yixing
  • 30 篇 pang liang
  • 28 篇 jin xiaolong
  • 28 篇 zhang ruqing
  • 22 篇 cao qi
  • 18 篇 xu jun
  • 17 篇 guan saiping
  • 17 篇 bai long
  • 16 篇 li zixuan
  • 13 篇 xueqi cheng
  • 13 篇 sun xiaoming
  • 10 篇 hou liang
  • 9 篇 huang qingming
  • 9 篇 huang junjie
  • 9 篇 chen wei
  • 8 篇 liu shenghua

语言

  • 353 篇 英文
  • 17 篇 其他
  • 2 篇 中文
检索条件"机构=CAS Key Lab of Network Data Science and Technology Institute of Computing Technology"
372 条 记 录,以下是121-130 订阅
排序:
UAV-Assisted Covert data Collection: When Remote Monitoring Meets Covert Communication  9
UAV-Assisted Covert Data Collection: When Remote Monitoring ...
收藏 引用
9th International Conference on Computer and Communications, ICCC 2023
作者: Su, Huasheng Xu, Xiaodong Zhao, Jing Zhou, Jiaxi University of Science and Technology of China Key Lab. of WOC-CAS Anhui Hefei China Institute of Space Integrated Ground Network Anhui Hefei China
Unmanned aerial vehicle (UAV) assisted remote monitoring and data collection are prevailing applications thanks to its deployment flexibility and strong mobility. To meet security and privacy requirements, this work i... 详细信息
来源: 评论
ReCoSa: Detecting the relevant contexts with self-attention for multi-turn dialogue generation
arXiv
收藏 引用
arXiv 2019年
作者: Zhang, Hainan Y., Lan L., Pang J., Guo X., Cheng CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Beijing China
In multi-turn dialogue generation, response is usually related with only a few contexts. Therefore, an ideal model should be able to detect these relevant contexts and produce a suitable response accordingly. However,... 详细信息
来源: 评论
GERE: Generative Evidence Retrieval for Fact Verification
arXiv
收藏 引用
arXiv 2022年
作者: Chen, Jiangui Zhang, Ruqing Guo, Jiafeng Fan, Yixing Cheng, Xueqi CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Beijing China
Fact verification (FV) is a challenging task which aims to verify a claim using multiple evidential sentences from trustworthy corpora, e.g., Wikipedia. Most existing approaches follow a three-step pipeline framework,... 详细信息
来源: 评论
On layer normalization in the transformer architecture  37
On layer normalization in the transformer architecture
收藏 引用
37th International Conference on Machine Learning, ICML 2020
作者: Xiong, Ruibin Yang, Yunchang He, Di Zheng, Kai Zheng, Shuxin Xing, Chen Zhang, Huishuai Lan, Yanyan Wang, Liwei Liu, Tie-Yan CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technolog Chinese Academy of Sciences China University of Chinese Academy of Sciences China Center for Data Science Peking University Beijing Institute of Big Data Research China Key Laboratory of Machine Perception MOE School of EECS Peking University China Microsoft Research College of Computer Science Nankai University China
The Transformer is widely used in natural language processing tasks. To train a Transformer however, one usually needs a carefully designed learning rate warm-up stage, which is shown to be crucial to the final perfor... 详细信息
来源: 评论
Influence maximization with ε-almost submodular threshold functions  17
Influence maximization with ε-almost submodular threshold f...
收藏 引用
Proceedings of the 31st International Conference on Neural Information Processing Systems
作者: Qiang Li Wei Chen Xiaoming Sun Jialin Zhang CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences and University of Chinese Academy of Sciences Microsoft Research
Influence maximization is the problem of selecting k nodes in a social network to maximize their influence spread. The problem has been extensively studied but most works focus on the submodular influence diffusion mo...
来源: 评论
Blind separation of noncooperative paired carrier multiple access signals based on improved quantum-inspired evolutionary algorithm and receding horizon optimization
Blind separation of noncooperative paired carrier multiple a...
收藏 引用
作者: Deng, Qi Zhang, Shanshan Chen, Gang Lu, Huaxiang Lab of Artificial Networks Institute of Semiconductors CAS Beijing China University of Chinese Academy of Sciences Beijing China CAS Center for Excellence in Brain Science and Intelligence Technology Chinese Academy of Sciences Beijing China Beijing Key Laboratory of Semiconductor Neural Network Intelligent Sensing and Computing Technology Beijing China
The single-channel blind source separation of paired carrier multiple access (PCMA) signal is a key technology in satellite communications. Due to the high-order complexity of existing separation methods and the uncer... 详细信息
来源: 评论
Beyond low-frequency information in graph convolutional networks
arXiv
收藏 引用
arXiv 2021年
作者: Bo, Deyu Wang, Xiao Shi, Chuan Shen, Huawei Beijing University of Posts and Telecommunications China CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing China
Graph neural networks (GNNs) have been proven to be effective in various network-related tasks. Most existing GNNs usually exploit the low-frequency signals of node features, which gives rise to one fundamental questi... 详细信息
来源: 评论
EagleMine: Vision-guided mining in large graphs
arXiv
收藏 引用
arXiv 2017年
作者: Feng, Wenjie Liu, Shenghua Faloutsos, Christos Hooi, Bryan Shen, Huawei Cheng, Xueqi Cas Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences School of Computer Science Carnegie Mellon University
Given a graph with millions of nodes, what patterns exist in the distributions of node characteristics, and how can we detect them and separate anomalous nodes in a way similar to human vision? In this paper, we propo... 详细信息
来源: 评论
A Novel Multi-Edge Cooperative Offloading Genetic Algorithm towards Environmental Monitoring System  5
A Novel Multi-Edge Cooperative Offloading Genetic Algorithm ...
收藏 引用
5th International Conference on Telecommunications and Communication Engineering, ICTCE 2022
作者: Fang, Jie Li, Wenzao Wang, Yue Sun, Xiulan College of Communication Engineering Chengdu University of Information Technology China Network and Data Security Key Lab of Sichuan Pro. University of Electronic Science and Technology of China China Institute of Data Application Research Educational Informalization and Big Data Center China
In environmental monitor architecture, the usual way of processing data is centralized. On the one hand, this leads to a long time of data processing, and with the increasing number of monitoring sensors, the pressure... 详细信息
来源: 评论
DFS-NER: Description Enhanced Few-shot NER via Prompt Learning and Meta-Learning
DFS-NER: Description Enhanced Few-shot NER via Prompt Learni...
收藏 引用
2022 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent technology (WI-IAT)
作者: Huinan Huang Yuming Feng Xiaolong Jin Saiping Guan Jiafeng Guo School of Computer Science and Technology University of Chinese Academy of Sciences CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences
Named Entity Recognition (NER) is a very common task in many social good related domains. Recently, deep learning based NER has gradually matured, but still faces the scarcity problem of labeled data in specific domai... 详细信息
来源: 评论