咨询与建议

限定检索结果

文献类型

  • 491 篇 期刊文献
  • 416 篇 会议

馆藏范围

  • 907 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 603 篇 工学
    • 451 篇 计算机科学与技术...
    • 369 篇 软件工程
    • 166 篇 信息与通信工程
    • 81 篇 生物工程
    • 72 篇 电气工程
    • 67 篇 控制科学与工程
    • 56 篇 电子科学与技术(可...
    • 45 篇 光学工程
    • 40 篇 生物医学工程(可授...
    • 33 篇 化学工程与技术
    • 27 篇 机械工程
    • 24 篇 仪器科学与技术
    • 19 篇 交通运输工程
    • 15 篇 网络空间安全
    • 14 篇 航空宇航科学与技...
  • 366 篇 理学
    • 181 篇 数学
    • 109 篇 物理学
    • 91 篇 生物学
    • 63 篇 统计学(可授理学、...
    • 35 篇 化学
    • 29 篇 系统科学
    • 19 篇 地球物理学
  • 194 篇 管理学
    • 117 篇 图书情报与档案管...
    • 85 篇 管理科学与工程(可...
    • 25 篇 工商管理
  • 47 篇 医学
    • 38 篇 临床医学
    • 33 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
    • 14 篇 公共卫生与预防医...
  • 27 篇 法学
    • 22 篇 社会学
  • 10 篇 经济学
  • 9 篇 文学
  • 7 篇 农学
  • 5 篇 教育学

主题

  • 42 篇 semantics
  • 32 篇 training
  • 30 篇 feature extracti...
  • 29 篇 deep learning
  • 19 篇 knowledge graph
  • 19 篇 computational mo...
  • 17 篇 generative adver...
  • 16 篇 machine learning
  • 16 篇 information retr...
  • 15 篇 conferences
  • 15 篇 data models
  • 14 篇 data mining
  • 14 篇 graph neural net...
  • 14 篇 federated learni...
  • 12 篇 neural networks
  • 12 篇 privacy
  • 11 篇 convolution
  • 11 篇 accuracy
  • 11 篇 forecasting
  • 10 篇 big data

机构

  • 169 篇 university of ch...
  • 80 篇 cas key lab of n...
  • 62 篇 cas key laborato...
  • 43 篇 school of comput...
  • 33 篇 key laboratory o...
  • 31 篇 shandong provinc...
  • 26 篇 institute of com...
  • 21 篇 peng cheng labor...
  • 18 篇 data intelligenc...
  • 17 篇 school of cyber ...
  • 16 篇 institute of com...
  • 15 篇 beijing key labo...
  • 15 篇 key laboratory o...
  • 15 篇 cas key laborato...
  • 14 篇 cas center for e...
  • 14 篇 key laboratory o...
  • 13 篇 gansu provincial...
  • 12 篇 institute of art...
  • 12 篇 chongqing key la...
  • 12 篇 institute for ai...

作者

  • 151 篇 cheng xueqi
  • 108 篇 guo jiafeng
  • 48 篇 lan yanyan
  • 42 篇 shen huawei
  • 34 篇 jin xiaolong
  • 34 篇 fan yixing
  • 30 篇 pang liang
  • 28 篇 zhang ruqing
  • 22 篇 xu jun
  • 22 篇 cao qi
  • 21 篇 huang qingming
  • 20 篇 bai long
  • 19 篇 li zixuan
  • 19 篇 guan saiping
  • 18 篇 xu qianqian
  • 16 篇 xueqi cheng
  • 14 篇 sun xiaoming
  • 12 篇 niyato dusit
  • 11 篇 hu bin
  • 11 篇 yang zhiyong

语言

  • 844 篇 英文
  • 54 篇 其他
  • 15 篇 中文
检索条件"机构=CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology"
907 条 记 录,以下是701-710 订阅
排序:
Priority-Based Optimization of I/O Isolation for Hybrid Deployed Services  15th
Priority-Based Optimization of I/O Isolation for Hybrid Depl...
收藏 引用
15th EAI International Conference on Collaborative computing: networking, Applications and Worksharing, CollaborateCom 2019
作者: Zhang, Jiancheng Li, Youhuizi Zhou, Li Ren, Zujie Wan, Jian Wang, Yuan Key Laboratory of Complex Systems Modeling and Simulation Ministry of Education Hangzhou Dianzi University Hangzhou China School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China Zhejiang Lab Hangzhou China School of Information and Electronic Engineering Zhejiang University of Science and Technology Hangzhou China Key Enterprise Research Institute of NetEase Big Data of Zhejiang Province Netease Hangzhou Network Co.Ltd Hangzhou China
With the increasing of software complexity and user demands, collaborative service is becoming more and more popular. Each service focuses on its own specialty, their cooperation can support complicated task with high... 详细信息
来源: 评论
Temporal Knowledge Propagation for Image-to-Video Person Re-Identification
Temporal Knowledge Propagation for Image-to-Video Person Re-...
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Xinqian Gu Bingpeng Ma Hong Chang Shiguang Shan Xilin Chen Key Laboratory of Intelligent Information Processing of Chinese Academy of Sciences (CAS) Institute of Computing Technology CAS Beijing China University of Chinese Academy of Sciences Beijing China CAS Center for Excellence in Brain Science and Intelligence Technology Shanghai China
In many scenarios of Person Re-identification (Re-ID), the gallery set consists of lots of surveillance videos and the query is just an image, thus Re-ID has to be conducted between image and videos. Compared with vid... 详细信息
来源: 评论
RhythmNet: End-to-end Heart Rate Estimation from Face via Spatial-temporal Representation
arXiv
收藏 引用
arXiv 2019年
作者: Niu, Xuesong Shan, Shiguang Han, Hu Chen, Xilin Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China University of Chinese Academy of Sciences Beijing100049 China Institute of Computing Technology CAS Beijing100190 China Peng Cheng Laboratory Shenzhen China Institute of Computing Technology CAS Beijing100190 China University of Chinese Academy of Sciences Beijing100049 China CAS Center for Excellence in Brain Science and Intelligence Technology
Heart rate (HR) is an important physiological signal that reflects the physical and emotional status of a person. Traditional HR measurements usually rely on contact monitors, which may cause inconvenience and discomf... 详细信息
来源: 评论
Learning from context: a mutual reinforcement model for Chinese microblog opinion retrieval
收藏 引用
Frontiers of Computer science 2018年 第4期12卷 714-724页
作者: Jingjing WEI Xiangwen LIAO Houdong ZHENG Guolong CHEN Xueqi CHENG College of Mathematics and Computer Science Fuzhou University Fuzhou 350108 China College of Electronics and Information Science Fujian Jiangxia University Fuzhou 350108 China Fujian Provincial Key Laboratory of Network Computing and Intelligence Processing Fuzhou University Fuzhou 350108 China Institute of Computing Technology Chinese Academic of Sciences Beijing 100190 China
This study addresses the problem of Chinese microblog opinion retrieval, which aims to retrieve opinionated Chinese microblog posts relevant to a target specified by a user query. Existing studies have shown that lexi... 详细信息
来源: 评论
A novel decision tree for depression recognition in speech
arXiv
收藏 引用
arXiv 2020年
作者: Liu, Zhenyu Wang, Dongyu Zhang, Lan Hu, Bin Gansu Provincial Key Laboratory of Wearable Computing School of Information Science and Engineering Lanzhou University Lanzhou China CAS Center for Excellence in Brain Science and Intelligence Technology Shanghai Institutes for Biological Sciences Chinese Academy of Sciences Shanghai China Joint Research Center for Cognitive Neurosensor Technology of Lanzhou University Institute of Semiconductors Chinese Academy of Sciences Beijing China Lanzhou University Second Hospital Lanzhou China
Depression is a common mental disorder worldwide which causes a range of serious outcomes. The diagnosis of depression relies on patient-reported scales and psychiatrist’s interview which may lead to subjective bias.... 详细信息
来源: 评论
A quantum-inspired classical algorithm for separable non-negative matrix factorization
arXiv
收藏 引用
arXiv 2019年
作者: Chen, Zhihuai Li, Yinan Sun, Xiaoming Yuan, Pei Zhang, Jialin CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China University of Chinese Academy of Sciences Beijing100049 China Centrum Wiskunde & Informatica and QuSoft Science Park 123 Amsterdam1098XG Netherlands
Non-negative Matrix Factorization (NMF) asks to decompose a (entry-wise) non-negative matrix into the product of two smaller-sized nonnegative matrices, which has been shown intractable in general. In order to overcom... 详细信息
来源: 评论
Graph based Tensor Recovery for Accurate Internet Anomaly Detection
Graph based Tensor Recovery for Accurate Internet Anomaly De...
收藏 引用
2018 IEEE Conference on Computer Communications, INFOCOM 2018
作者: Xie, Kun Li, Xiaocan Wang, Xin Xie, Gaogang Wen, Jigang Zhang, Dafang College of Computer Science and Electronics Engineering Hunan University China CAS Key Lab of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China Department of Electrical and Computer Engineering State University of New York at Stony Brook United States Institute of Computing Technology Chinese Academy of Sciences China
Detecting anomalous traffic is a crucial task of managing networks. Many anomaly detection algorithms have been proposed recently. However, constrained by their matrix-based traffic data model, existing algorithms oft... 详细信息
来源: 评论
Overview of AI and Communication for 6G network: Fundamentals, Challenges, and Future Research Opportunities
arXiv
收藏 引用
arXiv 2024年
作者: Cui, Qimei You, Xiaohu Ni, Wei Nan, Guoshun Zhang, Xuefei Zhang, Jianhua Lyu, Xinchen Ai, Ming Tao, Xiaofeng Feng, Zhiyong Zhang, Ping Wu, Qingqing Tao, Meixia Huang, Yongming Huang, Chongwen Liu, Guangyi Peng, Chenghui Pan, Zhiwen Sun, Tao Niyato, Dusit Chen, Tao Khan, Muhammad Khurram Jamalipour, Abbas Guizani, Mohsen Yuen, Chau National Engineering Research Center of Mobile Network Technologies Beijing University of Posts and Telecommunications Beijing100876 China Department of Broadband Communication Peng Cheng Laboratory Shenzhen518055 China National Mobile Communications Research Laboratory Southeast University Nanjing210096 China Fudan University Shanghai200433 China School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China CICT Mobile Communication Technology Co. Ltd. Beijing100020 China Department of Electronic Engineering Shanghai Jiao Tong University Shanghai200240 China Shanghai Jiao Tong University Shanghai200240 China College of Information Science and Electronic Engineering Zhejiang University Hangzhou310058 China China Mobile Research Institute Beijing100053 China Huawei Technologies Shanghai201206 China College of Computing and Data Science Nanyang Technological University Singapore117583 Singapore VTT Technical Research Centre of Finland Ltd. EspooFI-02044 VTT Finland Center of Excellence in Information Assurance King Saud University Riyadh11362 Saudi Arabia School of Electrical and Information Engineering University of Sydney NSW2006 Australia Abu Dhabi United Arab Emirates School of Electrical and Electronics Engineering Nanyang Technological University Singapore639798 Singapore
With the growing demand for seamless connectivity and intelligent communication, the integration of artificial intelligence (AI) and sixth-generation (6G) communication networks has emerged as a transformative paradig... 详细信息
来源: 评论
iSplit LBI: Individualized partial ranking with ties via split LBI
arXiv
收藏 引用
arXiv 2019年
作者: Xu, Qianqian Sun, Xinwei Yang, Zhiyong Cao, Xiaochun Huang, Qingming Yao, Yuan Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS Microsoft Research Asia State Key Laboratory of Information Security Institute of Information Engineering CAS School of Cyber Security University of Chinese Academy of Sciences School of Computer Science and Tech. University of Chinese Academy of Sciences Key Laboratory of Big Data Mining and Knowledge Management CAS Peng Cheng Laboratory Department of Mathematics Hong Kong University of Science and Technology Hong Kong
Due to the inherent uncertainty of data, the problem of predicting partial ranking from pairwise comparison data with ties has attracted increasing interest in recent years. However, in real-world scenarios, different... 详细信息
来源: 评论
A Hole Repairing Method Based on Slicing  12th
A Hole Repairing Method Based on Slicing
收藏 引用
12th International Conference on e-Learning and Games, Edutainment 2018
作者: Zhao, Yanni Wang, Yinghui Wang, Ningna Ning, Xiaojuan Shi, Zhenghao Zhao, Minghua Lv, Ke Huang, Liangyi Institute of Computer Science and Engineering Xi’an University of Technology Xi’an China Shaanxi Key Laboratory of Network Computing and Security Technology Xi’an China Department of Computer Science Shannxi Vocational and Technical College Xi’an China Booking B.V. Herengracht 597 Amsterdam1017 CE Netherlands Institute of Automation Chinese Academy of Sciences Beijing China School of Engineering and Applied Science George Washington University Washington D.C. United States
The repairing of 3D point cloud holes has an important meaning to ensure the integrity of cloud data. We present a slice-based repairing method for 3D point cloud in this paper. Firstly, the model is horizontal sliced... 详细信息
来源: 评论