咨询与建议

限定检索结果

文献类型

  • 319 篇 期刊文献
  • 278 篇 会议
  • 8 册 图书

馆藏范围

  • 605 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 365 篇 工学
    • 259 篇 计算机科学与技术...
    • 206 篇 软件工程
    • 63 篇 信息与通信工程
    • 51 篇 电气工程
    • 42 篇 生物工程
    • 41 篇 光学工程
    • 40 篇 生物医学工程(可授...
    • 38 篇 控制科学与工程
    • 29 篇 电子科学与技术(可...
    • 21 篇 机械工程
    • 15 篇 化学工程与技术
    • 14 篇 动力工程及工程热...
    • 10 篇 安全科学与工程
    • 9 篇 建筑学
  • 208 篇 理学
    • 85 篇 数学
    • 61 篇 物理学
    • 56 篇 生物学
    • 32 篇 统计学(可授理学、...
    • 21 篇 系统科学
    • 17 篇 化学
  • 90 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 29 篇 工商管理
  • 51 篇 医学
    • 45 篇 临床医学
    • 35 篇 基础医学(可授医学...
    • 22 篇 药学(可授医学、理...
    • 12 篇 公共卫生与预防医...
  • 19 篇 农学
    • 12 篇 作物学
  • 15 篇 法学
    • 10 篇 社会学
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 7 篇 教育学
  • 2 篇 文学
  • 2 篇 军事学
  • 1 篇 艺术学

主题

  • 32 篇 laboratories
  • 24 篇 hardware
  • 16 篇 deep learning
  • 16 篇 circuit testing
  • 14 篇 computational mo...
  • 14 篇 circuit faults
  • 13 篇 application soft...
  • 13 篇 semantics
  • 12 篇 machine learning
  • 12 篇 distributed comp...
  • 10 篇 fault tolerance
  • 10 篇 computer archite...
  • 10 篇 fault detection
  • 9 篇 costs
  • 9 篇 feature extracti...
  • 9 篇 system testing
  • 9 篇 testing
  • 8 篇 runtime
  • 8 篇 very large scale...
  • 8 篇 contracts

机构

  • 18 篇 university of ch...
  • 16 篇 national frontie...
  • 11 篇 beijing advanced...
  • 9 篇 center for relia...
  • 8 篇 state key labora...
  • 7 篇 computer science...
  • 7 篇 school of artifi...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 6 篇 centre for medic...
  • 6 篇 institute for qu...
  • 6 篇 the state key la...
  • 6 篇 national water a...
  • 5 篇 national researc...
  • 5 篇 guangxi colleges...
  • 5 篇 research institu...
  • 5 篇 school of comput...
  • 5 篇 state key labora...
  • 5 篇 school of artifi...
  • 5 篇 center for high ...

作者

  • 16 篇 e.j. mccluskey
  • 15 篇 ismail leila
  • 14 篇 lu bao-liang
  • 12 篇 zhao hai
  • 11 篇 w.h. sanders
  • 10 篇 yang jinzhu
  • 10 篇 materwala huned
  • 8 篇 bakas spyridon
  • 8 篇 wang changwei
  • 8 篇 xu rongtao
  • 7 篇 cao peng
  • 7 篇 yu hu
  • 7 篇 xu shibiao
  • 6 篇 mckee sally a.
  • 6 篇 hai zhao
  • 6 篇 guo li
  • 6 篇 kofler florian
  • 6 篇 liu jiang
  • 6 篇 menze bjoern
  • 6 篇 sanders william ...

语言

  • 542 篇 英文
  • 61 篇 其他
  • 2 篇 中文
检索条件"机构=Center For Reliable Computing Computer Systems Laboratory"
605 条 记 录,以下是271-280 订阅
排序:
MemNetAR: Memory Network with Adversative Relation for Target-Level Sentiment Classification
MemNetAR: Memory Network with Adversative Relation for Targe...
收藏 引用
2019 IEEE Global Communications Conference (GLOBECOM)
作者: Yiwei Gao Jianwei Niu Xuefeng Liu Kaili Mao Shui Yu State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University Beijing China Beijing Advanced Innovation Center for Big Data and Brain Computing (BDBC) Beihang University Hangzhou Innovation Research Institute Beihang University School of Computer Science and Cyber Engineering Guangzhou University Guangdong China
Target-level sentiment classification aims to identify the sentiment of multiple targets in a sentence. Although existing approaches based on neural network have achieved good performance in this task, we find that ma... 详细信息
来源: 评论
Design and Implementation of RFID based Smart Shopping Booth
Design and Implementation of RFID based Smart Shopping Booth
收藏 引用
International Conference on Information Science and Control Engineering (ICISCE)
作者: Ehtisham Lodhi Fenghua Zhu Zeeshan Lodhi Qasim Saleem Gang Xiong FeiYue Wang The State Key Laboratory for Management and Control of Complex Systems Chinese Academy of Sciences Beijing China Department of Electrical and Computer Engineering COMSATS University Islamabad Pakistan School of Automation Science and Electrical Engineering Beihang University Beijing China The Cloud Computing Center Chinese Academy of Sciences Dongguan China Beijing Engineering Research Center of Intelligent Systems and Technology Chinese Academy of Sciences Beijing China
In this modern era, technology has advanced to such an extent to make our daily life more proficient and convenient. This paper presents the design and implementation of vending machine (VM) for students, which operat...
来源: 评论
Security analysis oriented physical components modeling in quantum key distribution  1
收藏 引用
1st International Symposium on Mobile Internet Security, MobiSec 2016
作者: Mao, Xilong Li, Yan Peng, Yan Zhao, Baokang College of Computer National University of Defense Technology Changsha410073 China Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems Guilin University of Electronic Technology Guilin541004 China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin541004 China
Quantum Key Distribution (QKD), based on fundamental principles of quantum mechanics, plays an irreplaceable role in national defense, financial and government affairs. Security analysis of QKD system is of great impo... 详细信息
来源: 评论
Roadmap on Data-Centric Materials Science
arXiv
收藏 引用
arXiv 2024年
作者: Bauer, Stefan Benner, Peter Bereau, Tristan Blum, Volker Boley, Mario Carbogno, Christian Catlow, C.A. Richard Dehm, Gerhard Eibl, Sebastian Ernstorfer, Ralph Fekete, Ádám Foppa, Lucas Fratzl, Peter Freysoldt, Christoph Gault, Baptiste Ghiringhelli, Luca M. Giri, Sajal K. Gladyshev, Anton Goyal, Pawan Hattrick-Simpers, Jason Kabalan, Lara Karpov, Petr Khorrami, Mohammad S. Koch, Christoph Kokott, Sebastian Kosch, Thomas Kowalec, Igor Kremer, Kurt Leitherer, Andreas Li, Yue Liebscher, Christian H. Logsdail, Andrew J. Lu, Zhongwei Luong, Felix Marek, Andreas Merz, Florian Mianroodi, Jaber R. Neugebauer, Jörg Pei, Zongrui Purcell, Thomas A.R. Raabe, Dierk Rampp, Markus Rossi, Mariana Rost, Jan-Michael Saal, James Saalmann, Ulf Sasidhar, Kasturi Narasimha Saxena, Alaukik Sbailò, Luigi Scheidgen, Markus Schloz, Marcel Schmidt, Daniel F. Teshuva, Simon Trunschke, Annette Wei, Ye Weikum, Gerhard Xian, R. Patrick Yao, Yi Yin, Junqi Zhao, Meng Scheffler, Matthias School of Computation Information and Technology Technical University of Munich & Helmholtz AI Munich Germany Max Planck Institute for Dynamics of Complex Technical Systems Magdeburg Germany Institute for Theoretical Physics Heidelberg University Heidelberg Germany Thomas Lord Department of Mechanical Engineering and Materials Science Duke University DurhamNC United States Monash University Department of Data Science and AI Melbourne Australia The NOMAD Laboratory The FHI of the Max-Planck-Gesellschaft IRIS-Adlershof of the Humboldt-Universität zu Berlin Berlin Germany School of Chemistry Cardiff University Cardiff United Kingdom Max-Planck-Institut für Eisenforschung GmbH Düsseldorf Germany Max Planck Computing and Data Facility Garching Germany Institute for Optics and Atomic Physics Technical University of Berlin Berlin Germany Physics Department and IRIS-Adlershof Humboldt Universität zu Berlin Berlin Germany Max Planck Institute of Colloids and Interfaces Potsdam Germany Department of Materials Imperial College London United Kingdom Department of Materials Science and Engineering Friedrich-Alexander Universität Erlangen-Nürnberg Germany Department of Chemistry Northwestern University Illinois United States Humboldt-Universität zu Berlin Department of Physics Berlin Germany Department of Materials Science and Engineering University of Toronto Toronto Canada STFC Hartree Centre Daresbury Laboratory Daresbury Warrington United Kingdom Molecular Simulations from First Principles e.V. Berlin Germany Humboldt-Universität zu Berlin Department of Computer Science Berlin Germany Max Planck Institute for Polymer Research Mainz Germany ICFO-Institut de Ciencies Fotoniques The Barcelona Institute of Science and Technology Castelldefels Barcelona Spain Lenovo HPC Innovation Center Stuttgart Germany New York University New York United States University of Arizona Biochemistry Department Arizona United States Max Planck Institute for the Structure an
Science is and always has been based on data, but the terms ‘data-centric’ and the ‘4th paradigm’ of materials research indicate a radical change in how information is retrieved, handled and research is performed.... 详细信息
来源: 评论
Common Limitations of Image Processing Metrics: A Picture Story
arXiv
收藏 引用
arXiv 2021年
作者: Reinke, Annika Tizabi, Minu D. Sudre, Carole H. Eisenmann, Matthias Rädsch, Tim Baumgartner, Michael Acion, Laura Antonelli, Michela Arbel, Tal Bakas, Spyridon Bankhead, Peter Benis, Arriel Blaschko, Matthew Buettner, Florian Cardoso, M. Jorge Chen, Jianxu Cheplygina, Veronika Christodoulou, Evangelia Cimini, Beth A. Collins, Gary S. Engelhardt, Sandy Farahani, Keyvan Ferrer, Luciana Galdran, Adrian van Ginneken, Bram Glocker, Ben Godau, Patrick Haase, Robert Hamprecht, Fred Hashimoto, Daniel A. Heckmann-Nötzel, Doreen Hirsch, Peter Hoffman, Michael M. Huisman, Merel Isensee, Fabian Jannin, Pierre Kahn, Charles E. Kainmueller, Dagmar Kainz, Bernhard Karargyris, Alexandros Karthikesalingam, Alan Kavur, A. Emre Kenngott, Hannes Kleesiek, Jens Kleppe, Andreas Koehler, Sven Kofler, Florian Kopp-Schneider, Annette Kooi, Thijs Kozubek, Michal Kreshuk, Anna Kurc, Tahsin Landman, Bennett A. Litjens, Geert Madani, Amin Maier-Hein, Klaus Martel, Anne L. Mattson, Peter Meijering, Erik Menze, Bjoern Moher, David Moons, Karel G.M. Müller, Henning Nichyporuk, Brennan Nickel, Felix Noyan, M. Alican Petersen, Jens Polat, Gorkem Rafelski, Susanne M. Rajpoot, Nasir Reyes, Mauricio Rieke, Nicola Riegler, Michael A. Rivaz, Hassan Saez-Rodriguez, Julio Sánchez, Clara I. Schroeter, Julien Saha, Anindo Selver, M. Alper Sharan, Lalith Shetty, Shravya Smeden, Maarten V.A.N. Stieltjes, Bram Summers, Ronald M. Taha, Abdel A. Tiulpin, Aleksei Tsaftaris, Sotirios A. Calster, Ben V.A.N. Varoquaux, Gaël Wiesenfarth, Manuel Yaniv, Ziv R. Jäger, Paul Maier-Hein, Lena Division of Intelligent Medical Systems and HI Helmholtz Imaging Heidelberg Germany Faculty of Mathematics and Computer Science Heidelberg University Heidelberg Germany Division of Intelligent Medical Systems Heidelberg Germany NCT Heidelberg DKFZ University Medical Center Heidelberg Germany MRC Unit for Lifelong Health and Ageing UCL Centre for Medical Image Computing Department of Computer Science University College London London United Kingdom School of Biomedical Engineering and Imaging Science King’s College London London United Kingdom Division of Medical Image Computing Heidelberg Germany Instituto de Cálculo CONICET – Universidad de Buenos Aires Buenos Aires Argentina Centre for Medical Image Computing University College London London United Kingdom McGill University Montréal Canada Division of Computational Pathology Dept of Pathology & Laboratory Medicine Indiana University School of Medicine IU Health Information and Translational Sciences Building Indianapolis United States University of Pennsylvania Richards Medical Research Laboratories FL7 PhiladelphiaPA United States Institute of Genetics and Cancer University of Edinburgh Edinburgh United Kingdom Department of Digital Medical Technologies Holon Institute of Technology Holon Israel European Federation for Medical Informatics Le Mont-sur-Lausanne Switzerland Center for Processing Speech and Images Department of Electrical Engineering KU Leuven Kasteelpark Arenberg 10 - box 2441 Leuven3001 Belgium Frankfurt/Mainz DKFZ UCT Frankfurt-Marburg Germany Heidelberg Germany Goethe University Frankfurt Department of Medicine Germany Goethe University Frankfurt Department of Informatics Germany Frankfurt Cancer Insititute Germany Leibniz-Institut für Analytische Wissenschaften – ISAS – e.V. Dortmund Germany Department of Computer Science IT University of Copenhagen Copenhagen Denmark Imaging Platform Broad Institute of MIT and Harvard CambridgeMA United States Centre for St
While the importance of automatic image analysis is continuously increasing, recent meta-research revealed major flaws with respect to algorithm validation. Performance metrics are particularly key for meaningful, obj... 详细信息
来源: 评论
A New Approach for Face Anti-Spoofing Using Handcrafted and Deep Network Features
A New Approach for Face Anti-Spoofing Using Handcrafted and ...
收藏 引用
IEEE International Conference on Service Operations and Logistics, and Informatics, SOLI
作者: Polash Kumar Das Bin Hu Chang Liu Kaixin Cui Prabhat Ranjan Gang Xiong School of Electronic and Information Engineering South China University of Technology Guangzhou China The State Key Laboratory for Management and Control of Complex Systems Institute of Automation Chinese Academy of Science Beijing China College of Computer Science Sichuan University Chengdu China Beijing Engineering Research Center of Intelligent Systems and Technology Institute of Automation Chinese Academy of Sciences Beijing China The Cloud Computing Center Chinese Academy of Science Dongguan China
In biometrics, face recognition methods are achieving momentum with recent progress in the computer vision(CV). Face recognition is widely used in the identification of an individual's identity. Unfortunately, in ... 详细信息
来源: 评论
Word2Cluster: A New Multi-Label Text Clustering Algorithm with an Adaptive Clusters Number
Word2Cluster: A New Multi-Label Text Clustering Algorithm wi...
收藏 引用
2019 IEEE Global Communications Conference (GLOBECOM)
作者: Kaili Mao Jianwei Niu Xuefeng Liu Shui Yu Longbo Zhao State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University Beijing China Beijing Advanced Innovation Center for Big Data and Brain Computing (BDBC) Beihang University Hangzhou Innovation Research Institute Beihang University School of Computer Science and Cyber Engineering Guangzhou University Guangdong China China aerospace science and industry corporation China
Text clustering has been widely used in many Natural Language Processing (NLP) applications such as text summarization and news recommendation. However, most of the current algorithms need to predefine a clustering nu... 详细信息
来源: 评论
A New Construction Method of Regeneration Tree for Single Node Fault Repair Mechanism in Distributed Storage System
A New Construction Method of Regeneration Tree for Single No...
收藏 引用
International Conference on Computational Intelligence and Security
作者: Wei Guo Yong Wang Miao Ye School of Computer Science and Information Security Guilin University of Electronic Technoloay Guilin Guangxi China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin Guangxi China Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems Guilin University of Electronic Technology Guilin Guangxi China School of Information and Communication Guilin University of Electronic Technology Guilin Guangxi China
Comparing with the classic redundancy policy of multi-replica technology, Erasure code is preferred due to its higher utilization rate of storage space in distributed storage system. As one kind of the important Erasu... 详细信息
来源: 评论
Correction to: Type 2 Diabetes with Artificial Intelligence Machine Learning: Methods and Evaluation
收藏 引用
Archives of Computational Methods in Engineering 2021年 第7期28卷 5039-5039页
作者: Ismail, Leila Materwala, Huned Tayefi, Maryam Ngo, Phuong Karduck, Achim P. Intelligent Distributed Computing and Systems Research Laboratory Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University Al Ain Abu Dhabi United Arab Emirates National Water and Energy Center United Arab Emirates University Al Ain Abu Dhabi United Arab Emirates Norwegian Centre for E-Health Research Tromsø Norway Faculty of Informatics Furtwangen University Furtwangen Germany
来源: 评论
Network Traffic Outlier Detection Based on Full Convolutional Network
Network Traffic Outlier Detection Based on Full Convolutiona...
收藏 引用
International Conference on Computational Intelligence and Security
作者: Jingrong Mo Yong Wang Miao Ye School of Computer Science and Information Security Guilin University of Electronic Technology Guilin Guangxi China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin Guangxi China Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems Guilin University of Electronic Technology Guilin Guangxi China School of Information and Communication Guilin University of Electronic Technology Guilin Guangxi China
Network traffic flow can be represented as time series. Outliers of these time series is important for the computer network security. The existing methods for the time series anomaly detection mainly operate on the en... 详细信息
来源: 评论