咨询与建议

限定检索结果

文献类型

  • 2,169 篇 会议
  • 1,017 篇 期刊文献
  • 35 册 图书

馆藏范围

  • 3,221 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,913 篇 工学
    • 1,343 篇 计算机科学与技术...
    • 1,104 篇 软件工程
    • 490 篇 信息与通信工程
    • 300 篇 控制科学与工程
    • 231 篇 生物工程
    • 192 篇 电气工程
    • 170 篇 电子科学与技术(可...
    • 161 篇 生物医学工程(可授...
    • 135 篇 机械工程
    • 124 篇 光学工程
    • 109 篇 动力工程及工程热...
    • 102 篇 化学工程与技术
    • 101 篇 网络空间安全
    • 93 篇 核科学与技术
    • 84 篇 仪器科学与技术
    • 72 篇 土木工程
    • 65 篇 安全科学与工程
  • 1,087 篇 理学
    • 470 篇 数学
    • 391 篇 物理学
    • 255 篇 生物学
    • 149 篇 统计学(可授理学、...
    • 107 篇 系统科学
    • 98 篇 化学
  • 570 篇 管理学
    • 323 篇 管理科学与工程(可...
    • 267 篇 图书情报与档案管...
    • 146 篇 工商管理
  • 146 篇 医学
    • 117 篇 临床医学
    • 116 篇 基础医学(可授医学...
    • 72 篇 公共卫生与预防医...
  • 110 篇 法学
    • 91 篇 社会学
  • 64 篇 经济学
  • 53 篇 农学
  • 25 篇 教育学
  • 14 篇 军事学
  • 11 篇 文学
  • 8 篇 艺术学

主题

  • 143 篇 accuracy
  • 100 篇 hadron colliders
  • 96 篇 computational mo...
  • 93 篇 deep learning
  • 86 篇 feature extracti...
  • 83 篇 machine learning
  • 73 篇 training
  • 58 篇 data models
  • 58 篇 convolutional ne...
  • 56 篇 predictive model...
  • 55 篇 real-time system...
  • 54 篇 computer applica...
  • 51 篇 artificial intel...
  • 50 篇 support vector m...
  • 49 篇 semantics
  • 48 篇 internet of thin...
  • 43 篇 wireless sensor ...
  • 43 篇 security
  • 42 篇 optimization
  • 42 篇 data mining

机构

  • 133 篇 yerevan physics ...
  • 130 篇 national and kap...
  • 130 篇 centro brasileir...
  • 130 篇 istanbul technic...
  • 129 篇 irfu cea univers...
  • 128 篇 university of sp...
  • 128 篇 indian institute...
  • 127 篇 universidad iber...
  • 126 篇 brunel universit...
  • 126 篇 charles universi...
  • 125 篇 università di to...
  • 125 篇 academy of scien...
  • 125 篇 infn sezione di ...
  • 123 篇 department of ph...
  • 122 篇 infn sezione di ...
  • 122 篇 zhejiang univers...
  • 121 篇 university of de...
  • 121 篇 department of ph...
  • 120 篇 imperial college...
  • 119 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 3,051 篇 英文
  • 126 篇 其他
  • 45 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Computer Application Technology Institute"
3221 条 记 录,以下是1-10 订阅
排序:
Heap Memory Vulnerability Detection and Protection in Embedded Real-Time Operating Systems  24
Heap Memory Vulnerability Detection and Protection in Embedd...
收藏 引用
8th International Conference on Electronic Information technology and computer Engineering, EITCE 2024
作者: Zhang, Jinyuan Yao, Rui Zhang, Yang Beijing Institute of Computer Technology and Application Beijing China
In application software development, memory defects are difficult to detect. Traditional memory defect detection tools generally face issues of high performance overhead and excessive memory consumption, which limits ... 详细信息
来源: 评论
UniTrans:Unified Parameter-Efficient Transfer Learning and Multimodal Alignment for Large Multimodal Foundation Model
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 219-238页
作者: Jiakang Sun Ke Chen Xinyang He Xu Liu Ke Li Cheng Peng Chengdu Institute of Computer Application Chinese Academy of SciencesChengdu610213China School of Computer Science and Technology University of Chinese Academy of SciencesBeijing101499China
With the advancements in parameter-efficient transfer learning techniques,it has become feasible to leverage large pre-trained language models for downstream tasks under low-cost and low-resource ***,applying this tec... 详细信息
来源: 评论
Unveiling factuality and injecting knowledge for LLMs via reinforcement learning and data proportion
收藏 引用
Science China(Information Sciences) 2024年 第10期67卷 389-390页
作者: Wenjun KE Ziyu SHANG Zhizhao LUO Peng WANG Yikai GUO Qi LIU Yuxuan CHEN School of Computer Science and Engineering Southeast University Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications(Southeast University) Beijing Institute of Technology Zhuhai Beijing Institute of Computer Technology and Application
Large language models(LLMs) have demonstrated remarkable effectiveness across various natural language processing(NLP) tasks, as evidenced by recent studies [1, 2]. However, these models often produce responses that c...
来源: 评论
Research of Military Cyber Operation Forensic and Analysis in Russia-Ukraine Conflict  24
Research of Military Cyber Operation Forensic and Analysis i...
收藏 引用
24th IEEE International Conference on Software Quality, Reliability and Security Companion, QRS-C 2024
作者: Liu, Shiyu Li, Dongfang Yang, Guang Su, Mingyue Shen, Wei Beijing Institute of Computer Technology and Application Beijing China
The Russia-Ukraine conflict represents the first regional military confrontation between major (and external) powers that is thoroughly interspersed with cyber operations throughout the main military theater. In essen... 详细信息
来源: 评论
Research on the Impact of Tester's Technical and Cognitive Factors on Aerospace Software Test Quality  24
Research on the Impact of Tester's Technical and Cognitive F...
收藏 引用
24th IEEE International Conference on Software Quality, Reliability and Security Companion, QRS-C 2024
作者: Hu, Yadi Tao, Jinlong Liang, Yu Xu, Zhewei Jia, Zhangtao Beijing Institute of Computer Technology and Application Beijing China
This paper primarily analyzes the impact of tester capabilities on the quality of aerospace software testing and elaborates on how to assess tester abilities from both technical and cognitive perspectives. The researc... 详细信息
来源: 评论
A Efficient DNN Sparsity Framework with Data Pruning and Auxiliary Network  5
A Efficient DNN Sparsity Framework with Data Pruning and Aux...
收藏 引用
5th International Conference on Artificial Intelligence and computer Engineering, ICAICE 2024
作者: Guo, Enping Beijing Institute of Computer Technology and Application Beijing China
Model compression frequently leverages model pruning, an approach aimed at minimizing neural network size without compromising performance. Prior research has demonstrated the effectiveness of iterative pruning combin... 详细信息
来源: 评论
Platform-specific code generation method for the tyche embedded operating system based on AADL models  3
Platform-specific code generation method for the tyche embed...
收藏 引用
3rd International Conference on Algorithms, Network, and Communication technology, ICANCT 2024
作者: Chen, Li Jia, Zhangtao An, Heng Li, Haoyu Beijing Computer Technology and Application Research Institute Beijing China
The Tyche Embedded Operating System is a highly customized real-time embedded operating system, widely applied in fields such as aerospace, medical devices, and industrial automation. Renowned for its robust support f... 详细信息
来源: 评论
A Blockchain-Based Key Management Scheme in FANETs  4
A Blockchain-Based Key Management Scheme in FANETs
收藏 引用
4th International Conference on Electronic Information Engineering and computer Science, EIECS 2024
作者: Yin, Datong Han, Lei Beijing Institute of Computer Technology and Application Beijing China
Flying Ad-Hoc Networks (FANETs) enable the deployment of Unmanned aerial vehicles (UAVs) in a clustered manner to execute complex missions, yet their inherent openness poses significant challenges to communication sec... 详细信息
来源: 评论
A Brute-Force Attack Detection Method Based on the Combination of Artificial Neural Network and Auto Encoder  3
A Brute-Force Attack Detection Method Based on the Combinati...
收藏 引用
3rd International Conference on Cloud Computing, Big Data application and Software Engineering, CBASE 2024
作者: Ma, Xiaojun Li, Qingyuan Wang, Xiaofei Wen, Quan Zeng, Yingming Beijing Institute of Computer Technology and Application Beijing China
The ongoing advancement of information technology has led to the emergence of a multitude of network attack methodologies and techniques. As a prevalent form of network attack, it is imperative to undertake targeted r... 详细信息
来源: 评论
A Hierarchical Disposal Method Based on Task Allocation  2
A Hierarchical Disposal Method Based on Task Allocation
收藏 引用
2nd IEEE International Conference on Sensors, Electronics and computer Engineering, ICSECE 2024
作者: Ren, Jianxin Liu, Pengjie Zhao, Manfei Gao, Tong Yang, Heng Wang, Haofeng Beijing Institute of Computer Technology and Application Beijing China
With the development of society and the advancement of technology, security and defense issues have become increasingly prominent. Traditional disposal methods are no longer able to meet the current complex and ever-c... 详细信息
来源: 评论