咨询与建议

限定检索结果

文献类型

  • 1,700 篇 会议
  • 1,570 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 3,278 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,097 篇 工学
    • 1,248 篇 计算机科学与技术...
    • 989 篇 软件工程
    • 401 篇 信息与通信工程
    • 310 篇 电子科学与技术(可...
    • 293 篇 控制科学与工程
    • 277 篇 电气工程
    • 238 篇 光学工程
    • 201 篇 机械工程
    • 185 篇 生物工程
    • 150 篇 仪器科学与技术
    • 129 篇 生物医学工程(可授...
    • 103 篇 动力工程及工程热...
    • 102 篇 化学工程与技术
    • 86 篇 材料科学与工程(可...
    • 84 篇 交通运输工程
    • 78 篇 土木工程
    • 52 篇 建筑学
  • 1,093 篇 理学
    • 520 篇 数学
    • 323 篇 物理学
    • 226 篇 生物学
    • 166 篇 统计学(可授理学、...
    • 117 篇 系统科学
    • 105 篇 化学
  • 531 篇 管理学
    • 328 篇 管理科学与工程(可...
    • 212 篇 图书情报与档案管...
    • 114 篇 工商管理
  • 120 篇 医学
    • 98 篇 临床医学
    • 76 篇 基础医学(可授医学...
    • 48 篇 药学(可授医学、理...
  • 70 篇 法学
    • 58 篇 社会学
  • 39 篇 经济学
  • 29 篇 农学
  • 11 篇 教育学
  • 10 篇 军事学
  • 5 篇 文学
  • 4 篇 艺术学

主题

  • 77 篇 laboratories
  • 75 篇 feature extracti...
  • 70 篇 computer science
  • 60 篇 data mining
  • 55 篇 computational mo...
  • 52 篇 deep learning
  • 52 篇 training
  • 50 篇 optimization
  • 50 篇 semantics
  • 43 篇 accuracy
  • 37 篇 machine learning
  • 33 篇 predictive model...
  • 32 篇 protocols
  • 32 篇 clustering algor...
  • 31 篇 object detection
  • 30 篇 neural networks
  • 28 篇 reinforcement le...
  • 28 篇 bandwidth
  • 28 篇 data models
  • 26 篇 computer archite...

机构

  • 113 篇 national enginee...
  • 95 篇 college of compu...
  • 59 篇 school of comput...
  • 58 篇 college of infor...
  • 47 篇 hubei province k...
  • 41 篇 the key laborato...
  • 36 篇 department of co...
  • 36 篇 school of cyber ...
  • 33 篇 school of inform...
  • 33 篇 school of comput...
  • 30 篇 school of optica...
  • 30 篇 university of ch...
  • 29 篇 school of comput...
  • 29 篇 shenzhen city ke...
  • 27 篇 national enginee...
  • 25 篇 hubei key labora...
  • 25 篇 key laboratory o...
  • 24 篇 state key labora...
  • 24 篇 shenzhen univers...
  • 23 篇 school of comput...

作者

  • 42 篇 shen linlin
  • 40 篇 ren jiadong
  • 36 篇 hai jin
  • 34 篇 jin hai
  • 28 篇 yang yang
  • 25 篇 mei-ling shyu
  • 25 篇 shu-ching chen
  • 23 篇 zhigang zhang
  • 20 篇 chen shu-ching
  • 20 篇 ji zhen
  • 20 篇 li jianqiang
  • 19 篇 hu shengshan
  • 18 篇 wang xingjun
  • 18 篇 shyu mei-ling
  • 17 篇 zhen ji
  • 17 篇 zhang zhigang
  • 17 篇 shu haowen
  • 17 篇 linlin shen
  • 16 篇 陈景标
  • 14 篇 zhang leo yu

语言

  • 2,863 篇 英文
  • 302 篇 其他
  • 116 篇 中文
  • 1 篇 日文
检索条件"机构=Computer Science and Engineering System Laboratory"
3278 条 记 录,以下是471-480 订阅
排序:
QoS Perception for Cloud Databases: Necessity, Trends, and Challenges
QoS Perception for Cloud Databases: Necessity, Trends, and C...
收藏 引用
International Workshop on Quality of Service
作者: Weipeng Cao Xi Tao Yinghui Pan Ye Liu Zhong Ming Guangdong Laboratory of Artificial Intelligence and Digital Economy (Shenzhen) Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China
The advantages of resource elasticity and proactive data backup in cloud databases have attracted a large number of users to consider deploying their IT systems in the cloud. Factors such as performance, reliability, ... 详细信息
来源: 评论
Multi-Turn Jailbreaking Large Language Models via Attention Shifting  39
Multi-Turn Jailbreaking Large Language Models via Attention ...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Du, Xiaohu Mo, Fan Wen, Ming Gu, Tu Zheng, Huadi Jin, Hai Shi, Jie China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab School of Computer Science and Technology HUST China JinYinHu Laboratory China Huawei International China
Large Language Models (LLMs) have achieved significant performance in various natural language processing tasks but also pose safety and ethical threats, thus requiring red teaming and alignment processes to bolster t...
来源: 评论
MBAPIS: Multi-Level Behavior Analysis Guided Program Interval Selection for Microarchitecture Studies
MBAPIS: Multi-Level Behavior Analysis Guided Program Interva...
收藏 引用
International Conference on Parallel Architecture and Compilation Techniques (PACT)
作者: Hongwei Cui Yujie Cui Honglan Zhan Shuhao Liang Xianhua Liu Chun Yang Xu Cheng Engineering Reserach Center of Microprocessor & System Ministry of Education School of Computer Science Peking University Beijing National Key Laboratory for Multimedia Information Processing School of Computer Science Peking University Beijing
Understanding program behavior is crucial in computer architecture research, but the growing size of benchmarks makes analyzing and simulating entire programs increasingly challenging. In practice, researchers often s...
来源: 评论
Enhancing Ocean Scene Video Captioning with Multimodal Pre-Training and Video-Swin-Transformer
Enhancing Ocean Scene Video Captioning with Multimodal Pre-T...
收藏 引用
Annual Conference of Industrial Electronics Society
作者: Xinyu Chen Meng Zhao Fan Shi Meng'en Zhang Yu He Shengyong Chen Laboratory of Computer Vision and System of Ministry of Education School of Computer Science and Engineering Tianjin University of Technology Tianjin China Key Laboratory of Space Utilization Technology and Engineering Center for Space Utilization Chinese Academy of Sciences Beijing China
With the success of multimodal pre-training models in the video-language field and various downstream tasks, previous multimodal models used 3DCNN networks as video feature extractors, which have limitations in intera...
来源: 评论
A passive DDoS attack detection approach based on abnormal analysis in SDN environment  4
A passive DDoS attack detection approach based on abnormal a...
收藏 引用
2021 4th International Conference on computer Information science and Application Technology, CISAT 2021
作者: Sun, Shimin Zhang, Xinchao Huang, Wentian Xu, Aixin Wang, Xiaofan Han, Li Tianjin Key Laboratory of Autonomous Intelligent Technology and System School of Computer Science and Technology Tiangong University Tianjin300387 China National Engineering Laboratory for Computer Virus Prevention and Control Technology School of Computer Science and Engineering Tianjin University of Technology Tianjin300384 China
Most of the detection methods against DDoS attacks are based on periodic detection, which leads to high communication overhead, untimely detection, and slow attack response. This paper proposes a passive abnormality d... 详细信息
来源: 评论
Time Slot Correlation-Based Caching Strategy for Information-Centric Satellite Networks  1
收藏 引用
11th EAI International Conference on MOBILe Wireless MiddleWARE, Operating systems and Applications, MOBILWARE 2022
作者: Xu, Rui Di, Xiaoqiang Chen, Jing Cao, Jinhui Luo, Hao Wang, Haowei Qi, Hui He, Xiongwen Lei, Wenping School of Computer Science and Technology Changchun University of Science and Technology Changchun130022 China School of Information Engineering Henan Institute of Science and Technology Xinxiang453003 China Jilin Province Key Laboratory of Network and Information Security Changchun University of Science and Technology Changchun130022 China Information Center Changchun University of Science and Technology 130022 Changchun China Beijing Institute of Spacecraft System Engineering Beijing100094 China Beijing Institute of Space Mechanic and Electricity Beijing100094 China
With the successful manufacture of highly stable and high-performance satellite processors, caching on satellites has become possible. Information Centric Networking (ICN) is introduced to satellite networks to addres... 详细信息
来源: 评论
CA-Edit: Causality-Aware Condition Adapter for High-Fidelity Local Facial Attribute Editing  39
CA-Edit: Causality-Aware Condition Adapter for High-Fidelity...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Xian, Xiaole He, Xilin Niu, Zenghao Zhang, Junliang Xie, Weicheng Song, Siyang Yu, Zitong Shen, Linlin Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China University of Exeter United Kingdom Great Bay University China
For efficient and high-fidelity local facial attribute editing, most existing editing methods either require additional finetuning for different editing effects or tend to affect beyond the editing regions. Alternativ...
来源: 评论
PB-UAP: Hybride Universal Adversarial Attack for Image Segmentation
PB-UAP: Hybride Universal Adversarial Attack for Image Segme...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yufei Song Ziqi Zhou Minghui Li Xianlong Wang Hangtao Zhang Menghao Deng Wei Wan Shengshan Hu Leo Yu Zhang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the rapid advancement of deep learning, the model robustness has become a significant research hotspot, i.e., adversarial attacks on deep neural networks. Existing works primarily focus on image classification ta... 详细信息
来源: 评论
A Deep Learning-Based Algorithm for Energy and Performance Optimization of Computational Offloading in Mobile Edge Computing
收藏 引用
Wireless Communications and Mobile Computing 2023年 第1期2023卷
作者: Khan, Israr Raza, Salman Rehman, Waheed Ur Khan, Razaullah Nahida, Kiran Tao, Xiaofeng National Engineering Laboratory for Mobile Network Technologies Beijing University of Posts and Telecommunications Beijing100876 China Department of Computer Science National Textile University Faisalabad Pakistan Department of Computer Science University of Peshawar Peshawar Pakistan Department of Computer Science University of Engineering and Technology Mardan Pakistan Beijing Laboratory of Advanced Information Network Beijing Key Laboratory of Network System Architecture and Convergence Beijing University of Posts and Telecommunications China
Mobile edge computing (MEC) has produced incredible outcomes in the context of computationally intensive mobile applications by offloading computation to a neighboring server to limit the energy usage of user equipmen... 详细信息
来源: 评论
Adapting the Simulated Annealing Algorithm to Enhance the Performance of the LEACH Protocol
Adapting the Simulated Annealing Algorithm to Enhance the Pe...
收藏 引用
International Conference on computer and Applications (ICCA)
作者: Mohammed Benhadji Kaddi Mohammed Omari Mohammed Material Sciences Department Laboratory of Energy Environment and Information System (LEESI) University of Adrar Algeria Mathematics and Computer Science Department LDDI Laboratory University of Adrar Algeria Computer Science and Engineering Department American University of Ras Al Khaimah Ras Al Khaimah United Arab Emirates
In parallel with the proliferation and extension of wireless sensor networks (WSNs), as well as the diversity of their applications, such networks continue to fail to operate for lengthy periods of time due to node fa... 详细信息
来源: 评论