咨询与建议

限定检索结果

文献类型

  • 4,286 篇 会议
  • 3,547 篇 期刊文献
  • 92 册 图书

馆藏范围

  • 7,925 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,827 篇 工学
    • 2,704 篇 计算机科学与技术...
    • 2,195 篇 软件工程
    • 1,017 篇 信息与通信工程
    • 874 篇 控制科学与工程
    • 775 篇 电气工程
    • 658 篇 电子科学与技术(可...
    • 476 篇 机械工程
    • 421 篇 生物工程
    • 407 篇 光学工程
    • 309 篇 生物医学工程(可授...
    • 264 篇 仪器科学与技术
    • 241 篇 动力工程及工程热...
    • 233 篇 化学工程与技术
    • 223 篇 材料科学与工程(可...
    • 148 篇 交通运输工程
    • 130 篇 土木工程
    • 130 篇 安全科学与工程
  • 2,816 篇 理学
    • 1,389 篇 数学
    • 861 篇 物理学
    • 501 篇 生物学
    • 445 篇 系统科学
    • 444 篇 统计学(可授理学、...
    • 265 篇 化学
  • 1,041 篇 管理学
    • 699 篇 管理科学与工程(可...
    • 369 篇 图书情报与档案管...
    • 305 篇 工商管理
  • 316 篇 医学
    • 259 篇 临床医学
    • 201 篇 基础医学(可授医学...
    • 140 篇 药学(可授医学、理...
  • 143 篇 法学
    • 124 篇 社会学
  • 109 篇 经济学
  • 72 篇 农学
  • 54 篇 教育学
  • 14 篇 文学
  • 12 篇 军事学
  • 11 篇 艺术学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 340 篇 laboratories
  • 263 篇 computer science
  • 135 篇 computational mo...
  • 118 篇 control systems
  • 102 篇 application soft...
  • 101 篇 feature extracti...
  • 97 篇 optimization
  • 96 篇 computer archite...
  • 95 篇 deep learning
  • 87 篇 neural networks
  • 87 篇 artificial intel...
  • 85 篇 costs
  • 80 篇 semantics
  • 77 篇 bandwidth
  • 76 篇 machine learning
  • 68 篇 software enginee...
  • 68 篇 hardware
  • 68 篇 training
  • 66 篇 algorithm design...
  • 65 篇 predictive model...

机构

  • 165 篇 state key labora...
  • 65 篇 peng cheng labor...
  • 61 篇 state key labora...
  • 58 篇 shanghai key lab...
  • 56 篇 school of comput...
  • 42 篇 ieee
  • 36 篇 zhongguancun lab...
  • 36 篇 state key labora...
  • 34 篇 department of el...
  • 33 篇 state key labora...
  • 32 篇 university of ch...
  • 29 篇 beijing key labo...
  • 28 篇 department of co...
  • 27 篇 state key labora...
  • 27 篇 school of comput...
  • 26 篇 intelligent sens...
  • 25 篇 school of comput...
  • 25 篇 department of co...
  • 24 篇 grid computing a...
  • 24 篇 state key labora...

作者

  • 58 篇 rajkumar buyya
  • 47 篇 guo hong
  • 41 篇 m. zahn
  • 35 篇 niyato dusit
  • 25 篇 johansson karl h...
  • 25 篇 niu jianwei
  • 25 篇 junping du
  • 23 篇 j.h. lang
  • 23 篇 lu bao-liang
  • 21 篇 chen chen
  • 20 篇 chen xiaowu
  • 19 篇 uwe d. hanebeck
  • 16 篇 wang xingjun
  • 15 篇 yao xin
  • 15 篇 wei li
  • 15 篇 yang yang
  • 15 篇 ganesh k. venaya...
  • 15 篇 ismail leila
  • 15 篇 tóth roland
  • 15 篇 xiang cheng

语言

  • 7,087 篇 英文
  • 701 篇 其他
  • 138 篇 中文
  • 3 篇 德文
  • 3 篇 法文
  • 1 篇 阿拉伯文
  • 1 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Computer Science and Systems Engineering Laboratory"
7925 条 记 录,以下是1251-1260 订阅
排序:
An Efficient Implementation for Bayesian Manifold Regularization Method
An Efficient Implementation for Bayesian Manifold Regulariza...
收藏 引用
IEEE Conference on Decision and Control
作者: Junpeng Zhang Yue Ju Bo Wahlberg Biqiang Mu Tianshi Chen School of Data Science and Shenzhen Research Institute of Big Data The Chinese University of Hong Kong Shenzhen China Division of Decision and Control Systems School of Electrical Engineering and Computer Science KTH Royal Instituite of Technology Stockholm Sweden Key Laboratory of Systems and Control Institute of Systems Science Academy of Mathematics and System Science Chinese Academy of Sciences Beijing China
When applying the Bayesian manifold regularization method to function estimation problem with manifold constraints, the direct implementation has computational complexity $\mathcal{O}(N^{3})$ , where $N$ is the num...
来源: 评论
Fundus Image Quality Assessment and Enhancement: a Systematic Review
arXiv
收藏 引用
arXiv 2025年
作者: Li, Heng Li, Haojin Ou, Mingyang Yu, Xiangyang Zhang, Xiaoqing Niu, Ke Fu, Huazhu Liu, Jiang Research Institute of Trustworthy Autonomous Systems SUSTech Shenzhen China Department of Computer Science and Engineering SUSTech Shenzhen China Center for High Performance Computing and Shenzhen Key Laboratory of Intelligent Bioinformatics Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China Computer School Beijing Information Science and Technology University Beijing China Singapore
As an affordable and convenient eye scan, fundus photography holds the potential for preventing vision impairment, especially in resource-limited regions. However, fundus image degradation is common under intricate im... 详细信息
来源: 评论
Symbolic Execution of MPI Programs with One-Sided Communications
Symbolic Execution of MPI Programs with One-Sided Communicat...
收藏 引用
Asia-Pacific Conference on Software engineering
作者: Nenghui Hu Zheng Bian Ziqi Shuai Zhenbang Chen Yufeng Zhang College of Computer National University of Defense Technology China Key Laboratory of Software Engineering for Complex Systems National University of Defense Technology China State Key Laboratory of High Performance Computing National University of Defense Technology China College of Computer Science and Electronic Engineering Hunan University Changsha China
Message-passing interface (MPI) programs are non-deterministic and challenging to ensure correctness. The introduction of one-sided communications makes the problem of non-determinism more severe for MPI programs. Thi...
来源: 评论
Deep Reinforcement Learning Empowered Activity-Aware Dynamic Health Monitoring systems
arXiv
收藏 引用
arXiv 2024年
作者: Ye, Ziqiaing Gao, Yulan Xiao, Yue Xiong, Zehui Niyato, Dusit National Key Laboratory of Wireless Communications University of Electronic Science and Technology of China Chengdu611731 China School of Computer Science and Engineering Nanyang Technological University 639798 Singapore Information Systems Technology and Design Pillar Singapore University of Technology and Design 487372 Singapore
In smart healthcare, health monitoring utilizes diverse tools and technologies to analyze patients' real-time biosignal data, enabling immediate actions and interventions. Existing monitoring approaches were desig... 详细信息
来源: 评论
A Unified Modeling Framework for Automated Penetration Testing
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Yunfei Liu, Shixuan Wang, Wenhao Zhou, Changling Zhang, Chao Jin, Jiandong Zhu, Cheng National Key Laboratory of Information Systems Engineering National University of Defense Technology Hunan China Department of Intelligent Data Science College of Computer Science and Technology National University of Defense Technology Hunan China National University of Defense Technology Hunan China Tsinghua University Beijing China Computer Center Peking University Beijing China
The integration of artificial intelligence into automated penetration testing (AutoPT) has highlighted the necessity of simulation modeling for the training of intelligent agents, due to its cost-efficiency and swift ... 详细信息
来源: 评论
Unsatisfiable Core Based Constraint Solving Cache in Symbolic Execution
Unsatisfiable Core Based Constraint Solving Cache in Symboli...
收藏 引用
Asia-Pacific Conference on Software engineering
作者: Ziqi Shuai Zhenbang Chen Yufeng Zhang Hengbiao Yu Ji Wang College of Computer National University of Defense Technology China Key Laboratory of Software Engineering for Complex Systems National University of Defense Technology China State Key Laboratory of High Performance Computing National University of Defense Technology China College of Computer Science and Electronic Engineering Hunan University Changsha China
Constraint solving stands out as a significant bot-tleneck in symbolic execution. Caching is a commonly adopted approach to alleviate this bottleneck. However, the cutting-edge caching technique targeting unsatisfiabl...
来源: 评论
Hidden high-risky states identification from routine urban traffic
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Shiyan Bai, Mingyang Guo, Shengmin Gao, Jianxi Sun, Huijun Gao, Ziyou Li, Daqing School of Reliability and Systems Engineering Beihang University Beijing100191 China State Key Laboratory of Software Development Environment Beihang University Beijing100191 China Department of Computer Science Rensselaer Polytechnic Institute TroyNY12180 United States School of Systems Science Beijing Jiaotong University Beijing100044 China
One of the core risk management tasks is to identify hidden high-risky states that may lead to system breakdown, which can provide valuable early warning knowledge. However, due to high dimensionality and nonlinear in... 详细信息
来源: 评论
LCINet: Local Cross-position Interaction Network for Oracle Bone Inscriptions Recognition
LCINet: Local Cross-position Interaction Network for Oracle ...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Qingyang Sun Xiaoqing Zhang Chenlu Gui Hanxi Sun Tingsheng Cai Yan Hu Jigen Tang Jiang Liu Research Institute of Trustworthy Autonomous Systems and Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China School of Humanities and Social Sciences Southern University of Science and Technology Shenzhen China Guangdong Provincial Key Laboratory of Brain-Inspired Intelligent Computation Southern University of Science and Technology Shenzhen China
Oracle Bone Inscriptions (OBIs) are a type of ancient Chinese hieroglyphs, which are precursors of many Asian characters. Automatic OBIs recognition can assist archaeologists in understanding the history and evolution... 详细信息
来源: 评论
Direct Truncation and Routh Approximation Assisted Reduced Order Modelling of Islanded Microgrid
Direct Truncation and Routh Approximation Assisted Reduced O...
收藏 引用
IEEE Industry Applications Society Annual Meeting (IAS)
作者: Richa Chaudhary V. P. Singh Akhilesh Mathur U. K. Yadav Krishna Murari Sukumar Kamalasadan Department of Electrical Engineering Malaviya National Institute of Technology Jaipur Rajasthan India Electrical Engineering and Computer Science Department The University of Toledo Toledo Ohio USA Department of Electrical Engineering Power Energy and Intelligent Systems Laboratory EPIC University of North Carolina at Charlotte Charlotte NC USA
Microgrid (MG) networks, with their diverse energy sources and storage systems, represent complex higher-order systems (HOS). Analyzing such networks is challenging due to the uncertainty associated with energy source... 详细信息
来源: 评论
Efficient Long-Short Temporal Attention Network for Unsupervised Video Object Segmentation
SSRN
收藏 引用
SSRN 2023年
作者: Li, Ping Zhang, Yu Yuan, Li Xiao, Huaxin Lin, Binbin Xu, Xianghua School of Computer Science and Technology Hangzhou Dianzi University Hangzhou China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Electrical and Computer Engineering Peking University Beijing China College of Systems Engineering National University of Defense Technology Changsha China College of Computer Science Zhejiang University Hangzhou China
Unsupervised Video Object Segmentation (VOS) aims at identifying the contours of primary foreground objects in videos without any prior knowledge. However, previous methods do not fully use spatial-temporal context an... 详细信息
来源: 评论