咨询与建议

限定检索结果

文献类型

  • 279 篇 会议
  • 251 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 532 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 311 篇 工学
    • 210 篇 计算机科学与技术...
    • 165 篇 软件工程
    • 84 篇 信息与通信工程
    • 55 篇 电气工程
    • 45 篇 电子科学与技术(可...
    • 36 篇 控制科学与工程
    • 23 篇 生物工程
    • 21 篇 机械工程
    • 19 篇 生物医学工程(可授...
    • 17 篇 光学工程
    • 14 篇 仪器科学与技术
    • 13 篇 动力工程及工程热...
    • 13 篇 网络空间安全
    • 12 篇 化学工程与技术
    • 9 篇 材料科学与工程(可...
    • 9 篇 交通运输工程
  • 173 篇 理学
    • 82 篇 数学
    • 43 篇 物理学
    • 33 篇 生物学
    • 22 篇 统计学(可授理学、...
    • 17 篇 化学
    • 15 篇 系统科学
  • 83 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 33 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 34 篇 医学
    • 25 篇 临床医学
    • 24 篇 基础医学(可授医学...
    • 10 篇 公共卫生与预防医...
  • 19 篇 法学
    • 14 篇 社会学
  • 13 篇 经济学
    • 12 篇 应用经济学
  • 3 篇 军事学
  • 2 篇 历史学
  • 2 篇 农学
  • 1 篇 文学

主题

  • 18 篇 laboratories
  • 18 篇 computer network...
  • 14 篇 computer science
  • 14 篇 software enginee...
  • 13 篇 bandwidth
  • 11 篇 computer archite...
  • 11 篇 neural networks
  • 11 篇 streaming media
  • 10 篇 reinforcement le...
  • 10 篇 quality of servi...
  • 9 篇 adaptive systems
  • 9 篇 application soft...
  • 9 篇 prototypes
  • 9 篇 costs
  • 9 篇 delay
  • 8 篇 feature extracti...
  • 8 篇 protocols
  • 8 篇 mobile computing
  • 8 篇 adaptation model...
  • 7 篇 complex networks

机构

  • 20 篇 software enginee...
  • 14 篇 software enginee...
  • 10 篇 computer network...
  • 9 篇 college of compu...
  • 8 篇 health managemen...
  • 8 篇 school of inform...
  • 7 篇 department of co...
  • 7 篇 department of co...
  • 7 篇 school of artifi...
  • 7 篇 college of mathe...
  • 6 篇 department of mo...
  • 6 篇 royal stoke univ...
  • 6 篇 department of pu...
  • 6 篇 fujian provincia...
  • 6 篇 cambridge univer...
  • 6 篇 julius centre fo...
  • 6 篇 centre for heart...
  • 6 篇 guangxi key labo...
  • 6 篇 school of comput...
  • 5 篇 leeds institute ...

作者

  • 17 篇 liu ximeng
  • 10 篇 p.k. mckinley
  • 8 篇 péter gáspár
  • 8 篇 cheng betty h. c...
  • 7 篇 abu-gharbieh ema...
  • 7 篇 wang changwei
  • 7 篇 yu f. richard
  • 7 篇 xu rongtao
  • 6 篇 raghavan s.v.
  • 6 篇 bärnighausen til...
  • 6 篇 chu dinh-toi
  • 6 篇 yang yang
  • 6 篇 ximeng liu
  • 6 篇 xu shibiao
  • 5 篇 liu bo
  • 5 篇 dandona rakhi
  • 5 篇 guo li
  • 5 篇 chattu vijay kum...
  • 5 篇 mohammed shafiu
  • 5 篇 dandona lalit

语言

  • 499 篇 英文
  • 24 篇 其他
  • 9 篇 中文
检索条件"机构=Computer and Network Systems Laboratory"
532 条 记 录,以下是1-10 订阅
排序:
Discriminative feature encoding for intrinsic image decomposition
收藏 引用
Computational Visual Media 2023年 第3期9卷 597-618页
作者: Zongji Wang Yunfei Liu Feng Lu Key Laboratory of Network Information System Technology(NIST) Aerospace Information Research InstituteChinese Academy of SciencesBeijing 100190China State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and EngineeringBeihang UniversityBeijing 100191China Peng Cheng Laboratory Shenzhen 518000China
Intrinsic image decomposition is an important and long-standing computer vision *** an input image,recovering the physical scene properties is *** physically motivated priors have been used to restrict the solution sp... 详细信息
来源: 评论
MMH-FE:AMulti-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural network Training Based on Functional Encryption
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 5387-5405页
作者: Hao Li Kuan Shao Xin Wang Mufeng Wang Zhenyong Zhang The State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China China Industrial Control Systems Cyber Emergency Response Team Beijing100040China
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achie... 详细信息
来源: 评论
Pushing AI to wireless network edge: an overview on integrated sensing, communication, and computation towards 6G
收藏 引用
Science China(Information Sciences) 2023年 第3期66卷 7-25页
作者: Guangxu ZHU Zhonghao LYU Xiang JIAO Peixi LIU Mingzhe CHEN Jie XU Shuguang CUI Ping ZHANG Shenzhen Research Institute of Big Data Future Network of Intelligence Institute (FNii) The Chinese University of Hong Kong (Shenzhen) School of Science and Engineering (SSE) The Chinese University of Hong Kong (Shenzhen) State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Peking University Department of Electrical and Computer Engineering and Institute for Data Science and Computing University of Miami Peng Cheng Laboratory State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications
Pushing artificial intelligence(AI) from central cloud to network edge has reached board consensus in both industry and academia for materializing the vision of artificial intelligence of things(AIoT) in the sixth-gen... 详细信息
来源: 评论
Extinction Chains Reveal Intermediate Phases Between the Safety and Collapse in Mutualistic Ecosystems
收藏 引用
Engineering 2024年 第12期43卷 89-98页
作者: Guangwei Wang Xueming Liu Ying Xiao Ye Yuan Linqiang Pan Xiaohong Guan Jianxi Gao Hai-Tao Zhang The MOE Engineering Research Center of Autonomous Intelligent Unmanned Systems State Key Laboratory of Digital Manufacturing Equipment and TechnologySchool of Artificial Intelligence and AutomationHuazhong University of Science and TechnologyWuhan 430074China Guangdong HUST Industrial Technology Research Institute Huazhong University of Science and TechnologyDongguan 523808China Guangdong Provincial Engineering Technology Center of Autonomous Unmanned Vessels Dongguan 523808China MOE Key Laboratory of Intelligent Networks and Network Security&State Key Laboratory of Manufacturing Systems Xi’an Jiaotong UniversityXi’an 710049China Tsinghua National Laboratory of Information Science and Technology Department of AutomationTsinghua UniversityBeijing 100084China Department of Computer Science Rensselaer Polytechnic InstituteTroyNY 12180USA
Ecosystems are undergoing unprecedented persistent deterioration due to unsustainable anthropogenic human activities,such as overfishing and deforestation,and the effects of such damage on ecological stability are ***... 详细信息
来源: 评论
On a novel tracking differentiator design based on iterative learning in a moving window
收藏 引用
Control Theory and Technology 2023年 第1期21卷 46-55页
作者: Xiangyang Li Rafal Madonski Zhiqiang Gao Senping Tian Key Laboratory of Autonomous Systems and Network Control Ministry of EducationSchool of Automation Science and EngineeringSouth China University of TechnologyGuangzhou 510641China Energy and Electricity Research Center Jinan UniversityZhuhai 519070China Department of Electrical and Computer Science Cleveland State UniversityClevelandOH 44115USA
Differential signals are key in control engineering as they anticipate future behavior of process variables and therefore are critical in formulating control laws such as proportional-integral-derivative(PID).The prac... 详细信息
来源: 评论
A novel deep generative model for mRNA vaccine development: Designing 5′ UTRs with N1-methyl-pseudouridine modification
收藏 引用
Acta Pharmaceutica Sinica B 2024年 第4期14卷 1814-1826页
作者: Xiaoshan Tang Miaozhe Huo Yuting Chen Hai Huang Shugang Qin Jiaqi Luo Zeyi Qin Xin Jiang Yongmei Liu Xing Duan Ruohan Wang Lingxi Chen Hao Li Na Fan Zhongshan He Xi He Bairong Shen Shuai Cheng Li Xiangrong Song Institute of Systems Genetics Department of Critical Care MedicineFrontiers Science Center for Disease-related Molecular NetworkState Key Laboratory of Biotherapy and Cancer CenterWest China HospitalSichuan UniversityChengdu 610000China Department of Computer Science City University of Hong KongHong Kong 99907China Department of Biology Brandeis UniversityBostonMA 02453USA
Efficient translation mediated by the 5'untranslated region(5'UTR)is essential for the robust efficacy of mRNA ***,the N1-methyl-pseudouridine(m1)modification of mRNA can impact the translation efficiency of t... 详细信息
来源: 评论
New Cryptographic Bent Functions from Permutations and Linear Translator in Cyber Security
New Cryptographic Bent Functions from Permutations and Linea...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and Big Data Computing, 2023 International Conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Liu, Qian Chen, Yan Chen, Zhixiong Liu, Ximeng Lin, Hui College of Computer and Data Science Fuzhou University Fuzhou China Putian University Fujian Key Laboratory of Financial Information Processing Putian China College of Computer and Data Science Fuzhou University Key Laboratory of Information Security of Network Systems Fuzhou China College of Computer and Cyber Security Fujian Normal University Fuzhou China
Cryptographic bent functions are maximally nonlinear Boolean functions with an even number of variables. They are not only closely related to some interesting combinatorial objects, but also have important application... 详细信息
来源: 评论
Some Classes of Cryptographic Power Functions and Permutation Polynomials with Low (-1)-Differential Uniformity in Cyber Security
Some Classes of Cryptographic Power Functions and Permutatio...
收藏 引用
2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, 2023 International Conference on Pervasive Intelligence and Computing, 2023 International Conference on Cloud and Big Data Computing, 2023 International Conference on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2023
作者: Liu, Qian Dong, Xiaobei Chen, Zhixiong Liu, Ximeng Xu, Li College of Computer and Data Science Fuzhou University Fuzhou China Putian University Fujian Key Laboratory of Financial Information Processing Putian China College of Computer and Data Science Fuzhou University Key Laboratory of Information Security of Network Systems Fuzhou China College of Computer and Cyber Security Fujian Normal University Fuzhou China
Cryptographic functions with low differential uniformity have wide applications in cryptography and cyber security. In this paper, we further investigate c-differential uniformity proposed by Ellingsen et al. (IEEE Tr... 详细信息
来源: 评论
A data based system representation
收藏 引用
IFAC-PapersOnLine 2023年 第2期56卷 5518-5524页
作者: Zoltán Szabó József Bokor Péter Gáspár Systems and Control Laboratory Institute for Computer Science and Control (SZTAKI) Eötvös Loránd Research Network (ELKH) Budapest Hungary Systems and Control Laboratory Institute for Computer Science and Control (SZTAKI) Eotvos Loránd Research Network (ELKH) Budapest Hungary
The paper proposes a system representation formed by a minimal collection of sufficiently long restricted trajectories generated by an observable discrete time LTI system. Conditions are given under which such a colle... 详细信息
来源: 评论
Sea-Land Segmentation of Remote Sensing Images Based on SDW-UNet
收藏 引用
computer systems Science & Engineering 2023年 第5期45卷 1033-1045页
作者: Tianyu Liu Pengyu Liu Xiaowei Jia Shanji Chen Ying Ma Qian Gao The Information Department Beijing University of TechnologyBeijing 100124China School of Physics and Electronic Information Engineering Qinghai Minzu UniversityXining810000China Advanced Information Network Beijing Laboratory Beijing100124China Computational Intelligence and Intelligent Systems Beijing key Laboratory Beijing100124China Department of Computer Science University of Pittsburgh15260USA
Image segmentation of sea-land remote sensing images is of great importance for downstream applications including shoreline extraction,the monitoring of near-shore marine environment,and near-shore target *** mitigate... 详细信息
来源: 评论