咨询与建议

限定检索结果

文献类型

  • 279 篇 会议
  • 250 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 531 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 308 篇 工学
    • 207 篇 计算机科学与技术...
    • 163 篇 软件工程
    • 83 篇 信息与通信工程
    • 54 篇 电气工程
    • 43 篇 电子科学与技术(可...
    • 34 篇 控制科学与工程
    • 22 篇 生物工程
    • 20 篇 机械工程
    • 18 篇 光学工程
    • 18 篇 生物医学工程(可授...
    • 14 篇 仪器科学与技术
    • 13 篇 动力工程及工程热...
    • 12 篇 化学工程与技术
    • 12 篇 网络空间安全
    • 9 篇 材料科学与工程(可...
    • 9 篇 交通运输工程
  • 173 篇 理学
    • 82 篇 数学
    • 42 篇 物理学
    • 34 篇 生物学
    • 22 篇 统计学(可授理学、...
    • 16 篇 化学
    • 15 篇 系统科学
  • 84 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 33 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 33 篇 医学
    • 24 篇 临床医学
    • 23 篇 基础医学(可授医学...
    • 10 篇 公共卫生与预防医...
  • 19 篇 法学
    • 14 篇 社会学
  • 13 篇 经济学
    • 12 篇 应用经济学
  • 3 篇 农学
  • 3 篇 军事学
  • 2 篇 历史学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 18 篇 laboratories
  • 18 篇 computer network...
  • 14 篇 computer science
  • 14 篇 software enginee...
  • 13 篇 bandwidth
  • 11 篇 computer archite...
  • 11 篇 neural networks
  • 11 篇 streaming media
  • 10 篇 reinforcement le...
  • 10 篇 quality of servi...
  • 9 篇 adaptive systems
  • 9 篇 application soft...
  • 9 篇 prototypes
  • 9 篇 costs
  • 9 篇 delay
  • 8 篇 feature extracti...
  • 8 篇 protocols
  • 8 篇 mobile computing
  • 8 篇 adaptation model...
  • 7 篇 complex networks

机构

  • 20 篇 software enginee...
  • 14 篇 software enginee...
  • 11 篇 computer network...
  • 9 篇 college of compu...
  • 8 篇 health managemen...
  • 8 篇 school of inform...
  • 7 篇 department of co...
  • 7 篇 department of co...
  • 7 篇 school of artifi...
  • 7 篇 college of mathe...
  • 6 篇 department of mo...
  • 6 篇 royal stoke univ...
  • 6 篇 department of pu...
  • 6 篇 fujian provincia...
  • 6 篇 cambridge univer...
  • 6 篇 julius centre fo...
  • 6 篇 centre for heart...
  • 6 篇 guangxi key labo...
  • 6 篇 state key labora...
  • 6 篇 school of comput...

作者

  • 17 篇 liu ximeng
  • 10 篇 p.k. mckinley
  • 8 篇 péter gáspár
  • 8 篇 cheng betty h. c...
  • 7 篇 abu-gharbieh ema...
  • 7 篇 wang changwei
  • 7 篇 yu f. richard
  • 7 篇 xu rongtao
  • 6 篇 raghavan s.v.
  • 6 篇 chu dinh-toi
  • 6 篇 yang yang
  • 6 篇 ximeng liu
  • 6 篇 xu shibiao
  • 5 篇 bärnighausen til...
  • 5 篇 liu bo
  • 5 篇 dandona rakhi
  • 5 篇 guo li
  • 5 篇 alahdab fares
  • 5 篇 yang shenghao
  • 5 篇 s.m. sadjadi

语言

  • 500 篇 英文
  • 22 篇 其他
  • 9 篇 中文
检索条件"机构=Computer and Network Systems Laboratory"
531 条 记 录,以下是111-120 订阅
排序:
A Distance Similarity-based Genetic Optimization Algorithm for Satellite Ground network Planning Considering Feeding Mode
arXiv
收藏 引用
arXiv 2024年
作者: Ren, Yingying Li, Qiuli Guo, Yangyang Pedrycz, Witold Xing, Lining Liu, Anfeng Song, Yanjie School of Computer Electronics and Information Guangxi University Nanning China Guangxi Key Laboratory of Multimedia Communications and Network Technology China Key Laboratory of Parallel Distributed and Intelligent Computing Guangxi University China School of Systems Science Beijing Jiaotong University Beijing China Department of Electrical and Computer Engineering University of Alberta Edmonton Canada Systems Research Institute Polish Academy of Sciences Poland Faculty of Engineering and Natural Sciences Department of Computer Engineering Sariyer Istanbul Turkey School of Electronic Engineering Xidian University Xian China School of Electronic Engineering Central South University Changsha China National Engineering Research Center of Maritime Navigation System Dalian Maritime University Dalian China
With the rapid development of the satellite industry, the information transmission network based on communication satellites has gradually become a major and important part of the future satellite ground integration n... 详细信息
来源: 评论
Tunable collective electromagnetic induced transparency-like effect due to coupling of dual-band bound states in the continuum
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Jian Huang, Rixing Zhao, Xueqian Fan, Qingxi Chang, Kan Zhang, Zhenrong Li, Guangyuan Guangxi Key Laboratory of Multimedia Communications and Network Technology School of Computer Electronics and Information Guangxi University Nanning530004 China School of Electrical Engineering Guangxi University Nanning530004 China CAS Key Laboratory of Human-Machine Intelligence-Synergy Systems Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China Shenzhen College of Advanced Technology University of Chinese Academy of Sciences Shenzhen518055 China
The coupling between dual-band or multi-band quasi-bound states in the continuum (q-BICs) is of great interest for their rich physics and promising applications. Here, we report tunable collective electromagnetic indu... 详细信息
来源: 评论
Computing Power in the Sky: Digital Twin-assisted Collaborative Computing with Multi-UAV networks
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Wang, Chao Han, Yu Zhang, Long Jia, Ziye Zhang, Hongliang Hong, Choong Seon Han, Zhu Hebei University of Engineering School of Information and Electrical Engineering Handan056038 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Nanjing211106 China Southeast University National Mobile Communications Research Laboratory Jiangsu Nanjing211111 China Peking University State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Beijing100871 China Kyung Hee University Department of Computer Science and Engineering Gyeonggi-do Yongin-si17104 Korea Republic of University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
The collaboration of computing powers (CPs) among unmanned aerial vehicles (UAVs)-mounted edge servers is essential to handle data-intensive tasks of user equipments (UEs). This paper presents a multi-UAV computing po... 详细信息
来源: 评论
In-Context Translation: Towards Unifying Image Recognition, Processing, and Generation
arXiv
收藏 引用
arXiv 2024年
作者: Xue, Han Sun, Qianru Song, Li Zhang, Wenjun Huang, Zhiwu Institute of Image Communication and Network Engineering Shanghai Jiao Tong University Shanghai200240 China School of Information Systems Singapore Management University Singapore178902 Singapore MoE Key Laboratory of Artificial Intelligence AI Institute Shanghai Jiao Tong University Shanghai200240 China School of Electronics and Computer Science University of Southampton Southampton United Kingdom
We propose In-Context Translation (ICT), a general learning framework to unify visual recognition (e.g., semantic segmentation), low-level image processing (e.g., denoising), and conditional image generation (e.g., ed... 详细信息
来源: 评论
6G-Enabled Edge AI for Metaverse:Challenges, Methods,and Future Research Directions
收藏 引用
Journal of Communications and Information networks 2022年 第2期7卷 107-121页
作者: Luyi Chang Zhe Zhang Pei Li Shan Xi Wei Guo Yukang Shen Zehui Xiong Jiawen Kang Dusit Niyato Xiuquan Qiao Yi Wu School of Data Science and Technology Heilongjiang UniversityHarbin 150080China Institute for Cryptology and Network Security Heilongjiang UniversityHarbin 150080China SenseTime Group Limited Shenzhen 518000China Pillar of Information Systems Technology and Design Singapore University of Technology and Design.Singapore 487372Singapore School of Automation.Guangdong University of Technology and Center for Intelligenl Batch Manufacturing based on IoT TechnologyGuangzhou 510006China School of Computer Science and Engineering Nanyang Technological UniversitySingapore 639798.Singapore State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications.Beijing 100876China
Sixth generation(6G)enabled edge intelligence opens up a new era of Internet of everything and makes it possible to interconnect people-devices-cloud anytime,*** and more next-generation wireless network smart service... 详细信息
来源: 评论
G²Face: High-Fidelity Reversible Face Anonymization via Generative and Geometric Priors
收藏 引用
IEEE Transactions on Information Forensics and Security 2024年 19卷 8773-8785页
作者: Haoxin Yang Xuemiao Xu Cheng Xu Huaidong Zhang Jing Qin Yi Wang Pheng-Ann Heng Shengfeng He School of Computer Science and Engineering South China University of Technology Guangzhou China Guangdong Engineering Center for Large Model and GenAI Technology State Key Laboratory of Subtropical Building and Urban Science Guangzhou China Centre for Smart Health The Hong Kong Polytechnic University Hong Kong China School of Future Technology South China University of Technology Guangzhou China School of Computer Science and Network Security Dongguan University of Technology Dongguan China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong SAR China School of Computing and Information Systems Singapore Management University Victoria St Singapore
Reversible face anonymization, unlike traditional face pixelization, seeks to replace sensitive identity information in facial images with synthesized alternatives, preserving privacy without sacrificing image clarity... 详细信息
来源: 评论
Mixture Gaussian Distribution-Based Collaborative Reinforcement Learning for 3D UAV Localization Optimization Against Jamming Attacks
Mixture Gaussian Distribution-Based Collaborative Reinforcem...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Yujiao Zhu Mingzhe Chen Sihua Wang Yuchen Liu Gaolei Li Changchuan Yin Tony Q.S. Quek Beijing Laboratory of Advanced Information Network Beijing University of Posts and Telecommunications Beijing China Information Systems Technology and Design Pillar Singapore University of Technology and Design Singapore Department of Electrical and Computer Engineering and Institute for Data Science and Computing University of Miami Coral Gables FL USA Department of Computer Science North Carolina State University Raleigh NC USA School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University China
In this paper, the optimization of unmanned aerial vehicle (UAV) localization under jamming attacks is studied. In the considered network, a base station (BS) collaborates with an active UAV to localize a target UAV. ... 详细信息
来源: 评论
Generalization Boosted Adapter for Open-Vocabulary Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Wenhao Wang, Changwei Feng, Xuxiang Xu, Rongtao Huang, Longzhao Zhang, Zherui Guo, Li Xu, Shibiao School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing100876 China The Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250013 China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China The Aerospace Information Research Institute Chinese Academy of Sciences China The State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences Beijing China
Vision-language models (VLMs) have demonstrated remarkable open-vocabulary object recognition capabilities, motivating their adaptation for dense prediction tasks like segmentation. However, directly applying VLMs to ... 详细信息
来源: 评论
Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural networks
arXiv
收藏 引用
arXiv 2025年
作者: Dong, Xuewen Li, Jiachen Li, Shujun You, Zhichao Qu, Qiang Kholodov, Yaroslav Shen, Yulong School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China University of Kent CanterburyCT2 7NP United Kingdom Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences China Intelligent Transportation Systems Lab Innopolis University Innopolis Russia School of Computer Science and Technology Xidian University China The Shaanxi Key Laboratory of Network and System Security Xi’an710071 China
Recent studies show that graph neural networks (GNNs) are vulnerable to backdoor attacks. Existing backdoor attacks against GNNs use fixed-pattern triggers and lack reasonable trigger constraints, overlooking individu... 详细信息
来源: 评论
Robust Imagined Speech Production from Electrocorticography with Adaptive Frequency Enhancement
Robust Imagined Speech Production from Electrocorticography ...
收藏 引用
International Joint Conference on Neural networks (IJCNN)
作者: Xu Xu Chong Fu Junxin Chen Gwanggil Jeon David Camacho School of Computer Science and Engineering Northeastern University Shenyang China School of Software Dalian University of Technology Dalian China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang China Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang China College of Information Technology Incheon National University Incheon Korea Department of Computer Systems Engineering Universidad Politécnica de Madrid Madrid Spain
Imagined speech production with electrocorticography (ECoG) plays a crucial role in brain-computer interface system. A challenging issue is the great variation underlying the frequency bands of the ECoG signals’ enco... 详细信息
来源: 评论