咨询与建议

限定检索结果

文献类型

  • 2,763 篇 会议
  • 2,020 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 4,793 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,002 篇 工学
    • 1,615 篇 计算机科学与技术...
    • 1,290 篇 软件工程
    • 567 篇 信息与通信工程
    • 532 篇 电气工程
    • 490 篇 控制科学与工程
    • 489 篇 电子科学与技术(可...
    • 317 篇 光学工程
    • 310 篇 机械工程
    • 252 篇 生物工程
    • 235 篇 动力工程及工程热...
    • 223 篇 仪器科学与技术
    • 184 篇 生物医学工程(可授...
    • 156 篇 化学工程与技术
    • 139 篇 材料科学与工程(可...
    • 109 篇 土木工程
    • 105 篇 交通运输工程
    • 72 篇 力学(可授工学、理...
    • 69 篇 建筑学
  • 1,582 篇 理学
    • 784 篇 数学
    • 494 篇 物理学
    • 295 篇 生物学
    • 233 篇 统计学(可授理学、...
    • 204 篇 系统科学
    • 155 篇 化学
  • 685 篇 管理学
    • 448 篇 管理科学与工程(可...
    • 247 篇 图书情报与档案管...
    • 166 篇 工商管理
  • 158 篇 医学
    • 134 篇 临床医学
    • 103 篇 基础医学(可授医学...
  • 88 篇 法学
    • 71 篇 社会学
  • 64 篇 经济学
  • 43 篇 农学
  • 14 篇 教育学
  • 14 篇 军事学
  • 12 篇 艺术学
  • 8 篇 文学

主题

  • 142 篇 laboratories
  • 106 篇 feature extracti...
  • 82 篇 computational mo...
  • 76 篇 data mining
  • 73 篇 computer science
  • 71 篇 optimization
  • 64 篇 training
  • 61 篇 deep learning
  • 61 篇 semantics
  • 60 篇 accuracy
  • 52 篇 neural networks
  • 50 篇 computer archite...
  • 49 篇 mathematical mod...
  • 43 篇 machine learning
  • 42 篇 hardware
  • 41 篇 predictive model...
  • 41 篇 control systems
  • 41 篇 protocols
  • 40 篇 object detection
  • 40 篇 costs

机构

  • 114 篇 national enginee...
  • 95 篇 college of compu...
  • 82 篇 school of contro...
  • 74 篇 state key labora...
  • 59 篇 school of comput...
  • 58 篇 college of infor...
  • 47 篇 hubei province k...
  • 43 篇 key laboratory o...
  • 41 篇 the key laborato...
  • 36 篇 department of co...
  • 35 篇 school of cyber ...
  • 33 篇 school of inform...
  • 33 篇 school of comput...
  • 32 篇 department of el...
  • 32 篇 university of ch...
  • 30 篇 school of optica...
  • 29 篇 school of comput...
  • 29 篇 shenzhen city ke...
  • 27 篇 national enginee...
  • 26 篇 key laboratory o...

作者

  • 42 篇 shen linlin
  • 35 篇 hai jin
  • 34 篇 shu-ching chen
  • 33 篇 mei-ling shyu
  • 31 篇 yang yang
  • 28 篇 zhou mengchu
  • 28 篇 zongli lin
  • 28 篇 ren jiadong
  • 27 篇 jin hai
  • 25 篇 chen shu-ching
  • 25 篇 hamid soltanian-...
  • 23 篇 shyu mei-ling
  • 20 篇 wang xingjun
  • 20 篇 ji zhen
  • 18 篇 xiao feng
  • 18 篇 mengchu zhou
  • 18 篇 hu shengshan
  • 18 篇 zhang zhigang
  • 17 篇 zhen ji
  • 17 篇 wang lei

语言

  • 4,270 篇 英文
  • 366 篇 其他
  • 160 篇 中文
  • 1 篇 日文
检索条件"机构=Computer and System Engineering Laboratory"
4793 条 记 录,以下是691-700 订阅
排序:
Tunable Rectification of Diffusion-Wave Fields by Spatiotemporal Metamaterials
收藏 引用
Physical Review Letters 2022年 第25期129卷 256601-256601页
作者: Jiaxin Li Zhanxiang Zhang Guoqiang Xu Haoran Sun Lizhou Dai Tianlong Li Cheng-Wei Qiu Department of Electrical and Computer Engineering National University of Singapore Singapore 117583 Singapore State Key Laboratory of Robotics and System Harbin Institute of Technology Harbin 150001 China
The diffusion process is the basis of many branches of science and engineering, and generally obeys reciprocity between two ports of a linear time-invariant medium. Recent research on classical wave dynamics has explo... 详细信息
来源: 评论
Goat Feeding Behavior Modeling and Monitoring Utilizing Livestock Wearable Device and Machine Learning Algorithm
Goat Feeding Behavior Modeling and Monitoring Utilizing Live...
收藏 引用
IEEE World Forum on Internet of Things (WF-IoT)
作者: Melchizedek Alipio Gianne Marcus Obusan Julianne Abbe Ong Samuel Perez Anton Luis Garces Miroslav Bures Department of Computer Science System Testing Intelligent Laboratory FEE Czech Technical University in Prague Prague 2 Czech Republic Department of Electronics and Computer Engineering De La Salle University Manila Philippines
Goat farming shows potential as one of the so-lutions for providing quality livestock products in developing countries. Goat health is essential in determining the quality of goods obtained from the goat. Smart livest... 详细信息
来源: 评论
Paired regions for shadow removal approach based on multi-features
收藏 引用
High Technology Letters 2023年 第2期29卷 174-180页
作者: 张之政 GUO Mingqiang WU Liang HUANG Ying CHEN Xueye Key Laboratory of Urban Land Resources Monitoring and Simulation Ministry of Natural ResourcesShenzhen 518034P.R.China National Engineering Research Center of Geographic Information System China University of GeosciencesWuhan 430074P.R.China School of Computer Science China University of GeosciencesWuhan 430074P.R.China Wuhan Zondy Cyber Technology Co. Ltd.Wuhan 430074P.R.China
The existence of shadow leads to the degradation of the image qualities and the defect of ground object *** removal is therefore an essential research topic in image processing *** biggest challenge of shadow removal ... 详细信息
来源: 评论
DPFuzzer: Discovering Safety Critical Vulnerabilities for Drone Path Planners
DPFuzzer: Discovering Safety Critical Vulnerabilities for Dr...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Yue Wang Chao Yang Xiaodong Zhang Yuwanqi Deng JianFeng Ma State Key Laboratory of Integrated Services Networks (ISN) Xidian University China Shaanxi Key Laboratory of Network and System Security Xidian University Xi'an China School of Cyber Engineering Xidian University China School of Computer Science and Technology Xidian University China
State-of-the-art drone path planners enable drones to autonomously travel through obstacles in GPS-denied, uncharted, cluttered environments. However, our investigation shows that path planners fail to maneuver drones... 详细信息
来源: 评论
Parallelism or Fairness? How to Be Friendly for SSDs in Cloud Environments
Parallelism or Fairness? How to Be Friendly for SSDs in Clou...
收藏 引用
IEEE International Conference on Cluster Computing
作者: Yang Zhou Fang Wang Zhan Shi Dan Feng Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of data storage systems and Technology Ministry of Education of China Wuhan China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Modern SSDs achieve low latency and high throughput by utilizing multiple levels of SSD parallelism. Fairness is also a critical design consideration in cloud environments and has inspired great interest in recent yea... 详细信息
来源: 评论
Parameter-Efficient Multi-Modal Tuning for Salient Object Detection
SSRN
收藏 引用
SSRN 2025年
作者: Zhang, Zixuan Shi, Fan Jia, Chen Wang, Mianzhao Louis, Assale Adje Cheng, Xu Engineering Research Center of Learning-Based Intelligent System Ministry of Education Tianjin University of Technology Tianjin300384 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China Yamoussoukro999063 Ivory Coast Smart Innovation Norway Norway
Salient object detection (SOD) is a key preprocessing step in various computer vision tasks, aiming to replicate the human visual system to identify the most significant objects or regions in images or videos. However... 详细信息
来源: 评论
Improved Multistep Model Predictive Control for Six-Step Operation of Traction PMSM Drives
Improved Multistep Model Predictive Control for Six-Step Ope...
收藏 引用
Workshop on Predictive Control of Electrical Drives and Power Electronics (PRECEDE)
作者: Zhenyao Sun Shuai Xu Guangtong Ma Juri Jatskevich State Key Laboratory of Rail Transit Vehicle System Southwest Jiaotong University Chengdu China Department of Electrical and Computer Engineering The University of British Columbia Vancouver Canada
Model predictive control (MPC) has recently been considered for many permanent magnet synchronous machine (PMSM) drive applications. However, the conventional MPC lacks accurate current tracking and fast dynamic respo...
来源: 评论
Realizing Emotional Interactions to Learn User Experience and Guide Energy Optimization for Mobile Architectures  22
Realizing Emotional Interactions to Learn User Experience an...
收藏 引用
Proceedings of the 55th Annual IEEE/ACM International Symposium on Microarchitecture
作者: Xueliang Li Zhuobin Shi Junyang Chen Yepang Liu National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China College of Computer Science and Software Engineering Shenzhen University China Research Institute of Trustworthy Autonomous Systems Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation and Department of Computer Science and Engineering Southern University of Science and Technology China
In the age of AI, mobile architectures such as smartphones are still "cold machines"; machines do not feel. If the architecture is able to feel users' feelings and runtime user experience (UX), it will a...
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
MAGIC: detecting advanced persistent threats via masked graph representation learning  24
MAGIC: detecting advanced persistent threats via masked grap...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Zian Jia Yun Xiong Yuhong Nan Yao Zhang Jinjing Zhao Mi Wen Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China School of Software Engineering Sun Yat-sen University China National Key Laboratory of Science and Technology on Information System Security China Shanghai University of Electric Power China
Advance Persistent Threats (APTs), adopted by most delicate attackers, are becoming increasing common and pose great threat to various enterprises and institutions. Data provenance analysis on provenance graphs has em...
来源: 评论