咨询与建议

限定检索结果

文献类型

  • 2,763 篇 会议
  • 2,012 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 4,785 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,003 篇 工学
    • 1,616 篇 计算机科学与技术...
    • 1,290 篇 软件工程
    • 567 篇 信息与通信工程
    • 533 篇 电气工程
    • 491 篇 控制科学与工程
    • 489 篇 电子科学与技术(可...
    • 317 篇 光学工程
    • 310 篇 机械工程
    • 252 篇 生物工程
    • 235 篇 动力工程及工程热...
    • 223 篇 仪器科学与技术
    • 184 篇 生物医学工程(可授...
    • 156 篇 化学工程与技术
    • 139 篇 材料科学与工程(可...
    • 109 篇 土木工程
    • 105 篇 交通运输工程
    • 72 篇 力学(可授工学、理...
    • 70 篇 建筑学
  • 1,582 篇 理学
    • 785 篇 数学
    • 494 篇 物理学
    • 294 篇 生物学
    • 233 篇 统计学(可授理学、...
    • 204 篇 系统科学
    • 155 篇 化学
  • 684 篇 管理学
    • 447 篇 管理科学与工程(可...
    • 247 篇 图书情报与档案管...
    • 166 篇 工商管理
  • 157 篇 医学
    • 134 篇 临床医学
    • 102 篇 基础医学(可授医学...
  • 89 篇 法学
    • 72 篇 社会学
  • 64 篇 经济学
  • 43 篇 农学
  • 14 篇 教育学
  • 14 篇 军事学
  • 12 篇 艺术学
  • 8 篇 文学

主题

  • 142 篇 laboratories
  • 106 篇 feature extracti...
  • 82 篇 computational mo...
  • 76 篇 data mining
  • 73 篇 computer science
  • 71 篇 optimization
  • 61 篇 deep learning
  • 61 篇 semantics
  • 61 篇 training
  • 57 篇 accuracy
  • 52 篇 neural networks
  • 50 篇 computer archite...
  • 48 篇 mathematical mod...
  • 42 篇 machine learning
  • 42 篇 hardware
  • 41 篇 predictive model...
  • 41 篇 protocols
  • 40 篇 object detection
  • 40 篇 control systems
  • 40 篇 costs

机构

  • 113 篇 national enginee...
  • 95 篇 college of compu...
  • 81 篇 school of contro...
  • 72 篇 state key labora...
  • 59 篇 school of comput...
  • 58 篇 college of infor...
  • 47 篇 hubei province k...
  • 43 篇 key laboratory o...
  • 41 篇 the key laborato...
  • 36 篇 department of co...
  • 36 篇 school of cyber ...
  • 33 篇 school of inform...
  • 33 篇 school of comput...
  • 32 篇 department of el...
  • 32 篇 university of ch...
  • 30 篇 school of optica...
  • 29 篇 shenzhen city ke...
  • 28 篇 school of comput...
  • 27 篇 national enginee...
  • 26 篇 key laboratory o...

作者

  • 42 篇 shen linlin
  • 34 篇 shu-ching chen
  • 34 篇 hai jin
  • 33 篇 mei-ling shyu
  • 31 篇 yang yang
  • 30 篇 ren jiadong
  • 28 篇 zhou mengchu
  • 28 篇 zongli lin
  • 27 篇 jin hai
  • 25 篇 chen shu-ching
  • 25 篇 hamid soltanian-...
  • 23 篇 shyu mei-ling
  • 20 篇 wang xingjun
  • 20 篇 ji zhen
  • 19 篇 hu shengshan
  • 18 篇 xiao feng
  • 18 篇 mengchu zhou
  • 18 篇 zhigang zhang
  • 17 篇 zhen ji
  • 17 篇 wang lei

语言

  • 4,264 篇 英文
  • 366 篇 其他
  • 158 篇 中文
  • 1 篇 日文
检索条件"机构=Computer and System Engineering Laboratory"
4785 条 记 录,以下是711-720 订阅
排序:
Data-Driven Learning and Control with Event-Triggered Measurements
收藏 引用
IEEE Transactions on Automatic Control 2025年
作者: Feng, Shilun Shi, Dawei Chen, Tongwen Shi, Ling Beijing Institute of Technology State Key Laboratory of Intelligent Control and Decision of Complex Systems MIIT Key Laboratory of Servo Motion System Drive and Control School of Automation Beijing100081 China University of Alberta Department of Electrical and Computer Engineering EdmontonABT6G 1H9 Canada Hong Kong University of Science and Technology Department of Electronic and Computer Engineering Clear Water Bay Kowloon Hong Kong
Event-triggered control has attracted considerable attention for its effectiveness in resource-restricted applications. To make event-triggered control as an end-to-end solution, a key issue is how to effectively lear... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
"DOMINO - Stop Domestic Violence". An Educational Mobile Application
"DOMINO - Stop Domestic Violence". An Educational Mobile App...
收藏 引用
21st International Conference on Informatics, Management, and Technology in Healthcare, ICIMTH 2023
作者: Sakellari, Evanthia Murto, Tiina Häsänen, Marjatta Turunen, Timo Modhwadia, Hitesh Sotto-Mayor De Carvalho Pinto, Maria Luisa Ferreira Dos Santos, Maria Anabela Lagiou, Areti Department of Public and Community Health Laboratory of Hygiene and Epidemiology University of West Attica Athens Greece Faculty of Health and wellbeing Turku University of Applied Sciences Turku Finland Master Degree of Social Science in Business Financial Management Riga Technical University Latvia Master Degree of Engineering in Computer System Riga Technical University Latvia Portugal
Domestic violence affects people of all socioeconomic backgrounds and education levels and can happen to anyone. It is a public health issue that needs to be addressed with health and social care professionals playing... 详细信息
来源: 评论
Prediction-Based Thunderstorm Path Recovery Method Using CNN-BiLSTM
收藏 引用
Intelligent Automation & Soft Computing 2023年 第8期37卷 1637-1654页
作者: Xu Yang Ling Zhuang Yuqiang Sun Wenjie Zhang School of Electronics and Information Engineering Nanjing University of Information Science and TechnologyNanjing210044China Department of Electrical and Computer Engineering University of AlbertaEdmontonAB T6G 2R3Canada CCCC Highway Consultants Co. Ltd.Beijing100101China School of Geographical Sciences Nanjing University of Information Science and TechnologyNanjing210044China State Key Laboratory of Resources and Environmental Information System Institute of Geographic Sciences and Natural Resources ResearchChinese Academy of SciencesBeijing100101China
The loss of three-dimensional atmospheric electric field(3DAEF)data has a negative impact on thunderstorm *** paper proposes a method for thunderstorm point charge path *** on the relation-ship between a point charge ... 详细信息
来源: 评论
PAM-4 optical transmission beyond 224 Gbps based on an ultrahigh-bandwidth slow-light silicon modulator
PAM-4 optical transmission beyond 224 Gbps based on an ultra...
收藏 引用
CLEO: Applications and Technology in CLEO 2024, CLEO: A and T 2024 - Part of Conference on Lasers and Electro-Optics
作者: Han, Changhao Qin, Jun Yang, Qipeng Zheng, Zhao Shu, Haowen Zhang, Yunhao Wu, Yichen Sun, Yu Lu, Junde Zhou, Yan Ge, Zhangfeng Wang, Lei He, Zhixue Yu, Shaohua Hu, Weiwei Peng, Chao Bowers, John E. Wang, Xingjun State Key Laboratory of Advanced Optical Communications System and Networks School of Electronics Peking University Beijing100871 China Department of Electrical and Computer Engineering University of California Santa BarbaraCA93106 United States Key Laboratory of Information and Communication Systems Ministry of Information Industry Beijing Information Science and Technology University Beijing100192 China Frontiers Science Center for Nano-optoelectronics Peking University Beijing100871 China Peng Cheng Laboratory Shenzhen518055 China Peking University Yangtze Delta Institute of Optoelectronics Nantong226010 China
We experimentally demonstrate PAM-4 optical transmission beyond 224 Gbps based on an ultrahigh-bandwidth slow-light silicon modulator in C-band with the combination of the artificial neural network equalizers. © ... 详细信息
来源: 评论
Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning
arXiv
收藏 引用
arXiv 2024年
作者: Du, Xiaohu Wen, Ming Zhu, Jiahao Xie, Zifan Ji, Bin Liu, Huijun Shi, Xuanhua Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China College of Computer National University of Defense Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab HUST Wuhan430074 China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security HUST Wuhan430074 China JinYinHu Laboratory Wuhan430077 China Cluster and Grid Computing Lab HUST Wuhan430074 China
Code Pre-trained Models (CodePTMs) based vulnerability detection have achieved promising results over recent years. However, these models struggle to generalize as they typically learn superficial mapping from source ... 详细信息
来源: 评论
Learning to Cluster Person in the Video via Graph Convolution Network
Learning to Cluster Person in the Video via Graph Convolutio...
收藏 引用
IEEE International Symposium on Information (IT) in Medicine and Education, ITME
作者: Wei Li Sixin Liang Ang Bian Guodong Du College of Computer Science Sichuan University Chengdu China The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province School of Information Science and Engineering Yanshan University Qinhuangdao P.R. China
Video person re-identification is receiving academic interest. However, the practical application of the algorithm is hardly supported because of prohibitive annotated data. Hence, the study for unlabeled data will le...
来源: 评论
Video2Reward: Generating Reward Function from Videos for Legged Robot Behavior Learning
arXiv
收藏 引用
arXiv 2024年
作者: Zeng, Runhao Zhou, Dingjie Liang, Qiwei Liu, Junlin Li, Hui Huang, Changxin Li, Jianqiang Hu, Xiping Sun, Fuchun Artificial Intelligence Research Institute Shenzhen MSU-BIT University China College of Mechatronics and Control Engineering Shenzhen University China College of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Computer Science and Technology Tsinghua University China
Learning behavior in legged robots presents a significant challenge due to its inherent instability and complex constraints. Recent research has proposed the use of a large language model (LLM) to generate reward func... 详细信息
来源: 评论
Insulating materials for realising carbon neutrality:Opportunities,remaining issues and challenges
收藏 引用
High Voltage 2022年 第4期7卷 610-632页
作者: Chuanyang Li Yang Yang Guoqiang Xu Yao Zhou Mengshuo Jia Shaolong Zhong Yu Gao Chanyeop Park Qiang Liu Yalin Wang Shakeel Akram Xiaoliang Zeng Yi Li Fangwei Liang Bin Cui Junpeng Fang Lingling Tang Yulin Zeng Xingtao Hu Jiachen Gao Giovanni Mazzanti Jinliang He Jianxiao Wang Davide Fabiani Gilbert Teyssedre Yang Cao Feipeng Wang Yunlong Zi The State Key Laboratory of Power System Department of Electrical EngineeringTsinghua UniversityBeijingChina Department of Mechanical and Automation Engineering The Chinese University of Hong KongHong KongChina Simpson Querrey Institute Northwestern UniversityEvanstonIllinoisUSA Department of Materials Science and Engineering The Pennsylvania State UniversityUniversity ParkPennsylvaniaUSA Department of Information Technology and Electrical Engineering ETH ZürichZürichSwitzerland School of Electrical and Information Engineering Tianjin UniversityTianjinChina Department of Electrical and Computer Engineering Mississippi State UniversityMississippi StateMississippiUSA Electrical and Electronic Engineering The University of ManchesterManchesterUK Department of Electrical Engineering School of Electronic Information and Electrical EngineeringShanghai Jiao Tong UniversityShanghaiChina Key Laboratory of Control of Power Transmission and Conversion(SJTU) Ministry of EducationShanghaiChina College of Electrical Engineering Sichuan UniversityChengduChina Shenzhen Institute of Advanced Technology Chinese Academy of Sciences ShenzhenShenzhenChina School of Electrical Engineering Wuhan UniversityWuhanChina School of Integrated Circuits Tsinghua UniversityBeijingChina Jiangsu Jinxin Electric Appliance Co.Ltd. YangzhouChina Tai'an Tiancheng Safety Evaluation Co. Ltd.Tai'anChina Department Electrical Electronic and Information EngineeringUniversity of BolognaBolognaItaly National Engineering Laboratory for Big Data Analysis and Applications Peking UniversityBeijingChina Laplace Paul Sabatier Universityand CNRSToulouseFrance Electrical and Computer Engineering University of ConnecticutStorrsConnecticutUSA State Key Laboratory of Power Transmission Equipment&System Security and New Technology School of Electrical EngineeringChongqing UniversityChongqingChina Thrust of Sustainable Energy and Environment The Hong Kong University of Science and Technology(Guangzhou)GuangzhouChina De
The 2050 carbon-neutral vision spawns a novel energy structure revolution,and the construction of the future energy structure is based on equipment *** material,as the core of electrical power equipment and electrifie... 详细信息
来源: 评论
Concept-Level Semantic Transfer and Context-Level Distribution Modeling for Few-Shot Segmentation
收藏 引用
IEEE Transactions on Circuits and systems for Video Technology 2025年
作者: Luo, Yuxuan Chen, Jinpeng Cong, Runmin Ip, Horace Ho Shing Kwong, Sam City University of Hong Kong Department of Computer Science Hong Kong Shandong University School of Control Science and Engineering Jinan250061 China Ministry of Education Key Laboratory of Machine Intelligence and System Control Jinan250061 China Lingnan University Hong Kong
Few-shot segmentation (FSS) methods aim to segment objects using only a few pixel-level annotated samples. Current approaches either derive a generalized class representation from support samples to guide the segmenta... 详细信息
来源: 评论