咨询与建议

限定检索结果

文献类型

  • 2,763 篇 会议
  • 2,020 篇 期刊文献
  • 10 册 图书

馆藏范围

  • 4,793 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,002 篇 工学
    • 1,615 篇 计算机科学与技术...
    • 1,290 篇 软件工程
    • 567 篇 信息与通信工程
    • 532 篇 电气工程
    • 490 篇 控制科学与工程
    • 489 篇 电子科学与技术(可...
    • 317 篇 光学工程
    • 310 篇 机械工程
    • 252 篇 生物工程
    • 235 篇 动力工程及工程热...
    • 223 篇 仪器科学与技术
    • 184 篇 生物医学工程(可授...
    • 156 篇 化学工程与技术
    • 139 篇 材料科学与工程(可...
    • 109 篇 土木工程
    • 105 篇 交通运输工程
    • 72 篇 力学(可授工学、理...
    • 69 篇 建筑学
  • 1,582 篇 理学
    • 784 篇 数学
    • 494 篇 物理学
    • 295 篇 生物学
    • 233 篇 统计学(可授理学、...
    • 204 篇 系统科学
    • 155 篇 化学
  • 685 篇 管理学
    • 448 篇 管理科学与工程(可...
    • 247 篇 图书情报与档案管...
    • 166 篇 工商管理
  • 158 篇 医学
    • 134 篇 临床医学
    • 103 篇 基础医学(可授医学...
  • 88 篇 法学
    • 71 篇 社会学
  • 64 篇 经济学
  • 43 篇 农学
  • 14 篇 教育学
  • 14 篇 军事学
  • 12 篇 艺术学
  • 8 篇 文学

主题

  • 142 篇 laboratories
  • 106 篇 feature extracti...
  • 82 篇 computational mo...
  • 76 篇 data mining
  • 73 篇 computer science
  • 71 篇 optimization
  • 64 篇 training
  • 61 篇 deep learning
  • 61 篇 semantics
  • 60 篇 accuracy
  • 52 篇 neural networks
  • 50 篇 computer archite...
  • 49 篇 mathematical mod...
  • 43 篇 machine learning
  • 42 篇 hardware
  • 41 篇 predictive model...
  • 41 篇 control systems
  • 41 篇 protocols
  • 40 篇 object detection
  • 40 篇 costs

机构

  • 114 篇 national enginee...
  • 95 篇 college of compu...
  • 82 篇 school of contro...
  • 74 篇 state key labora...
  • 59 篇 school of comput...
  • 58 篇 college of infor...
  • 47 篇 hubei province k...
  • 43 篇 key laboratory o...
  • 41 篇 the key laborato...
  • 36 篇 department of co...
  • 35 篇 school of cyber ...
  • 33 篇 school of inform...
  • 33 篇 school of comput...
  • 32 篇 department of el...
  • 32 篇 university of ch...
  • 30 篇 school of optica...
  • 29 篇 school of comput...
  • 29 篇 shenzhen city ke...
  • 27 篇 national enginee...
  • 26 篇 key laboratory o...

作者

  • 42 篇 shen linlin
  • 35 篇 hai jin
  • 34 篇 shu-ching chen
  • 33 篇 mei-ling shyu
  • 31 篇 yang yang
  • 28 篇 zhou mengchu
  • 28 篇 zongli lin
  • 28 篇 ren jiadong
  • 27 篇 jin hai
  • 25 篇 chen shu-ching
  • 25 篇 hamid soltanian-...
  • 23 篇 shyu mei-ling
  • 20 篇 wang xingjun
  • 20 篇 ji zhen
  • 18 篇 xiao feng
  • 18 篇 mengchu zhou
  • 18 篇 hu shengshan
  • 18 篇 zhang zhigang
  • 17 篇 zhen ji
  • 17 篇 wang lei

语言

  • 4,270 篇 英文
  • 366 篇 其他
  • 160 篇 中文
  • 1 篇 日文
检索条件"机构=Computer and System Engineering Laboratory"
4793 条 记 录,以下是891-900 订阅
排序:
A Parallel and Pipelined Hardware Architecture for Fractional-Pixel Motion Estimation in AVS3
A Parallel and Pipelined Hardware Architecture for Fractiona...
收藏 引用
2022 IEEE International Conference on Consumer Electronics, ICCE 2022
作者: Zeng, Yuning Zhu, Xizhong Xiang, Guoqing Hao, Zhijian Zhang, Peng Huang, Xiaofeng Yan, Wei Peking University School of Software and Microelectronics Beijing China Advanced Institute of Information Technology Peking University Beijing China Peking University Shenzhen Guraduate School School of Electronic and Computer Engineering Shenzhen China Fudan University State Key Laboratory of ASIC System Shanghai China Hangzhou Dianzi University School of Communication Engineering Hangzhou China
The latest generation of video coding standards has significantly improved video coding performance. The third generation of audio video coding standards (AVS3) is one of these latest standards. However, due to the mo... 详细信息
来源: 评论
Few-Shot Camouflaged Object Segmentation
Few-Shot Camouflaged Object Segmentation
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Ziqiu Wang Yuying Li Yang Yang Yamin Li Gaoyang Liu Key Laboratory of Intelligent Sensing System and Security (Ministry of Education) School of Artificial Intelligence Hubei University Wuhan China School of Computer Science and Information Engineering Hubei University Wuhan China Huazhong University of Science and Technology Wuhan China
In the domain of computer vision, Camouflaged Object Segmentation (COS) is a crucial task aimed at identifying objects that blend into their surroundings, with applications spanning diverse sectors such as military, m... 详细信息
来源: 评论
BLDTS: Blockchain-based Lightweight Data Trusted Sharing Scheme for Internet of Vehicles
BLDTS: Blockchain-based Lightweight Data Trusted Sharing Sch...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Haoran Lin Zhongyuan Yu Guijuan Wang Anming Dong Xiang Tian School of Computer Science Qufu Normal University Rizhao China School of Information Science and Engineering Lanzhou University Lanzhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
Ensuring safe and reliable data sharing is crucial for the development of Internet of Vehicles (IoV) technology. To provide a trusted data environment for IoV and enable traditional consensus algorithms to meet the hi... 详细信息
来源: 评论
SFDE-net: A Spatial-Frequency Domain Feature Enhancement Network for Cloud Detection
SFDE-net: A Spatial-Frequency Domain Feature Enhancement Net...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Baotong Su Siyan Li Wenguang Zheng Yao Chen The School of Computer Science and Engineering Tianjin University of Technology Tianjin China Key Laboratory of Technology in Geo-Spatial Information Processing and Application System Chinese Academy of Sciences and Aerospace Information Research Institute Chinese Academy of Sciences Beijing China
Cloud detection is a crucial step in the preprocessing of satellite remote sensing images. Existing methods tend to have misjudgments when dealing with specific scenarios, such as challenges in distinguishing thin clo... 详细信息
来源: 评论
Dockformer: A transformer-based molecular docking paradigm for large-scale virtual screening
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Zhangfan Ji, Junkai He, Shan Li, Jianqiang He, Tiantian Bai, Ruibin Zhu, Zexuan Ong, Yew Soon School of Computer Science University of Nottingham Ningbo Ningbo315199 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Singapore138632 Singapore School of Computer Science University of Birmingham BirminghamB15 2TT United Kingdom School of Computer Science and Engineering Nanyang Technological University Nanyang Avenue 639798 Singapore
Molecular docking is a crucial step in drug development, which enables the virtual screening of compound libraries to identify potential ligands that target proteins of interest. However, the computational complexity ... 详细信息
来源: 评论
Downstream-agnostic Adversarial Examples
Downstream-agnostic Adversarial Examples
收藏 引用
International Conference on computer Vision (ICCV)
作者: Ziqi Zhou Shengshan Hu Ruizhi Zhao Qian Wang Leo Yu Zhang Junhui Hou Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Wuhan University School of Information and Communication Technology Griffith University Department of Computer Science City University of Hong Kong School of Computer Science and Technology Huazhong University of Science and Technology Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlabeled data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper...
来源: 评论
Method for constructing multi-dimensional feature map of malicious code  5
Method for constructing multi-dimensional feature map of mal...
收藏 引用
2020 5th International Seminar on computer Technology, Mechanical and Electrical engineering, ISCME 2020
作者: Ma, Haocong Zhang, Ji Zhou, Junhua Zhai, Xiang Xue, Junjie Ji, Hang State Key Laboratory of Intelligent Manufacturing System Technology Beijing Institute of Electronic System Engineering Beijing100854 China School of Computer Science and Technology Beijing Institute of Technology Beijing100081 China Beijing Complex Product Advanced Manufacturing Engineering Research Center Beijing Simulation Center Beijing100854 China Science and Technology on Space System Simulation Laboratory Beijing Simulation Center Beijing100854 China
Malicious code is characterized by a large number of types, rapid increase in number, continuous update of transmission routes, and continuous enhancement of back analysis and back detection methods. Therefore, how to... 详细信息
来源: 评论
A LiDAR-Assist Yaw Misalignment Compensation Method Based on Machine Learning Algorithms
A LiDAR-Assist Yaw Misalignment Compensation Method Based on...
收藏 引用
Chinese Control Conference (CCC)
作者: Pei Chen Zhongwei Lin Zihan Zhang Zhen Xie State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources School of Control and Computer Engineering North China Electric Power University Beijing P. R. China
Yaw misalignment is common in the yaw system control of wind turbines, resulting in reduced power generation efficiency and increased load. The advantage of LiDAR is that the accuracy of wind measurement is greatly im...
来源: 评论
PseudoSC: A Binary Approximation to Stochastic Computing within Latent Operation-Space for Ultra-Lightweight on-Edge DNNs  23
PseudoSC: A Binary Approximation to Stochastic Computing wit...
收藏 引用
Proceedings of the 60th Annual ACM/IEEE Design Automation Conference
作者: Jihe Wang Zhaoqing Wang Danghui Wang School of Computer Science Northwestern Polytechnical University Xi'an China Engineering Research Center of Embedded System Integration Ministry of Education Northwestern Polytechnical University Xi'an China National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology Northwestern Polytechnical University Xi'an China
Recently, stochastic computing (SC) is increasingly popular in constructing MAC for on-edge DNNs benefiting from its outstanding energy-efficiency, including its adequate precision and gatelevel operation. However, cu... 详细信息
来源: 评论
Robust Phase Retrieval from Quantized and Noisy Measurements
Robust Phase Retrieval from Quantized and Noisy Measurements
收藏 引用
Acoustics, Speech, and Signal Processing Workshops (ICASSPW), IEEE International Conference on
作者: Yihong Gao Luteng Zhu Zhuoyang An Mingjie Shao Department of Electrical and Electronic Engineering The University of Hong Kong Hong Kong SAR China School of Information Science and Engineering Shandong University Qingdao China Computer School Beijing Information Science and Technology University Beijing China Key Laboratory of System and Control AMSS Chinese Academy of Sciences Beijing China
The phase retrieval (PR) problem involves recovering a signal from amplitude-only measurements and has been extensively studied in various physical measurement and signal processing systems. Recently, there has been i... 详细信息
来源: 评论