咨询与建议

限定检索结果

文献类型

  • 3,011 篇 会议
  • 2,076 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 5,092 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,230 篇 工学
    • 2,021 篇 计算机科学与技术...
    • 1,565 篇 软件工程
    • 565 篇 信息与通信工程
    • 485 篇 控制科学与工程
    • 427 篇 电子科学与技术(可...
    • 396 篇 电气工程
    • 325 篇 机械工程
    • 282 篇 生物工程
    • 255 篇 光学工程
    • 198 篇 仪器科学与技术
    • 175 篇 化学工程与技术
    • 164 篇 生物医学工程(可授...
    • 154 篇 动力工程及工程热...
    • 125 篇 材料科学与工程(可...
    • 115 篇 交通运输工程
    • 107 篇 土木工程
    • 86 篇 建筑学
    • 82 篇 安全科学与工程
  • 1,731 篇 理学
    • 923 篇 数学
    • 456 篇 物理学
    • 326 篇 生物学
    • 257 篇 统计学(可授理学、...
    • 197 篇 系统科学
    • 172 篇 化学
  • 836 篇 管理学
    • 527 篇 管理科学与工程(可...
    • 329 篇 图书情报与档案管...
    • 164 篇 工商管理
  • 142 篇 医学
    • 120 篇 临床医学
    • 96 篇 基础医学(可授医学...
  • 107 篇 法学
    • 84 篇 社会学
  • 59 篇 经济学
  • 53 篇 农学
  • 26 篇 教育学
  • 14 篇 艺术学
  • 13 篇 军事学
  • 8 篇 文学

主题

  • 167 篇 laboratories
  • 137 篇 feature extracti...
  • 125 篇 computer archite...
  • 106 篇 computer science
  • 101 篇 computational mo...
  • 90 篇 semantics
  • 79 篇 training
  • 76 篇 optimization
  • 72 篇 accuracy
  • 71 篇 data mining
  • 70 篇 deep learning
  • 67 篇 bandwidth
  • 65 篇 hardware
  • 64 篇 protocols
  • 54 篇 clustering algor...
  • 53 篇 neural networks
  • 53 篇 predictive model...
  • 53 篇 delay
  • 51 篇 object detection
  • 47 篇 image segmentati...

机构

  • 179 篇 hubei province k...
  • 133 篇 school of comput...
  • 125 篇 department of co...
  • 117 篇 key laboratory o...
  • 114 篇 national enginee...
  • 104 篇 college of compu...
  • 99 篇 tianjin key labo...
  • 88 篇 key laboratory o...
  • 83 篇 college of compu...
  • 75 篇 department of co...
  • 72 篇 key laboratory o...
  • 68 篇 school of comput...
  • 60 篇 university of ch...
  • 59 篇 key laboratory o...
  • 58 篇 shandong provinc...
  • 57 篇 hubei province k...
  • 57 篇 college of infor...
  • 55 篇 school of softwa...
  • 50 篇 services computi...
  • 48 篇 key laboratory o...

作者

  • 108 篇 hai jin
  • 47 篇 xiaowei li
  • 41 篇 shen linlin
  • 36 篇 dan feng
  • 35 篇 zhang hua
  • 33 篇 jin hai
  • 28 篇 zhou mengchu
  • 28 篇 huawei li
  • 26 篇 ren jiadong
  • 24 篇 wang chundong
  • 22 篇 liu jun
  • 21 篇 li peng
  • 20 篇 changjun jiang
  • 20 篇 yu hu
  • 19 篇 wang lei
  • 19 篇 zhang xiaolong
  • 19 篇 cui zhihua
  • 19 篇 hu shengshan
  • 19 篇 wang wei
  • 19 篇 gao zan

语言

  • 4,487 篇 英文
  • 387 篇 其他
  • 232 篇 中文
  • 1 篇 日文
检索条件"机构=Computer and System Technology Laboratory"
5092 条 记 录,以下是111-120 订阅
排序:
A Copyright Authentication Method Balancing Watermark Robustness and Data Distortion  26
A Copyright Authentication Method Balancing Watermark Robust...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Wang, Chundong Li, Yue Tianjin University of Technology Tianjin300384 China National Engineering Laboratory for Virus Prevention and Control Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin China
Database watermarking plays an irreplaceable role in copyright authentication and data integrity protection, but the robustness of the watermark and the resulting data distortion are a pair of contradictory objects th... 详细信息
来源: 评论
PAIR: Protein-aptamer interaction prediction based on language models and contrastive learning framework
PAIR: Protein-aptamer interaction prediction based on langua...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Zhang, Jun Yan, Zhiqiang Zeng, Hao Zhu, Zexuan Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen China Shenzhen University College of Computer Science and Software Engineering Shenzhen China
Aptamers are single-stranded DNA or RNA oligonucleotides that selectively bind to specific targets, making them valuable for drug design and diagnostic applications. Identifying the interactions between aptamers and t... 详细信息
来源: 评论
Anti-3CLpro Molecular Design Based on the Model Constrained by Specific DTIs
Anti-3CLpro Molecular Design Based on the Model Constrained ...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Lin, Xiaoli Liu, Xuan Zhang, Xiaolong School of Computer Science and Technology Wuhan University of Science and Technology Hubei Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan China
computer-aided drug design and artificial intelligence-driven drug design have accelerated drug discovery. However, how to design effective drugs that have strong interaction ability with target proteins to further im... 详细信息
来源: 评论
A Coarse to Fine Detection Method for Prohibited Object in X-ray Images Based on Progressive Transformer Decoder  24
A Coarse to Fine Detection Method for Prohibited Object in X...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Ma, Chunjie Du, Lina Gao, Zan Zhuo, Li Wang, Meng Shandong Jinan China School of Computer Science and Technology Shandong Jianzhu University Shandong Jinan China Faculty of Information Technology Beijing University Of Technology Beijing China School of Computer Science and Information Engineering Hefei University of Technology Anhui Hefei China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China
Currently, Transformer-based prohibited object detection methods in X-ray images appear constantly, but there are still some shortcomings such as poor performance and high computational complexity for prohibited objec... 详细信息
来源: 评论
Tailoring Highly Confined Electric-field Based Optical Skyrmions
Tailoring Highly Confined Electric-field Based Optical Skyrm...
收藏 引用
2024 Photonics and Electromagnetics Research Symposium, PIERS 2024
作者: Chen, J. Shen, X. Zeng, Y. Zhan, Q. University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China University of Shanghai for Science and Technology Shanghai Key Laboratory of Modern Optical System Shanghai200093 China
Optical skyrmions are quasi-particles with nontrivial topological textures, which hold potential applications in optical information processing, transmission, and storage. There are various three-dimensional physical ... 详细信息
来源: 评论
Competitive and Cooperative-Based Strength Pareto Evolutionary Algorithm for Green Distributed Heterogeneous Flow Shop Scheduling
收藏 引用
Intelligent Automation & Soft Computing 2023年 第8期37卷 2077-2101页
作者: Kuihua Huang Rui Li Wenyin Gong Weiwei Bian Rui Wang College of System Engineering National University of Defense TechnologyChangsha410073China School of Computer Science China University of GeosciencesWuhan430074China Equipment General Technology Laboratory Beijing Mechanical Equipment Research InstituteBeijing100854China
This work aims to resolve the distributed heterogeneous permutation flow shop scheduling problem(DHPFSP)with minimizing makespan and total energy consumption(TEC).To solve this NP-hard problem,this work proposed a com... 详细信息
来源: 评论
An Image Semantic Communication system Based on GAN and Relative Position-Encoding
收藏 引用
IEEE Communications Letters 2025年 第6期29卷 1280-1284页
作者: Zhang, Ziqi Tan, Weijie Li, Chunguo Guizhou University College of Big Data and Information Engineering Guiyang550025 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Ministry of Industry and Information Technology Laboratory of Cryptography Application Technology Innovation and Testing Verification Beijing100015 China Southeast University School of Information Science and Engineering Nanjing210096 China
In image semantic communication, the complex wireless channel environment leads to the loss of image details and performance degradation during transmission. To address this issue, we propose an image semantic communi... 详细信息
来源: 评论
Fine-Grained Software Vulnerability Detection via Neural Architecture Search  28th
Fine-Grained Software Vulnerability Detection via Neural Ar...
收藏 引用
28th International Conference on Database systems for Advanced Applications, DASFAA 2023
作者: Du, Qianjin Kuang, Xiaohui Li, Xiang Zhao, Gang The Department of Computer Science and Technology Tsinghua University Beijing100084 China National Key Laboratory of Science and Technology on Information System Security Beijing100084 China
Vulnerability detection methods based on the deep learning have achieved remarkable performance improvements compared to traditional methods. Current deep learning-based detectors mostly use a single RNN or its varian... 详细信息
来源: 评论
Generating Molecules Conditional on 3D Protein Pockets with HGAF
Generating Molecules Conditional on 3D Protein Pockets with ...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Zhu, Qinglian Lin, Xiaoli Zhang, Xiaolong Wuhan University of Science and Technology Hubei Key Laboratory of Intelligent Information Processing and Real-Time Industrial System School of Computer Science and Technology Wuhan China
Most current representations of protein pockets are the atom-pair graph, which ignore the global structural information of amino acids. Therefore, we propose a new molecular generation model, which uses the hypergraph... 详细信息
来源: 评论
Method for Evaluating the Performance of Aircraft Collaborative Decision-Making Based on Dynamic Bayesian Network
Method for Evaluating the Performance of Aircraft Collaborat...
收藏 引用
2024 International Conference on Electronics and Devices, Computational Science, ICEDCS 2024
作者: Zhang, Wenbo Yu, Boxiao Tong, Jiahui Li, Jing Beijing Electro-Mechanical Engineering Institute National Key Laboratory of Complex System Control and Intelligent Agent Cooperation Beijing China Beijing Institute of Technology School of Computer Science and Technology Beijing China
This research addresses the challenge of assessing equipment decision-making effectiveness in environments characterized by uncertainty and multiple influencing factors. We propose a novel approach involving the creat... 详细信息
来源: 评论