咨询与建议

限定检索结果

文献类型

  • 3,011 篇 会议
  • 2,076 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 5,092 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,230 篇 工学
    • 2,021 篇 计算机科学与技术...
    • 1,565 篇 软件工程
    • 565 篇 信息与通信工程
    • 485 篇 控制科学与工程
    • 427 篇 电子科学与技术(可...
    • 396 篇 电气工程
    • 325 篇 机械工程
    • 282 篇 生物工程
    • 255 篇 光学工程
    • 198 篇 仪器科学与技术
    • 175 篇 化学工程与技术
    • 164 篇 生物医学工程(可授...
    • 154 篇 动力工程及工程热...
    • 125 篇 材料科学与工程(可...
    • 115 篇 交通运输工程
    • 107 篇 土木工程
    • 86 篇 建筑学
    • 82 篇 安全科学与工程
  • 1,731 篇 理学
    • 923 篇 数学
    • 456 篇 物理学
    • 326 篇 生物学
    • 257 篇 统计学(可授理学、...
    • 197 篇 系统科学
    • 172 篇 化学
  • 836 篇 管理学
    • 527 篇 管理科学与工程(可...
    • 329 篇 图书情报与档案管...
    • 164 篇 工商管理
  • 142 篇 医学
    • 120 篇 临床医学
    • 96 篇 基础医学(可授医学...
  • 107 篇 法学
    • 84 篇 社会学
  • 59 篇 经济学
  • 53 篇 农学
  • 26 篇 教育学
  • 14 篇 艺术学
  • 13 篇 军事学
  • 8 篇 文学

主题

  • 167 篇 laboratories
  • 137 篇 feature extracti...
  • 125 篇 computer archite...
  • 106 篇 computer science
  • 101 篇 computational mo...
  • 90 篇 semantics
  • 79 篇 training
  • 76 篇 optimization
  • 72 篇 accuracy
  • 71 篇 data mining
  • 70 篇 deep learning
  • 67 篇 bandwidth
  • 65 篇 hardware
  • 64 篇 protocols
  • 54 篇 clustering algor...
  • 53 篇 neural networks
  • 53 篇 predictive model...
  • 53 篇 delay
  • 51 篇 object detection
  • 47 篇 image segmentati...

机构

  • 179 篇 hubei province k...
  • 133 篇 school of comput...
  • 125 篇 department of co...
  • 117 篇 key laboratory o...
  • 114 篇 national enginee...
  • 104 篇 college of compu...
  • 99 篇 tianjin key labo...
  • 88 篇 key laboratory o...
  • 83 篇 college of compu...
  • 75 篇 department of co...
  • 72 篇 key laboratory o...
  • 68 篇 school of comput...
  • 60 篇 university of ch...
  • 59 篇 key laboratory o...
  • 58 篇 shandong provinc...
  • 57 篇 hubei province k...
  • 57 篇 college of infor...
  • 55 篇 school of softwa...
  • 50 篇 services computi...
  • 48 篇 key laboratory o...

作者

  • 108 篇 hai jin
  • 47 篇 xiaowei li
  • 41 篇 shen linlin
  • 36 篇 dan feng
  • 35 篇 zhang hua
  • 33 篇 jin hai
  • 28 篇 zhou mengchu
  • 28 篇 huawei li
  • 26 篇 ren jiadong
  • 24 篇 wang chundong
  • 22 篇 liu jun
  • 21 篇 li peng
  • 20 篇 changjun jiang
  • 20 篇 yu hu
  • 19 篇 wang lei
  • 19 篇 zhang xiaolong
  • 19 篇 cui zhihua
  • 19 篇 hu shengshan
  • 19 篇 wang wei
  • 19 篇 gao zan

语言

  • 4,487 篇 英文
  • 387 篇 其他
  • 232 篇 中文
  • 1 篇 日文
检索条件"机构=Computer and System Technology Laboratory"
5092 条 记 录,以下是181-190 订阅
排序:
MLPFormer: MLP-integrated transformer for colorectal histopathology whole slide image segmentation
收藏 引用
Neural Computing and Applications 2025年 第6期37卷 4651-4661页
作者: Wang, Yuxuan Li, Dan Li, Xuechen Guo, Yan Zuo, Yanfei Shen, Linlin Department of Computer Science Wenzhou-Kean University Wenzhou China School of Electronics and Information Engineering Wuyi University Jiangmen China Department of Histo Pathology Shanghai Histo Pathology Diagnostic Center Shanghai China College of Computer Sicence and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China
Colorectal intraepithelial neoplasia is a precancerous lesion of colorectal cancer, which is mainly diagnosed using pathological images. According to the characteristics of lesions, precancerous lesions can be classif... 详细信息
来源: 评论
Learning to Cluster Person in the Video via Graph Convolution Network  13
Learning to Cluster Person in the Video via Graph Convolutio...
收藏 引用
13th International Conference on Information technology in Medicine and Education, ITME 2023
作者: Li, Wei Liang, Sixin Bian, Ang Du, Guodong College of Computer Science Sichuan University Chengdu China School of Information Science and Engineering Yanshan University The Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Qinhuangdao China
Video person re-identification is receiving academic interest. However, the practical application of the algorithm is hardly supported because of prohibitive annotated data. Hence, the study for unlabeled data will le... 详细信息
来源: 评论
A Reliability Framework for Proactive-Tolerance Reed-Solomon Storage systems
A Reliability Framework for Proactive-Tolerance Reed-Solomon...
收藏 引用
2024 IEEE International Conference on systems, Man, and Cybernetics, SMC 2024
作者: Li, Jing Zhou, Zhenrui Ding, Jinali College of Computer Science and Technology Civil Aviation University of China Tianjin China Key Laboratory of Theory and System of Civil Aviation Smart Airport Civil Aviation University of China Tianjin China
Reed-Solomon coding has been widely adopted to protect data storage against failures in storage systems. Recently, proactive fault tolerance is coming to offer an added protection for data storage coping with the incr... 详细信息
来源: 评论
RKSeg+: make full use of Runge–Kutta methods in medical image segmentation
收藏 引用
Multimedia systems 2024年 第2期30卷 1-13页
作者: Zhu, Mai Fu, Chong Wang, Xingwei School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang110819 China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China
The dynamical system perspective has been used to build efficient image classification networks and semantic segmentation networks. Furthermore, the Runge–Kutta (RK) methods are powerful tools for building networks f... 详细信息
来源: 评论
Trimap generation with background for natural image matting  3
Trimap generation with background for natural image matting
收藏 引用
3rd International Conference on Optics and Machine Vision, ICOMV 2024
作者: Fu, Qian Liang, Yihui Kun, Zou Feng, Fujian Xu, Xiang School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Computer Science Zhongshan Institute University of Electronic Science and Technology of China Zhongshan China Guizou Key Laboratory of Pattern Recognition and Intelligent System Guizhou Minzu University Guiyang China
Image matting is a widely-used image processing technique that aims at accurately separating foreground from an image. However, this is a challenging and ill-posed problem that demands additional input, such as trimap... 详细信息
来源: 评论
A Study on Semi-Supervised Semantic Segmentation of Ship Flame Images  29
A Study on Semi-Supervised Semantic Segmentation of Ship Fla...
收藏 引用
29th IEEE International Conference on Parallel and Distributed systems, ICPADS 2023
作者: Wan, Junwei Chen, Yaojie Zheng, Xuecong Wuhan University of Science and Technology Department of Computer Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan China
In addressing the challenges of limited semantic labeling data and imprecise segmentation regions prevalent in the semantic segmentation of ship flame images, this study introduces a semi-supervised semantic segmentat... 详细信息
来源: 评论
Improved Demonstration-Knowledge Utilization in Reinforcement Learning
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第5期5卷 2139-2150页
作者: Liu, Yanyu Zeng, Yifeng Ma, Biyang Pan, Yinghui Gao, Huifan Zhang, Yuting Xiamen University Xiamen Key Laboratory of Big Data Intelligent Analysis and Decision Department of Automation Xiamen361102 China Northumbria University Department of Computer and Information Sciences NewcastleNE1 8ST United Kingdom Minnan Normal University Department of Computer Science Zhangzhou363000 China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China
Reinforcement learning (RL) has made great success in recent years. Generally, the learning process requires a huge amount of interaction with the environment before an agent can achieve acceptable performance. This m... 详细信息
来源: 评论
Video matting based on local-global features fusion  4
Video matting based on local-global features fusion
收藏 引用
4th International Conference on Machine Learning and computer Application, ICMLCA 2023
作者: Dong, Niuniu Liang, Yihui Zou, Kun Li, Wensheng Feng, Fujian School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Computer Science Zhongshan Institute University of Electronic Science and Technology of China Zhongshan China Guizhou Key Laboratory of Pattern Recognition and Intelligent System Guizhou Minzu University Guiyang China
Video matting aims at accurately separating foreground from videos. Recent video matting researches pursue to eliminate auxiliary inputs. However, due to the limited ability of extracting global correlation features, ... 详细信息
来源: 评论
A Surrogate-Assisted Evolutionary Algorithm for Expensive Dynamic Multimodal Optimzation  13
A Surrogate-Assisted Evolutionary Algorithm for Expensive Dy...
收藏 引用
13th IEEE Congress on Evolutionary Computation, CEC 2024
作者: Wu, Xunfeng Liu, Songbai Ji, Junkai Ma, Lijia Leung, Victor C. M. Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China The University of British Columbia Department of Electrical and Computer Engineering Vancouver Canada
Surrogate-assisted evolutionary algorithms (SAEAs) have demonstrated promising optimization performance in addressing expensive dynamic optimization problems or expensive multimodal optimization problems. However, non... 详细信息
来源: 评论
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models  41
Intersecting-Boundary-Sensitive Fingerprinting for Tampering...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Bai, Xiaofan He, Chaoxiang Ma, Xiaojing Zhu, Bin Benjamin Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Microsoft United States School of Computer Science and Technology Huazhong University of Science and Technology China Cluster and Grid Computing Lab China
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr... 详细信息
来源: 评论