咨询与建议

限定检索结果

文献类型

  • 3,011 篇 会议
  • 2,076 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 5,092 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,230 篇 工学
    • 2,021 篇 计算机科学与技术...
    • 1,565 篇 软件工程
    • 565 篇 信息与通信工程
    • 485 篇 控制科学与工程
    • 427 篇 电子科学与技术(可...
    • 396 篇 电气工程
    • 325 篇 机械工程
    • 282 篇 生物工程
    • 255 篇 光学工程
    • 198 篇 仪器科学与技术
    • 175 篇 化学工程与技术
    • 164 篇 生物医学工程(可授...
    • 154 篇 动力工程及工程热...
    • 125 篇 材料科学与工程(可...
    • 115 篇 交通运输工程
    • 107 篇 土木工程
    • 86 篇 建筑学
    • 82 篇 安全科学与工程
  • 1,731 篇 理学
    • 923 篇 数学
    • 456 篇 物理学
    • 326 篇 生物学
    • 257 篇 统计学(可授理学、...
    • 197 篇 系统科学
    • 172 篇 化学
  • 836 篇 管理学
    • 527 篇 管理科学与工程(可...
    • 329 篇 图书情报与档案管...
    • 164 篇 工商管理
  • 142 篇 医学
    • 120 篇 临床医学
    • 96 篇 基础医学(可授医学...
  • 107 篇 法学
    • 84 篇 社会学
  • 59 篇 经济学
  • 53 篇 农学
  • 26 篇 教育学
  • 14 篇 艺术学
  • 13 篇 军事学
  • 8 篇 文学

主题

  • 167 篇 laboratories
  • 137 篇 feature extracti...
  • 125 篇 computer archite...
  • 106 篇 computer science
  • 101 篇 computational mo...
  • 90 篇 semantics
  • 79 篇 training
  • 76 篇 optimization
  • 72 篇 accuracy
  • 71 篇 data mining
  • 70 篇 deep learning
  • 67 篇 bandwidth
  • 65 篇 hardware
  • 64 篇 protocols
  • 54 篇 clustering algor...
  • 53 篇 neural networks
  • 53 篇 predictive model...
  • 53 篇 delay
  • 51 篇 object detection
  • 47 篇 image segmentati...

机构

  • 179 篇 hubei province k...
  • 133 篇 school of comput...
  • 125 篇 department of co...
  • 117 篇 key laboratory o...
  • 114 篇 national enginee...
  • 104 篇 college of compu...
  • 99 篇 tianjin key labo...
  • 88 篇 key laboratory o...
  • 83 篇 college of compu...
  • 75 篇 department of co...
  • 72 篇 key laboratory o...
  • 68 篇 school of comput...
  • 60 篇 university of ch...
  • 59 篇 key laboratory o...
  • 58 篇 shandong provinc...
  • 57 篇 hubei province k...
  • 57 篇 college of infor...
  • 55 篇 school of softwa...
  • 50 篇 services computi...
  • 48 篇 key laboratory o...

作者

  • 108 篇 hai jin
  • 47 篇 xiaowei li
  • 41 篇 shen linlin
  • 36 篇 dan feng
  • 35 篇 zhang hua
  • 33 篇 jin hai
  • 28 篇 zhou mengchu
  • 28 篇 huawei li
  • 26 篇 ren jiadong
  • 24 篇 wang chundong
  • 22 篇 liu jun
  • 21 篇 li peng
  • 20 篇 changjun jiang
  • 20 篇 yu hu
  • 19 篇 wang lei
  • 19 篇 zhang xiaolong
  • 19 篇 cui zhihua
  • 19 篇 hu shengshan
  • 19 篇 wang wei
  • 19 篇 gao zan

语言

  • 4,487 篇 英文
  • 387 篇 其他
  • 232 篇 中文
  • 1 篇 日文
检索条件"机构=Computer and System Technology Laboratory"
5092 条 记 录,以下是201-210 订阅
排序:
Online Queue-Aware Service Migration and Resource Allocation in Mobile Edge Computing
收藏 引用
IEEE Transactions on Vehicular technology 2025年 第5期74卷 8063-8078页
作者: Du, An Jia, Jie Chen, Jian Wang, Xingwei Huang, Min Northeastern University School of Computer Science and Engineering The Engineering Research Center of Security Technology of Complex Network System Shenyang110819 China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Northeastern University College of Information Science and Engineering State Key Laboratory of Synthetical Automation for Process Industries Shenyang110819 China
Mobile edge computing (MEC) integrated with Network Functions Virtualization (NFV) helps run a wide range of services implemented by Virtual Network Functions (VNFs) deployed at MEC networks. This emerging paradigm of... 详细信息
来源: 评论
The Study of Multi-type Computing Power Trading Mechanism in Computing Power Network Based on Blockchain and Combinatorial Double Auction  24
The Study of Multi-type Computing Power Trading Mechanism in...
收藏 引用
4th International Conference on Artificial Intelligence, Big Data and Algorithms, CAIBDA 2024
作者: Zhao, Yue Wang, Jizhi Kong, Lingrui Sui, Tongtong Shandong Computer Science Center National Supercomputer Center in Jinan Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Provincial Key Laboratory of Industrial Network and Information System Security Qilu University of Technology Shandong Academy of Sciences Jinan Shandong China Quancheng Laboratory Jinan Key Laboratory of Digital Security Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan Shandong China
The advancement of 5G and mobile internet technologies has propelled the development of emerging businesses and applications, demanding higher requirements for network bandwidth and computational resources. To address... 详细信息
来源: 评论
A Robust Key Exchange and Tamper-Resistant Protocol for HAN and NAN Networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21394-21403页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart Grids (SG) rely on Home Area Networks (HAN) and Neighborhood Area Networks (NAN) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these adva... 详细信息
来源: 评论
HairDiffusion: Vivid Multi-Colored Hair Editing via Latent Diffusion  38
HairDiffusion: Vivid Multi-Colored Hair Editing via Latent D...
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Zeng, Yu Zhang, Yang Liu, Jiachen Shen, Linlin Deng, Kaijun He, Weizhao Wang, Jinbao Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University China Shenzhen Institute of Artificial Intelligence and Robotics for Society China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
Hair editing is a critical image synthesis task that aims to edit hair color and hairstyle using text descriptions or reference images, while preserving irrelevant attributes (e.g., identity, background, cloth). Many ...
来源: 评论
Code Vulnerability Detection via Nearest Neighbor Mechanism
Code Vulnerability Detection via Nearest Neighbor Mechanism
收藏 引用
2022 Findings of the Association for Computational Linguistics: EMNLP 2022
作者: Du, Qianjin Kuang, Xiaohui Zhao, Gang Department of Computer Science and Technology Tsinghua University China National Key Laboratory of Science and Technology on Information System Security China
Code vulnerability detection is a fundamental and challenging task in the software security field. Existing research works aim to learn semantic information from the source code by utilizing NLP technologies. However,... 详细信息
来源: 评论
Unlearnable 3D Point Clouds: Class-wise Transformation Is All You Need  38
Unlearnable 3D Point Clouds: Class-wise Transformation Is Al...
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Wang, Xianlong Li, Minghui Liu, Wei Zhang, Hangtao Hu, Shengshan Zhang, Yechao Zhou, Ziqi Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China
Traditional unlearnable strategies have been proposed to prevent unauthorized users from training on the 2D image data. With more 3D point cloud data containing sensitivity information, unauthorized usage of this new ...
来源: 评论
WaveDN: A Wavelet-based Training-free Zero-shot Enhancement for Vision-Language Models  24
WaveDN: A Wavelet-based Training-free Zero-shot Enhancement ...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Li, Jiulin Yang, Mengyu Tian, Ye Zhang, Lanshan Lu, Yongchun Liu, Jice Wang, Wendong State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Beijing Key Laboratory of Network System and Network Culture Beijing China School of Computer Science Beijing University of Posts and Telecommunications Beijing China
Vision-Language Models (VLMs) built on contrastive learning, such as CLIP, demonstrate great transferability and excel in downstream tasks like zero-shot classification and retrieval. To further enhance the performanc... 详细信息
来源: 评论
Last-X-Generation Archiving Strategy for Multi-Objective Evolutionary Algorithms  13
Last-X-Generation Archiving Strategy for Multi-Objective Evo...
收藏 引用
13th IEEE Congress on Evolutionary Computation, CEC 2024
作者: Shu, Tianye Nan, Yang Shang, Ke Ishibuchi, Hisao Southern University of Science and Technology Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Department of Computer Science and Engineering Shenzhen518055 China Southern University of Science and Technology Shenzhen518055 China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China
For evolutionary multi-objective optimization algorithms (EMOAs), an external archive can be utilized for saving good solutions found throughout the evolutionary process. Recent studies showed that a solution set sele... 详细信息
来源: 评论
Polarization-induced photocurrent switching effect in heterojunction photodiodes
收藏 引用
Nano Research 2023年 第4期16卷 5503-5510页
作者: Dingbo Chen Yu-Chang Chen Guang Zeng Yu-Chun Li Xiao-Xi Li Dong Li Chao Shen Nan Chi Boon S.Ooi David Wei Zhang Hong-Liang Lu State Key Laboratory of ASIC and System Shanghai Institute of Intelligent Electronics&SystemsSchool of MicroelectronicsFudan UniversityShanghai 200433China Key Laboratory for Information Science of Electromagnetic Waves Department of Communication Science and EngineeringFudan UniversityShanghai 200433China Photonics Laboratory Division of ComputerElectricaland Mathematical Sciences and EngineeringKing Abdullah University of Science and Technology(KAUST)Thuwal 23955-6900Kingdom of Saudi Arabia
The unipolar photocurrent in conventional photodiodes(PDs)based on photovoltaic effect limits the output modes and potential versatility of these devices in *** photodiodes with photocurrent switching are emerging as ... 详细信息
来源: 评论
Generative Positive-Unlabeled Classification for Hunting Small Open Reading Frames
Generative Positive-Unlabeled Classification for Hunting Sma...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Chen, Jie Liao, Wenbin Wen, Du Li, Jianqiang Wang, Fangzhong Shenzhen University College of Computer Science and Software Engineering China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology China Tianjin University Laboratory of Synthetic Microbiology School of Chemical Engineering & Technology China
The annotation of Open Reading Frames (ORFs) is a crucial step in gene annotation, as it precisely delineates the specific regions of expressed genes. However, small Open Reading Frames (smORFs), in comparison to ORFs... 详细信息
来源: 评论