咨询与建议

限定检索结果

文献类型

  • 5,414 篇 会议
  • 3,923 篇 期刊文献
  • 77 册 图书

馆藏范围

  • 9,414 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,588 篇 工学
    • 3,251 篇 计算机科学与技术...
    • 2,707 篇 软件工程
    • 1,137 篇 信息与通信工程
    • 1,047 篇 控制科学与工程
    • 856 篇 电气工程
    • 694 篇 电子科学与技术(可...
    • 552 篇 机械工程
    • 507 篇 生物工程
    • 453 篇 光学工程
    • 344 篇 生物医学工程(可授...
    • 309 篇 仪器科学与技术
    • 265 篇 动力工程及工程热...
    • 256 篇 化学工程与技术
    • 207 篇 材料科学与工程(可...
    • 190 篇 交通运输工程
    • 146 篇 安全科学与工程
    • 142 篇 土木工程
    • 141 篇 航空宇航科学与技...
  • 3,195 篇 理学
    • 1,508 篇 数学
    • 1,021 篇 物理学
    • 601 篇 生物学
    • 483 篇 统计学(可授理学、...
    • 472 篇 系统科学
    • 295 篇 化学
  • 1,227 篇 管理学
    • 791 篇 管理科学与工程(可...
    • 470 篇 图书情报与档案管...
    • 328 篇 工商管理
  • 353 篇 医学
    • 286 篇 临床医学
    • 229 篇 基础医学(可授医学...
    • 152 篇 药学(可授医学、理...
  • 161 篇 法学
  • 111 篇 经济学
  • 96 篇 农学
  • 57 篇 教育学
  • 36 篇 文学
  • 20 篇 艺术学
  • 18 篇 军事学
  • 5 篇 哲学
  • 2 篇 历史学

主题

  • 481 篇 laboratories
  • 242 篇 computer science
  • 168 篇 control systems
  • 141 篇 computer archite...
  • 137 篇 neural networks
  • 135 篇 computational mo...
  • 126 篇 feature extracti...
  • 117 篇 optimization
  • 113 篇 deep learning
  • 113 篇 semantics
  • 109 篇 application soft...
  • 97 篇 costs
  • 96 篇 data mining
  • 92 篇 bandwidth
  • 89 篇 throughput
  • 81 篇 artificial intel...
  • 78 篇 visualization
  • 78 篇 machine learning
  • 77 篇 routing
  • 72 篇 reinforcement le...

机构

  • 153 篇 state key labora...
  • 151 篇 state key labora...
  • 101 篇 state key labora...
  • 86 篇 spoken language ...
  • 67 篇 department of co...
  • 63 篇 peng cheng labor...
  • 60 篇 ieee
  • 48 篇 university of ch...
  • 47 篇 school of comput...
  • 45 篇 state key labora...
  • 44 篇 department of el...
  • 44 篇 zhongguancun lab...
  • 40 篇 hubei key labora...
  • 36 篇 state key labora...
  • 34 篇 school of artifi...
  • 33 篇 college of compu...
  • 31 篇 state key labora...
  • 31 篇 jet propulsion l...
  • 31 篇 college of compu...
  • 30 篇 beijing key labo...

作者

  • 45 篇 fuchun sun
  • 40 篇 m. zahn
  • 38 篇 guo hong
  • 33 篇 niyato dusit
  • 31 篇 wei li
  • 28 篇 sun maosong
  • 26 篇 zhang min
  • 26 篇 li-rong zheng
  • 26 篇 niu jianwei
  • 26 篇 sun fuchun
  • 25 篇 liu yang
  • 25 篇 johansson karl h...
  • 25 篇 zhang bo
  • 24 篇 ganesh k. venaya...
  • 24 篇 zengqi sun
  • 23 篇 peifa jia
  • 23 篇 j.h. lang
  • 22 篇 chen xiaowu
  • 21 篇 mengchu zhou
  • 21 篇 hu xiaolin

语言

  • 8,839 篇 英文
  • 427 篇 其他
  • 147 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 2 篇 斯洛文尼亚文
  • 1 篇 俄文
检索条件"机构=Computer and Systems Technology Laboratory"
9414 条 记 录,以下是491-500 订阅
排序:
Audio-Driven Talking Face Video Generation with Emotion
Audio-Driven Talking Face Video Generation with Emotion
收藏 引用
Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW), IEEE Conference on
作者: Jiadong Liang Feng Lu State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University Beijing China
Vivid talking face generation has potential applications in virtual reality. Existing methods can generate talking faces that are synchronized with the audio, but typically ignore the accurate expression of emotions. ... 详细信息
来源: 评论
MACO: Exploring GEMM Acceleration on a Loosely-Coupled Multi-core Processor
arXiv
收藏 引用
arXiv 2024年
作者: Sui, Bingcai Shen, Junzhong Sun, Caixia Wang, Junhui Zheng, Zhong Guo, Wei School of Computer National University of Defense Technology China Key Laboratory of Advanced Microprocessor Chips and Systems Changsha China
General-purpose processor vendors have integrated customized accelerator in their products due to the widespread use of General Matrix-Matrix Multiplication (GEMM) kernels. However, it remains a challenge to further i... 详细信息
来源: 评论
Hybrid Deadlock Recovery Algorithm for Irregular NoC in Multi-Chiplet systems
Hybrid Deadlock Recovery Algorithm for Irregular NoC in Mult...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Zhiqiang Chen Yongwen Wang Hongwei Zhou College of Computer Science and Technology National University of Defense Technology Changsha China Key Laboratory of Advanced Microprocessor Chips and Systems Changsha China
Dividing a single System-on-Chip (SoC) into multiple chiplets and connecting them using 2.5D packaging technology is becoming a widely adopted approach to enhance chip scale and performance. However, when multiple chi... 详细信息
来源: 评论
Data Exploration and Mining on Traditional Chinese Medicine  9th
Data Exploration and Mining on Traditional Chinese Medicine
收藏 引用
9th CCF Conference on Big Data, BigData 2021
作者: Li, Xueyan Rong, Chuitian Chai, Zhengyi Sun, Huabo School of Computer Science and Technology Tiangong University Tianjin China Tianjin Key Laboratory of Autonomous Intelligence Technology and Systems School of Computer Science and Technology Tiangong University Tianjin China Institute of Aviation Safety China Academy of Civil Aviation Science and Technology Beijing China
The theory of traditional Chinese medicine (TCM) has been developed for a long history and accumulated plenty of knowledge about combating diseases, which is a part of Chinese culture. There have been some related wor... 详细信息
来源: 评论
Two-Stage Representation Refinement Based on Convex Combination for 3-D Human Poses Estimation
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6500-6508页
作者: Chen, Luefeng Cao, Wei Zheng, Biao Wu, Min Pedrycz, Witold Hirota, Kaoru China University of Geosciences School of Automation Wuhan430074 China Hubei Key Laboratory of Advanced Control and Intelligent Automation for Complex Systems Wuhan430074 China Ministry of Education Engineering Research Center of Intelligent Technology for Geo-Exploration Wuhan430074 China University of Alberta Department of Electrical and Computer Engineering EdmontonABT6G 2R3 Canada Macau University of Science and Technology Institute of Systems Engineering Taipa999078 China Istinye University Research Center of Performance and Productivity Analysis Istanbul34010 Turkey Tokyo Institute of Technology Yokohama226-8502 Japan
In the human pose estimation task, on the one hand, 3-D pose always has difficulty in dividing different 2-D poses if the view is limited;on the other hand, it is hard to reduce the lifting ambiguity because of the la... 详细信息
来源: 评论
Polarization-controlled dual resonant lattice Kerker effects
收藏 引用
Nano Research 2023年 第2期16卷 3195-3200页
作者: Lei Xiong Xueqian Zhao Xiang Du Shuai Chen Yuanfu Lu Hongwei Ding Guangyuan Li School of Information Science and Engineering Yunnan UniversityKunming 650500China CAS Key Laboratory of Human-Machine Intelligence-Synergy Systems Shenzhen Institute of Advanced TechnologyChinese Academy of SciencesShenzhen 518055China School of Computer Electronic and InformationGuangxi UniversityNanning 530004China College of Physics and Electronic Technology Anhui Normal UniversityWuhu 241000China Tianjin H-Chip Technology Group Corporation Tianjin 300467China SIAT Branch Shenzhen Institute of Artificial Intelligence and Robotics for SocietyShenzhen 518055China
The generalized Kerker effects have attracted increasing interests in recent years due to their abilities to manipulate the far-field properties of ***,the dual-polarized generalized Kerker effect enabling different t... 详细信息
来源: 评论
Maximum Power Point Tracking for PV systems: A Comparison of Perturb & Observe and Fuzzy Logic Control  11
Maximum Power Point Tracking for PV Systems: A Comparison of...
收藏 引用
11th International Conference on ENERGY and ENVIRONMENT, CIEM 2023
作者: Tahiri, Fadila Hartani, M. Amine Harrouz, Abdelkader Dumbrava, Virgil Wira, Patrice Technology and Sciences Department LDDI Laboratory Adrar Algeria Department of Hydrocarbon and Renewable Energy LDDI Laboratory Adrar Algeria Department of Electric Power Systems Polytechnic University of Bucharest Bucharest Romania Institute for Research in Computer Science Mathematics Automation and Signal Mulhouse France
The purpose of this research paper is to explore different approaches to maximize power point tracking (MPPT) in photovoltaic (PV) systems. In this work, we evaluate and compare incremental conductance (InC) and fuzzy... 详细信息
来源: 评论
Lag Consensus for Second-Order Nonlinear Multi-Agent systems on the Basis of Passivity  13
Lag Consensus for Second-Order Nonlinear Multi-Agent Systems...
收藏 引用
13th IEEE International Conference on CYBER technology in Automation, Control, and Intelligent systems, CYBER 2023
作者: Liu, Ru-Yue Han, Xiao Wang, Jin-Liang School of Mathematical Sciences Tiangong University Tianjin300387 China School of Mechanical Engineering Tiangong University Tianjin300387 China School of Computer Science and Technology Tianjin Key Laboratory of Autonomous Intelligence Technology and Systems Tiangong University Tianjin300387 China
This paper investigates lag consensus of second-order nonlinear multi-agent systems (MASs) on the basis of passivity. on one hand, the passivity of single agent is addressed by utilizing the appropriate controller. On... 详细信息
来源: 评论
Beam Pattern Modulation Embedded Hybrid Transceiver Optimization for Integrated Sensing and Communication
收藏 引用
IEEE Transactions on Wireless Communications 2025年 第6期24卷 4966-4980页
作者: Liu, Boxun Gao, Shijian Yang, Zonghui Cheng, Xiang Yang, Liuqing Peking University State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Beijing100871 China Internet of Things Thrust Guangzhou511400 China Internet of Things Thrust Intelligent Transportation Thrust Guangzhou511400 China The Hong Kong University of Science and Technology Department of Electronic and Computer Engineering Department of Civil and Environmental Engineering SAR Hong Kong Hong Kong
Integrated sensing and communication (ISAC) emerges as a promising technology for 6G, particularly in the millimeter-wave (mmWave) band. However, the widely utilized hybrid architecture in mmWave systems compromises m... 详细信息
来源: 评论
Organization-wide IOC Monitoring and Security Compliance in Endpoints using Open Source Tools  3
Organization-wide IOC Monitoring and Security Compliance in ...
收藏 引用
3rd IEEE Global Conference for Advancement in technology, GCAT 2022
作者: Divya, P.J. George, Reenu Sara Madhusudhan, G. Padmasree, S. Jss Science and Technology University Department of Computer Science and Engineering Mysore India Indian Space Research Organization Information Technology Cell Laboratory for Electro-Optics Systems Bengaluru India
Endpoint Security is an important layer in cyber security and it is one of the first places organizations look to secure their enterprise network. Proactively and iteratively monitoring endpoints for threats and Indic... 详细信息
来源: 评论