咨询与建议

限定检索结果

文献类型

  • 6,218 篇 期刊文献
  • 4,778 篇 会议
  • 5 册 图书

馆藏范围

  • 11,001 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,484 篇 工学
    • 4,545 篇 计算机科学与技术...
    • 3,801 篇 软件工程
    • 1,604 篇 信息与通信工程
    • 928 篇 电气工程
    • 855 篇 控制科学与工程
    • 773 篇 生物工程
    • 772 篇 化学工程与技术
    • 744 篇 电子科学与技术(可...
    • 554 篇 光学工程
    • 531 篇 生物医学工程(可授...
    • 519 篇 机械工程
    • 368 篇 材料科学与工程(可...
    • 357 篇 仪器科学与技术
    • 315 篇 动力工程及工程热...
    • 294 篇 交通运输工程
    • 232 篇 建筑学
    • 227 篇 土木工程
  • 4,379 篇 理学
    • 2,086 篇 数学
    • 1,294 篇 物理学
    • 964 篇 生物学
    • 682 篇 统计学(可授理学、...
    • 627 篇 化学
    • 313 篇 系统科学
  • 1,926 篇 管理学
    • 1,116 篇 管理科学与工程(可...
    • 884 篇 图书情报与档案管...
    • 364 篇 工商管理
  • 538 篇 医学
    • 438 篇 临床医学
    • 324 篇 基础医学(可授医学...
    • 220 篇 药学(可授医学、理...
  • 276 篇 法学
    • 229 篇 社会学
  • 248 篇 农学
  • 159 篇 经济学
  • 88 篇 教育学
  • 33 篇 军事学
  • 30 篇 文学
  • 17 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 261 篇 semantics
  • 223 篇 feature extracti...
  • 208 篇 deep learning
  • 162 篇 data mining
  • 135 篇 computational mo...
  • 127 篇 training
  • 125 篇 machine learning
  • 114 篇 convolution
  • 113 篇 knowledge engine...
  • 101 篇 neural networks
  • 99 篇 predictive model...
  • 98 篇 image segmentati...
  • 94 篇 computer science
  • 91 篇 data models
  • 90 篇 object detection
  • 88 篇 reinforcement le...
  • 88 篇 accuracy
  • 83 篇 optimization
  • 82 篇 laboratories
  • 77 篇 educational inst...

机构

  • 394 篇 college of compu...
  • 306 篇 university of ch...
  • 256 篇 key laboratory o...
  • 174 篇 iccub universita...
  • 173 篇 infn sezione di ...
  • 171 篇 department of ph...
  • 166 篇 school of inform...
  • 160 篇 infn sezione di ...
  • 158 篇 horia hulubei na...
  • 152 篇 h.h. wills physi...
  • 151 篇 yandex school of...
  • 147 篇 van swinderen in...
  • 138 篇 universiteit maa...
  • 124 篇 massachusetts in...
  • 116 篇 national researc...
  • 113 篇 warsaw
  • 113 篇 university of ci...
  • 113 篇 university of ma...
  • 112 篇 université clerm...
  • 111 篇 lpnhe sorbonne u...

作者

  • 117 篇 beiter a.
  • 117 篇 arzymatov k.
  • 116 篇 barter w.
  • 114 篇 brundu d.
  • 110 篇 bellee v.
  • 102 篇 bowcock t.j.v.
  • 102 篇 casse g.
  • 101 篇 bobulska d.
  • 100 篇 blake t.
  • 99 篇 borsato m.
  • 99 篇 betancourt c.
  • 99 篇 belin s.
  • 96 篇 afsharnia h.
  • 94 篇 belavin v.
  • 92 篇 bediaga i.
  • 90 篇 cali s.
  • 86 篇 amato s.
  • 85 篇 baryshnikov f.
  • 83 篇 bjørn m.
  • 77 篇 niyato dusit

语言

  • 10,217 篇 英文
  • 516 篇 其他
  • 268 篇 中文
  • 2 篇 德文
  • 2 篇 法文
  • 1 篇 荷兰文
检索条件"机构=Data Engineering and Knowledge Engineering Key Laboratory"
11001 条 记 录,以下是4911-4920 订阅
排序:
Fault detection for rolling bearings by multi-sensor information fusion method with adaptive weights
Fault detection for rolling bearings by multi-sensor informa...
收藏 引用
data Driven Control and Learning Systems (DDCLS)
作者: Hao Wu YingHao Zhao Xu Yang Jian Huang Jiarui Cui Key Laboratory of Knowledge Automation for Industrial Processes of Ministry of Education School of Automation and Electrical Engineering University of Science and Technology Beijing Beijing China
Driven by the increasing needs for production safety, a fault detection method based on multi-sensor fusion with adaptive weight coefficients is proposed in this paper to make full use of multi-measuring points inform...
来源: 评论
A fuzzy relational clustering algorithm with q-weighted medoids
收藏 引用
Journal of Computational Information Systems 2014年 第6期10卷 2389-2396页
作者: Gao, Ying Qi, Hong Liu, Dayou Li, Jiafei Li, Lina College of Computer Science and Technology Jilin University Changchun 130012 China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun 130012 China
Medoids-based fuzzy relational clustering generates clusters of objects based on relational data, which records pairwise similarity or dissimilarities among objects. Compared with single-medoid based approaches, multi... 详细信息
来源: 评论
key Value Ordering Heuristic for Solving Algorithm Based on the AC-4 Algorithm
Key Value Ordering Heuristic for Solving Algorithm Based on ...
收藏 引用
2010 International Conference on Computer,Mechatronics,Control and Electronic engineering(2010计算机、机电、控制与电子工程国际会议 CMCE 2010)
作者: Zhan-shan Li Hai-jiao Shen Hui-ying Du Zi-wen Wang School of Computer Science and Technology Jilin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University ChangchunChina
We have studied the AC-4 algorithm and then present key value ordering heuristic forming the new solving algorithm BT-KVV, which is based on the AC-4 algorithm. This algorithm takes full advantage of the state inf... 详细信息
来源: 评论
Load balance and time delay efficient algorithm for VNF service chain deployment based on DQN  18
Load balance and time delay efficient algorithm for VNF serv...
收藏 引用
18th International Conference on Computational Intelligence and Security, CIS 2022
作者: Xuan, Hejun Lin, Lidan Liu, Zhenghui Zhao, Xuelin Xinyang Normal University Department of Computer and Information Technology China Big Data Xinyang Normal University Henan Key Laboratory of Analysis and Applications of Education Xinyang Henan China Luo He Vocational Technology College Department of Information Engineering Luohe Henan China
In mobile edge computing, computing and storage resources are close to the network of the user device, which can effectively reduce network access and computing service delay. However, network function virtualization ... 详细信息
来源: 评论
A real time multi-focus image fusion framework
收藏 引用
Journal of Information and Computational Science 2014年 第4期11卷 1295-1302页
作者: Liu, Zhaojun Li, Xiongfei Zhang, Xiaoli Key Laboratory of Symbolic Computation and Knowledge Engineering for Ministry of Education Jilin University Changchun 130012 China College of Computer Science and Technology Jilin University Changchun 130012 China
In this paper, we proposed a new image fusion scheme on spatial domain. The interest of the scheme is its real time. The framework contains two steps: saliency detection and coefficient selection based on the principl... 详细信息
来源: 评论
Multi-objective evolutionary optimization for hardware-aware neural network pruning
收藏 引用
Fundamental Research 2024年 第4期4卷 941-950页
作者: Wenjing Hong Guiying Li Shengcai Liu Peng Yang Ke Tang Guangdong Provincial Key Laboratory of Brain-Inspired Inteligent Computation Department of Computer Science and EngineeringSouthern University of Science and TechnologyShenzhen 518055China Research Institute of Trustworthy Autonomous Systems Southern University of Science and TechnologyShenzhen 518055China Department of Statistics and Data Science Southern University of Science and TechnologyShenzhen 518055China
Neural network pruning is a popular approach to reducing the computational complexity of deep neural *** recent years,as growing evidence shows that conventional network pruning methods employ inappropriate proxy metr... 详细信息
来源: 评论
A Low-Area Overhead Secure Scan Architecture Resisting Scan-Based Attacks for Crypto Chips
A Low-Area Overhead Secure Scan Architecture Resisting Scan-...
收藏 引用
2017 International MultiConference of Engineers and Computer Scientists, IMECS 2017
作者: Weizheng, Wang Jincheng, Wang Shuo, Cai Peng, Liu Tieqiao, Liu College of Computer and Communication Engineering Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and Technology Changsha Hunan410114 China College of Computer and Communication Engineering Changsha University of Science and Technology Changsha410114 China College of Computer and Communication Engineering Changsha University of Science and Technology Changsha410114 China Information Science and Engineering Department Hunan University Changsha410082 China Management School Hangzhou Dianzi University Hangzhou310018 China
Scan design is a widely used design-for-testability (DFT) technique that improves the controllability and observability of integrated circuits (ICs) resulting in the facilitation of the testing. However, it can also b... 详细信息
来源: 评论
High-precision FMCW ranging with a hybrid-integrated external cavity laser
High-precision FMCW ranging with a hybrid-integrated externa...
收藏 引用
2023 Opto-Electronics and Communications Conference, OECC 2023
作者: Liu, Chuxin Xu, Ruiyang Xu, Weihan Lu, Liangjun Guo, Yuyao Li, Yu Chen, Jianping Zhou, Linjie Shanghai Jiao Tong University State Key Laboratory of Advanced Optical Communication Systems and Networks Shanghai Key Lab of Navigation and Location Services Shanghai Institute for Advanced Communication and Data Science Department of Electronic Engineering Shanghai China SJTU-Pinghu Institute of Intelligent Optoelectronics Pinghu China Shanghai314200 China
We implement an analog EO-PLL for a III/V-Si3N4 hybrid integrated ECL to generate a highly-linear FMCW signal over multiple wavelengths. A high range precision of 4.2 cm is achieved for a 200-m distance. © 2023 I... 详细信息
来源: 评论
Extreme Large Margin Distribution Machine and its applications for biomedical datasets
Extreme Large Margin Distribution Machine and its applicatio...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Zhiyong Yang Jingcheng Lu Taohong Zhang Department of Computer University of Science and Technology Beijing (USTB) Beijing China Beijing Key Laboratory of Knowledge Engineering for Materials Science Beijing China
Classification methods has become increasingly popular for biomedical and bioinformatical data analysis. However, due to the difficulty of data acquisition, sometimes we could only obtain small-scale datasets which ma... 详细信息
来源: 评论
Linear(hull) cryptanalysis of round-reduced versions of KATAN  2
Linear(hull) cryptanalysis of round-reduced versions of KATA...
收藏 引用
2nd International Conference on Information Systems Security and Privacy, ICISSP 2016
作者: Shi, Danping Hu, Lei Sun, Siwei Song, Ling State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Data Aburance and Communication Security Research Center Chinese Academy of Sciences Beijing100093 China University of Chinese Academy of Sciences Beijing100093 China
KATAN is a family of block ciphers published at CHES 2009. Based on the Mixed-integer linear programming(MILP) technique, we propose the first third-party linear cryptanalysis on KATAN. Furthermore, we evaluate the se... 详细信息
来源: 评论