咨询与建议

限定检索结果

文献类型

  • 942 篇 会议
  • 804 篇 期刊文献
  • 20 册 图书
  • 2 篇 专利

馆藏范围

  • 1,768 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,062 篇 工学
    • 672 篇 计算机科学与技术...
    • 540 篇 软件工程
    • 229 篇 控制科学与工程
    • 182 篇 信息与通信工程
    • 125 篇 电气工程
    • 117 篇 机械工程
    • 106 篇 生物工程
    • 98 篇 光学工程
    • 91 篇 生物医学工程(可授...
    • 81 篇 电子科学与技术(可...
    • 50 篇 仪器科学与技术
    • 50 篇 化学工程与技术
    • 39 篇 材料科学与工程(可...
    • 39 篇 动力工程及工程热...
    • 36 篇 交通运输工程
    • 31 篇 建筑学
  • 583 篇 理学
    • 315 篇 数学
    • 146 篇 物理学
    • 130 篇 生物学
    • 82 篇 系统科学
    • 77 篇 统计学(可授理学、...
    • 56 篇 化学
    • 32 篇 地球物理学
  • 267 篇 管理学
    • 173 篇 管理科学与工程(可...
    • 95 篇 图书情报与档案管...
    • 58 篇 工商管理
  • 105 篇 医学
    • 91 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 37 篇 药学(可授医学、理...
  • 36 篇 法学
    • 31 篇 社会学
  • 25 篇 农学
  • 22 篇 经济学
  • 11 篇 教育学
  • 6 篇 艺术学
  • 5 篇 文学
  • 2 篇 哲学
  • 1 篇 军事学

主题

  • 91 篇 automation
  • 72 篇 computer science
  • 42 篇 computational mo...
  • 38 篇 feature extracti...
  • 32 篇 educational inst...
  • 30 篇 neural networks
  • 27 篇 laboratories
  • 26 篇 semantics
  • 25 篇 image segmentati...
  • 24 篇 deep learning
  • 24 篇 computer vision
  • 23 篇 cameras
  • 23 篇 machine learning
  • 23 篇 accuracy
  • 22 篇 artificial intel...
  • 22 篇 training
  • 21 篇 pattern recognit...
  • 19 篇 simulation
  • 19 篇 optimization
  • 18 篇 application soft...

机构

  • 58 篇 institute of aut...
  • 53 篇 department of au...
  • 49 篇 department of co...
  • 41 篇 school of artifi...
  • 32 篇 computer and aut...
  • 28 篇 school of automa...
  • 25 篇 department of co...
  • 25 篇 university of ch...
  • 20 篇 jiangsu automati...
  • 16 篇 national institu...
  • 15 篇 ieee
  • 15 篇 sino-french inst...
  • 14 篇 research center ...
  • 14 篇 college of nucle...
  • 14 篇 department of ph...
  • 14 篇 school of physic...
  • 14 篇 school of mechan...
  • 14 篇 sjtu paris elite...
  • 14 篇 school of physic...
  • 14 篇 the school of au...

作者

  • 21 篇 zhang shu
  • 20 篇 niyato dusit
  • 20 篇 samet hanan
  • 16 篇 kang jiawen
  • 15 篇 wang wei
  • 15 篇 h. samet
  • 14 篇 zhang tao
  • 14 篇 zhu yanqiao
  • 14 篇 fei-yue wang
  • 14 篇 li xiang
  • 13 篇 chen a.
  • 13 篇 benoit d.m.
  • 13 篇 ferrara g.
  • 13 篇 ardid m.
  • 13 篇 calvo d.
  • 13 篇 eddymaoui a.
  • 13 篇 kulikovskiy v.
  • 13 篇 labalme m.
  • 13 篇 wu yuan
  • 13 篇 gal t.

语言

  • 1,682 篇 英文
  • 63 篇 其他
  • 24 篇 中文
  • 2 篇 朝鲜文
  • 1 篇 俄文
检索条件"机构=French Institute for Research in Computer Science and Automation"
1768 条 记 录,以下是31-40 订阅
排序:
Sequential Asynchronous Action Coordination in Multi-Agent Systems: A Stackelberg Decision Transformer Approach  41
Sequential Asynchronous Action Coordination in Multi-Agent S...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Zhang, Bin Mao, Hangyu Li, Lijuan Xu, Zhiwei Li, Dapeng Zhao, Rui Fan, Guoliang Institute of Automation Chinese Academy of Sciences China School of Artificial Intelligence University of Chinese Academy of Sciences China SenseTime Research China School of Computer Science and Technology Shandong University China
Asynchronous action coordination presents a pervasive challenge in Multi-Agent Systems (MAS), which can be represented as a Stackelberg game (SG).However, the scalability of existing Multi-Agent Reinforcement Learning... 详细信息
来源: 评论
Technological Machines Diagnostics of Grain Processing Enterprises as the Object of automation
Technological Machines Diagnostics of Grain Processing Enter...
收藏 引用
2023 International Conference Automatics and Informatics, ICAI 2023
作者: Kalandarov, Palvan I. Ubaydullayeva, Shakhnoza R. Nikolov, Nikola N. Hayitov, Aziz Sharifov, Husen 'Tashkent Institute of Irrigation and Agricultural Mechanization Engineers' National Research University Department 'Automation and Control of Technology Process in Production' Tashkent Uzbekistan Technical University of Varna Faculty of Computer Science and Automation Department of Automation Varna Bulgaria Bukhara Institute of Natural Resource Management of the National Research University 'Tashkent Institute of Irrigation and Agricultural Mechanization Institute' Tashkent Uzbekistan
The article gives the basic concepts of reliability, performance, durability, considers the issues of changing the technical state of the machine during operation. The models under consideration have the ability to in... 详细信息
来源: 评论
research on underground speech enhancement technology based on generative adversarial network
Research on underground speech enhancement technology based ...
收藏 引用
2022 IEEE International Conference on Signal Processing, Communications and Computing, ICSPCC 2022
作者: Zhang, Zhaozhao Liu, Zhongqi Chen, Xiaolin Sun, Kang Institute of Computer Science and Technology Xi'an University of Science and Technology Ccteg Changzhou Research Research Institute Xi'an China Automation Co. Ltd Changzhou China
Because of the problems such as speech interaction and speech input difficulty caused by high noise intensity and unclear sources in underground mine, this paper proposes a speech enhancement system based on a Time-do... 详细信息
来源: 评论
An Adaptive Multi-Stage Evolution Algorithm for High-Dimensional Expensive Problems
An Adaptive Multi-Stage Evolution Algorithm for High-Dimensi...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Zhang, Boyuan Lai, Rui Gong, Guanghong Yuan, Haitao Yang, Jinhong Zhang, Jia School of Automation Science and Electrical Engineering Beihang University Beijing100191 China Cssc Systems Engineering Research Institute Beijing China Southern Methodist University Dept. of Computer Science DallasTX75275 United States
Recently, many studies have used evolutionary algorithms (EAs) to optimize complex problems across various fields, including mechanical structure design, robotics, and cloud computing. EAs simulate the process of evol... 详细信息
来源: 评论
Attack-Agnostic Deep Face Anti-Spoofing
Attack-Agnostic Deep Face Anti-Spoofing
收藏 引用
2023 IEEE/CVF Conference on computer Vision and Pattern Recognition Workshops, CVPRW 2023
作者: Liu, Ajian Tan, Zichang Liang, Yanyan Wan, Jun Institute of Automation Chinese Academy of Sciences Mais Beijing China Institute of Deep Learning Baidu Research Beijing China School of Computer Science and Engineering Faculty of Innovation Engineering Macau University of Science and Technology China
The task of face anti-spoofing (FAS) is to determine whether the captured face from a face recognition system is live or fake. Current methods which are trained with existing fake faces ignore the generalization and p... 详细信息
来源: 评论
Low-Latency and Energy-Efficient Task Scheduling for End-Edge-Cloud Collaborative Computing
Low-Latency and Energy-Efficient Task Scheduling for End-Edg...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Li, Jingyao Yuan, Haitao Ma, Yaofei Bi, Jing Yang, Jinhong Zhang, Jia School of Automation Science and Electrical Engineering Beihang University Beijing100191 China College of Computer Beijing University of Technology Beijing100124 China Cssc Systems Engineering Research Institute Beijing China Southern Methodist University Dept. of Computer Science DallasTX75275 United States
Mobile edge computing (MEC) is a new paradigm that improves the quality of service compared with traditional cloud computing. In MEC, computational tasks are submitted by numerous end users and are partially offloaded... 详细信息
来源: 评论
Multiobjective adaptive car-following control of an intelligent vehicle based on receding horizon optimization
收藏 引用
science China(Information sciences) 2023年 第4期66卷 301-302页
作者: Hongbo GAO Juping ZHU Fei ZHANG Ruidong YAN Junjie ZHOU Lei JIANG Jianqiang WANG Keqiang LI Department of Automation University of Science and Technology of China Institute of Advanced Technology University of Science and Technology of China Department of Computational Mathematics School of Mathematical Sciences Anhui University School of Traffic and Transportation Beijing Jiaotong University Autonomous Driving Business Unit Chery Automobile School of College of Computer Science and Technology Zhejiang University China North Vehicle Research Institute School of Automotive Engineering Tsinghua University
Dear editor, Vehicle control is one of the key steps of intelligent driving [1]. Algorithms based on receding horizon optimization(RHO) can predict future trajectories and handle multiobjective constraint conditions; ...
来源: 评论
Two Layer Symmetric Cryptography Algorithm for Protecting Data from Attacks
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2625-2640页
作者: Muhammad Nadeem Ali Arshad Saman Riaz Syeda Wajiha Zahra Shahab SBand Amir Mosavi Department of Computer Science Abasyn UniversityIslamabad44000Pakistan Department of Computer Science National University of TechnologyIslamabad44000Pakistan Future Technology Research Center National Yunlin University of Science and TechnologyDouliuYunlin64002Taiwan Institute of Information Society University of Public ServiceBudapest1083Hungary John Von Neumann Faculty of Informatics Obuda UniversityBudapestHungary Institute of Information Engineering Automation and MathilticsSlovak University of Technology in BratislavaSlovakia
Many organizations have insisted on protecting the cloud server from the outside,although the risks of attacking the cloud server are mostly from the *** are many algorithms designed to protect the cloud server from a... 详细信息
来源: 评论
Preventing Cloud Network from Spamming Attacks Using Cloudflare and KNN
收藏 引用
computers, Materials & Continua 2023年 第2期74卷 2641-2659页
作者: Muhammad Nadeem Ali Arshad Saman Riaz SyedaWajiha Zahra Muhammad Rashid Shahab S.Band Amir Mosavi Department of Computer Science Abasyn UniversityIslamabad44000Pakistan Department of Computer Science National University of TechnologyIslamabad44000Pakistan Future Technology Research Center National Yunlin University of Science and TechnologyDouliuYunlin64002Taiwan Institute of Information Society University of Public ServiceBudapest1083Hungary John von Neumann Faculty of Informatics Obuda UniversityBudapestHungary Institute of Information Engineering Automation and MathematicsSlovak University of Technology in BratislavaSlovakia
Cloud computing is one of the most attractive and cost-saving models,which provides online services to *** computing allows the user to access data directly from any *** nowadays,cloud security is one of the biggest i... 详细信息
来源: 评论
Instance Segmentation of Ice-Covered Transmission Line in Unmanned Aerial Vehicle Images  5
Instance Segmentation of Ice-Covered Transmission Line in Un...
收藏 引用
5th International Seminar on Artificial Intelligence, Networking and Information Technology, AINIT 2024
作者: Pan, Nianyi Sun, Jiacheng Zhou, Xinghong Li, Xiaomao School of Computer Engineering and Science Shanghai University Shanghai China School of Future Technology Shanghai University Shanghai China Research Institute of Usv Engineering School of Mechatronic Engineering and Automation Shanghai University Shanghai China
Unmanned aerial vehicle (UAV) detection of ice-covered transmission lines (ITL) is a crucial task for winter power grid maintenance. Instance segmentation offers robustness in handling complex scene variations in UAV ... 详细信息
来源: 评论