咨询与建议

限定检索结果

文献类型

  • 1,675 篇 期刊文献
  • 983 篇 会议
  • 28 册 图书

馆藏范围

  • 2,686 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,639 篇 工学
    • 1,041 篇 计算机科学与技术...
    • 811 篇 软件工程
    • 347 篇 信息与通信工程
    • 250 篇 电气工程
    • 218 篇 电子科学与技术(可...
    • 174 篇 光学工程
    • 171 篇 控制科学与工程
    • 165 篇 生物工程
    • 119 篇 生物医学工程(可授...
    • 89 篇 机械工程
    • 87 篇 仪器科学与技术
    • 75 篇 动力工程及工程热...
    • 69 篇 核科学与技术
    • 67 篇 化学工程与技术
    • 54 篇 材料科学与工程(可...
    • 51 篇 航空宇航科学与技...
    • 48 篇 交通运输工程
  • 1,340 篇 理学
    • 755 篇 物理学
    • 439 篇 数学
    • 188 篇 生物学
    • 127 篇 统计学(可授理学、...
    • 91 篇 化学
    • 88 篇 地球物理学
    • 80 篇 系统科学
  • 390 篇 管理学
    • 256 篇 管理科学与工程(可...
    • 142 篇 工商管理
    • 138 篇 图书情报与档案管...
  • 133 篇 医学
    • 119 篇 临床医学
    • 97 篇 基础医学(可授医学...
    • 59 篇 药学(可授医学、理...
  • 43 篇 法学
  • 35 篇 经济学
  • 25 篇 教育学
  • 25 篇 农学
  • 9 篇 军事学
  • 7 篇 文学
  • 6 篇 艺术学
  • 1 篇 哲学
  • 1 篇 历史学

主题

  • 55 篇 machine learning
  • 47 篇 computer science
  • 47 篇 deep learning
  • 47 篇 proton-proton in...
  • 47 篇 computational mo...
  • 44 篇 higgs bosons
  • 40 篇 hadron colliders
  • 37 篇 grid computing
  • 35 篇 large hadron col...
  • 35 篇 standard model (...
  • 35 篇 training
  • 33 篇 feature extracti...
  • 32 篇 computer archite...
  • 31 篇 distributed comp...
  • 30 篇 laboratories
  • 29 篇 collisions (nucl...
  • 29 篇 application soft...
  • 29 篇 nuclear counters
  • 28 篇 cosmic rays
  • 28 篇 semantics

机构

  • 286 篇 department for p...
  • 285 篇 department of ph...
  • 284 篇 faculty of scien...
  • 279 篇 departamento de ...
  • 275 篇 department of ph...
  • 268 篇 department of ph...
  • 268 篇 kirchhoff-instit...
  • 266 篇 institute of phy...
  • 264 篇 department of ph...
  • 259 篇 faculté des scie...
  • 259 篇 institute of phy...
  • 249 篇 fakultät für phy...
  • 241 篇 instituto de fís...
  • 238 篇 institut für ast...
  • 234 篇 yerevan physics ...
  • 231 篇 physics departme...
  • 223 篇 department of ph...
  • 221 篇 department of ph...
  • 217 篇 physics division...
  • 216 篇 department of ph...

作者

  • 268 篇 c. alexa
  • 268 篇 j. m. izen
  • 268 篇 g. bella
  • 268 篇 j. strandberg
  • 268 篇 d. calvet
  • 268 篇 c. amelung
  • 268 篇 g. spigo
  • 267 篇 f. siegert
  • 267 篇 a. c. könig
  • 263 篇 m. klein
  • 262 篇 h. a. gordon
  • 261 篇 r. ströhmer
  • 258 篇 m. rijssenbeek
  • 257 篇 s. jin
  • 257 篇 g. gaudio
  • 257 篇 s. mohapatra
  • 257 篇 y. nagasaka
  • 256 篇 h. sakamoto
  • 250 篇 s. guindon
  • 247 篇 a. kaczmarska

语言

  • 2,456 篇 英文
  • 195 篇 其他
  • 34 篇 中文
  • 2 篇 德文
检索条件"机构=High-Performance Computing Laboratory Department of Computer Science and Information Engineering"
2686 条 记 录,以下是671-680 订阅
排序:
Precise and scalable evaluation on the robustness metric of neural networks as classifiers
Precise and scalable evaluation on the robustness metric of ...
收藏 引用
International Conference on Electronics, Communications and information Technology (CECIT)
作者: Yangyi Hu College of Computer Science and Technology Institute for Quantum Information & State Key Laboratory of High Performance Computing National University of Defense Technology Changsha China College of Computer Science National University of Defense Technology Changsha China
It is well known that the minimum adversarial distortion associated with a specific sample x 0 reflects the local robustness of neural networks. However, it is intractable to solve the optimization problem related to... 详细信息
来源: 评论
Modeling the Trade-off of Privacy Preservation and Activity Recognition on Low-Resolution Images
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Yuntao Kong, Yan Yan, Yukang Cheng, Zirui Wang, Xueyang Yu, Chun Shi, Yuanchun Yi, Xin Xu, Xuhai Patel, Shwetak Key Laboratory of Pervasive Computing Ministry of Education Department of Computer Science and Technology Tsinghua University Beijing China Institute for Network Sciences and Cyberspace Tsinghua University Beijing China Department of Computer Science and Technology Tsinghua University Beijing China Qinghai University Qinghai Xining China Zhongguancun Laboratory Beijing China Information School University of Washington SeattleWA United States Paul G. Allen School of Computer Science and Engineering University of Washington SeattleWA United States
A computer vision system using low-resolution image sensors can provide intelligent services (e.g., activity recognition) but preserve unnecessary visual privacy information from the hardware level. However, preservin... 详细信息
来源: 评论
VMScan: an out-of-VM malware scanner
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2020年 第4期27卷 59-68页
作者: Lin Jie Liu Chuanyi Fang Binxing School of Computer Science and Technology Harbin Institute of TechnologyShenzhenShenzhen 518055China Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and TelecommunicationsBeijing 100876China Department of Information and Electronic Engineering Chinese Academy of EngineeringBeijing 100088China
The harm caused by malware in cloud computing environment is more and more serious. Traditional anti-virus software is in danger of being attacked when it is deployed in virtual machine on a large scale, and it tends ... 详细信息
来源: 评论
Robust Generalization against Photon-Limited Corruptions via Worst-Case Sharpness Minimization
arXiv
收藏 引用
arXiv 2023年
作者: Huang, Zhuo Zhu, Miaoxi Xia, Xiaobo Shen, Li Yu, Jun Gong, Chen Han, Bo Du, Bo Liu, Tongliang Syndey Ai Centre The University of Sydney Australia National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence School of Computer Science Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University China Jd Explore Academy China Department of Automation University of Science and Technology of China China Key Lab. of Intelligent Percept. and Syst. for High-Dimensional Information of Ministry of Education School of Computer Science and Engineering Nanjing University of Science and Technology China Department of Computer Science Hong Kong Baptist University Hong Kong
Robust generalization aims to tackle the most challenging data distributions which are rare in the training set and contain severe noises, i.e., photon-limited corruptions. Common solutions such as distributionally ro... 详细信息
来源: 评论
Securing the Future Internet of Things with Post-Quantum Cryptography
arXiv
收藏 引用
arXiv 2022年
作者: Kumar, Adarsh Ottaviani, Carlo Gill, Sukhpal Singh Buyya, Rajkumar Department of Systemics School of Computer Science University of Petroleum and Energy Studies Dehradun India Department of Computer Science York Centre for Quantum Technologies University of York United Kingdom School of Electronic Engineering and Computer Science Queen Mary University of London United Kingdom Laboratory School of Computing and Information Systems The University of Melbourne Australia
Traditional and lightweight cryptography primitives and protocols are insecure against quantum attacks. Thus, a real-time application using traditional or lightweight cryptography primitives and protocols does not ens... 详细信息
来源: 评论
EGRC-Net: Embedding-induced Graph Refinement Clustering Network
arXiv
收藏 引用
arXiv 2022年
作者: Peng, Zhihao Liu, Hui Jia, Yuheng Hou, Junhui The Department of Computer Science City University of Hong Kong Kowloon999077 Hong Kong The School of Computing & Information Sciences Caritas In-stitute of Higher Education Hong Kong School of Computer Science and Engineering SoutheastUniversity Nanjing210096 China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education China
Existing graph clustering networks heavily rely on a predefined yet fixed graph, which can lead to failures when the initial graph fails to accurately capture the data topology structure of the embedding space. In ord... 详细信息
来源: 评论
A Clustering-Based Routing Protocol Using Path Pattern Discovery Method to Minimize Delay in VANET
收藏 引用
Wireless Communications and Mobile computing 2023年 第1期2023卷
作者: Xie, Xiaoyun Navaei, Yahya Dorostkar Einy, Sajad School of Electronic Information Engineering Gannan University of Science and Technology Jiangxi Ganzhou341000 China Ganzhou Key Laboratory of Cloud Computing and Big Data Jiangxi Ganzhou341000 China Computer and Information Technology Engineering Qazvin Branch Islamic Azad University Qazvin Iran Istanbul Aydin University Department of Application and Research Center for Advanced Studies Istanbul Turkey
In vehicular ad hoc networks (VANETs), vehicle-to-vehicle (V2V) communications can link vehicles to each other, and vehicle-to-infrastructure (V2I) messaging and communications can link roadside infrastructure such as... 详细信息
来源: 评论
Training of Spiking Neural Network joint Curriculum Learning Strategy
arXiv
收藏 引用
arXiv 2023年
作者: Tang, Lingling Chu, Jielei Gong, Zhiguo Li, Tianrui The School of Computing and Artificial Intelligence Southwest Jiaotong University Chengdu611756 China National Engineering Laboratory of Integrated Transportation Big Data Application Technology Southwest Jiaotong University Chengdu611756 China The State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science University of Macau China
Starting with small and simple concepts, and gradually introducing complex and difficult concepts is the natural process of human learning. Spiking Neural Networks (SNNs) aim to mimic the way humans process informatio... 详细信息
来源: 评论
Loophole-free test of macroscopic realism via high-order correlations of measurement
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Ping Chen, Chong Liao, Hao Vorobyov, Vadim V. Wrachtrup, Jörg Liu, Ren-Bao College of Education for the Future Beijing Normal University Zhuhai519087 China Department of Physics The Chinese University of Hong Kong New Territories Shatin Hong Kong Centre for Quantum Coherence The Chinese University of Hong Kong New Territories Shatin Hong Kong The Hong Kong Institute of Quantum Information Science and Technology The Chinese University of Hong Kong New Territories Shatin Hong Kong National Engineering Laboratory on Big Data System Computing Technology Guangdong Province Engineering Center of China-made High Performance Data Computing System College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China 3rd Institute of Physics Research Center SCoPE and IQST University of Stuttgart Stuttgart70569 Germany New Cornerstone Science Laboratory The Chinese University of Hong Kong New Territories Shatin Hong Kong
Test of macroscopic realism (MR) is key to understanding the foundation of quantum mechanics. Due to the existence of the non-invasive measurability loophole and other interpretation loopholes, however, such test rema... 详细信息
来源: 评论
computing Safest $st$-Paths in Backbone Networks: Efficiently Solvable Cases and Fast Heuristics
Computing Safest $st$-Paths in Backbone Networks: Efficientl...
收藏 引用
International Workshop on Reliable Networks Design and Modeling (RNDM)
作者: Balázs Vass Péter Revisnyei Alija Pašíć Department of Telecommunications and Artificial Intelligence (TMIT) Faculty of Electrical Engineering and Informatics (VIK) High Speed Networks Laboratory (HSNLab) Budapest University of Technology and Economics (BME) Budapest Hungary Faculty of Mathematics and Computer Science Babeș-Bolyai University Cluj Napoca Romania HUN-REN-BME Information Systems Research Group Budapest Hungary
For proper evaluation and optimization of the expected availability of a backbone network service, two related very fundamental modeling and algorithmic questions are the following. 1) Realistically estimate the avail... 详细信息
来源: 评论