咨询与建议

限定检索结果

文献类型

  • 18 篇 会议
  • 13 篇 期刊文献

馆藏范围

  • 31 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 20 篇 工学
    • 12 篇 计算机科学与技术...
    • 11 篇 软件工程
    • 4 篇 机械工程
    • 3 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 电气工程
    • 2 篇 生物工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
    • 1 篇 网络空间安全
  • 10 篇 理学
    • 5 篇 数学
    • 2 篇 物理学
    • 2 篇 化学
    • 2 篇 生物学
    • 1 篇 系统科学
  • 5 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 2 篇 图书情报与档案管...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学
    • 1 篇 临床医学
    • 1 篇 特种医学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 3 篇 humans
  • 2 篇 speech coding
  • 2 篇 information proc...
  • 1 篇 digital images
  • 1 篇 conferences
  • 1 篇 filters
  • 1 篇 knowledge engine...
  • 1 篇 imaging
  • 1 篇 differential pow...
  • 1 篇 personnel traini...
  • 1 篇 audio-visual sys...
  • 1 篇 data integration
  • 1 篇 reliability engi...
  • 1 篇 human computer i...
  • 1 篇 application soft...
  • 1 篇 human-machine in...
  • 1 篇 automation
  • 1 篇 视觉跟踪
  • 1 篇 real time system...
  • 1 篇 process design

机构

  • 3 篇 laboratory of hu...
  • 2 篇 school of electr...
  • 2 篇 huazhong agricul...
  • 2 篇 school of cyber ...
  • 1 篇 department of ne...
  • 1 篇 university of sc...
  • 1 篇 school of chemis...
  • 1 篇 the commonwealth...
  • 1 篇 wuhan university...
  • 1 篇 school of materi...
  • 1 篇 digital media ar...
  • 1 篇 visual artificia...
  • 1 篇 national academy...
  • 1 篇 universitat autò...
  • 1 篇 state key lab of...
  • 1 篇 department of bi...
  • 1 篇 cibm center for ...
  • 1 篇 faculty of engin...
  • 1 篇 university of ab...
  • 1 篇 xlab d.o.o. ljub...

作者

  • 3 篇 dai guo-zhong
  • 2 篇 tang jinshan
  • 2 篇 qin yan-yan
  • 2 篇 tong yan
  • 2 篇 wang xiao-chun
  • 2 篇 zhang fengjun
  • 2 篇 zhou chao
  • 2 篇 tian feng
  • 2 篇 ren zhengwei
  • 2 篇 xu shiwei
  • 1 篇 qiao shao-jie
  • 1 篇 d. aydogan
  • 1 篇 c. fuller
  • 1 篇 gao huajian
  • 1 篇 z. zhao
  • 1 篇 zhu bowen
  • 1 篇 abidian mohammad...
  • 1 篇 han nan
  • 1 篇 d. zimmerer
  • 1 篇 r. dorent

语言

  • 20 篇 英文
  • 6 篇 其他
  • 6 篇 中文
检索条件"机构=Human Computer Interaction Technology and Intelligent Information Processing Laboratory"
31 条 记 录,以下是1-10 订阅
排序:
Deep Learning Based Take-Over Performance Prediction and Its Application on intelligent Vehicles
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on intelligent Vehicles 2024年 1-15页
作者: Liu, Weimin Li, Qingkun Wang, Wenjun Wang, Zhenyuan Zeng, Chao Cheng, Bo State Key Laboratory of Automotive Safety and Energy Center for Intelligent Connected Vehicles and Transportation School of Vehicle and Mobility Tsinghua University Beijing China Beijing Key Laboratory of Human-Computer Interaction Institute of Software Chinese Academy of Sciences Beijing China College of Information Science and Engineering Henan University of Technology Zhengzhou China
Take-over performance plays a significant role in evaluating drivers' state, and serves as a crucial reference for enhancing control transitions in the context of conditionally automated driving. In this study, we... 详细信息
来源: 评论
Experimental Study on Motion Controller based on NN-ARX and ARMAX Actuator Identification for 3-DoF Delta Parallel Robot  11
Experimental Study on Motion Controller based on NN-ARX and ...
收藏 引用
11th RSI International Conference on Robotics and Mechatronics, ICRoM 2023
作者: Jalali, Hasan Damavandi, Hossein Kalhor, Ahmad Masouleh, Mehdi Tale University of Tehran Human and Robot Interaction Laboratory School of Electrical and Computer Engineering Tehran Iran Sadjad University Faculty of Computer Engineering and Information Technology Mashhad Iran University of Tehran Control and Intelligent Processing Center of Excellence School of Electrical and Computer Engineering Tehran Iran
Today, system identification plays a pivotal role in control science and offering a myriad of applications. This paper places its focus on the identification of actuator models within real-world delta robots for infor... 详细信息
来源: 评论
VAction: A Lightweight and Integrated VR Training System for Authentic Film-Shooting Experience  25
VAction: A Lightweight and Integrated VR Training System for...
收藏 引用
2025 CHI Conference on human Factors in Computing Systems, CHI 2025
作者: Wang, Shaocong Qu, Che Yu, Minjing Zhou, Chao Wang, Yuntao Wen, Yu-Hui Shi, Yuanchun Liu, Yong-Jin Department of Computer Science and Technology Tsinghua University Beijing China Film & TV Technology Department Beijing Film Academy Beijing China College of Intelligence and Computing Tianjin University Tianjin China Human Computer Interaction Technology Intelligent Information Processing Laboratory Institute of Software Chinese Acadamy of Sciences Beijing China School of Computer Science and Technology Beijing Jiaotong University Beijing China
The film industry exerts significant economic and cultural influence, and its rapid development is contingent upon the expertise of industry professionals, underscoring the critical importance of film-shooting educati... 详细信息
来源: 评论
Imperceptible and Sparse Adversarial Attacks via a Dual-Population-Based Constrained Evolutionary Algorithm
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2023年 第2期4卷 268-281页
作者: Tian, Ye Pan, Jingwen Yang, Shangshang Zhang, Xingyi He, Shuping Jin, Yaochu Anhui University Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Institutes of Physical Science and Information Technology Hefei230601 China Hefei Comprehensive National Science Center Institute of Artificial Intelligence Hefei230088 China Anhui University School of Computer Science and Technology Hefei230601 China Anhui University Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Artificial Intelligence Hefei230601 China Anhui University Anhui Engineering Laboratory of Human-Robot Integration System and Intelligent Equipment School of Electrical Engineering and Automation Hefei230601 China Bielefeld University Faculty of Technology Bielefeld33619 Germany
The sparse adversarial attack has attracted increasing attention due to the merit of a low attack cost via changing a small number of pixels. However, the generated adversarial examples are easily detected in vision s... 详细信息
来源: 评论
Computing Flow Experience Based on Physiological Signals: A Systematic Literature Review
Computing Flow Experience Based on Physiological Signals: A ...
收藏 引用
2025 CHI Conference on human Factors in Computing Systems, CHI EA 2025
作者: Hong, Yichen Zhou, Chao Liu, Zelu Zifeng, Ni Liu, Juan Li, Xiangxian Yang, Chenglei Bian, Yulong Shandong University Weihai China Human Computer Interaction Technology and Intelligent Information Processing Laboratory Institute of Software Chinese Academy of Sciences Beijing China Shandong University School of Mechanical Electrical & Information Engineering Weihai China Shandong University Jinan China School of Software Shandong University Jinan China Shandong Key Laboratory of Intelligent Electronic Packaging Testing and Application Shandong University Shandong Weihai China Shandong Key Laboratory of Intelligent Electronic Packaging Testing and Application China
Flow experience is a key user experience in human-computer interaction (HCI). Compared with traditional subjective measurements, physiological signal-based methods (i.e. physiological computation of flow experience) c... 详细信息
来源: 评论
Experimental Study on Motion Controller based on NN-ARX and ARMAX Actuator Identification for 3-DoF Delta Parallel Robot
Experimental Study on Motion Controller based on NN-ARX and ...
收藏 引用
RSI/ISM International Conference on Robotics and Mechatronics (ICROM)
作者: Hasan Jalali Hossein Damavandi Ahmad Kalhor Mehdi Tale Masouleh Human and Robot Interaction Laboratory School of Electrical and Computer Engineering University of Tehran Tehran Iran Faculty of Computer Engineering and Information Technology Sadjad University Mashhad Iran Control and Intelligent Processing Center of Excellence School of Electrical and Computer Engineering University of Tehran Tehran Iran
Today, system identification plays a pivotal role in control science and offering a myriad of applications. This paper places its focus on the identification of actuator models within real-world delta robots for infor...
来源: 评论
Simulating the Dilution of Sulfuric Acid on Mixed Reality Platform  8
Simulating the Dilution of Sulfuric Acid on Mixed Reality Pl...
收藏 引用
8th International Conference on Virtual Reality, ICVR 2022
作者: Pan, Zhipeng Miao, Jinda Cai, Ning Luo, Tianren Zhang, Mingmin Pan, Zhigeng Research Institute of Virtual Reality and Intelligent Systems Hangzhou Normal University Hangzhou China Zhejiang University College of Computer Science and Technology Hangzhou China Institute of Software Chinese Academy of Sciences State Key Laboratory of Computer Science and Beijing Key Lab of Human-Computer Interaction Beijing China Nanjing University of Information Science and Technology School of Artificial Intelligence Nanjing China
Augmented reality technology has been widely used in experimental education. Augmented reality provides virtual-real integration, real-Time interaction and three-dimensional immersion, which provides a new development... 详细信息
来源: 评论
Natural human Skin‑Inspired Wearable and Breathable Nanofiber‑based Sensors with Excellent Thermal Management Functionality
收藏 引用
Advanced Fiber Materials 2024年 第6期6卷 1955-1968页
作者: Peng Wang Xiaodan Li Guifen Sun Guoqing Wang Qing Han Chuizhou Meng Zhonghe Wei Yang Li School of Mechanical Engineering University of JinanJinan 250022China School of Information and Control Engineering China University of Mining and TechnologyXuzhou 221116China State Key Laboratory for Reliability and Intelligence of Electrical Equipment Engineering Research Center of Ministry of Education for Intelligent Rehabilitation Device and Detection TechnologyHebei Key Laboratory of Smart Sensing and Human‑Robot InteractionSchool of Mechanical EngineeringHebei University of TechnologyTianjin 300401China Shandong Provincial Key Laboratory of Network‑Based Intelligent Computing School of Information Science and EngineeringUniversity of JinanJinan 250022China Network Information Center Department of Computer ScienceQilu University of Technology(Shandong Academy of Sciences)Jinan 250353China School of Integrated Circuits Shandong UniversityJinan 250101China
Wearable sensors have been rapidly developed for application in various human monitoring ***,the wearing comfort and thermal properties of these devices have been largely ignored,and these characteristics urgently nee... 详细信息
来源: 评论
Research on Differential Power Analysis of Lightweight Block Cipher LED  10th
Research on Differential Power Analysis of Lightweight Block...
收藏 引用
10th International Conference on computer Engineering and Networks, CENet 2020
作者: Zou, Yi Li, Lang Zhao, Hui-huang Jiao, Ge College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Human Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
LED algorithm is a new lightweight encryption algorithm proposed in CHES 2011, which is used for IOT to protect the communication security of RFID tags and smart cards. It has been found that it is possible to retriev... 详细信息
来源: 评论
RAS2P: Remote Attestation via Self-Measurement for SGX-based Platforms
RAS2P: Remote Attestation via Self-Measurement for SGX-based...
收藏 引用
2022 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2022
作者: Ren, Zhengwei Li, Xueting Deng, Li Tong, Yan Xu, Shiwei Tang, Jinshan Wuhan University of Science and Technology School of Computer Science and Technology Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China Wuhan University of Science and Technology School of Computer Science and Technology Wuhan China Agricultural University College of Informatics Huazhong Wuhan China George Mason University College of Health and Human Services Department of Health Administration and Policy Fairfax United States
Remote Attestation (RA) is a security service by which a Verifier (Vrf) can verify the platform state of a remote Prover (Prv). However, in most existing RA schemes, the Prv might be vulnerable to denial of service (D... 详细信息
来源: 评论