咨询与建议

限定检索结果

文献类型

  • 552 篇 会议
  • 473 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 1,029 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 657 篇 工学
    • 344 篇 计算机科学与技术...
    • 287 篇 软件工程
    • 185 篇 控制科学与工程
    • 93 篇 电气工程
    • 84 篇 信息与通信工程
    • 78 篇 电子科学与技术(可...
    • 74 篇 机械工程
    • 60 篇 光学工程
    • 55 篇 生物工程
    • 51 篇 生物医学工程(可授...
    • 36 篇 交通运输工程
    • 31 篇 动力工程及工程热...
    • 30 篇 仪器科学与技术
    • 28 篇 化学工程与技术
    • 24 篇 材料科学与工程(可...
    • 23 篇 土木工程
    • 21 篇 安全科学与工程
    • 20 篇 建筑学
  • 394 篇 理学
    • 183 篇 数学
    • 141 篇 物理学
    • 70 篇 系统科学
    • 69 篇 生物学
    • 57 篇 统计学(可授理学、...
    • 29 篇 化学
  • 160 篇 管理学
    • 131 篇 管理科学与工程(可...
    • 41 篇 工商管理
    • 33 篇 图书情报与档案管...
  • 56 篇 医学
    • 47 篇 临床医学
    • 34 篇 基础医学(可授医学...
    • 24 篇 药学(可授医学、理...
  • 15 篇 法学
  • 12 篇 经济学
  • 11 篇 农学
  • 7 篇 教育学
  • 3 篇 文学
  • 2 篇 艺术学
  • 1 篇 哲学
  • 1 篇 军事学

主题

  • 23 篇 computational mo...
  • 19 篇 accuracy
  • 17 篇 feature extracti...
  • 17 篇 training
  • 15 篇 neural networks
  • 15 篇 control systems
  • 15 篇 mathematical mod...
  • 14 篇 optimization
  • 13 篇 object detection
  • 12 篇 gravitational wa...
  • 12 篇 robustness
  • 11 篇 monitoring
  • 11 篇 linear matrix in...
  • 11 篇 machine learning
  • 11 篇 uncertainty
  • 11 篇 data models
  • 10 篇 reinforcement le...
  • 10 篇 deep learning
  • 10 篇 convolution
  • 10 篇 vectors

机构

  • 52 篇 school of comput...
  • 27 篇 school of artifi...
  • 20 篇 institute for pl...
  • 20 篇 beijing engineer...
  • 20 篇 school of contro...
  • 19 篇 department of co...
  • 19 篇 university of so...
  • 19 篇 cloud computing ...
  • 19 篇 institute of com...
  • 18 篇 department of as...
  • 18 篇 department of co...
  • 17 篇 scuola di ingegn...
  • 17 篇 infn sezione di ...
  • 17 篇 dipartimento di ...
  • 17 篇 università degli...
  • 17 篇 department of ph...
  • 17 篇 infn trento inst...
  • 17 篇 max planck insti...
  • 17 篇 université paris...
  • 17 篇 universiteit gen...

作者

  • 46 篇 gang xiong
  • 28 篇 xiong gang
  • 24 篇 zhen shen
  • 20 篇 el-sayed m.el-ke...
  • 18 篇 r. takahashi
  • 18 篇 k. komori
  • 18 篇 t. kajita
  • 18 篇 t. sawada
  • 18 篇 c. kim
  • 18 篇 t. akutsu
  • 18 篇 abdelhameed ibra...
  • 17 篇 j. c. bayley
  • 17 篇 f. hellman
  • 17 篇 m. kinley-hanlon
  • 17 篇 t. mcrae
  • 17 篇 a. parisi
  • 17 篇 s. rowan
  • 17 篇 s. m. aronson
  • 17 篇 v. p. mitrofanov
  • 17 篇 g. moreno

语言

  • 997 篇 英文
  • 25 篇 其他
  • 8 篇 中文
检索条件"机构=Institute of Control and Computing Engineering"
1029 条 记 录,以下是151-160 订阅
排序:
Multi-channel EEG signal segmentation and feature extraction
Multi-channel EEG signal segmentation and feature extraction
收藏 引用
14th International Conference on Intelligent engineering Systems, INES 2010
作者: Procházka, Aleš Mudrová, Martina Vyšata, Oldřich Háva, Robert Araujo, Carmen Paz Suárez Department of Computing and Control Engineering Institute of Chemical Technology in Prague Czech Republic Neurocenter Caregroup Czech Republic Universidad de Las Palmas de G.C. Spain
Signal analysis of multi-channel data form a specific area of general digital signal processing methods. The paper is devoted to application of these methods for electroencephalogram (EEG) signal processing including ... 详细信息
来源: 评论
A sharing path awareness scheduling algorithm for dataflow architecture  21
A sharing path awareness scheduling algorithm for dataflow a...
收藏 引用
21st IEEE International Conference on High Performance computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Li, Yi Tan, Xu Xue, Rui Ye, Xiaochun Li, Wenming Wang, Da Zhang, Hao Fan, Dongrui State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Computer and Control Engineering University of Chinese Academy of Sciences Beijing China
Dataflow architecture has native advantage in achieving high instruction parallelism and power efficiency for today's emerging applications such as high performance computing and machining learning. In dataflow co... 详细信息
来源: 评论
XoT: A flexible block I/O data transfer protocol for xen  10th
XoT: A flexible block I/O data transfer protocol for xen
收藏 引用
10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017
作者: Zhang, Jin Li, Yuxuan Sun, Chengjun Yang, Haoxiang Wu, Jiacheng Gong, Xiaoli College of Computer and Control Engineering Nankai University Tianjin300350 China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China
The management of I/O resources is an important part of virtualization. Although the traditional management is complex, it becomes more challenging in virtualization. There has been many researches on how to improve I... 详细信息
来源: 评论
Memory partition for SIMD in streaming dataflow architectures  7
Memory partition for SIMD in streaming dataflow architecture...
收藏 引用
7th International Green and Sustainable computing Conference, IGSC 2016
作者: Shen, Xiaowei Ye, Xiaochun Tan, Xu Wang, Da Zhang, Zhimin Tang, Zhimin Fan, Dongrui State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Computer and Control Engineering University of Chinese Academy of Sciences Beijing China
The high parallelism feature of scientific applications makes SIMD very suitable for streaming dataflow architectures. However, the splitting of SIMD memory requests increases the messages in on-chip networks and decr... 详细信息
来源: 评论
Runtime verification by convergent formula progression  21
Runtime verification by convergent formula progression
收藏 引用
21st Asia-Pacific Software engineering Conference, APSEC 2014
作者: Shen, Yan Li, Jianwen Wang, Zheng Su, Ting Fang, Bin Pu, Geguang Liu, Wanwei Chen, Mingsong Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Beijing Institute of Control Engineering Beijing China National University of Defense Technology Changsha China
Runtime verification is a dynamic verification technique widely used in practice. In this paper we revisit the runtime verification technique with formula progression, which verifies the execution trace step by step b...
来源: 评论
Trajectory realization with collision avoidance algorithm
Trajectory realization with collision avoidance algorithm
收藏 引用
International Workshop on Robot Motion and control (RoMoCo)
作者: R. Kapela A. Rybarczyk M. Szulc Computing Science and Management Institute of Control and Information Engineering Poznan Poland
This paper describes the approach to collision avoidance problem for 3-DOF anthropomorphic robot manipulators. The novelty of the approach is the decomposition of 3D space to two 2D spaces. Resulting is the computatio... 详细信息
来源: 评论
A unified approach of object-level saliency detection in images and videos
收藏 引用
2013 International Conference on Advances in Materials Science and Manufacturing Technology, AMSMT 2013
作者: Zhang, Chi Wang, Wei Qiang School of Computer and Control Engineering University of Chinese Academy of Sciences Beijing 100190 China Key Lab of intelligence information Processing Institute of Computing Technology CAS Beijing 100190 China
Object-level saliency detection is an important branch of visual saliency. In this paper, we propose a novel method which can conduct object-level saliency detection in both images and videos in a unified way. We empl... 详细信息
来源: 评论
Security enhancement of LSB-based audio steganography method
Security enhancement of LSB-based audio steganography method
收藏 引用
2023 IEEE Zooming Innovation in Consumer Technologies Conference, ZINC 2023
作者: Jezdimirovic, Jovana Pekez, Nenad Kovacevic, Jelena University of Novi Sad Faculty of Technical Sciences Computing and Control Engineering Department Novi Sad Serbia Systems LLC RT-RK Institute for Computer Based Novi Sad Serbia
The rapid development of digital technology has brought about the challenge of ensuring information security. Cryptography and steganography are among the various techniques available to address this challenge. These ... 详细信息
来源: 评论
Device-free human presence detection using frequency domain  1
Device-free human presence detection using frequency domain
收藏 引用
1st IEEE International Workshop on Consumer Electronics - Novi Sad, CE WS 2015
作者: Mrazovac, Bojan Todorovic, Branislav M. Kukolj, Dragan Temerinac, Miodrag Department for Computing and Control Engineering Faculty of Technical Sciences Novi Sad Serbia RT-RK Institute for Computer Based Systems Narodnog fronta 23a Novi Sad Serbia
Device-free human presence (DFHP) detection is a novel technique, mainly applicable to wireless sensor networks in which a human does not need to carry a wireless transceiver to be detected. Irregularities in the radi... 详细信息
来源: 评论
MoFiM: A morphable fish modeling method for underwater binocular vision system
MoFiM: A morphable fish modeling method for underwater binoc...
收藏 引用
作者: Yin, Jingfang Zhu, Dengming Shi, Min Li, Zhaoxin Duan, Ming Mi, Xiangyuan Wang, Zhaoqi Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Control and Computer Engineering North China Electric Power University Beijing China Institute of Hydrobiology Chinese Academy of Sciences Hubei Wuhan China
Fish morphology is an essential basis for fishery management, as it can reflect the growth status of fishes. Noncontact 3D reconstruction of underwater fish is a new way to obtain fish morphology. While it is difficul... 详细信息
来源: 评论