咨询与建议

限定检索结果

文献类型

  • 368 篇 会议
  • 215 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 588 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 325 篇 工学
    • 234 篇 计算机科学与技术...
    • 195 篇 软件工程
    • 54 篇 控制科学与工程
    • 53 篇 信息与通信工程
    • 37 篇 生物工程
    • 36 篇 电气工程
    • 27 篇 生物医学工程(可授...
    • 26 篇 光学工程
    • 24 篇 机械工程
    • 19 篇 化学工程与技术
    • 18 篇 动力工程及工程热...
    • 16 篇 交通运输工程
    • 14 篇 电子科学与技术(可...
    • 11 篇 建筑学
    • 10 篇 土木工程
    • 9 篇 仪器科学与技术
    • 9 篇 环境科学与工程(可...
  • 150 篇 理学
    • 74 篇 数学
    • 42 篇 生物学
    • 30 篇 物理学
    • 22 篇 统计学(可授理学、...
    • 21 篇 系统科学
    • 17 篇 化学
  • 96 篇 管理学
    • 65 篇 管理科学与工程(可...
    • 37 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 25 篇 医学
    • 23 篇 临床医学
    • 17 篇 基础医学(可授医学...
    • 12 篇 药学(可授医学、理...
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 8 篇 法学
  • 6 篇 农学
  • 3 篇 教育学
  • 2 篇 艺术学

主题

  • 18 篇 laboratories
  • 16 篇 intelligent syst...
  • 15 篇 computational mo...
  • 15 篇 distributed comp...
  • 15 篇 computer network...
  • 14 篇 reinforcement le...
  • 14 篇 deep learning
  • 13 篇 machine learning
  • 13 篇 accuracy
  • 12 篇 computer archite...
  • 12 篇 feature extracti...
  • 12 篇 cloud computing
  • 12 篇 training
  • 11 篇 neural networks
  • 11 篇 predictive model...
  • 10 篇 scalability
  • 10 篇 artificial intel...
  • 9 篇 three-dimensiona...
  • 9 篇 automation
  • 9 篇 humans

机构

  • 46 篇 school of artifi...
  • 28 篇 beijing engineer...
  • 28 篇 guangdong engine...
  • 17 篇 university of ch...
  • 17 篇 state key labora...
  • 14 篇 center for resea...
  • 13 篇 qingdao academy ...
  • 12 篇 cloud computing ...
  • 11 篇 the state key la...
  • 9 篇 intelligent manu...
  • 9 篇 the beijing engi...
  • 9 篇 gecad - research...
  • 9 篇 school of intell...
  • 8 篇 microsoft resear...
  • 8 篇 the state key la...
  • 7 篇 state key labora...
  • 7 篇 college of infor...
  • 6 篇 research center ...
  • 6 篇 national researc...
  • 6 篇 shanghai researc...

作者

  • 56 篇 gang xiong
  • 33 篇 xiong gang
  • 30 篇 zhen shen
  • 22 篇 xisong dong
  • 21 篇 zita vale
  • 18 篇 shen zhen
  • 17 篇 vale zita
  • 17 篇 dong xisong
  • 14 篇 xiuqin shang
  • 14 篇 pedro faria
  • 13 篇 fenghua zhu
  • 12 篇 ismail leila
  • 12 篇 gomes luis
  • 11 篇 fei-yue wang
  • 10 篇 bin hu
  • 10 篇 rajkumar buyya
  • 10 篇 materwala huned
  • 9 篇 wang liang
  • 9 篇 liu jiang
  • 9 篇 yu hu

语言

  • 553 篇 英文
  • 28 篇 其他
  • 6 篇 中文
  • 1 篇 葡萄牙文
检索条件"机构=Intelligent Distributed Computing and Systems Research Laboratory"
588 条 记 录,以下是161-170 订阅
排序:
Younger: The First Dataset for Artificial Intelligence-Generated Neural Network Architecture
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Zhengxin Gao, Wanling Peng, Luzhou Huang, Yunyou Tang, Fei Zhan, Jianfeng Research Center of Distributed Systems Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University China Inspur Group Co. Ltd. China Jinan Inspur Data Technology Co. Ltd. China
Designing and optimizing neural network architectures typically requires extensive expertise, starting with handcrafted designs and then manual or automated refinement. This dependency presents a significant barrier t... 详细信息
来源: 评论
Dfier: A Directed Vulnerability Verifier for Ethereum Smart Contracts
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zeli Dai, Weiqi Li, Ming Choo, Kim-Kwang Raymond Zou, Deqing Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing40065 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio United States
Existing smart contract vulnerability identification approaches mainly focus on complete program detection. Consequently, lots of known potentially vulnerable locations need manual verification, which is energy-exhaus... 详细信息
来源: 评论
Comparative Analysis of Machine Learning Models for Students’ Performance Prediction
Comparative Analysis of Machine Learning Models for Students...
收藏 引用
International Conference on Advances in Digital Science, ICADS 2021
作者: Ismail, Leila Materwala, Huned Hennebelle, Alain Distributed Computing and Systems Research Laboratory Department of Computer Science and Software Engineering College of Information Technology United Arab Emirates University Al Ain Abu Dhabi15551 United Arab Emirates Al Ain Abu Dhabi United Arab Emirates
Machine learning for education is an emerging discipline where a model is developed based on training data to make predictions on students’ performance. The main aim is to identify students who would have difficulty ... 详细信息
来源: 评论
Geometry Problem Solving Based on Counter-Factual Evolutionary Reasoning
Geometry Problem Solving Based on Counter-Factual Evolutiona...
收藏 引用
IEEE International Conference on Automation Science and Engineering (CASE)
作者: Bing Song Gang Xiong Zhen Shen Fenghua Zhu Yisheng Lv Peijun Ye The State Key Laboratory of Management and Control for Complex Systems Institute of Automation Chinese Academy of Sciences Beijing China School of Artificial Intelligence University of Chinese Academy of Sciences Beijing China The Beijing Engineering Research Center of Intelligent Systems and Technology Institute of Automation Chinese Academy of Sciences China The Guangdong Engineering Research Center of 3D Printing and Intelligent Manufacturing The Cloud Computing Center Chinese Academy of Sciences Dongguan China Intelligent Manufacturing Center Qingdao Academy of Intelligent Industries Qingdao China
As a representative topic in natural language processing and automated theorem proving, geometry problem solving requires an abstract problem understanding and symbolic reasoning. A major challenge here is to find a f...
来源: 评论
Distribution Network Digital Twin: a Basic Machine Learning based Voltage Estimator
Distribution Network Digital Twin: a Basic Machine Learning ...
收藏 引用
IEEE International Conference on Smart Grid Communications (SmartGridComm)
作者: Mohamad El Iaali Reza Razi Antoine Bruyere Bruno Francois Joao Soares Univ. Lille Arts et Metiers Institute of Technology Centrale Lille Junia ULR 2697 - L2EP Lille France GECAD - Research Group on Intelligent Engineering and Computing for Advanced Innovation and Development LASI - Intelligent Systems Associate LAboratory Polytechnic of Porto Porto Portugal
The increasing integration of renewable energy sources, and the widespread use of electric vehicles have introduced greater complexity and dynamics in power flows in distribution systems. With bidirectional power flow...
来源: 评论
EDDNet: An Efficient and Accurate Defect Detection Network for the Industrial Edge Environment
EDDNet: An Efficient and Accurate Defect Detection Network f...
收藏 引用
IEEE International Conference on Software Quality, Reliability and Security (QRS)
作者: Runbing Qin Ningjiang Chen Yihui Huang School of Computer and Electronic Information Guangxi University Nanning China Guangxi Intelligent Digital Services Research Center of Engineering Technology Nanning China Guangxi Colleges and Universities Key Laboratory of Parallel and Distributed Computing Nanning China
Defect detection aims to locate the accurate position of defects in images, which is of great significance to quality inspection in the industrial product manufacturing. Currently, many defect detection methods rely o... 详细信息
来源: 评论
Time Series Forecasting of COVID-19 Infections in United Arab Emirates using ARIMA
Time Series Forecasting of COVID-19 Infections in United Ara...
收藏 引用
2020 International Conference on Computational Science and Computational Intelligence, CSCI 2020
作者: Ismail, Leila Alhmoudi, Shaikhah Alkatheri, Sumyah United Arab Emirates University Distributed Computing and Systems Research Laboratory College of Information Technology Abu Dhabi15551 United Arab Emirates
Machine learning time series models have been used to predict COVID-19 pandemic infections. Based on the public dataset from Johns Hopkins, we present a novel framework for forecasting COVID-19 infections. We implemen... 详细信息
来源: 评论
A Sub-mother UAV System Capable of Autonomous Aerial Docking
IEEE Transactions on Intelligent Vehicles
收藏 引用
IEEE Transactions on intelligent Vehicles 2024年
作者: Li, Gang Lu, Yi He, Bin Pang, Tao Cheng, Bin Zhang, Pengpeng College of Electronics and Information Engineering Tongji University Shanghai201804 China Shanghai Research Institute for Intelligent Autonomous Systems Shanghai200120 China Shanghai Sunshine Rehabilitation Center Shanghai201613 China National Key Laboratory of Autonomous Intelligent Unmanned Systems Shanghai200120 China East China Institute of Computing Technology Shanghai201822 China Department of Control Science and Engineering College of Electronics and Information Engineering Tongji University Shanghai China College of Electronic and Information Engineering Tongji University Shanghai China
Completing the docking between two multi-rotor unmanned aerial vehicles (UAVs) in the air has great significance for expanding the application scenarios of multiple UAVs and improving their endurance capability. In th... 详细信息
来源: 评论
Modeling and Clustering of Parabolic Granular Data
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第7期5卷 3728-3742页
作者: Tang, Yiming Gao, Jianwei Pedrycz, Witold Hu, Xianghui Xi, Lei Ren, Fuji Hu, Min Hefei University of Technology Anhui Province Key Laboratory of Affective Computing and Advanced Intelligent Machine School of Computer and Information Hefei230601 China University of Alberta Department of Electrical and Computer Engineering EdmontonABT6R 2V4 Canada Hefei University of Technology School of Computer and Information Hefei230601 China University of Alberta Department of Electrical and Computer Engineering EdmontonABT6G 2R3 Canada Polish Academy of Sciences Systems Research Institute Warsaw00-901 Poland Istinye University Research Center of Performance and Productivity Analysis Istanbul34010 Turkey Southeast University School of Computer Science and Engineering Nanjing211189 China University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China
At present, there exist some problems in granular clustering methods, such as lack of nonlinear membership description and global optimization of granular data boundaries. To address these issues, in this study, revol... 详细信息
来源: 评论
PMU-Spill: Performance Monitor Unit Counters Leak Secrets in Transient Executions
PMU-Spill: Performance Monitor Unit Counters Leak Secrets in...
收藏 引用
IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)
作者: Pengfei Qiu Qiang Gao Dongsheng Wang Yongqiang Lyu Chang Liu Xiaoyong Li Chunlu Wang Gang Qu Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Tsinghua University Beijing China Department of Computer Science and Technology Beijing National Research Center for Information Science and Technology Tsinghua University Beijing China Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing China Department of Electrical and Computer Engineering Institute for Systems Research University of Maryland Maryland USA
The processor's Performance Monitor Unit (PMU) allows the recording of architectural and microarchitectural events for profiling purposes. In this study, we reveal a security issue caused by the fact that current ... 详细信息
来源: 评论