咨询与建议

限定检索结果

文献类型

  • 240 篇 会议
  • 152 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 395 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 274 篇 工学
    • 199 篇 计算机科学与技术...
    • 167 篇 软件工程
    • 50 篇 信息与通信工程
    • 40 篇 生物工程
    • 34 篇 机械工程
    • 34 篇 控制科学与工程
    • 18 篇 电气工程
    • 17 篇 电子科学与技术(可...
    • 16 篇 光学工程
    • 13 篇 仪器科学与技术
    • 11 篇 生物医学工程(可授...
    • 9 篇 建筑学
    • 8 篇 冶金工程
    • 8 篇 动力工程及工程热...
    • 8 篇 化学工程与技术
    • 8 篇 交通运输工程
    • 7 篇 安全科学与工程
  • 131 篇 理学
    • 79 篇 数学
    • 41 篇 生物学
    • 32 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 19 篇 系统科学
    • 9 篇 化学
  • 87 篇 管理学
    • 57 篇 管理科学与工程(可...
    • 36 篇 图书情报与档案管...
    • 17 篇 工商管理
  • 14 篇 法学
    • 13 篇 社会学
  • 11 篇 医学
    • 11 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 3 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学
  • 1 篇 农学

主题

  • 13 篇 computer vision
  • 12 篇 image segmentati...
  • 11 篇 semantics
  • 11 篇 feature extracti...
  • 11 篇 accuracy
  • 7 篇 image edge detec...
  • 7 篇 laboratories
  • 7 篇 active contours
  • 7 篇 equations
  • 6 篇 optimization
  • 6 篇 energy consumpti...
  • 6 篇 educational tech...
  • 6 篇 forecasting
  • 6 篇 ubiquitous compu...
  • 5 篇 collaborative fi...
  • 5 篇 task analysis
  • 5 篇 neural networks
  • 5 篇 convergence
  • 5 篇 wireless sensor ...
  • 5 篇 network security

机构

  • 39 篇 state key labora...
  • 31 篇 key laboratory o...
  • 30 篇 tianjin key lab ...
  • 20 篇 tianjin key lab....
  • 15 篇 tianjin key lab ...
  • 15 篇 school of comput...
  • 15 篇 state key lab. f...
  • 14 篇 national key lab...
  • 14 篇 tianjin key labo...
  • 13 篇 tianjin key labo...
  • 11 篇 intelligent soft...
  • 10 篇 university of ch...
  • 10 篇 hunan provincial...
  • 10 篇 national key lab...
  • 9 篇 key laboratory o...
  • 9 篇 key laboratory o...
  • 8 篇 school of comput...
  • 8 篇 state key lab fo...
  • 7 篇 ministry of educ...
  • 7 篇 faculty of compu...

作者

  • 21 篇 zhang de-gan
  • 16 篇 zhang degan
  • 13 篇 guosheng kang
  • 12 篇 liu jianxun
  • 11 篇 yuanquan wang
  • 10 篇 xia chengyi
  • 10 篇 degan zhang
  • 9 篇 kang guosheng
  • 9 篇 zhang rui
  • 9 篇 cao jiannong
  • 9 篇 jianxun liu
  • 8 篇 de-gan zhang
  • 8 篇 zhang ting
  • 8 篇 xiao yingyuan
  • 7 篇 tong lu
  • 7 篇 dou wanchun
  • 7 篇 yang jian
  • 7 篇 buqing cao
  • 7 篇 jiannong cao
  • 6 篇 guo yanwen

语言

  • 381 篇 英文
  • 9 篇 其他
  • 5 篇 中文
检索条件"机构=Key Lab of Intelligent Computing and Novel Software Technology"
395 条 记 录,以下是1-10 订阅
排序:
A Helmet Detection Algorithm Based on Transformers with Deformable Attention Module
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 229-241页
作者: Songle Chen Hongbo Sun Yuxin Wu Lei Shang Xiukai Ruan Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Nanjing University of Posts and Telecommunications State Key Lab for Novel Software Technology Nanjing University Institute of Intelligent Locks Wenzhou University
Wearing a helmet is one of the effective measures to protect workers' safety. To address the challenges of severe occlusion, multi-scale, and small target issues in helmet detection, this paper proposes a helmet d... 详细信息
来源: 评论
New Offloading Method of computing Task Based on Gray Wolf Hunting Optimization Mechanism for the IOV
收藏 引用
IEEE Transactions on Network and Service Management 2025年
作者: Zhang, Jie Zhang, De-Gan Qiao, Meng Hong-Lin, E. Zhang, Ting Zhang, Ping University of Macau Key Lab of Internet of Things for Smart City Faculty of Science and Technology 999078 China Tianjin University of Technology Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin300384 China Tianjin University of Sport School of Sports Economics and Management Tianjin301617 China
Task offloading, as an effective solution, provides low latency and sufficient computing resources for mobile users in the network. However, how to reasonably offload to reduce system overhead is a challenging issue t... 详细信息
来源: 评论
DCAS-BMT: Dynamic Construction and Adjustment of Skewed Bonsai Merkle Tree for Performance Enhancement in Secure Non-Volatile Memory
收藏 引用
IEEE Transactions on Computers 2025年
作者: Zhang, Yu Chen, Renhai Yan, Hangyu Wu, Hongyue Feng, Zhiyong Tianjin University College of Intelligence and Computing Tianjin300350 China Nanjing University State Key Lab. for Novel Software Technology Nanjing210023 China Yunnan University of Finance and Economics Yunnan Key Lab. of Service Computing Kunming650221 China
Traditional DRAM-based memory solutions face challenges, including high energy consumption and limited scalability. Non-Volatile Memory (NVM) offers low energy consumption and high scalability. However, security chall... 详细信息
来源: 评论
CESFusion: Cross-Frequency Enhanced Spatial—Spectral Fusion Network for Hyperspectral and Multispectral Image Fusion
收藏 引用
IEEE Transactions on Geoscience and Remote Sensing 2025年 63卷
作者: Zhang, Haozheng Yang, Yanhong Li, Chaoyang Lu, Yanjie Zhang, Guodao Chen, Shengyong Tianjin University of Technology School of Computer Science and Engineering Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin300384 China School of Computer Science and Engineering Tianjin300384 China Hangzhou Dianzi University Institute of Intelligent Media Computing Hangzhou310018 China
The fusion of hyperspectral and multispectral images (MSIs) involves integrating a high spectral resolution hyperspectral image (HSI) and a high spatial resolution MSI to generate an HSI with high-resolution HSI (HR-H... 详细信息
来源: 评论
Blockchain-Enabled Secure, Fair and Scalable Data Sharing in Zero-Trust Edge-End Environment
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2056-2069页
作者: Xu, Xiaolong Meng, Ke Xiang, Haolong Cui, Guangming Xia, Xiaoyu Dou, Wanchun Nanjing210044 China Nanjing University of Information Science and Technology School of Software and the Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services Nanjing210044 China RMIT University School of Computing Technologies MelbourneVIC3000 Australia Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China
In edge computing, the Zero-Trust Security Model (ZTSM), as a key enabling technology for next-generation networks, plays a crucial role in providing authentication for addressing data sharing concerns, such as freque... 详细信息
来源: 评论
Uncertainty-aware Superpoint Graph Transformer for Weakly Supervised 3D Semantic Segmentation
收藏 引用
IEEE Transactions on Fuzzy Systems 2025年
作者: Fan, Yan Wang, Yu Zhu, Pengfei Hui, Le Xie, Jin Hu, Qinghua Tianjin University College of Intelligence and Computing Tianjin300350 China Ministry of Education of the People's Republic of China Engineering Research Center of City Intelligence and Digital Governance China Haihe Laboratory of Itai Tianjin China Northwestern Polytechnical University School of Electronics and Information Shaanxi Key Laboratory of Information Acquisition and Processing China Nanjing University of Science and Technology Pca Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education China Nanjing University State Key Laboratory for Novel Software Technology Nanjing China
Weakly supervised 3D semantic segmentation has successfully mitigated the labor-intensive and time-consuming task of annotating 3D point clouds. However, reliably utilizing the minimal point-wise annotations for unlab... 详细信息
来源: 评论
K-ON: Stacking Knowledge On the Head Layer of Large Language Model
arXiv
收藏 引用
arXiv 2025年
作者: Guo, Lingbing Zhang, Yichi Bo, Zhongpu Chen, Zhuo Sun, Mengshu Zhang, Zhiqiang Zhang, Wen Chen, Huajun College of Computer Science and Technology Zhejiang University China ZJU-Ant Group Joint Lab of Knowledge Graph China Ant Group China School of Software Technology Zhejiang University China Zhejiang Key Laboratory of Big Data Intelligent Computing China
Recent advancements in large language models (LLMs) have significantly improved various natural language processing (NLP) tasks. Typically, LLMs are trained to predict the next token, aligning well with many NLP tasks... 详细信息
来源: 评论
Predictive ISAC Beamforming Using LoRA-Transformer LSTM Integrated with GNN in Ultra-Dense D2D mmWave Networks
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Liu, Haochen Bi, Jia Li, Bohan Xiang, Luping Yang, Xin Zhang, Zhaolin Wang, Ling Northwestern Polytechnical University School of Electronics and Information Xi'an710019 China Rutherford Appleton Laboratory Scientific Computing Department STFC DidcotOX11 0QX United Kingdom Ocean University of China Faculty of Information Science and Engineering Qingdao266100 China Nanjing University State Key Laboratory of Novel Software Technology Nanjing210008 China School of Intelligent Software and Engineering Suzhou China
Effective beamforming is crucial in ultra-dense device-to-device (D2D) mmWave networks to reduce interference and optimize communication. However, current methods often struggle to balance high data rates with minimal... 详细信息
来源: 评论
Diff-Reg v2: Diffusion-Based Matching Matrix Estimation for Image Matching and 3D Registration
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Qianliang Jiang, Haobo Ding, Yaqing Luo, Lei Xie, Jin Yang, Jian PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education China School of Computer Science and Engineering Nanjing University of Science and Technology China Nanyang Technological University Singapore Visual Recognition Group Faculty of Electrical Engineering Czech Technical University in Prague Prague Czech Republic State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Intelligence Science and Technology Nanjing University Suzhou China
Establishing reliable correspondences is crucial for all registration tasks, including 2D image registration, 3D point cloud registration, and 2D-3D image-to-point cloud registration. However, these tasks are often co... 详细信息
来源: 评论
Modeling Multilevel Business Process Monitoring via BPMN Extension
收藏 引用
Concurrency and Computation: Practice and Experience 2025年 第12-14期37卷
作者: Kang, Guosheng Wang, Zhen Cheng, Hangyu Liu, Jianxun Wen, Yiping Peng, Jun School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China Hunan Provincial Key Lab. for Services Computing and Novel Software Technology Hunan University of Science and Technology Xiangtan China School of Computer Science and Technology Xi'an Jiaotong University Xi'an China School of Computer Science Fudan University Shanghai China
Business process monitoring involves real-time supervision of a series of activities carried out by an organization to achieve specific objectives. Process event monitoring points (PEMP) are used to pinpoint specific ... 详细信息
来源: 评论