咨询与建议

限定检索结果

文献类型

  • 240 篇 会议
  • 151 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 394 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 272 篇 工学
    • 198 篇 计算机科学与技术...
    • 166 篇 软件工程
    • 49 篇 信息与通信工程
    • 40 篇 生物工程
    • 33 篇 机械工程
    • 32 篇 控制科学与工程
    • 17 篇 电气工程
    • 16 篇 光学工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 仪器科学与技术
    • 11 篇 生物医学工程(可授...
    • 9 篇 建筑学
    • 8 篇 冶金工程
    • 8 篇 动力工程及工程热...
    • 8 篇 化学工程与技术
    • 8 篇 交通运输工程
    • 7 篇 安全科学与工程
  • 131 篇 理学
    • 80 篇 数学
    • 41 篇 生物学
    • 32 篇 统计学(可授理学、...
    • 25 篇 物理学
    • 19 篇 系统科学
    • 9 篇 化学
  • 88 篇 管理学
    • 58 篇 管理科学与工程(可...
    • 36 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 14 篇 法学
    • 13 篇 社会学
  • 11 篇 医学
    • 11 篇 临床医学
    • 8 篇 基础医学(可授医学...
  • 10 篇 经济学
    • 10 篇 应用经济学
  • 3 篇 教育学
  • 2 篇 文学
  • 2 篇 艺术学
  • 1 篇 农学

主题

  • 13 篇 computer vision
  • 12 篇 image segmentati...
  • 11 篇 semantics
  • 11 篇 feature extracti...
  • 11 篇 accuracy
  • 7 篇 image edge detec...
  • 7 篇 laboratories
  • 7 篇 active contours
  • 7 篇 equations
  • 6 篇 optimization
  • 6 篇 energy consumpti...
  • 6 篇 educational tech...
  • 6 篇 forecasting
  • 6 篇 ubiquitous compu...
  • 5 篇 collaborative fi...
  • 5 篇 task analysis
  • 5 篇 neural networks
  • 5 篇 convergence
  • 5 篇 wireless sensor ...
  • 5 篇 network security

机构

  • 39 篇 state key labora...
  • 31 篇 key laboratory o...
  • 30 篇 tianjin key lab ...
  • 20 篇 tianjin key lab....
  • 15 篇 tianjin key lab ...
  • 15 篇 school of comput...
  • 15 篇 state key lab. f...
  • 14 篇 national key lab...
  • 14 篇 tianjin key labo...
  • 13 篇 tianjin key labo...
  • 11 篇 intelligent soft...
  • 10 篇 university of ch...
  • 10 篇 hunan provincial...
  • 10 篇 national key lab...
  • 9 篇 key laboratory o...
  • 9 篇 key laboratory o...
  • 8 篇 school of comput...
  • 8 篇 state key lab fo...
  • 7 篇 ministry of educ...
  • 7 篇 faculty of compu...

作者

  • 21 篇 zhang de-gan
  • 16 篇 zhang degan
  • 13 篇 guosheng kang
  • 12 篇 liu jianxun
  • 11 篇 yuanquan wang
  • 10 篇 xia chengyi
  • 10 篇 degan zhang
  • 9 篇 kang guosheng
  • 9 篇 zhang rui
  • 9 篇 cao jiannong
  • 9 篇 jianxun liu
  • 8 篇 de-gan zhang
  • 8 篇 zhang ting
  • 8 篇 xiao yingyuan
  • 7 篇 tong lu
  • 7 篇 dou wanchun
  • 7 篇 yang jian
  • 7 篇 buqing cao
  • 7 篇 jiannong cao
  • 6 篇 guo yanwen

语言

  • 380 篇 英文
  • 9 篇 其他
  • 5 篇 中文
检索条件"机构=Key Lab of Intelligent Computing and Novel Software Technology"
394 条 记 录,以下是121-130 订阅
排序:
Hyperbolic Geometric Latent Diffusion Model for Graph Generation
arXiv
收藏 引用
arXiv 2024年
作者: Fu, Xingcheng Gao, Yisen Wei, Yuecen Sun, Qingyun Peng, Hao Li, Jianxin Li, Xianxian Key Lab of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin China Institute of Artificial Intelligence Beihang University Beijing China School of Software Beihang University Beijing China Beijing Advanced Innovation Center for Big Data and Brain Computing School of Computer Science and Engineering Beihang University Beijing China
Diffusion models have made significant contributions to computer vision, sparking a growing interest in the community recently regarding the application of them to graph generation. Existing discrete graph diffusion m... 详细信息
来源: 评论
Synthesizing Barrier Certificates of Neural Network Controlled Continuous Systems via Approximations  21
Synthesizing Barrier Certificates of Neural Network Controll...
收藏 引用
Proceedings of the 58th Annual ACM/IEEE Design Automation Conference
作者: Meng Sha Xin Chen Yuzhe Ji Qingye Zhao Zhengfeng Yang Wang Lin Enyi Tang Qiguang Chen Xuandong Li State Key Laboratory for Novel Software Technology of Nanjing University Nanjing China Shanghai Key Lab of Trustworthy Computing of East China Normal University Shanghai China School of Information Science and Technology of Zhejiang Sci-Tech University Hangzhou China British Columbia Academy Nanjing China
The paper presents a barrier certificate based approach to verifying safety properties of closed-loop systems using neural networks as controllers. It deals with the verification problem in the infinite time horizon a... 详细信息
来源: 评论
novel approach of the best path selection based on prior knowledge reinforcement learning  3
Novel approach of the best path selection based on prior kno...
收藏 引用
3rd IEEE International Conference on Smart Internet of Things, SmartIoT 2019
作者: Liu, Xiao-Huan Zhang, De-Gan Zhang, Ting Cui, Yu-Ya Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin300384 China
This paper proposes and designs a novel approach to solve the optimal path planning problem of intelligent driving vehicles in practical applications. Through the understanding and learning of the reinforcement learni... 详细信息
来源: 评论
A Representation Learning Framework for Stock Movement Prediction
SSRN
收藏 引用
SSRN 2022年
作者: Feng, Wenzhi Ma, Xiang Li, Xuemei Zhang, Caiming School of Software Shandong University Jinan250101 China Shandong Co-Innovation Center of Future Intelligent Computing Yantai264025 China Digital Media Technology Key Lab of Shandong Province Jinan250014 China
The learning of high-quality stock representations is one of the keys to predicting stock movements effectively. Current studies have been negatively impacted by stochasticity in stock prices, resulting in inadequate ... 详细信息
来源: 评论
An Effective Network Repair Strategy Against Both Random and Malicious Edge Attacks
An Effective Network Repair Strategy Against Both Random and...
收藏 引用
第40届中国控制会议
作者: Jianda Zhao Shiwen Sun Hao Shen Chengyi Xia School of Computer Science and Engineering Tianjin University of Technology Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Engineering Research Center of Learning-Based Intelligent System Ministry of Education
Attack vulnerability and protection of large-scale complex networks are of great significance in academic and engineering *** this study,the problem of structural vulnerability of complex networks induced by attacks o... 详细信息
来源: 评论
Online Attentive Kernel-Based Temporal Difference Learning
arXiv
收藏 引用
arXiv 2022年
作者: Yang, Guang Chen, Xingguo Yang, Shangdong Wang, Huihui Dong, Shaokang Gao, Yang The the Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications National Engineering Laboratory for Agri-Product Quality Traceability Beijing Technology and Business University China The State Key Laboratory for Novel Software Technology Nanjing University China The PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology China
With rising uncertainty in the real world, online Reinforcement Learning (RL) has been receiving increasing attention due to its fast learning capability and improving data efficiency. However, online RL often suffers... 详细信息
来源: 评论
Algebraic analysis and control of networked opacity with bounded communication delays
Algebraic analysis and control of networked opacity with bou...
收藏 引用
第40届中国控制会议
作者: Qian Xu Zhipeng Zhang Chengyi Xia Zengqiang Chen Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Engineering Research Center of Learning-Based Intelligent System Ministry of Education College of Artificial Intelligence Nankai University
Networked finite state machine takes the delay factor into consideration, and its security has become an significant research topic. In this paper, we explore the impact of bounded communication delays on networked op... 详细信息
来源: 评论
A Many-Objective Evolutionary Algorithm Assisted by Ideal Hyperplane
SSRN
收藏 引用
SSRN 2022年
作者: Zhang, Zhixia Wen, Jie Wang, Hui Cai, Xingjuan Cui, Zhihua Zhang, Wensheng School of Computer Science and Technology Taiyuan University of Science and Technology China School of Information Engineering Nanchang Institute of Technology Nanchang330099 China State Key Laboratory of Intelligent Control and Management of Complex System Institute of Automation Chinese Academy of Sciences China State Key Lab. for Novel Software Technology Nanjing University China
In many-objective optimization problems (MaOPs), it is a difficult task for evolutionary algorithms to balance convergence and diversity while rapidly converging to the Pareto front. As the number of objectives increa... 详细信息
来源: 评论
SPA: A Graph Spectral Alignment Perspective for Domain Adaptation
arXiv
收藏 引用
arXiv 2023年
作者: Xiao, Zhiqing Wang, Haobo Jin, Ying Feng, Lei Chen, Gang Huang, Fei Zhao, Junbo College of Computer Science and Technology Zhejiang University China School of Software Technology Zhejiang University China Key Lab of Intelligent Computing based Big Data of Zhejiang Province Zhejiang University China CUHK-SenseTime Joint Lab The Chinese University of Hong Kong Hong Kong School of Computer Science and Engineering Nanyang Technological University Singapore Alibaba Group China
Unsupervised domain adaptation (UDA) is a pivotal form in machine learning to extend the in-domain model to the distinctive target domains where the data distributions differ. Most prior works focus on capturing the i... 详细信息
来源: 评论
SEMICON: A Learning-to-hash Solution for Large-scale Fine-grained Image Retrieval
arXiv
收藏 引用
arXiv 2022年
作者: Shen, Yang Sun, Xuhao Wei, Xiu-Shen Jiang, Qing-Yuan Yang, Jian School of Computer Science and Engineering Nanjing University of Science and Technology China State Key Laboratory of Integrated Services Networks Xidian University China State Key Laboratory for Novel Software Technology Nanjing University China Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security Nanjing University of Science and Technology China
In this paper, we propose Suppression-Enhancing Mask based attention and Interactive Channel transformatiON (SEMICON) to learn binary hash codes for dealing with large-scale fine-grained image retrieval tasks. In SEMI... 详细信息
来源: 评论