咨询与建议

限定检索结果

文献类型

  • 419 篇 会议
  • 120 篇 期刊文献

馆藏范围

  • 539 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 414 篇 工学
    • 316 篇 计算机科学与技术...
    • 267 篇 软件工程
    • 108 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 37 篇 生物工程
    • 28 篇 电子科学与技术(可...
    • 22 篇 电气工程
    • 20 篇 机械工程
    • 20 篇 光学工程
    • 14 篇 动力工程及工程热...
    • 12 篇 仪器科学与技术
    • 11 篇 化学工程与技术
    • 11 篇 农业工程
    • 11 篇 生物医学工程(可授...
    • 8 篇 安全科学与工程
    • 7 篇 建筑学
  • 196 篇 理学
    • 138 篇 数学
    • 43 篇 统计学(可授理学、...
    • 37 篇 物理学
    • 37 篇 生物学
    • 12 篇 系统科学
    • 11 篇 化学
  • 142 篇 管理学
    • 95 篇 图书情报与档案管...
    • 61 篇 管理科学与工程(可...
    • 29 篇 工商管理
  • 13 篇 法学
    • 11 篇 社会学
  • 11 篇 经济学
    • 11 篇 应用经济学
  • 11 篇 农学
    • 11 篇 作物学
  • 11 篇 医学
    • 10 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 3 篇 艺术学
  • 2 篇 教育学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 16 篇 semantics
  • 11 篇 network coding
  • 10 篇 bandwidth
  • 10 篇 data mining
  • 10 篇 training
  • 9 篇 feature extracti...
  • 8 篇 computational mo...
  • 8 篇 clustering algor...
  • 8 篇 cloud computing
  • 7 篇 collaborative fi...
  • 7 篇 data models
  • 6 篇 object detection
  • 6 篇 educational inst...
  • 6 篇 servers
  • 6 篇 mapreduce
  • 6 篇 computational li...
  • 6 篇 real-time system...
  • 6 篇 entropy
  • 6 篇 web services
  • 5 篇 scalability

机构

  • 30 篇 key lab. of inte...
  • 29 篇 university of ch...
  • 20 篇 tianjin key lab....
  • 19 篇 key lab. of inte...
  • 13 篇 key lab. of inte...
  • 13 篇 school of comput...
  • 11 篇 graduate univers...
  • 11 篇 key laboratory o...
  • 11 篇 state key lab. f...
  • 10 篇 shenyang institu...
  • 10 篇 peng cheng labor...
  • 10 篇 hunan provincial...
  • 9 篇 school of comput...
  • 9 篇 graduate univers...
  • 9 篇 liaoning key lab...
  • 8 篇 state key labora...
  • 8 篇 key laboratory o...
  • 7 篇 key lab. of inte...
  • 7 篇 school of cyber ...
  • 7 篇 institute of com...

作者

  • 25 篇 liu qun
  • 19 篇 yin zhenyu
  • 19 篇 kai lei
  • 19 篇 li hui
  • 18 篇 huang qingming
  • 13 篇 guosheng kang
  • 10 篇 gao wen
  • 9 篇 zhang degan
  • 9 篇 liu jianxun
  • 9 篇 xu qianqian
  • 9 篇 jianxun liu
  • 9 篇 zhuge hai
  • 8 篇 kang guosheng
  • 8 篇 zhang feiqing
  • 8 篇 cao jiannong
  • 7 篇 fan chao
  • 7 篇 jiang shuqiang
  • 7 篇 mi haitao
  • 7 篇 wang tao
  • 7 篇 yang yan

语言

  • 513 篇 英文
  • 21 篇 中文
  • 5 篇 其他
检索条件"机构=Key Lab. of Cloud Computing Technology"
539 条 记 录,以下是441-450 订阅
排序:
A Fully Pipelined High-Performance Elliptic Curve Cryptography Processor for NIST P-256
A Fully Pipelined High-Performance Elliptic Curve Cryptograp...
收藏 引用
IEEE European Test Symposium (ETS)
作者: Han Yan Shuai Chen Junying Huang Jing Ye Huawei Li Xiaowei Li State Key Lab of Processors Institute of Computing Technology CAS University of Chinese Academy of Sciences Rock-Solid Security Lab. Binary Semiconductor Co. Ltd. CASTEST Co. Ltd.
Elliptic curve cryptography (ECC) is widely used in public key encryption, but its high-speed deployment faces challenges due to algorithmic and arithmetic complexity. In this paper, we present a high-performance ECC ... 详细信息
来源: 评论
Guest Editorial: Ubiquitous Intelligence for Internet of Vehicles
收藏 引用
IEEE Internet of Things Magazine 2023年 第3期6卷 52-54页
作者: Peng, Haixia Cheng, Nan Ye, Qiang Fang, He Yan, Shen Choo, Kim-Kwang Raymond Duong, Trung Q. California State University Long Beach Department of Computer Engineering and Computer Science Long BeachCA United States School of Telecommunications Engineering Xidian University State Key Lab. of ISN Shaanxi China Memorial University of Newfoundland Department of Computer Science NL Canada Soochow University China Intelligent Automotive Solution BU Huawei Technologies Co. Ltd Policy Standard & Patent Dept. China The University of Texas at San Antonio Cloud Technology Endowed United States Royal Academy of Engineering Queen's University Belfast United Kingdom
As one of the prominent networking paradigms in the realm of the Internet of Things (IoT), the Internet of Vehicles (IoV) facilitates seamless information dissemination and task processing among vehicles equipped with... 详细信息
来源: 评论
Continuous Travel Time Prediction for Transit Signal Priority Based on a Deep Network
Continuous Travel Time Prediction for Transit Signal Priorit...
收藏 引用
International Conference on Intelligent Transportation
作者: Xiong Gang Wenwen Kang Feiyue Wang Fenghua Zhu Yisheng Lv Xisong Dong Jukka Riekki Susanna Pirttikangas State Key Lab. of Manage. & Control for Complex Syst. Institute of Automation Chinese Academy of Sciences Beijing Beijing CN The State Key Laboratory of Management and Control for Complex Systems Chinese Academy of Sciences Beijing China Cloud Computing Center Chinese Academy of Sciences Dongguan CHINA Faculty of Information Technology and Electrical Engineering University of Oulu Finland
It has been recognized by many researchers that accurate bus travel time prediction is critical for successful deployment of traffic signal priority (TSP) systems. Although there exist a lot of studies on travel time ... 详细信息
来源: 评论
A lightweight music texture transfer system
arXiv
收藏 引用
arXiv 2018年
作者: Peng, Xutan Li, Chen Cai, Zhi Shi, Faqiang Liu, Yidan Li, Jianxin Beijing Advanced Innovation Center for Big Data and Brain Computing SKLSDE Lab. Beihang University State Key Laboratory of VR Technology and Systems Beihang University Department of Psychology Beihang University
Deep learning researches on the transformation problems for image and text have raised great attention. However, present methods for music feature transfer using neural networks are far from practical application. In ... 详细信息
来源: 评论
Green Federated Learning over cloud-RAN with Limited Fronthaul and Quantized Neural Networks
Green Federated Learning over Cloud-RAN with Limited Frontha...
收藏 引用
Communications and Networking (MeditCom), IEEE International Mediterranean Conference on
作者: Jiali Wang Yijie Mao Ting Wang Yuanming Shi MoE Engineering Research Center of Software/Hardware Co-Design Technology and Application Shanghai Key Lab. of Trustworthy Computing East China Normal University China School of Information Science and Technology (SIST) ShanghaiTech University China
In this paper, we investigate a green federated learning (FL) framework over cloud radio access network (cloud-RAN) system that comprises a server, multiple devices and remote radio heads (RRHs). Each device utilizes ...
来源: 评论
Transfer Learning with Dynamic Adversarial Adaptation Network
Transfer Learning with Dynamic Adversarial Adaptation Networ...
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Chaohui Yu Jindong Wang Yiqiang Chen Meiyu Huang Beijing Key Lab. of Mobile Computing and Pervasive Device Inst. of Comp. Tech Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Microsoft Research Asia Beijing China Qian Xuesen Lab. of Space Technology China Academy of Space Technology Beijing China
The recent advances in deep transfer learning reveal that adversarial learning can be embedded into deep networks to learn more transferable features to reduce the distribution discrepancy between two domains. Existin...
来源: 评论
Suppress Content Shift: Better Diffusion Features via Off-the-Shelf Generation Techniques  38
Suppress Content Shift: Better Diffusion Features via Off-th...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Yang, Zhiyong Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Computer Science and Tech. University of Chinese Academy of Sciences China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are powerful generative models, and this capability can also be applied to discrimination. The inner activations of a pre-trained diffusion model can serve as features for discriminative tasks, namely...
来源: 评论
User-inspired posterior network for recommendation reason generation
arXiv
收藏 引用
arXiv 2021年
作者: Zhan, Haolan Zhang, Hainan Chen, Hongshen Shen, Lei Lan, Yanyan Ding, Zhuoye Yin, Dawei State Key Lab. of Computer Science Institute of Software Chinese Academy of Sciences Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Data Science Lab *** Baidu Inc. Beijing China
Recommendation reason generation, aiming at showing the selling points of products for customers, plays a vital role in attracting customers’ attention as well as improving user experience. A simple and effective way... 详细信息
来源: 评论
Web image clustering by consistent utilization of visual features and surrounding texts
Web image clustering by consistent utilization of visual fea...
收藏 引用
13th ACM International Conference on Multimedia, MM 2005
作者: Gao, Bin Liu, Tie-Yan Qin, Tao Zheng, Xin Cheng, Qian-Sheng Ma, Wei-Ying Microsoft Research Asia Sigma Center No. 49 Zhichun Road Beijing 100080 China LMAM Dept. of Information Science School of Mathematical Sciences Beijing 100871 China MSP Laboratory Dept. of Electronic Engineering Tsinghua University Beijing 100084 China Key Lab. of Pervasive Computing Dept. of Computer Science and Technology Tsinghua University Beijing 100084 China
Image clustering, an important technology for image processing, has been actively researched for a long period of time. Especially in recent years, with the explosive growth of the Web, image clustering has even been ... 详细信息
来源: 评论
Verifying Safety of Neural Networks from Topological Perspectives
arXiv
收藏 引用
arXiv 2023年
作者: Liang, Zhen Ren, Dejin Xue, Bai Wang, Ji Yang, Wenjing Liu, Wanwei National University of Defense Technology Institute for Quantum Information State Key Laboratory of High Performance Computing Hunan Changsha410073 China Chinese Academy of Sciences State Key Lab. of Computer Science BeijingBAI XUE China
Neural networks (NNs) are increasingly applied in safety-critical systems such as autonomous vehicles. However, they are fragile and are often ill-behaved. Consequently, their behaviors should undergo rigorous guarant... 详细信息
来源: 评论