咨询与建议

限定检索结果

文献类型

  • 2,719 篇 会议
  • 2,052 篇 期刊文献

馆藏范围

  • 4,771 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,214 篇 工学
    • 2,016 篇 计算机科学与技术...
    • 1,611 篇 软件工程
    • 569 篇 信息与通信工程
    • 439 篇 控制科学与工程
    • 390 篇 电子科学与技术(可...
    • 368 篇 机械工程
    • 347 篇 电气工程
    • 322 篇 生物工程
    • 294 篇 光学工程
    • 197 篇 仪器科学与技术
    • 193 篇 生物医学工程(可授...
    • 169 篇 化学工程与技术
    • 126 篇 动力工程及工程热...
    • 113 篇 材料科学与工程(可...
    • 103 篇 交通运输工程
    • 91 篇 土木工程
    • 90 篇 建筑学
  • 1,667 篇 理学
    • 889 篇 数学
    • 436 篇 物理学
    • 352 篇 生物学
    • 246 篇 统计学(可授理学、...
    • 175 篇 系统科学
    • 164 篇 化学
  • 833 篇 管理学
    • 524 篇 管理科学与工程(可...
    • 336 篇 图书情报与档案管...
    • 150 篇 工商管理
  • 163 篇 医学
    • 143 篇 临床医学
    • 115 篇 基础医学(可授医学...
    • 85 篇 药学(可授医学、理...
  • 96 篇 法学
    • 77 篇 社会学
  • 56 篇 经济学
  • 51 篇 农学
  • 29 篇 教育学
  • 16 篇 艺术学
  • 13 篇 军事学
  • 6 篇 文学

主题

  • 129 篇 laboratories
  • 123 篇 feature extracti...
  • 103 篇 computer archite...
  • 99 篇 semantics
  • 93 篇 training
  • 89 篇 computational mo...
  • 71 篇 optimization
  • 70 篇 computer science
  • 67 篇 deep learning
  • 60 篇 virtual reality
  • 58 篇 object detection
  • 54 篇 computer vision
  • 51 篇 image segmentati...
  • 49 篇 data mining
  • 48 篇 educational tech...
  • 48 篇 clustering algor...
  • 46 篇 neural networks
  • 46 篇 visualization
  • 45 篇 accuracy
  • 45 篇 delay

机构

  • 184 篇 state key labora...
  • 184 篇 hubei province k...
  • 175 篇 state key labora...
  • 125 篇 school of comput...
  • 122 篇 department of co...
  • 116 篇 key laboratory o...
  • 107 篇 college of compu...
  • 94 篇 tianjin key labo...
  • 93 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 74 篇 department of co...
  • 70 篇 university of ch...
  • 69 篇 state key labora...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 54 篇 hubei province k...
  • 54 篇 school of comput...
  • 53 篇 school of softwa...
  • 48 篇 school of comput...
  • 47 篇 peng cheng labor...

作者

  • 50 篇 xiaowei li
  • 35 篇 heng pheng-ann
  • 32 篇 dan feng
  • 32 篇 jianwei niu
  • 31 篇 li jia
  • 30 篇 huawei li
  • 29 篇 zhang hua
  • 28 篇 zhou mengchu
  • 28 篇 ren jiadong
  • 27 篇 niu jianwei
  • 25 篇 li bo
  • 25 篇 aimin hao
  • 25 篇 jin hai
  • 23 篇 chen xiaowu
  • 23 篇 hai jin
  • 23 篇 wang chundong
  • 22 篇 yu hu
  • 22 篇 shuai li
  • 21 篇 li peng
  • 21 篇 liu jun

语言

  • 4,426 篇 英文
  • 214 篇 中文
  • 139 篇 其他
检索条件"机构=Key Laboratory for Computer Virtual Technology and System"
4771 条 记 录,以下是271-280 订阅
排序:
Brillouin Frequency Shift Extraction for BOTDA Based on Gramian Angular Fields  4
Brillouin Frequency Shift Extraction for BOTDA Based on Gram...
收藏 引用
4th International Computational Imaging Conference, CITA 2024
作者: Zhu, Borong Zhang, Zhihao Qian, Yuhao Ma, Xiaole Wang, Liang Yu, Kuanglu Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing100044 China Institute of Information Science School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China National Engineering Laboratory for Next Generation Internet Access System School of Optics and Electronic Information Huazhong University of Science and Technology Wuhan430074 China
To accurately extract Brillouin frequency shift of BOTDA with large sweeping step sizes, a novel structure of GAFCNN is proposed, combining time series coding with convolutional neural networks. The experimental data ... 详细信息
来源: 评论
An Encryption Algorithm Cycle Identification Method Based on Bit Execution  9
An Encryption Algorithm Cycle Identification Method Based on...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Sun, Yunge Du, Gaolei Qu, Junpeng Fu, Yong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Ransomware uses symmetric encryption algorithms to lock user files to extort money. This paper proposes a cryptographic algorithm loop identification method based on bit-precise execution, aiming to solve the problem ... 详细信息
来源: 评论
Adaptive Uniform Performance Control of Strict-Feedback Nonlinear systems With Time-Varying Control Gain
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第2期10卷 451-461页
作者: Kai Zhao Changyun Wen Yongduan Song Frank L.Lewis IEEE the Department of Electrical and Computer Engineering National University of SingaporeSingapore 119077Singapore the School of Electrical and Electronic Engineering Nanyang Technological UniversitySingapore 639798Singapore the State Key Laboratory of Power Transmission Equipment&System Security and New Technology Chongqing Key Laboratory of Intelligent Unmanned SystemsSchool of AutomationChongqing UniversityChongqing 400044China the UTA Research Institute University of Texas at ArlingtonFort WorthTX 76118 USA
In this paper,we present a novel adaptive performance control approach for strict-feedback nonparametric systems with unknown time-varying control coefficients,which mainly includes the following ***,by introducing se... 详细信息
来源: 评论
An automated construction method for symmetric encryption round function models based on dynamic analysis  9
An automated construction method for symmetric encryption ro...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Du, Gaolei Sun, Yunge Qu, Junpeng Fu, Yong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
With the deepening of informatization, the incidence of cybercrimes utilizing malicious software for attacks is on the rise. This paper addresses the detection issue of symmetric encryption in malicious software from ... 详细信息
来源: 评论
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection  31
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
31st IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2024
作者: Chen, Kang Wen, Ming Jia, Haoxiang Wu, Rongxin Jin, Hai Wuhan430074 China Jin YinHu Laboratory Wuhan430074 China School of Informatics Xiamen University Xiamen361005 China School of Computer Science and Technology HUST Wuhan430074 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论
Offloading Algorithm for Edge Computing Tasks Based on Energy Optimization  8
Offloading Algorithm for Edge Computing Tasks Based on Energ...
收藏 引用
8th IEEE International Conference on Smart Cloud, SmartCloud 2023
作者: Gao, Xing Gu, Haonan Liu, Fang Hu, Wei Wuhan City College Wuhan China College of Computer Science and Technology Wuhan University of Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China
Current research in computation offloading encompasses various aspects, including task partitioning and allocation, resource management, communication, and data management. This paper focuses on developing new algorit... 详细信息
来源: 评论
On the Outage of Far-Reach Communications via RIS-Empowered Satellites
On the Outage of Far-Reach Communications via RIS-Empowered ...
收藏 引用
2024 IEEE Pacific Rim Conference on Communications, computers and Signal Processing, PACRIM 2024
作者: Wang, Fan Jiang, Ruihong Liu, Yuan Bao, Tingnan Peng, Mugen Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China Research Center for Space Computing System Zhejiang Laboratory Hangzhou311100 China School of Electrical Engineering and Computer Science University of Ottawa OttawaON Canada
The rising demand for reliable, high-bandwidth satellite communications in far-reach areas drives the integration of low earth orbit (LEO) satellites into future 6G networks. In this paper, we investigate the deployme... 详细信息
来源: 评论
Advances in Noble Metal-Decorated Metal Oxide Nanomaterials for Chemiresistive Gas Sensors:Overview
收藏 引用
Nano-Micro Letters 2023年 第6期15卷 353-427页
作者: Li‑Yuan Zhu Lang‑Xi Ou Li‑Wen Mao Xue‑Yan Wu Yi‑Ping Liu Hong‑Liang Lu State Key Laboratory of ASIC and System Shanghai Institute of Intelligent Electronics and SystemsSchool of MicroelectronicsFudan UniversityShanghai 200433People’s Republic of China School of Opto‑Electronic Information and Computer Engineering University of Shanghai for Science and TechnologyShanghai 200093People’s Republic of China State Key Laboratory of Metal Matrix Composites School of Material Science and EngineeringShanghai Jiao Tong UniversityShanghai 200240People’s Republic of China
Highly sensitive gas sensors with remarkably low detection limits are attractive for diverse practical application fields including real-time environmental monitoring,exhaled breath diagnosis,and food freshness *** va... 详细信息
来源: 评论
Modeling and Simulation of Manned and Unmanned Cooperative Reconnaissance and Surveillance Scenario Based on DoDAF
Modeling and Simulation of Manned and Unmanned Cooperative R...
收藏 引用
IEEE Conference on Industrial Electronics and Applications (ICIEA)
作者: Jin Xiao Fengnan Chen Siyuan Cao Xiaoguang Hu Xinwei Cao Wenming Ren State Key Laboratory of Virtual Reality Technology and System Beihang University Beijing China Interoperability Laboratory AVIC China Aero-Polytechnology Establishment Beijing China
Due to the advantages of improving system operational effectiveness, the manned and unmanned cooperative operational methods are increasingly being applied in modern battlefields. However, in complex scenarios, the in... 详细信息
来源: 评论
Implicit Learning of Rotational Decoupling Detection Heads Applied to Remote Sensing Object Detection
Implicit Learning of Rotational Decoupling Detection Heads A...
收藏 引用
2023 Asia-Pacific Conference on Image Processing, Electronics and computers, IPEC 2023
作者: Song, Chengkun Ding, Sheng Chen, Yingying School of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China Kagoshima University Kagoshima Japan
Remote sensing image features complicated background, big image size, small object pixels, and variable object direction due to the arbitrary shooting angle. Conventional object detector has poor detection effect on r... 详细信息
来源: 评论