咨询与建议

限定检索结果

文献类型

  • 2,719 篇 会议
  • 2,052 篇 期刊文献

馆藏范围

  • 4,771 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,214 篇 工学
    • 2,016 篇 计算机科学与技术...
    • 1,611 篇 软件工程
    • 569 篇 信息与通信工程
    • 439 篇 控制科学与工程
    • 390 篇 电子科学与技术(可...
    • 368 篇 机械工程
    • 347 篇 电气工程
    • 322 篇 生物工程
    • 294 篇 光学工程
    • 197 篇 仪器科学与技术
    • 193 篇 生物医学工程(可授...
    • 169 篇 化学工程与技术
    • 126 篇 动力工程及工程热...
    • 113 篇 材料科学与工程(可...
    • 103 篇 交通运输工程
    • 91 篇 土木工程
    • 90 篇 建筑学
  • 1,667 篇 理学
    • 889 篇 数学
    • 436 篇 物理学
    • 352 篇 生物学
    • 246 篇 统计学(可授理学、...
    • 175 篇 系统科学
    • 164 篇 化学
  • 833 篇 管理学
    • 524 篇 管理科学与工程(可...
    • 336 篇 图书情报与档案管...
    • 150 篇 工商管理
  • 163 篇 医学
    • 143 篇 临床医学
    • 115 篇 基础医学(可授医学...
    • 85 篇 药学(可授医学、理...
  • 96 篇 法学
    • 77 篇 社会学
  • 56 篇 经济学
  • 51 篇 农学
  • 29 篇 教育学
  • 16 篇 艺术学
  • 13 篇 军事学
  • 6 篇 文学

主题

  • 129 篇 laboratories
  • 123 篇 feature extracti...
  • 103 篇 computer archite...
  • 99 篇 semantics
  • 93 篇 training
  • 89 篇 computational mo...
  • 71 篇 optimization
  • 70 篇 computer science
  • 67 篇 deep learning
  • 60 篇 virtual reality
  • 58 篇 object detection
  • 54 篇 computer vision
  • 51 篇 image segmentati...
  • 49 篇 data mining
  • 48 篇 educational tech...
  • 48 篇 clustering algor...
  • 46 篇 neural networks
  • 46 篇 visualization
  • 45 篇 accuracy
  • 45 篇 delay

机构

  • 184 篇 state key labora...
  • 184 篇 hubei province k...
  • 175 篇 state key labora...
  • 125 篇 school of comput...
  • 122 篇 department of co...
  • 116 篇 key laboratory o...
  • 107 篇 college of compu...
  • 94 篇 tianjin key labo...
  • 93 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 74 篇 department of co...
  • 70 篇 university of ch...
  • 69 篇 state key labora...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 54 篇 hubei province k...
  • 54 篇 school of comput...
  • 53 篇 school of softwa...
  • 48 篇 school of comput...
  • 47 篇 peng cheng labor...

作者

  • 50 篇 xiaowei li
  • 35 篇 heng pheng-ann
  • 32 篇 dan feng
  • 32 篇 jianwei niu
  • 31 篇 li jia
  • 30 篇 huawei li
  • 29 篇 zhang hua
  • 28 篇 zhou mengchu
  • 28 篇 ren jiadong
  • 27 篇 niu jianwei
  • 25 篇 li bo
  • 25 篇 aimin hao
  • 25 篇 jin hai
  • 23 篇 chen xiaowu
  • 23 篇 hai jin
  • 23 篇 wang chundong
  • 22 篇 yu hu
  • 22 篇 shuai li
  • 21 篇 li peng
  • 21 篇 liu jun

语言

  • 4,426 篇 英文
  • 214 篇 中文
  • 139 篇 其他
检索条件"机构=Key Laboratory for Computer Virtual Technology and System"
4771 条 记 录,以下是361-370 订阅
排序:
Enhanced fireworks algorithm based on particle swarm optimization and reverse learning of small-hole imaging experiment
Enhanced fireworks algorithm based on particle swarm optimiz...
收藏 引用
2022 IEEE International Conference on systems, Man, and Cybernetics, SMC 2022
作者: Jiao, Jiao Li, Jun Wuhan University of Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System College of Computer Science and Technology Wuhan China
Since the traditional fireworks algorithm (FWA) is easy to fall into local optimization and has insufficient global optimization capability and low optimization accuracy, this paper proposes the enhanced fireworks alg... 详细信息
来源: 评论
Multi-agent Deep Reinforcement Learning Based Multi-objective Charging Control for Electric Vehicle Charging Station  7th
Multi-agent Deep Reinforcement Learning Based Multi-objectiv...
收藏 引用
7th Chinese Conference on Swarm Intelligence and Cooperative Control, CCSICC 2023
作者: Gong, Jiabao Fu, Weiming Kang, Yu Qin, Jiahu Xiao, Feng Department of Automation University of Science and Technology of China Hefei230027 China State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources School of Control and Computer Engineering North China Electric Power University Beijing102206 China
This paper proposes a multi-agent deep reinforcement learning (MADRL) based algorithm for charging control of multiple electric vehicles (EVs) in an electric vehicle charging station (EVCS) with dynamic operations. By... 详细信息
来源: 评论
Influence Maximization With Graph Neural Network in Multi-Feature Social Network  24
Influence Maximization With Graph Neural Network in Multi-Fe...
收藏 引用
24th IEEE International Conference on High Performance Computing and Communications, 8th IEEE International Conference on Data Science and systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Wang, Yuhao Li, Peng Huang, Weiyi School of Computer Science and Technology Wuhan University of Science and Technology China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System China
The classical influence maximization (IM) prob-lem aims to select a set of nodes as seed nodes for information propagation. Most related studies focus on one-dimensional information dissemination. However, the diffusi... 详细信息
来源: 评论
A virtualized data center energy-saving mechanism based on switching operating mode of physical servers and reserving virtual machines
A virtualized data center energy-saving mechanism based on s...
收藏 引用
作者: Yin, Chunxia Liu, Jian Jin, Shunfu College of Information Science and Engineering Yanshan University Qinhuangdao China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao China Ocean College of Hebei Agricultural University Qinhuangdao China Institute of Computing Technology Chinese Academy of Sciences Beijing China
The energy consumption of virtualized data centers has grown very fast in last several years. Because a large number of hosts are running in an idle state, virtualized data centers waste a large amount of electric ene... 详细信息
来源: 评论
Effective and Imperceptible Adversarial Textual Attack Via Multi-objectivization
收藏 引用
ACM Transactions on Evolutionary Learning and Optimization 2024年 第3期4卷 1-23页
作者: Liu, Shengcai Lu, Ning Hong, Wenjing Qian, Chao Tang, Ke Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen College of Engineering South Tower 1088 Xueyuan Avenue Guangdong Shenzhen518055 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong999077 Hong Kong National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen 10F Zhizhen Building Canghai Campus 3688 Nanhai Avenue Guangdong Shenzhen China National Key Laboratory for Novel Software Technology School of Artificial Intelligence Nanjing University Nanjing International College Area Xianlin Campus 163 Xianlin Avenue Jiangsu Nanjing China
The field of adversarial textual attack has significantly grown over the past few years, where the commonly considered objective is to craft adversarial examples (AEs) that can successfully fool the target model. Howe... 详细信息
来源: 评论
Adaptive Federated Learning for EEG Emotion Recognition
Adaptive Federated Learning for EEG Emotion Recognition
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Calvin Chan Qingqing Zheng Chengjian Xu Qiong Wang Pheng Ann Heng Guangdong Provincial Key Laboratory of Computer Vision and Virtual Reality Technology Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Department of Computer Science and Engineering The Chinese University of Hong Kong
Emotion classification based on electroencephalogram (EEG) signals has drawn huge attention in affective brain computer interface (BCI). Recently, plenty of deep learning approaches have been proposed to improve the p... 详细信息
来源: 评论
CMD: A Cache-Assisted GPU Memory Deduplication Architecture
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and systems 2025年
作者: Zhao, Wei Feng, Dan Tong, Wei Wei, Xueliang Wu, Bing Ministry of Education of China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System Engineering Research Center of data storage systems and Technology China
Massive off-chip accesses in GPUs are the main performance bottleneck. We find that many writes are duplicate, and the duplication can be inter-dup and intra-dup. While inter-dup means different memory blocks are iden... 详细信息
来源: 评论
Low Energy Consumption and Time Deterministic Energy-saving Workflow Task Scheduling Algorithm based on DVFS  9
Low Energy Consumption and Time Deterministic Energy-saving ...
收藏 引用
9th IEEE International Conference on Cyber Security and Cloud Computing and 8th IEEE International Conference on Edge Computing and Scalable Cloud, CSCloud-EdgeCom 2022
作者: Liu, Xun Wuhan University of Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System College of Computer Science and Technology Wuhan China
With the development of streaming media, soft real-time system in today's life could participate in the use of more extensive areas. The use frequency was also increasing. Consequently, modern processors were equi... 详细信息
来源: 评论
Two-sided Online Stable Task Assignment with Incomplete Lists and Ties in Spatial Crowdsourcing  19
Two-sided Online Stable Task Assignment with Incomplete List...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Huang, Weiyi Li, Peng Li, Bo Liu, Jing Nie, Lei Bao, Haizhou Wuhan University of Science and Technology School of Computer Science and Technology China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System China
For the application of task assignment in crowdsourcing, previous research has focused on offline version or one-sided online version. Some of them draw extra attention to stability in task assignment. Our work extend... 详细信息
来源: 评论
Mining Alarm Association Rules in Optical Transmission Networks Using a Statistical Approach  24
Mining Alarm Association Rules in Optical Transmission Netwo...
收藏 引用
24th IEEE International Conference on High Performance Computing and Communications, 8th IEEE International Conference on Data Science and systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Deng, Miao Li, Peng Liu, Yu Zhu, Rongjing Zhang, Yujie School of Computer Science and Technology Wuhan University of Science and Technology China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System China
Due to the interconnection between devices in the optical transmission network (OTN), when one device fails and generates alarm information, a large number of other invalid alarms are generated in OTN. How to mining a... 详细信息
来源: 评论