咨询与建议

限定检索结果

文献类型

  • 2,719 篇 会议
  • 2,052 篇 期刊文献

馆藏范围

  • 4,771 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,214 篇 工学
    • 2,016 篇 计算机科学与技术...
    • 1,611 篇 软件工程
    • 569 篇 信息与通信工程
    • 439 篇 控制科学与工程
    • 390 篇 电子科学与技术(可...
    • 368 篇 机械工程
    • 347 篇 电气工程
    • 322 篇 生物工程
    • 294 篇 光学工程
    • 197 篇 仪器科学与技术
    • 193 篇 生物医学工程(可授...
    • 169 篇 化学工程与技术
    • 126 篇 动力工程及工程热...
    • 113 篇 材料科学与工程(可...
    • 103 篇 交通运输工程
    • 91 篇 土木工程
    • 90 篇 建筑学
  • 1,667 篇 理学
    • 889 篇 数学
    • 436 篇 物理学
    • 352 篇 生物学
    • 246 篇 统计学(可授理学、...
    • 175 篇 系统科学
    • 164 篇 化学
  • 833 篇 管理学
    • 524 篇 管理科学与工程(可...
    • 336 篇 图书情报与档案管...
    • 150 篇 工商管理
  • 163 篇 医学
    • 143 篇 临床医学
    • 115 篇 基础医学(可授医学...
    • 85 篇 药学(可授医学、理...
  • 96 篇 法学
    • 77 篇 社会学
  • 56 篇 经济学
  • 51 篇 农学
  • 29 篇 教育学
  • 16 篇 艺术学
  • 13 篇 军事学
  • 6 篇 文学

主题

  • 129 篇 laboratories
  • 123 篇 feature extracti...
  • 103 篇 computer archite...
  • 99 篇 semantics
  • 93 篇 training
  • 89 篇 computational mo...
  • 71 篇 optimization
  • 70 篇 computer science
  • 67 篇 deep learning
  • 60 篇 virtual reality
  • 58 篇 object detection
  • 54 篇 computer vision
  • 51 篇 image segmentati...
  • 49 篇 data mining
  • 48 篇 educational tech...
  • 48 篇 clustering algor...
  • 46 篇 neural networks
  • 46 篇 visualization
  • 45 篇 accuracy
  • 45 篇 delay

机构

  • 184 篇 state key labora...
  • 184 篇 hubei province k...
  • 175 篇 state key labora...
  • 125 篇 school of comput...
  • 122 篇 department of co...
  • 116 篇 key laboratory o...
  • 107 篇 college of compu...
  • 94 篇 tianjin key labo...
  • 93 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 74 篇 department of co...
  • 70 篇 university of ch...
  • 69 篇 state key labora...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 54 篇 hubei province k...
  • 54 篇 school of comput...
  • 53 篇 school of softwa...
  • 48 篇 school of comput...
  • 47 篇 peng cheng labor...

作者

  • 50 篇 xiaowei li
  • 35 篇 heng pheng-ann
  • 32 篇 dan feng
  • 32 篇 jianwei niu
  • 31 篇 li jia
  • 30 篇 huawei li
  • 29 篇 zhang hua
  • 28 篇 zhou mengchu
  • 28 篇 ren jiadong
  • 27 篇 niu jianwei
  • 25 篇 li bo
  • 25 篇 aimin hao
  • 25 篇 jin hai
  • 23 篇 chen xiaowu
  • 23 篇 hai jin
  • 23 篇 wang chundong
  • 22 篇 yu hu
  • 22 篇 shuai li
  • 21 篇 li peng
  • 21 篇 liu jun

语言

  • 4,426 篇 英文
  • 214 篇 中文
  • 139 篇 其他
检索条件"机构=Key Laboratory for Computer Virtual Technology and System"
4771 条 记 录,以下是391-400 订阅
排序:
Research on Enhanced Perception and Attention-Driven Person Re-Identification  20
Research on Enhanced Perception and Attention-Driven Person ...
收藏 引用
20th International Conference on Natural Computation, Fuzzy systems and Knowledge Discovery, ICNC-FSKD 2024
作者: Wu, Cancan Li, Dong Zhang, Zhi College of Computer Science and Technology Wuhan University of Science and Technology Hubei Wuhan430065 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Hubei Wuhan430065 China Big Data Science and Engineering Research Institute Wuhan University of Science and Technology Hubei Wuhan430065 China
When matching similarity among pedestrians in images, pedestrian re-identification algorithms are often disturbed by occlusions. A typical tactic is to improve the robustness of occlusion features in the model. Howeve... 详细信息
来源: 评论
MBTDiff: Multi-segmentation Brain Tumor Model with Diffusion Probabilistic Model  9
MBTDiff: Multi-segmentation Brain Tumor Model with Diffusion...
收藏 引用
9th International Conference on Image, Vision and Computing, ICIVC 2024
作者: Zeng, Shuqi Liu, Jun Xu, Ji Luo, Yuan School of Computer Science and Engineering Wuhan Institute of Technology Wuhan China Key Laboratory of Biomarkers and In Vitro Diagnosis Translation Zhejiang province Hangzhou China Hubei Engineering Research Center for Intelligent Digital Technology in New Power System Hubei Central China Technology Development of Electric Power Co. Ltd Wuhan China
The diffusion probability model has recently garnered remarkable achievements in image generation, emerging as a prominent research focus within computer vision. It has been observed through numerous studies that the ... 详细信息
来源: 评论
Self-adjustable hyper-graphs for video pose estimation based on spatial-temporal subspace construction
收藏 引用
Science China(Information Sciences) 2022年 第3期65卷 260-262页
作者: Jizhou MA Shuai LI Hong QIN Aimin HAO Qinping ZHAO State Key Laboratory of Virtual Reality Technology and Systems Beihang University Department of Computer Science Stony Brook University
Dear editor,In recent years many supervised video pose estimation methods have achieved growing successes based on well-labeled training datasets. Nonetheless, when facing roughly-labeled training data, it still remai... 详细信息
来源: 评论
On convergence of covariance matrix of empirical Bayes hyper-parameter estimator
收藏 引用
Control Theory and technology 2024年 第2期22卷 149-162页
作者: Yue Ju Biqiang Mu Tianshi Chen School of Data Science and Shenzhen Research Institute of Big Data The Chinese University of Hong KongShenzhenShenzhen518172GuangdongChina Division of Decision and Control Systems School of Electrical Engineering and Computer ScienceKTH Royal Institute of Technology10044StockholmSweden Key Laboratory of Systems and Control Institute of Systems ScienceAcademy of Mathematics and System ScienceChinese Academy of SciencesBeijing100190China
Regularized system identification has become the research frontier of system identification in the past *** related core subject is to study the convergence properties of various hyper-parameter estimators as the samp... 详细信息
来源: 评论
High-Order Differential Regularizing Implicit Surface Representation of Point Cloud
High-Order Differential Regularizing Implicit Surface Repres...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Yuhang Cheng Ziyang Fan Hongyu Wu Xiaogang Wang College of Computer and Information Science Southwest University Chongqing China State Key Laboratory of Virtual Reality Technology and Systems Beihang University Beijing China
Reconstructing surfaces from diverse raw data in computer graphics poses an enduring challenge. While recent methods deploy neural networks for direct implicit surface reconstruction, they struggle with degraded raw d... 详细信息
来源: 评论
A new class of generalized quasi-variational inequalities with applications to Oseen problems under nonsmooth boundary conditions
收藏 引用
Science China Mathematics 2024年 第2期67卷 315-338页
作者: Shengda Zeng Akhtar A.Khan Stanislaw Migórski Guangxi Colleges and Universities Key Laboratory of Complex System Optimization and Big Data Processing Yulin Normal UniversityYulin 537000China Faculty of Mathematics and Computer Science Jagiellonian University in Krak´owKrak´ow 30348Poland Center for Applied and Computational Mathematics School of Mathematical SciencesRochester Institute of TechnologyRochesterNY 14623USA College of Sciences Beibu Gulf UniversityQinzhou 535000China
In this paper, we study a generalized quasi-variational inequality (GQVI for short) with twomultivalued operators and two bifunctions in a Banach space setting. A coupling of the Tychonov fixedpoint principle and the ... 详细信息
来源: 评论
Optimized Design of a Haptic Unit for Vibrotactile Amplitude Modulation
Optimized Design of a Haptic Unit for Vibrotactile Amplitude...
收藏 引用
2024 IEEE International Conference on Robotics and Biomimetics, ROBIO 2024
作者: Huang, Jingchen Fang, Yun Guo, Weichao Qiao, Zhijian Sheng, Xinjun School of Mechanical Engineering Meta Robotics Institute Shanghai Jiao Tong University State Key Laboratory of Mechanical System and Vibration Shanghai200240 China Hong Kong University of Science and Technology Department of Electronic and Computer Engineering Hong Kong Hong Kong
Communicating information to users is a crucial aspect of human-machine interaction. Vibrotactile feedback encodes information into spatiotemporal vibrations, enabling users to perceive tactile sensations. It offers a... 详细信息
来源: 评论
Steel Surface Defect Detection Based on Improved YOLOv8  20
Steel Surface Defect Detection Based on Improved YOLOv8
收藏 引用
20th International Conference on Natural Computation, Fuzzy systems and Knowledge Discovery, ICNC-FSKD 2024
作者: Zhang, Jichen Zhang, Zhi College of Computer Science and Technology Wuhan University of Science and Technology Hubei Wuhan430065 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Hubei Wuhan430065 China Big Data Science and Engineering Research Institute Wuhan University of Science and Technology Hubei Wuhan430065 China
There are some defects on the surface of steel that are difficult to detect, so we propose an improved algorithm based on YOLOv8 for detecting defects that are difficult to be detected. This improvement includes the i... 详细信息
来源: 评论
Multimodal Aspect-Based Sentiment Analysis under Conditional Relation  31
Multimodal Aspect-Based Sentiment Analysis under Conditional...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Liu, Xinjing Li, Ruifan Ye, Shuqin Zhang, Guangwei Wang, Xiaojie School of Artificial Intelligence Beijing University of Posts and Telecommunications China School of Computer Science Beijing University of Posts and Telecommunications China Engineering Research Center of Information Networks Ministry of Education China Key Laboratory of Interactive Technology and Experience System Ministry of Culture and Tourism China
Multimodal Aspect-Based Sentiment Analysis (MABSA) aims to extract aspect terms from text-image pairs and identify their sentiments. Previous methods are based on the premise that the image contains the objects referr... 详细信息
来源: 评论
Fuzzing DBMS via NNLM  7
Fuzzing DBMS via NNLM
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Li, Yabin Nie, Yuanping Kuang, Xiaohui Beijing University of Posts and Telecommunications School of Computer Science Beijing China National Key Laboratory of Science and Technology on Information System Security Beijing China
Vulnerabilities in database management system (DBMS) can cause serious security problems affecting hundreds of millions of software systems. Fuzzing is an effective vulnerability mining technology, but few studies uti... 详细信息
来源: 评论