咨询与建议

限定检索结果

文献类型

  • 1,644 篇 会议
  • 1,566 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 3,211 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,069 篇 工学
    • 1,485 篇 计算机科学与技术...
    • 1,259 篇 软件工程
    • 503 篇 信息与通信工程
    • 293 篇 生物工程
    • 276 篇 电气工程
    • 269 篇 控制科学与工程
    • 165 篇 电子科学与技术(可...
    • 159 篇 光学工程
    • 155 篇 生物医学工程(可授...
    • 139 篇 机械工程
    • 109 篇 化学工程与技术
    • 101 篇 交通运输工程
    • 88 篇 仪器科学与技术
    • 75 篇 动力工程及工程热...
    • 68 篇 土木工程
    • 67 篇 网络空间安全
    • 65 篇 建筑学
  • 1,151 篇 理学
    • 628 篇 数学
    • 329 篇 生物学
    • 235 篇 物理学
    • 200 篇 统计学(可授理学、...
    • 128 篇 化学
    • 96 篇 系统科学
  • 581 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 278 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 148 篇 医学
    • 127 篇 临床医学
    • 98 篇 基础医学(可授医学...
    • 62 篇 药学(可授医学、理...
  • 102 篇 法学
    • 83 篇 社会学
  • 62 篇 农学
  • 46 篇 经济学
  • 38 篇 教育学
  • 6 篇 文学
  • 4 篇 艺术学
  • 3 篇 军事学

主题

  • 131 篇 feature extracti...
  • 127 篇 semantics
  • 113 篇 training
  • 95 篇 deep learning
  • 67 篇 computational mo...
  • 63 篇 accuracy
  • 60 篇 predictive model...
  • 56 篇 machine learning
  • 55 篇 data models
  • 52 篇 convolution
  • 48 篇 neural networks
  • 48 篇 graph neural net...
  • 45 篇 contrastive lear...
  • 43 篇 object detection
  • 41 篇 reinforcement le...
  • 41 篇 data mining
  • 38 篇 task analysis
  • 36 篇 visualization
  • 36 篇 federated learni...
  • 35 篇 optimization

机构

  • 77 篇 beijing advanced...
  • 68 篇 key laboratory o...
  • 62 篇 college of compu...
  • 58 篇 shandong provinc...
  • 58 篇 school of comput...
  • 54 篇 university of ch...
  • 52 篇 south china univ...
  • 51 篇 key laboratory o...
  • 50 篇 peng cheng labor...
  • 46 篇 shandong enginee...
  • 43 篇 school of softwa...
  • 43 篇 national enginee...
  • 41 篇 school of comput...
  • 40 篇 school of electr...
  • 39 篇 jiangsu key labo...
  • 38 篇 school of cyber ...
  • 36 篇 jiangsu key labo...
  • 35 篇 hunan provincial...
  • 34 篇 guangdong key la...
  • 33 篇 chongqing key la...

作者

  • 38 篇 xu xiaolong
  • 35 篇 wang guoyin
  • 35 篇 tan mingkui
  • 30 篇 jin hai
  • 25 篇 huang qingming
  • 25 篇 xiaolong xu
  • 21 篇 chen yanping
  • 21 篇 guo wenzhong
  • 21 篇 xu qianqian
  • 20 篇 shen linlin
  • 20 篇 hai jin
  • 20 篇 hongyan ma
  • 18 篇 hu shengshan
  • 18 篇 wu di
  • 17 篇 guo kun
  • 16 篇 niyato dusit
  • 16 篇 chen huajun
  • 16 篇 li jianxin
  • 15 篇 xia shuyin
  • 15 篇 chen gang

语言

  • 3,007 篇 英文
  • 169 篇 其他
  • 52 篇 中文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=Key Laboratory of Big Data Intelligent Computing "
3211 条 记 录,以下是91-100 订阅
排序:
GoPIM: GCN-Oriented Pipeline Optimization for PIM Accelerators  31
GoPIM: GCN-Oriented Pipeline Optimization for PIM Accelerato...
收藏 引用
31st IEEE International Symposium on High Performance Computer Architecture, HPCA 2025
作者: Yang, Siling He, Shuibing Wang, Wenjiong Yin, Yanlong Wu, Tong Chen, Weijian Zhang, Xuechen Sun, Xian-He Feng, Dan The State Key Laboratory of Blockchain and Data Security Zhejiang University China Zhejiang Lab China Institute of Blockchain and Data Security China Zhejiang Key Laboratory of Big Data Intelligent Computing China Washington State University Vancouver United States Illinois Institute of Technology United States Huazhong University of Science and Technology China Wuhan National Laboratory for Optoelectronics China
Graph convolutional networks (GCNs) are popular for a variety of graph learning tasks. ReRAM-based processing-in-memory (PIM) accelerators are promising to expedite GCN training owing to their in-situ computing capabi... 详细信息
来源: 评论
MDPFL:A Multiple Differential Privacy Protection Method based on Federated Learning  26
MDPFL:A Multiple Differential Privacy Protection Method base...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Liu, Xinyu Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China
With the continuous development of artificial intelligence technology, machine learning in distributed network systems, such as IoVflntemet of Vehicles), will inevitably lead to privacy leakage. At present, there are ... 详细信息
来源: 评论
Spatiotemporal deformation analysis of glaciers and surrounding landscapes in the Shishapangma region using InSAR techniques
收藏 引用
Journal of Mountain Science 2025年 第1期22卷 210-229页
作者: LIANG Wenli LIU Rui JI Qin KOU Pinglang Chongqing Key Laboratory of GIS Application School of Geography and TourismChongqing Normal UniversityChongqing 401331China National Earth System Science Data Center Beijing 100000China Chongqing Engineering Research Center of Spatial Big Data Intelligent Technology Chongqing University of Posts and TelecommunicationsChongqing 400065China Key Laboratory of Tourism Multisource Data Perception and Decision Ministry of Culture and Tourism(TMDPDMCT)Chongqing University of Posts and TelecommunicationsChongqing 400065China
Glacier dynamics in the Himalayan midlatitudes,particularly in regions like the Shishapangma,are not yet fully understood,especially the localized topographic and climatic impacts on glacier *** study analyzes the spa... 详细信息
来源: 评论
Complementary Label Queries for Efficient Active Learning  23
Complementary Label Queries for Efficient Active Learning
收藏 引用
6th International Conference on Image and Graphics Processing, ICIGP 2023
作者: Liu, Shengyuan Hu, Tianlei Chen, Ke Mao, Yunqing Key Lab of Intelligent Computing Based Big Data of Zhejiang Province Zhejiang University China Co. Ltd. China
Many active learning methods are based on the assumption that a learner simply asks for the true labels of some training data from annotators. Unfortunately, it is expensive to exactly annotate instances in real-world... 详细信息
来源: 评论
Image Matching Algorithm Under Adverse Conditions Based on SIFT  14
Image Matching Algorithm Under Adverse Conditions Based on S...
收藏 引用
14th International Conference on Information Technology in Medicine and Education, ITME 2024
作者: Chen, Hao Cao, Xinrong Li, Zuoyong Lin, Lihui Fuzhou University College of Computer and Big Data Fuzhou350108 China Minjiang University Fujian Provincial Key Laboratory of Information Processing and Intelligent Control School of Computer and Big Data Fuzhou350121 China Wuyi University Fujian Key Laboratory of Big Data Application and Intellectualization for Tea Industry School of Mathematics and Computer Science Fujian354300 China
Image matching technology is crucial in computer vision applications. However, the traditional SIFT (Scale-Invariant Feature Transform) algorithm often faces challenges under adverse conditions, such as a high number ... 详细信息
来源: 评论
Distributed Truss Computation in Dynamic Graphs
收藏 引用
Tsinghua Science and Technology 2023年 第5期28卷 873-887页
作者: Ziwei Mo Qi Luo Dongxiao Yu Hao Sheng Jiguo Yu Xiuzhen Cheng School of Computer Science and Technology Shandong UniversityQingdao 266200China State Key Laboratory of Software Development Environment School of Computer Science and Engineering and the Beijing Advanced Innovation Center for Big Data and Brain ComputingBeihang UniversityBeijing 100191China Big Data Institute Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353China
Large-scale graphs usually exhibit global sparsity with local cohesiveness,and mining the representative cohesive subgraphs is a fundamental problem in graph *** k-truss is one of the most commonly studied cohesive su... 详细信息
来源: 评论
Research progress of quantum artificial intelligence in smart city
收藏 引用
intelligent and Converged Networks 2024年 第2期5卷 116-133页
作者: Sumin Wang Ning Wang Tongyu Ji Yiyun Shi Chao Wang the Joint International Research Laboratory of Specialty Fiber Optics and Advanced Communication Shanghai UniversityShanghai 200444China School of Information Engineering Ganzhou Key Laboratory of Cloud Computing and Big Data ResearchGannan University of Science and TechnologyGanzhou 341000China
The rapid accumulation of big data in the Internet era has gradually decelerated the progress of Artificial Intelligence(AI).As Moore’s Law approaches its limit,it is imperative to break the constraints that are hold... 详细信息
来源: 评论
Privacy protection oriented on data stream computing
Privacy protection oriented on data stream computing
收藏 引用
2022 International Conference on Computer Application and Information Security, ICCAIS 2022
作者: He, Renjie Zheng, Xianghan Wang, Gong School of Computer and Big Data Fuzhou University Fujian Fuzhou China The Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fujian Fuzhou China
data security has always been one of the public concerns, and homomorphic encryption technology, as one of the effective means to ensure data security, has always been a hot topic of academic research. Traditional mac... 详细信息
来源: 评论
MS-SAM: Multi-scale SAM Based on Dynamic Weighted Agent Attention  31st
MS-SAM: Multi-scale SAM Based on Dynamic Weighted Agent Att...
收藏 引用
31st International Conference on Multimedia Modeling, MMM 2025
作者: Yang, Enhui Zhang, Zhibin Engineering Research Center of Ecological Big Data Ministry of Education Key Laboratory of Wireless Networks and Mobile Computing Inner Mongolia University Hohhot010021 China
The Segment Anything Model (SAM), introduced in 2023, has made significant advancements in the field of computer vision. However, SAM faces two major challenges: limitations related to single-scale processing and high... 详细信息
来源: 评论
A method of multi-models fusion for speaker recognition
收藏 引用
International Journal of Speech Technology 2022年 第2期25卷 493-498页
作者: Wu, Hao Luo, Linkai Peng, Hong Wen, Wei Department of Automation Xiamen University Xiamen China Xiamen Key Laboratory of Big Data Intelligent Analysis and Decision Xiamen China
As a new type of biometrics recognition technology, speaker recognition is gaining more and more attention because of the advantages in remote authentication. In this paper, we construct an end-to-end speaker recognit... 详细信息
来源: 评论