咨询与建议

限定检索结果

文献类型

  • 1,659 篇 会议
  • 1,591 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 3,251 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,080 篇 工学
    • 1,491 篇 计算机科学与技术...
    • 1,259 篇 软件工程
    • 503 篇 信息与通信工程
    • 293 篇 生物工程
    • 277 篇 电气工程
    • 269 篇 控制科学与工程
    • 165 篇 电子科学与技术(可...
    • 159 篇 光学工程
    • 156 篇 生物医学工程(可授...
    • 139 篇 机械工程
    • 111 篇 化学工程与技术
    • 101 篇 交通运输工程
    • 88 篇 仪器科学与技术
    • 75 篇 动力工程及工程热...
    • 68 篇 土木工程
    • 67 篇 网络空间安全
    • 65 篇 建筑学
  • 1,156 篇 理学
    • 628 篇 数学
    • 331 篇 生物学
    • 235 篇 物理学
    • 200 篇 统计学(可授理学、...
    • 129 篇 化学
    • 96 篇 系统科学
  • 581 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 278 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 151 篇 医学
    • 129 篇 临床医学
    • 99 篇 基础医学(可授医学...
    • 62 篇 药学(可授医学、理...
  • 102 篇 法学
    • 83 篇 社会学
  • 63 篇 农学
  • 46 篇 经济学
  • 38 篇 教育学
  • 6 篇 文学
  • 4 篇 艺术学
  • 3 篇 军事学

主题

  • 133 篇 feature extracti...
  • 129 篇 semantics
  • 116 篇 training
  • 96 篇 deep learning
  • 69 篇 computational mo...
  • 63 篇 accuracy
  • 60 篇 predictive model...
  • 56 篇 machine learning
  • 56 篇 data models
  • 52 篇 convolution
  • 49 篇 neural networks
  • 49 篇 graph neural net...
  • 45 篇 contrastive lear...
  • 43 篇 object detection
  • 43 篇 data mining
  • 41 篇 reinforcement le...
  • 38 篇 task analysis
  • 36 篇 optimization
  • 36 篇 visualization
  • 36 篇 federated learni...

机构

  • 77 篇 beijing advanced...
  • 68 篇 key laboratory o...
  • 63 篇 college of compu...
  • 58 篇 shandong provinc...
  • 58 篇 school of comput...
  • 54 篇 university of ch...
  • 52 篇 south china univ...
  • 51 篇 key laboratory o...
  • 50 篇 peng cheng labor...
  • 46 篇 shandong enginee...
  • 44 篇 school of softwa...
  • 44 篇 national enginee...
  • 41 篇 school of comput...
  • 40 篇 school of electr...
  • 39 篇 jiangsu key labo...
  • 39 篇 school of cyber ...
  • 36 篇 jiangsu key labo...
  • 35 篇 hunan provincial...
  • 34 篇 guangdong key la...
  • 33 篇 chongqing key la...

作者

  • 38 篇 xu xiaolong
  • 35 篇 wang guoyin
  • 35 篇 tan mingkui
  • 29 篇 jin hai
  • 25 篇 huang qingming
  • 25 篇 xiaolong xu
  • 22 篇 hai jin
  • 21 篇 chen yanping
  • 21 篇 guo wenzhong
  • 21 篇 xu qianqian
  • 20 篇 shen linlin
  • 20 篇 hongyan ma
  • 18 篇 hu shengshan
  • 18 篇 wu di
  • 17 篇 guo kun
  • 16 篇 niyato dusit
  • 16 篇 chen huajun
  • 16 篇 li jianxin
  • 15 篇 xia shuyin
  • 15 篇 chen gang

语言

  • 3,047 篇 英文
  • 169 篇 其他
  • 52 篇 中文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=Key Laboratory of Big Data Intelligent Computing "
3251 条 记 录,以下是3061-3070 订阅
排序:
A lightweight music texture transfer system
arXiv
收藏 引用
arXiv 2018年
作者: Peng, Xutan Li, Chen Cai, Zhi Shi, Faqiang Liu, Yidan Li, Jianxin Beijing Advanced Innovation Center for Big Data and Brain Computing SKLSDE Lab. Beihang University State Key Laboratory of VR Technology and Systems Beihang University Department of Psychology Beihang University
Deep learning researches on the transformation problems for image and text have raised great attention. However, present methods for music feature transfer using neural networks are far from practical application. In ... 详细信息
来源: 评论
Anomaly Prediction in Passenger Flow with Knowledge Transfer Method
Anomaly Prediction in Passenger Flow with Knowledge Transfer...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure computing (DASC)
作者: Zhipu Xie Weifeng Lv Syed Muhammad Asim Ali Bowen Du Runhe Huang Key State Laboratory of Software Development Environment Beihang University Beijing China Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing Hosei University Tokyo Japan
Predicting anomaly in travel demand is a crucial finding from smart card data analytics. The output of these predictions is a significant contribution to planning sustainable public transport system and generating pos... 详细信息
来源: 评论
Recovery and repair schemes for shift-XOR regenerating codes
arXiv
收藏 引用
arXiv 2019年
作者: Fu, Ximing Yang, Shenghao Xiao, Zhiqing School of Science and Engineering Chinese University of Hong Kong Shenzhen China University of Science and Technology of China China School of Science and Engineering Chinese University of Hong Kong Shenzhen Guangdong518172 China Shenzhen Key Laboratory of IoT Intelligent Systems and Wireless Network Technology Chinese University of Hong Kong Shenzhen Guangdong518172 China Shenzhen Research Institute of Big Data Shenzhen Guangdong518172 China Tsinghua University
Recovery and repair schemes are proposed for shift-exclusive-or (shift-XOR) product-matrix (PM) regenerating codes, which outperform those of the existing PM codes in terms of both communication and computation costs.... 详细信息
来源: 评论
Comparison of UAV-based multispectral sensors for detection of Solenopsis invicta Nests
收藏 引用
IOP Conference Series: Earth and Environmental Science 2020年 第1期569卷
作者: Yuejun Song Feng Chen Kaitao Liao Jiangxi Institute of Soil and Water Conservation Nanchang 330029 China Jiangxi Key Laboratory of Soil Erosion and Prevention Nanchang 330029 China College of Computer and Information Engineering Xiamen University of Technology Xiamen 361024 China Big Data Institute of Digital Natural Disaster Monitoring in Fujian Xiamen University of Technology Xiamen 361024 China Fujian Key Laboratory of Sensing and Computing for Smart Cities School of Informatics Xiamen University Xiamen 361005 China
The invasive red imported fire ant (Solenopsis invicta Buren) (Hymenoptera: Formicidae) has been continuing to expand its range in China, resulting in adverse ecological impacts to where it has invaded. As such, the r...
来源: 评论
A java code protection scheme via dynamic recovering runtime instructions  18th
A java code protection scheme via dynamic recovering runtime...
收藏 引用
18th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2018
作者: Jiajia, Sun Jinbao, Gao Yu-an, Tan Yu, Zhang Xiao, Yu School of Computer Science and Technology Beijing Institute of Technology Beijing100081 China School of Electrical and Information Engineering Beijing Key Laboratory of Intelligent Processing for Building Big Data Beijing University of Civil Engineering and Architecture Beijing100044 China China University of Mining and Technology Beijing100083 China Department of Computer Science and Technology Shandong University of Technology ZiboShandong255022 China
As Android operating system and applications on the device play important roles, the security requirements of Android applications increased as well. With the upgrade of Android system, Android runtime mode (ART mode)... 详细信息
来源: 评论
Self-Evolutionary Neuron Model for Fast-Response Spiking Neural Networks
TechRxiv
收藏 引用
TechRxiv 2019年
作者: Zhang, Anguo Han, Ying Hu, Jing Niu, Yuzhen Gao, Yueming Chen, Zhizhang Zhao, Kai College of Physics and Information Engineering Fuzhou University Fujian350108 China The Key Laboratory of Medical Instrumentation Pharmaceutical Technology of Fujian Province Fuzhou350116 China Research Institute of Ruijie Ruijie Networks Co. Ltd Fujian350002 China School of Public Health Xiamen University Xiamen361102 China College of Information and Intelligent Transportation Fujian Chuanzheng Communications College Fuzhou350007 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing College of Mathematics and Computer Science Fuzhou University The Key Laboratory of Spatial Data Mining and Information Sharing Ministry of Education Fujian350108 China College of Physics and information Engineering Fuzhou University the Key Laboratory of Medical Instrumentation Pharmaceutical Technology of Fujian Province Fujian350108 China College of Physics and Information Engineering Fuzhou University 350108 China Faculty of Science and Technology University of Macau 999078 China
We propose two simple and effective spiking neuron models to improve the response time of the conventional spiking neural network. The proposed neuron models adaptively tune the presynaptic input current depending on ... 详细信息
来源: 评论
Dynamic network embedding via incremental skip-gram with negative sampling
arXiv
收藏 引用
arXiv 2019年
作者: Peng, Hao Li, Jianxin Yan, Hao Gong, Qiran Wang, Senzhang Liu, Lin Wang, Lihong Ren, Xiang Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University Beijing China State Key Laboratory of Software Development Environment Beihang University Beijing China Collage of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China Department of Computer Science University of Southern California Los Angeles United States
Network representation learning, as an approach to learn low dimensional representations of vertices, has attracted considerable research attention recently. It has been proven extremely useful in many machine learnin... 详细信息
来源: 评论
Research on the Brain-inspired Cross-modal Neural Cognitive computing Framework
arXiv
收藏 引用
arXiv 2018年
作者: Liu, Yang Key Laboratory of Big Data Analysis and Processing of Henan province Intelligent Technology and Application Engineering Research Centre of Henan province College of Computer Science and Information Engineering Henan University Kaifeng475004 China
To address modeling problems of brain-inspired intelligence, this thesis is focused on researching in the semantic-oriented framework design for multimedia and multimodal information. The Multimedia Neural Cognitive C... 详细信息
来源: 评论
Correction to: Incentive mechanisms for mobile crowd sensing based on supply-demand relationship
收藏 引用
Peer-to-Peer Networking and Applications 2019年 第3期13卷 1069-1069页
作者: Xu, Jia Lu, Wei Xu, Lijie Yang, Dejun Li, Tao Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China Department of Computer Science Colorado School of Mines Golden USA
Correction is needed in the original article. The university name in affiliation (1) is changed from “University of Posts and Telecommunications” to “Nanjing University of Posts and Telecommunications”.
来源: 评论
Impact of Prior Knowledge and data Correlation on Privacy Leakage: A Unified Analysis
arXiv
收藏 引用
arXiv 2019年
作者: Li, Yanan Ren, Xuebin Yang, Shusen Yang, Xinyu National Engineering Laboratory for Big Data Analytics [NEL-BDA Xi’an Jiaotong University Xi’an Shaanxi710049 China School of Mathematics and Statistics Xi’an Jiaotong University Xi’an Shaanxi710049 China School of Electronic and Information Engineering Xi’an Jiaotong University Xi’an Shaanxi710049 China Ministry of Education Key Lab for Intelligent Networks and Network Security [MOE KLINNS Lab Xi’an Jiaotong University Xi’an Shaanxi710049 China
It has been widely understood that differential privacy (DP) can guarantee rigorous privacy against adversaries with arbitrary prior knowledge. However, recent studies demonstrate that this may not be true for correla... 详细信息
来源: 评论