咨询与建议

限定检索结果

文献类型

  • 1,810 篇 期刊文献
  • 1,625 篇 会议
  • 3 册 图书

馆藏范围

  • 3,438 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,291 篇 工学
    • 1,564 篇 计算机科学与技术...
    • 1,177 篇 软件工程
    • 438 篇 信息与通信工程
    • 274 篇 电子科学与技术(可...
    • 234 篇 控制科学与工程
    • 232 篇 电气工程
    • 227 篇 生物工程
    • 175 篇 光学工程
    • 151 篇 机械工程
    • 116 篇 生物医学工程(可授...
    • 96 篇 动力工程及工程热...
    • 91 篇 化学工程与技术
    • 89 篇 核科学与技术
    • 79 篇 仪器科学与技术
    • 76 篇 材料科学与工程(可...
    • 67 篇 建筑学
    • 66 篇 土木工程
    • 59 篇 交通运输工程
    • 53 篇 网络空间安全
  • 1,364 篇 理学
    • 589 篇 数学
    • 574 篇 物理学
    • 257 篇 生物学
    • 153 篇 统计学(可授理学、...
    • 104 篇 化学
    • 103 篇 系统科学
  • 518 篇 管理学
    • 318 篇 管理科学与工程(可...
    • 224 篇 图书情报与档案管...
    • 83 篇 工商管理
  • 107 篇 医学
    • 93 篇 临床医学
    • 80 篇 基础医学(可授医学...
  • 54 篇 法学
  • 27 篇 农学
  • 25 篇 经济学
  • 17 篇 教育学
  • 10 篇 艺术学
  • 9 篇 军事学
  • 6 篇 文学
  • 5 篇 哲学
  • 1 篇 历史学

主题

  • 111 篇 hadron colliders
  • 91 篇 computer archite...
  • 80 篇 training
  • 79 篇 semantics
  • 79 篇 feature extracti...
  • 76 篇 computational mo...
  • 64 篇 deep learning
  • 58 篇 laboratories
  • 46 篇 hardware
  • 42 篇 accuracy
  • 42 篇 data models
  • 41 篇 machine learning
  • 39 篇 neural networks
  • 36 篇 delay
  • 34 篇 convolution
  • 34 篇 predictive model...
  • 32 篇 optimization
  • 31 篇 higgs bosons
  • 31 篇 costs
  • 30 篇 wireless sensor ...

机构

  • 240 篇 university of ch...
  • 208 篇 state key labora...
  • 191 篇 yerevan physics ...
  • 151 篇 centro brasileir...
  • 150 篇 national and kap...
  • 150 篇 istanbul technic...
  • 149 篇 university of sp...
  • 148 篇 universidad iber...
  • 147 篇 indian institute...
  • 146 篇 brunel universit...
  • 146 篇 academy of scien...
  • 143 篇 charles universi...
  • 139 篇 università di to...
  • 136 篇 infn sezione di ...
  • 135 篇 key laboratory o...
  • 134 篇 university of de...
  • 133 篇 imperial college...
  • 133 篇 rwth aachen univ...
  • 131 篇 infn sezione di ...
  • 131 篇 department of ph...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 111 篇 a. babaev
  • 111 篇 a. steen
  • 111 篇 n. cartiglia
  • 107 篇 v. karjavine
  • 105 篇 n. colino
  • 105 篇 f. moortgat
  • 104 篇 b. clerbaux
  • 104 篇 g. sultanov
  • 103 篇 m. a. ciocci
  • 103 篇 k. lamichhane
  • 103 篇 s. maselli
  • 102 篇 e. migliore
  • 102 篇 p. avery
  • 102 篇 l. silvestris

语言

  • 3,203 篇 英文
  • 128 篇 其他
  • 114 篇 中文
检索条件"机构=Key Laboratory of Computer Architecture Institute of Computing Technology"
3438 条 记 录,以下是101-110 订阅
排序:
Quantum memory assisted entangled state verification with local measurements
收藏 引用
Physical Review Research 2025年 第1期7卷 013003-013003页
作者: Siyuan Chen Wei Xie Ping Xu Kun Wang Hefei National Research Center for Physical Sciences at the Microscale and School of Physical Sciences University of Science and Technology of China Hefei 230026 China College of Physics Jilin University Changchun 130012 China School of Computer Science and Technology University of Science and Technology of China Hefei 230027 China Institute for Quantum Information & State Key Laboratory of High Performance Computing College of Computer Science and Technology National University of Defense Technology Changsha 410073 China
We consider the quantum memory assisted quantum state verification task, where an adversary prepares independent multipartite entangled states and sends them to the local verifiers, who then store several copies in th... 详细信息
来源: 评论
DFMC:Feature-Driven Data-Free Knowledge Distillation
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年
作者: Zhang, Zherui Xu, Rongtao Wang, Changwei Xu, Wenhao Chen, Shunpeng Xu, Shibiao Xu, Guangyuan Guo, Li Beijing University of Posts and Telecommunications School of Artificial Intelligence Beijing100876 China Chinese Academy of Sciences State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Beijing100190 China Qilu University of Technology Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250316 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan250014 China
Data-Free Knowledge Distillation (DFKD) enables knowledge transfer from teacher networks without access to the real dataset. However, generator-based DFKD methods often suffer from insufficient diversity or low-confid... 详细信息
来源: 评论
Towards Depth-continuous Scene Representation with Displacement Field for Robust Light Field Depth Estimation
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Chen, Rongshan Sheng, Hao Yang, Da Cong, Ruixuan Cui, Zhenglong Wang, Sizhe Wang, Tun Zhao, Mingyuan Beihang University State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beijing100191 China Beihang University Key Laboratory of Data Science and Intelligent Computing International Innovation Institute 166 Shuanghongqiao Street Pingyao Town Yuhang District Hangzhou31 1115 China Macao Polytechnic University Faculty of Applied Sciences Macao999078 China
The light field (LF) captures both the spatial and angular information of scenes, enabling accurate depth estimation. However, previous deep learning methods typically model surface depth only while ignoring the conti... 详细信息
来源: 评论
DRL-Based Time-Varying Workload Scheduling With Priority and Resource Awareness
收藏 引用
IEEE Transactions on Network and Service Management 2025年
作者: Liu, Qifeng Fan, Qilin Zhang, Xu Li, Xiuhua Wang, Kai Xiong, Qingyu Chongqing University School of Big Data and Software Engineering Chongqing400044 China Chongqing University Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing400044 China Nanjing University School of Electronic Science and Engineering Nanjing210023 China Haihe Laboratory of Information Technology Application Innovation Tianjin300072 China Harbin Institute of Technology School of Computer Science and Technology Weihai264209 China Shandong Key Laboratory of Industrial Network Security Weihai264209 China
With the proliferation of cloud services and the continuous growth in enterprises' demand for dynamic multi-dimensional resources, the implementation of effective strategy for time-varying workload scheduling has ... 详细信息
来源: 评论
Trainbow: a new trusted virtual machine based platform
收藏 引用
中国高等学校学术文摘·计算机科学 2010年 第1期4卷 47-64页
作者: Yuzhong SUN Yongbing HUANG Yunwei GAO Haifeng FANG Ying SONG Lei DU Kai ZHANG Hongyong ZANG Yaqiong LI Yajun YANG Ran AO Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Graduate University of Chinese Academy of Sciences Beijing 100190China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Graduate University of Chinese Academy of Sciences Beijing 100190China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China Department of Computer Science and Technology Xi'an Jiaotong University Xi'an 710049China Key Laboratory of Computer System and Architecture Institute of Computing TechnologyChinese Academy of Sciences Beijing 100190China Graduate University of Chinese Academy of Sciences Beijing 100190China
Currently, with the evolution of virtualization technology, cloud computing mode has become more and more popular. However, people still concern the issues of the runtime integrity and data security of cloud computing... 详细信息
来源: 评论
Adaptive Backdoor Attacks with Reasonable Constraints on Graph Neural Networks
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Dong, Xuewen Li, Jiachen Li, Shujun You, Zhichao Qu, Qiang Kholodov, Yaroslav Shen, Yulong The School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China The Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China The School of Computing Kent Interdisciplinary Research Centre in Cyber Security University of Kent CanterburyCT2 7NF United Kingdom Shenzhen Institute of Advanced Technology Chinese Academy of Sciences China The Intelligent Transportation Systems Lab Innopolis University Innopolis Russia The School of Computer Science and Technology Xidian University China
Recent studies show that graph neural networks (GNNs) are vulnerable to backdoor attacks. Existing backdoor attacks against GNNs use fixed-pattern triggers and lack reasonable trigger constraints, overlooking individu... 详细信息
来源: 评论
Graph Contrastive Learning with Progressive Augmentations  25
Graph Contrastive Learning with Progressive Augmentations
收藏 引用
Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.1
作者: Yuhai Zhao Yejiang Wang Zhengkui Wang Wen Shan Miaomiao Huang Xingwei Wang School of Computer Science and Engineering Key Laboratory of Intelligent Computing in Medical Image of Ministry of Education Northeastern University Shenyang Liaoning China InfoComm Technology Cluster Singapore Institute of Technology Singapore Singapore Singapore University of Social Sciences Singapore Singapore School of Computer Science and Engineering Northeastern University Shenyang Liaoning China
To be still yet still moving. - Do Hyun ChoeGraph contrastive learning (GCL) has recently gained prominence in unsupervised graph representation learning. Traditional GCL approaches generally focus on creating a singl... 详细信息
来源: 评论
Meta-Transfer Learning Based Cross-Domain Gesture Recognition Using WiFi Channel State Information
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Dai, Penglin Zhou, Junfei Ma, Jialong Zhang, Hao Wu, Xiao Southwest Jiaotong University School of Computing and Artificial Intelligence Chengdu611756 China Ministry of Education Engineering Research Center of Sustainable Urban Intelligent Transportation China Tangshan Institute of Southwest Jiaotong University Tangshan063000 China Chongqing University of Posts and Telecommunications College of Computer Science and Technology Key Laboratory of Data Engineering and Visual Computing Chongqing400065 China
Gesture recognition plays a crucial role in a wide range of consumer electronics applications, including human-computer interaction and virtual reality, by enabling the identification and interpretation of human gestu... 详细信息
来源: 评论
Lightweight Task-Oriented Semantic Communication Empowered by Large-Scale AI Models
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Liu, Chuanhong Guo, Caili Yang, Yang Chen, Mingzhe Quek, Tony Q. S. Beijing University of Posts and Telecommunications Beijing Key Laboratory of Network System Architecture and Convergence School of Information and Communication Engineering Beijing100876 China Beijing University of Posts and Telecommunications Beijing Laboratory of Advanced Information Networks School of Information and Communication Engineering Beijing100876 China University of Miami Department of Electrical and Computer Engineering Institute for Data Science and Computing Coral GablesFL United States Singapore University of Technology and Design Dept. of Information Systems Technology and Design 487372 Singapore
Recent studies have focused on leveraging large-scale artificial intelligence (LAI) models to improve semantic representation and compression capabilities. However, the substantial computational demands of LAI models ... 详细信息
来源: 评论
Fence Theorem: Towards Dual-Objective Semantic-Structure Isolation in Preprocessing Phase for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Liang, Hanzhe Zhou, Jie Chen, Xuanxin Dai, Tao Wang, Jinbao Gao, Can College of Computer Science and Software Engineering Shenzhen University China Shenzhen Audencia Financial Technology Institute Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Faculty of Education Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
3D anomaly detection (AD) is prominent but difficult due to lacking a unified theoretical foundation for preprocessing design. We establish the Fence Theorem, formalizing preprocessing as a dual-objective semantic iso... 详细信息
来源: 评论