咨询与建议

限定检索结果

文献类型

  • 1,815 篇 期刊文献
  • 1,638 篇 会议
  • 3 册 图书

馆藏范围

  • 3,456 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,288 篇 工学
    • 1,561 篇 计算机科学与技术...
    • 1,173 篇 软件工程
    • 437 篇 信息与通信工程
    • 273 篇 电子科学与技术(可...
    • 233 篇 控制科学与工程
    • 228 篇 电气工程
    • 227 篇 生物工程
    • 176 篇 光学工程
    • 151 篇 机械工程
    • 116 篇 生物医学工程(可授...
    • 96 篇 动力工程及工程热...
    • 91 篇 化学工程与技术
    • 88 篇 核科学与技术
    • 79 篇 仪器科学与技术
    • 76 篇 材料科学与工程(可...
    • 67 篇 建筑学
    • 66 篇 土木工程
    • 59 篇 交通运输工程
    • 53 篇 网络空间安全
  • 1,365 篇 理学
    • 588 篇 数学
    • 574 篇 物理学
    • 257 篇 生物学
    • 153 篇 统计学(可授理学、...
    • 104 篇 化学
    • 102 篇 系统科学
  • 518 篇 管理学
    • 318 篇 管理科学与工程(可...
    • 224 篇 图书情报与档案管...
    • 83 篇 工商管理
  • 109 篇 医学
    • 93 篇 临床医学
    • 80 篇 基础医学(可授医学...
  • 54 篇 法学
  • 27 篇 农学
  • 25 篇 经济学
  • 17 篇 教育学
  • 10 篇 艺术学
  • 9 篇 军事学
  • 6 篇 文学
  • 5 篇 哲学
  • 1 篇 历史学

主题

  • 111 篇 hadron colliders
  • 91 篇 computer archite...
  • 83 篇 training
  • 81 篇 feature extracti...
  • 79 篇 semantics
  • 77 篇 computational mo...
  • 64 篇 deep learning
  • 58 篇 laboratories
  • 46 篇 hardware
  • 43 篇 accuracy
  • 42 篇 data models
  • 41 篇 machine learning
  • 39 篇 neural networks
  • 36 篇 delay
  • 34 篇 convolution
  • 34 篇 predictive model...
  • 32 篇 optimization
  • 31 篇 higgs bosons
  • 31 篇 costs
  • 30 篇 wireless sensor ...

机构

  • 242 篇 university of ch...
  • 208 篇 state key labora...
  • 190 篇 yerevan physics ...
  • 150 篇 centro brasileir...
  • 149 篇 national and kap...
  • 149 篇 istanbul technic...
  • 148 篇 university of sp...
  • 147 篇 universidad iber...
  • 146 篇 indian institute...
  • 145 篇 brunel universit...
  • 145 篇 academy of scien...
  • 141 篇 charles universi...
  • 138 篇 università di to...
  • 135 篇 infn sezione di ...
  • 135 篇 key laboratory o...
  • 133 篇 university of de...
  • 132 篇 imperial college...
  • 132 篇 rwth aachen univ...
  • 130 篇 infn sezione di ...
  • 130 篇 department of ph...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 111 篇 a. babaev
  • 111 篇 a. steen
  • 111 篇 n. cartiglia
  • 107 篇 v. karjavine
  • 105 篇 n. colino
  • 105 篇 f. moortgat
  • 104 篇 b. clerbaux
  • 104 篇 g. sultanov
  • 103 篇 m. a. ciocci
  • 103 篇 k. lamichhane
  • 103 篇 s. maselli
  • 102 篇 e. migliore
  • 102 篇 p. avery
  • 102 篇 l. silvestris

语言

  • 3,220 篇 英文
  • 128 篇 其他
  • 115 篇 中文
检索条件"机构=Key Laboratory of Computer Architecture Institute of Computing Technology"
3456 条 记 录,以下是301-310 订阅
排序:
Degradation analysis and optimization of temperature effect on MEMRISTOR-based Neural Network Accelerators by electro-thermal simulation
Degradation analysis and optimization of temperature effect ...
收藏 引用
2020 International Conference on Electronics, Communications and Information technology, CECIT 2020
作者: Shang, Mengjun Yin, Longxiang Xu, Ning School of Information Engineering Wuhan University of Technology Wuhan China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China
Nowadays, memristor-based neural network accelerators have been widely studied due to their outstanding performance in massive parallel vector matrix multiplication. However, the memristor is sensitive to temperature ... 详细信息
来源: 评论
FIRE: a dataset for feedback integration and refinement evaluation of multimodal models  24
FIRE: a dataset for feedback integration and refinement eval...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Pengxiang Li Zhi Gao Bofei Zhang Tao Yuan Yuwei Wu Mehrtash Harandi Yunde Jia Song-Chun Zhu Qing Li Beijing Key Laboratory of Intelligent Information Technology School of Computer Science & Technology Beijing Institute of Technology and State Key Laboratory of General Artificial Intelligence BIGAI State Key Laboratory of General Artificial Intelligence BIGAI and State Key Laboratory of General Artificial Intelligence Peking University State Key Laboratory of General Artificial Intelligence BIGAI Beijing Key Laboratory of Intelligent Information Technology School of Computer Science & Technology Beijing Institute of Technology and Guangdong Laboratory of Machine Perception and Intelligent Computing Shenzhen MSU-BIT University Department of Electrical and Computer System Engineering Monash University Guangdong Laboratory of Machine Perception and Intelligent Computing Shenzhen MSU-BIT University and Beijing Key Laboratory of Intelligent Information Technology School of Computer Science & Technology Beijing Institute of Technology State Key Laboratory of General Artificial Intelligence BIGAI and State Key Laboratory of General Artificial Intelligence Peking University and Department of Automation Tsinghua University
Vision language models (VLMs) have achieved impressive progress in diverse applications, becoming a prevalent research direction. In this paper, we build FIRE, a feedback-refinement dataset, consisting of 1.1M multi-t...
来源: 评论
DU-DARTS: Decreasing the Uncertainty of Differentiable architecture Search  32
DU-DARTS: Decreasing the Uncertainty of Differentiable Archi...
收藏 引用
32nd British Machine Vision Conference, BMVC 2021
作者: Lu, Shun Hu, Yu Yang, Longxing Sun, Zihao Mei, Jilin Zeng, Yiming Li, Xiaowei Research Center for Intelligent Computing Systems Institute of Computing Technology Chinese Academy of Sciences China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China School of Computer Science and Technology University of Chinese Academy of Sciences China Tecent ADlab China
Differentiable Neural architecture Search (DARTS) recently attracts a lot of research attention because of its high efficiency. However, the competition of candidate operations in DARTS introduces high uncertainty for... 详细信息
来源: 评论
Richelieu: Self-Evolving LLM-Based Agents for AI Diplomacy  38
Richelieu: Self-Evolving LLM-Based Agents for AI Diplomacy
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Guan, Zhenyu Kong, Xiangyu Zhong, Fangwei Wang, Yizhou Institute for Artificial Intelligence Peking University China College of Computer Science Beijing Information Science and Technology University China School of Artificial Intelligence Beijing Normal University China Center on Frontiers of Computing Studies School of Computer Science Nat'l Eng Research Center of Visual Technology Peking University China State Key Laboratory of General Artificial Intelligence BIGAI China
Diplomacy is one of the most sophisticated activities in human society, involving complex interactions among multiple parties that require skills in social reasoning, negotiation, and long-term strategic planning. Pre...
来源: 评论
Tensor Graph Convolutional Network for Dynamic Graph Representation Learning  7
Tensor Graph Convolutional Network for Dynamic Graph Represe...
收藏 引用
7th International Symposium on Autonomous Systems, ISAS 2024
作者: Wang, Ling Yuan, Ye The School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing400065 China The Chongqing Key Laboratory of Big Data and Intelligent Computing Chongqing Engineering Research Center of Big Data Application For Smart Cities Chongqing Institute of Green and Intelligent Technology Chinese Academy of Sciences Chongqing400714 China College of Computer and Information Science Southwest University Chongqing400715 China
Dynamic graphs (DG) represent evolving interactions between entities in various real-world scenarios. Many existing DG representation learning models employ a combination of graph convolutional networks and sequence n... 详细信息
来源: 评论
ISAR imaging of complex moving targets based on coherent accumulation type non-uniform sampling third-order autocorrelation function
ISAR imaging of complex moving targets based on coherent acc...
收藏 引用
International Conference on computer Engineering and Applications (ICCEA)
作者: Zongyang Sun Tong Zhang Kangfa Xu Qiheng Song Aviation Key Laboratory of Science and Technology on Airborne and Missle-Borne Computer Xi’an Aeronautics Computing Technique Research Institute AVIC School of Computer Science Northwestern Polytechnical University Xi’an China Aviation Key Laboratory of Science and Technology on Airborne and Missle-Borne Computer Xi’an Aeronautics Computing Technique Research Institute AVIC Xi’an China
ISAR imaging algorithm based on Coherent accumulation type non-uniform sampling third-order autocorrelation function (CANS-TAF) is proposed for complex moving targets. CANS-TAF defines a new non-uniform sampling third... 详细信息
来源: 评论
Towards Robust Universal Information Extraction: Benchmark, Evaluation, and Solution
arXiv
收藏 引用
arXiv 2025年
作者: Zhu, Jizhao Shi, Akang Li, Zixuan Bai, Long Jin, Xiaolong Guo, Jiafeng Cheng, Xueqi Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China School of Computer Science Shenyang Aerospace University Shenyang China
In this paper, we aim to enhance the robustness of Universal Information Extraction (UIE) by introducing a new benchmark dataset, a comprehensive evaluation, and a feasible solution. Existing robust benchmark datasets... 详细信息
来源: 评论
Design and development of intelligent well logging interpretation system  41
Design and development of intelligent well logging interpret...
收藏 引用
第41届中国控制会议
作者: Saifei Ma Jin Tang Zerui Li Kun Li Wenjun Lv School of Computer Science and Technology Anhui University Institute of Artificial Intelligence Hefei Comprehensive National Science Center Anhui Key Laboratory of Multimodal Cognitive Computing Anhui University Institute of Advanced Technology University of Science and Technology of China Department of Automation University of Science and Technology of China
In recent years,the traditional well logging interpretation method manually operated by experts has shown some problems,such as low efficiency and poor results,facing the challenges of high dimension,diversity and com... 详细信息
来源: 评论
The Adaptive Fault-tolerant Routing Based on an Improved Local Security Information Model of the Exchanged Hypercube  21
The Adaptive Fault-tolerant Routing Based on an Improved Loc...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud computing, 16th IEEE International Conference on Social computing and Networking and 13th International Conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Zhang, Yazhi Luo, Chuanwen Wang, Guijuan Zhang, Li Lv, Mengjie Yu, Jiguo Qilu University of Technology School of Computer Science and Technology Jinan China Beijing Forestry University School of Information Science and Technology Beijing China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks Jinan China Nanjing University of Posts and Telecommunications College of Computer Nanjing China Qilu University of Technology Shandong Academy of Sciences Big Data Research Institute Jinan China
With the increasing amount of computation in high-performance computing, the scale of interconnection networks is becoming larger and larger. It is inevitable that processors or links in the network become faulty. The... 详细信息
来源: 评论
Modelization and analysis of dynamic heterogeneous redundant system
Modelization and analysis of dynamic heterogeneous redundant...
收藏 引用
作者: Wang, Wei Li, Guangsong Gai, Keke Tang, Yazhe Yang, Benchao Si, Xueming State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China School of Computer Science and Technology Beijing Institute of Technology Beijing China School of Computer Science and Technology Xi'an Jiaotong University Xi'an China Shanghai Key Laboratory of Data Science Fudan University Shanghai China
With the development and popularization of Internet technology, network security has become the focus of attention. Vulnerabilities and back doors are regarded as two of the main reasons of network security problems. ... 详细信息
来源: 评论