咨询与建议

限定检索结果

文献类型

  • 1,854 篇 期刊文献
  • 1,669 篇 会议
  • 3 册 图书

馆藏范围

  • 3,526 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,352 篇 工学
    • 1,611 篇 计算机科学与技术...
    • 1,194 篇 软件工程
    • 444 篇 信息与通信工程
    • 279 篇 电子科学与技术(可...
    • 264 篇 控制科学与工程
    • 241 篇 电气工程
    • 230 篇 生物工程
    • 179 篇 光学工程
    • 151 篇 机械工程
    • 119 篇 生物医学工程(可授...
    • 96 篇 动力工程及工程热...
    • 94 篇 化学工程与技术
    • 88 篇 核科学与技术
    • 79 篇 仪器科学与技术
    • 78 篇 材料科学与工程(可...
    • 70 篇 建筑学
    • 68 篇 土木工程
    • 60 篇 交通运输工程
    • 53 篇 网络空间安全
  • 1,380 篇 理学
    • 592 篇 数学
    • 579 篇 物理学
    • 259 篇 生物学
    • 155 篇 统计学(可授理学、...
    • 106 篇 化学
    • 102 篇 系统科学
  • 525 篇 管理学
    • 323 篇 管理科学与工程(可...
    • 226 篇 图书情报与档案管...
    • 86 篇 工商管理
  • 111 篇 医学
    • 95 篇 临床医学
    • 80 篇 基础医学(可授医学...
  • 55 篇 法学
  • 27 篇 农学
  • 25 篇 经济学
  • 19 篇 教育学
  • 10 篇 艺术学
  • 9 篇 军事学
  • 6 篇 文学
  • 5 篇 哲学
  • 1 篇 历史学

主题

  • 111 篇 hadron colliders
  • 91 篇 computer archite...
  • 84 篇 training
  • 82 篇 feature extracti...
  • 79 篇 semantics
  • 77 篇 computational mo...
  • 64 篇 deep learning
  • 58 篇 laboratories
  • 46 篇 hardware
  • 44 篇 accuracy
  • 42 篇 data models
  • 41 篇 machine learning
  • 39 篇 neural networks
  • 36 篇 delay
  • 34 篇 convolution
  • 34 篇 predictive model...
  • 32 篇 image segmentati...
  • 32 篇 optimization
  • 31 篇 higgs bosons
  • 31 篇 costs

机构

  • 247 篇 university of ch...
  • 208 篇 state key labora...
  • 190 篇 yerevan physics ...
  • 150 篇 centro brasileir...
  • 149 篇 national and kap...
  • 149 篇 istanbul technic...
  • 148 篇 university of sp...
  • 147 篇 universidad iber...
  • 146 篇 indian institute...
  • 145 篇 brunel universit...
  • 145 篇 academy of scien...
  • 141 篇 charles universi...
  • 138 篇 università di to...
  • 136 篇 key laboratory o...
  • 135 篇 infn sezione di ...
  • 133 篇 university of de...
  • 132 篇 imperial college...
  • 132 篇 rwth aachen univ...
  • 130 篇 infn sezione di ...
  • 130 篇 department of ph...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 111 篇 a. babaev
  • 111 篇 a. steen
  • 111 篇 n. cartiglia
  • 107 篇 v. karjavine
  • 105 篇 n. colino
  • 105 篇 f. moortgat
  • 104 篇 b. clerbaux
  • 104 篇 g. sultanov
  • 103 篇 m. a. ciocci
  • 103 篇 k. lamichhane
  • 103 篇 s. maselli
  • 102 篇 e. migliore
  • 102 篇 p. avery
  • 102 篇 l. silvestris

语言

  • 3,193 篇 英文
  • 225 篇 其他
  • 115 篇 中文
检索条件"机构=Key Laboratory of Computer Architecture Institute of Computing Technology"
3526 条 记 录,以下是71-80 订阅
排序:
Accelerate Bit Manipulation in XiangShan Processer Using RISC-V B Extension and Instruction Fusion
Accelerate Bit Manipulation in XiangShan Processer Using RIS...
收藏 引用
2022 International Conference on Cloud computing, Internet of Things, and computer Applications, CICA 2022
作者: Zhang, Fawang Tang, Dan Cai, Ye College of Computer Science and Software Engineering Shenzhen University Shenzhen China State Key Laboratory of Computer Architecture Institute of Computing Technology Beijing China
In the field of high-performance computing, some application scenarios make extensive use of bit manipulation. RISC-V foundation issues B extension to reduce the number of instructions during the static compilation. B... 详细信息
来源: 评论
Energy-Efficient and Reliable Federated Learning in Heterogeneous Mobile-Edge computing  19
Energy-Efficient and Reliable Federated Learning in Heteroge...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Xu, Yan Li, Liying Cong, Peijin Zhou, Junlong Nanjing University of Science and Technology School of Computer Science and Engineering China Institute of Computing Technology Chinese Academy of Sciences State Key Laboratory of Computer Architecture China
As a decentralized machine learning paradigm, Federated Learning (FL) is an emerging technique to protect user data privacy in Mobile Edge computing (MEC). FL adopts the idea of distributed privacy computing, enabling... 详细信息
来源: 评论
Energy-Constrained Task Scheduling in Heterogeneous Distributed Systems  26
Energy-Constrained Task Scheduling in Heterogeneous Distribu...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Chen, Chen Zhu, Jie Huang, Haiping Gao, Yingmeng Nanjing University of Posts & Telecommunications Nanjing210003 China Institute of Computing Technology Academy of Sciences State Key Laboratory Chinese of Computer Architecture Beijing100864 China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing210003 China
The resource-constrained task scheduling problem has been one of the popular research topics in cloud computing systems. By employing the dynamic voltage and frequency scaling (DVFS) techniques, the task scheduling ca... 详细信息
来源: 评论
Dynamic Task Allocation for Heterogeneous Multi-Robot System under Communication Constraints  6
Dynamic Task Allocation for Heterogeneous Multi-Robot System...
收藏 引用
6th IEEE Information technology, Networking, Electronic and Automation Control Conference, ITNEC 2023
作者: Li, Jun Cai, Zhongxuan Li, Minglong Huang, Wanrong Zhang, Yongjun National University of Defense Technology Institute for Quantum Information State Key Laboratory of High Performance Computing College of Computer China
Multi-robot system has important application potential in disaster rescue and other dangerous scenarios, in which task allocation is the basis for multi-robot cooperation to complete tasks. Due to the limited ability ... 详细信息
来源: 评论
LayerCFL:an efcient federated learning with layer-wised clustering
收藏 引用
Cybersecurity 2025年 第1期8卷 72-85页
作者: Jie Yuan Rui Qian Tingting Yuan Mingliang Sun Jirui Li Xiaoyong Li School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijingChina Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijingChina Institute of Computer Science Faculty of Mathematics and Computer ScienceUniversity of GoettingenGöettingenGermany School of Information Technology Henan University of Chinese MedicineZhengzhouHenanChina
Federated Learning(FL)sufers from the Non-IID problem in practice,which poses a challenge for efcient and accurate model *** address this challenge,prior research has introduced clustered FL(CFL),which involves cluste... 详细信息
来源: 评论
PIOD: An Efficient Parallel Iterative Algorithm for Solving Over-determined Equations  29
PIOD: An Efficient Parallel Iterative Algorithm for Solving ...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Tian, Min Wei, Zhenguo Li, Yanlong Du, Wei Xiao, Lei Xu, Chaoshuai China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computer Networks China Jinan Institute of Supercomputing Technology Jinan Key Laboratory of High Performance Computing China
The solution of over-determined equations plays a very important role in fields such as data fitting, signal processing, and machine learning. It is of great significance in predicting natural phenomena, optimizing en... 详细信息
来源: 评论
Automatic Target Description File Generation
收藏 引用
Journal of computer Science & technology 2023年 第6期38卷 1339-1355页
作者: 耿洪娜 吕方 钟茗 崔慧敏 薛景玲 冯晓兵 State Key Laboratory of Processors Institute of Computing TechnologyChinese Academy of SciencesBeijing 100190China University of Chinese Academy of Sciences Beijing 100049China School of Computer Science and Engineering University of New South WalesSydneyNSW 2052Australia
Agile hardware design is gaining increasing momentum and bringing new chips in larger quantities to the market ***,it also takes new challenges for compiler developers to retarget existing compilers to these new chips... 详细信息
来源: 评论
HTDet:A Clustering Method Using Information Entropy for Hardware Trojan Detection
收藏 引用
Tsinghua Science and technology 2021年 第1期26卷 48-61页
作者: Renjie Lu Haihua Shen Zhihua Feng Huawei Li Wei Zhao Xiaowei Li the University of Chinese Academy of Sciences Beijing 101408China Beijing Institute of Computer Technology and Application Beijing 100854China the State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesBeijing 100190China
Hardware Trojans(HTs)have drawn increasing attention in both academia and industry because of their significant potential *** this paper,we propose HTDet,a novel HT detection method using information entropybased *** ... 详细信息
来源: 评论
Self-distillation Enhanced Vertical Wavelet Spatial Attention for Person Re-identification  1
收藏 引用
30th International Conference on MultiMedia Modeling, MMM 2024
作者: Zhang, Yuxuan Tan, Huibin Lan, Long Teng, Xiao Ren, Jing Zhang, Yongjun Institute for Quantum Information & State Key Laboratory of High Performance Computing College of Computer Science and Technology National University of Defense Technology Changsha410073 China Beijing100071 China
Person re-identification is a challenging problem in computer vision, aiming to accurately match and recognize the same individual across different viewpoints and cameras. Due to significant variations in appearance u... 详细信息
来源: 评论
IntNet: A novel framework using reconstructed mutation samples and a biologically informed neural network for pathway analysis
IntNet: A novel framework using reconstructed mutation sampl...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Zhou, Li Li, Jie Tan, Weilong Harbin Institute of Technology School of Computer Science and Technology Harbin China National Key Laboratory of Smart Farming Technology and Systems College of Computing Harbin Institute of Technology Harbin China Technology Center for Medicines Center for Medicines Nanjing China
Most pathway analysis methods based on simple nucleotide variations overlook mutations occurring in genes outside the pathway, fail to address mutation heterogeneity with targeted measures, and do not consider the fun... 详细信息
来源: 评论