咨询与建议

限定检索结果

文献类型

  • 1,810 篇 期刊文献
  • 1,625 篇 会议
  • 3 册 图书

馆藏范围

  • 3,438 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,291 篇 工学
    • 1,564 篇 计算机科学与技术...
    • 1,177 篇 软件工程
    • 438 篇 信息与通信工程
    • 274 篇 电子科学与技术(可...
    • 234 篇 控制科学与工程
    • 232 篇 电气工程
    • 227 篇 生物工程
    • 175 篇 光学工程
    • 151 篇 机械工程
    • 116 篇 生物医学工程(可授...
    • 96 篇 动力工程及工程热...
    • 91 篇 化学工程与技术
    • 89 篇 核科学与技术
    • 79 篇 仪器科学与技术
    • 76 篇 材料科学与工程(可...
    • 67 篇 建筑学
    • 66 篇 土木工程
    • 59 篇 交通运输工程
    • 53 篇 网络空间安全
  • 1,364 篇 理学
    • 589 篇 数学
    • 574 篇 物理学
    • 257 篇 生物学
    • 153 篇 统计学(可授理学、...
    • 104 篇 化学
    • 103 篇 系统科学
  • 518 篇 管理学
    • 318 篇 管理科学与工程(可...
    • 224 篇 图书情报与档案管...
    • 83 篇 工商管理
  • 107 篇 医学
    • 93 篇 临床医学
    • 80 篇 基础医学(可授医学...
  • 54 篇 法学
  • 27 篇 农学
  • 25 篇 经济学
  • 17 篇 教育学
  • 10 篇 艺术学
  • 9 篇 军事学
  • 6 篇 文学
  • 5 篇 哲学
  • 1 篇 历史学

主题

  • 111 篇 hadron colliders
  • 91 篇 computer archite...
  • 80 篇 training
  • 79 篇 semantics
  • 79 篇 feature extracti...
  • 76 篇 computational mo...
  • 64 篇 deep learning
  • 58 篇 laboratories
  • 46 篇 hardware
  • 42 篇 accuracy
  • 42 篇 data models
  • 41 篇 machine learning
  • 39 篇 neural networks
  • 36 篇 delay
  • 34 篇 convolution
  • 34 篇 predictive model...
  • 32 篇 optimization
  • 31 篇 higgs bosons
  • 31 篇 costs
  • 30 篇 wireless sensor ...

机构

  • 240 篇 university of ch...
  • 208 篇 state key labora...
  • 191 篇 yerevan physics ...
  • 151 篇 centro brasileir...
  • 150 篇 national and kap...
  • 150 篇 istanbul technic...
  • 149 篇 university of sp...
  • 148 篇 universidad iber...
  • 147 篇 indian institute...
  • 146 篇 brunel universit...
  • 146 篇 academy of scien...
  • 143 篇 charles universi...
  • 139 篇 università di to...
  • 136 篇 infn sezione di ...
  • 135 篇 key laboratory o...
  • 134 篇 university of de...
  • 133 篇 imperial college...
  • 133 篇 rwth aachen univ...
  • 131 篇 infn sezione di ...
  • 131 篇 department of ph...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 111 篇 a. babaev
  • 111 篇 a. steen
  • 111 篇 n. cartiglia
  • 107 篇 v. karjavine
  • 105 篇 n. colino
  • 105 篇 f. moortgat
  • 104 篇 b. clerbaux
  • 104 篇 g. sultanov
  • 103 篇 m. a. ciocci
  • 103 篇 k. lamichhane
  • 103 篇 s. maselli
  • 102 篇 e. migliore
  • 102 篇 p. avery
  • 102 篇 l. silvestris

语言

  • 3,203 篇 英文
  • 128 篇 其他
  • 114 篇 中文
检索条件"机构=Key Laboratory of Computer Architecture Institute of Computing Technology"
3438 条 记 录,以下是81-90 订阅
排序:
HTDet:A Clustering Method Using Information Entropy for Hardware Trojan Detection
收藏 引用
Tsinghua Science and technology 2021年 第1期26卷 48-61页
作者: Renjie Lu Haihua Shen Zhihua Feng Huawei Li Wei Zhao Xiaowei Li the University of Chinese Academy of Sciences Beijing 101408China Beijing Institute of Computer Technology and Application Beijing 100854China the State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesBeijing 100190China
Hardware Trojans(HTs)have drawn increasing attention in both academia and industry because of their significant potential *** this paper,we propose HTDet,a novel HT detection method using information entropybased *** ... 详细信息
来源: 评论
Self-distillation Enhanced Vertical Wavelet Spatial Attention for Person Re-identification  1
收藏 引用
30th International Conference on MultiMedia Modeling, MMM 2024
作者: Zhang, Yuxuan Tan, Huibin Lan, Long Teng, Xiao Ren, Jing Zhang, Yongjun Institute for Quantum Information & State Key Laboratory of High Performance Computing College of Computer Science and Technology National University of Defense Technology Changsha410073 China Beijing100071 China
Person re-identification is a challenging problem in computer vision, aiming to accurately match and recognize the same individual across different viewpoints and cameras. Due to significant variations in appearance u... 详细信息
来源: 评论
IntNet: A novel framework using reconstructed mutation samples and a biologically informed neural network for pathway analysis
IntNet: A novel framework using reconstructed mutation sampl...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Zhou, Li Li, Jie Tan, Weilong Harbin Institute of Technology School of Computer Science and Technology Harbin China National Key Laboratory of Smart Farming Technology and Systems College of Computing Harbin Institute of Technology Harbin China Technology Center for Medicines Center for Medicines Nanjing China
Most pathway analysis methods based on simple nucleotide variations overlook mutations occurring in genes outside the pathway, fail to address mutation heterogeneity with targeted measures, and do not consider the fun... 详细信息
来源: 评论
A large scale parallel fluid-structure interaction computing platform for simulating structural responses to a detonation shock
A large scale parallel fluid-structure interaction computing...
收藏 引用
作者: Zhang, Sen Guo, Xiao-Wei Li, Chao Liu, Yi Fan, Sijiang Zhao, Ran Yang, Canqun Institute for Quantum Information & State Key Laboratory of High Performance Computing College of Computer Science and Technology National University of Defense Technology Changsha China
Due to the intrinsic nature of multi-physics, it is prohibitively complex to design and implement a simulation software platform for study of structural responses to a detonation shock. In this article, a partitioned ... 详细信息
来源: 评论
Degenerate polarization entangled photon source based on a single Ti-diffusion lithium niobate waveguide in a polarization Sagnac interferometer
收藏 引用
Chinese Physics B 2023年 第8期32卷 69-73页
作者: 孙宇 孙昌伟 周唯 杨然 端家晨 龚彦晓 徐平 祝世宁 National Laboratory of Solid State Microstructures and School of Physics Nanjing UniversityNanjing 210093China NanZhi Institude of Advanced Optoelectronic Integration Nanjing 210018China Institute for Quantum Information and State Key Laboratory of High Performance Computing College of Computer Science and TechnologyNational University of Defense TechnologyChangsha 410073China
Combining a Ti-diffusion periodically poled lithium niobate(PPLN)waveguide with a Sagnac interferometer,two opposite directions type-II spontaneous parametric down conversions(SPDC)occur coherently and yield a high br... 详细信息
来源: 评论
OL-CBBA: An Online Task Allocation Algorithm under Weak Communication Conditions  29
OL-CBBA: An Online Task Allocation Algorithm under Weak Comm...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Li, Jun Huang, Wanrong Wu, Honglin Cai, Zhongxuan Zhang, Yongjun National University of Defense Technology Institute for Quantum Information State Key Laboratory of High Performance Computing College of Computer Science and Technology Changsha China
Multiple unmanned aerial vehicles (UAVs) and multiple tasks allocation problem is difficult to solve. Existing task allocation algorithms assume that the UAVs' position is static, and cannot assign tasks with the ... 详细信息
来源: 评论
Acorns: A Framework for Accelerating Deep Neural Networks with Input Sparsity  19
Acorns: A Framework for Accelerating Deep Neural Networks wi...
收藏 引用
Proceedings of the International Conference on Parallel architectures and Compilation Techniques
作者: Xiao Dong Lei Liu Peng Zhao Guangli Li Jiansong Li Xueying Wang Xiaobing Feng State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China and University of Chinese Academy of Sciences Beijing China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China
Deep neural networks have been employed in a broad range of applications, including face detection, natural language processing, and autonomous driving. Yet, the neural networks with the capability to tackle real-worl... 详细信息
来源: 评论
Network intrusion detection method based on CAE-ResNet-BiLSTM  4
Network intrusion detection method based on CAE-ResNet-BiLST...
收藏 引用
4th International Conference on Advanced Algorithms and Neural Networks, AANN 2024
作者: Yansong, Liu Pin, Wang College of Computer Science and Technology Shenyang University of Chemical Technology Liaoning Key Laboratory of Intelligent Technology for Chemical Process Industry Shenyang110142 China Shenyang Institute of computing technology Chinese academy of sciences China
To address the issue of low detection accuracy in existing network intrusion detection technologies caused by insufficient learning of data feature information, this paper proposes a network intrusion detection model ... 详细信息
来源: 评论
Towards Radar Emitter Recognition in Changing Environments with Domain Generalization  2
Towards Radar Emitter Recognition in Changing Environments w...
收藏 引用
2nd International Conference on Signal Processing, computer Networks and Communications, SPCNC 2023
作者: Wu, Honglin Li, Xueqiong Lan, Long Xu, Liyang Tang, Yuhua Institute for Quantum Information State Key Laboratory of High Performance Computing College of Computer Science and Technology National University of Defense Technology Changsha China
Analyzing radar signals from complex Electronic Warfare (EW) environment is a non-trivial task. However, in the real world, the changing EW environment results in inconsistent signal distribution, such as the pulse re... 详细信息
来源: 评论
NeuVSA: A Unified and Efficient Accelerator for Neural Vector Search  31
NeuVSA: A Unified and Efficient Accelerator for Neural Vecto...
收藏 引用
31st IEEE International Symposium on High Performance computer architecture, HPCA 2025
作者: Yuan, Ziming Dai, Lei Li, Wen Zhang, Jie Liang, Shengwen Wang, Ying Liu, Cheng Li, Huawei Li, Xiaowei Guo, Jiafeng Wang, Peng Chen, Renhai Zhang, Gong Shanxi University School of Computer and Information Technology China Peking University School of Computer Science China Institute of Computing Technology CAS State Key Lab of Processors China University of Chinese Academy of Sciences China Zhongguancun National Laboratory Beijing China Institute of Computing Technology CAS Key Lab of Network Data Science and Technology China Huawei Technologies Co. Ltd. China
Neural Vector Search (NVS) has exhibited superior search quality over traditional key-based strategies for information retrieval tasks. An effective NVS architecture requires high recall, low latency, and high through... 详细信息
来源: 评论