咨询与建议

限定检索结果

文献类型

  • 633 篇 会议
  • 374 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,009 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 687 篇 工学
    • 505 篇 计算机科学与技术...
    • 305 篇 软件工程
    • 117 篇 电子科学与技术(可...
    • 101 篇 信息与通信工程
    • 78 篇 控制科学与工程
    • 55 篇 电气工程
    • 54 篇 机械工程
    • 48 篇 动力工程及工程热...
    • 46 篇 生物工程
    • 23 篇 光学工程
    • 23 篇 化学工程与技术
    • 23 篇 生物医学工程(可授...
    • 20 篇 材料科学与工程(可...
    • 18 篇 建筑学
    • 17 篇 网络空间安全
    • 16 篇 仪器科学与技术
    • 15 篇 交通运输工程
    • 15 篇 环境科学与工程(可...
    • 14 篇 土木工程
  • 253 篇 理学
    • 139 篇 数学
    • 52 篇 生物学
    • 45 篇 物理学
    • 41 篇 系统科学
    • 30 篇 统计学(可授理学、...
    • 27 篇 化学
  • 146 篇 管理学
    • 119 篇 管理科学与工程(可...
    • 38 篇 工商管理
    • 32 篇 图书情报与档案管...
  • 27 篇 医学
    • 24 篇 临床医学
    • 21 篇 基础医学(可授医学...
  • 11 篇 经济学
  • 7 篇 法学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 73 篇 computer archite...
  • 38 篇 laboratories
  • 35 篇 hardware
  • 33 篇 delay
  • 30 篇 circuit faults
  • 26 篇 computational mo...
  • 24 篇 bandwidth
  • 21 篇 costs
  • 20 篇 circuit testing
  • 20 篇 protocols
  • 20 篇 clocks
  • 19 篇 throughput
  • 19 篇 wireless sensor ...
  • 19 篇 training
  • 18 篇 optimization
  • 18 篇 microprocessors
  • 17 篇 benchmarking
  • 16 篇 routing
  • 16 篇 deep learning
  • 16 篇 fault tolerance

机构

  • 272 篇 state key labora...
  • 164 篇 university of ch...
  • 94 篇 key laboratory o...
  • 82 篇 key laboratory o...
  • 55 篇 institute of com...
  • 41 篇 graduate univers...
  • 33 篇 chinese academy ...
  • 31 篇 key laboratory o...
  • 27 篇 national enginee...
  • 26 篇 state key labora...
  • 24 篇 graduate univers...
  • 22 篇 key laboratory o...
  • 19 篇 school of comput...
  • 19 篇 loongson technol...
  • 19 篇 state key labora...
  • 17 篇 chinese academy ...
  • 17 篇 department of el...
  • 16 篇 key laboratory o...
  • 15 篇 school of comput...
  • 15 篇 graduate school ...

作者

  • 89 篇 xiaowei li
  • 48 篇 li xiaowei
  • 43 篇 huawei li
  • 33 篇 yu hu
  • 33 篇 yinhe han
  • 30 篇 zhou mengchu
  • 29 篇 wang lei
  • 29 篇 zhan jianfeng
  • 27 篇 fan dongrui
  • 25 篇 hu yu
  • 24 篇 dongrui fan
  • 24 篇 li huawei
  • 24 篇 sun ninghui
  • 22 篇 tan guangming
  • 22 篇 chen mingyu
  • 22 篇 ye xiaochun
  • 21 篇 gao wanling
  • 19 篇 shen linlin
  • 18 篇 han yinhe
  • 17 篇 ninghui sun

语言

  • 928 篇 英文
  • 61 篇 中文
  • 22 篇 其他
检索条件"机构=Key Laboratory of Computer System and Architecture Institute of Computing Technology"
1009 条 记 录,以下是121-130 订阅
排序:
TileSpMSpV: A Tiled Algorithm for Sparse Matrix-Sparse Vector Multiplication on GPUs  22
TileSpMSpV: A Tiled Algorithm for Sparse Matrix-Sparse Vecto...
收藏 引用
Proceedings of the 51st International Conference on Parallel Processing
作者: Haonan Ji Huimin Song Shibo Lu Zhou Jin Guangming Tan Weifeng Liu Super Scientific Software Laboratory China University of Petroleum-Beijing China China Northeastern University United States of America State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China
Sparse matrix-sparse vector multiplication (SpMSpV) is an important primitive for graph algorithms and machine learning applications. The sparsity of the input and output vectors makes its floating point efficiency in... 详细信息
来源: 评论
KOP-Fuzzer: A key-Operation-based Fuzzer for Type Confusion Bugs in JavaScript Engines
KOP-Fuzzer: A Key-Operation-based Fuzzer for Type Confusion ...
收藏 引用
IEEE Annual International computer Software and Applications Conference (COMPSAC)
作者: Lili Sun Chenggang Wu Zhe Wang Yan Kang Bowen Tang State Key Laboratory of Computer Architecture Chinese Academy of Sciences Institute of Computing Technology University of Chinese Academy of Sciences Beijing China
JavaScript (JS) engines are a core component of a lot of software, such as web browsers, PDF readers and flash players. There has been much research on finding JS engine vulnerabilities. However, due to the fact that ... 详细信息
来源: 评论
MFCLIP: Multi-modal Fine-grained CLIP for Generalizable Diffusion Face Forgery Detection
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Yaning Wang, Tianyi Yu, Zitong Gao, Zan Shen, Linlin Chen, Shengyong Jinan250353 China Nanyang Technological University 50 Nanyang Ave Block N 4 639798 Singapore School of Computing and Information Technology Great Bay University Dongguan523000 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Jinan250014 China The Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen518129 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China
The rapid development of photo-realistic face generation methods has raised significant concerns in society and academia, highlighting the urgent need for robust and generalizable face forgery detection (FFD) techniqu... 详细信息
来源: 评论
Provably Secure Authenticated key-Management Mechanism for e-Healthcare Environment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Ghaffar, Zahid Xie, Yong Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan Qinghai Institute of Technology School of Computer and Information Science China Qinghai Provincial Laboratory for Intelligent Computing and Application China Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan250353 China
The Internet of Things (IoT) is rapidly permeating all aspects of human life, involving a network of devices that share sensitive data. A notable application is the e-healthcare systems, which employ connected sensors... 详细信息
来源: 评论
$k$k-TEVS: A $ k$k-Times E-Voting Scheme on Blockchain With Supervision
收藏 引用
IEEE Transactions on Dependable and Secure computing 2024年 第3期22卷 2326-2337页
作者: Yang Liu Debiao He Min Luo Lianhai Wang Cong Peng School of Cyber Science and Engineering Wuhan University Wuhan China Institute of Information Technology Shenzhen Institute of Information Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Shanghai China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The e-vote is regarded as a way to express the opinion that the voters ask for. Actually, the e-vote could be applied wildly like questionnaire, survey and feedback. Moreover, the coexistences of efficiency and securi... 详细信息
来源: 评论
Boosting the Restoring Performance of Deduplication Data by Classifying Backup Metadata
收藏 引用
ACM/IMS Transactions on Data Science 2021年 第2期2卷 1–16页
作者: Yang, Ru Deng, Yuhui Zhou, Yi Huang, Ping Department of Computer Science Jinan University Guangzhou510632 China Department of Computer Science Jinan University China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China TSYS School of Computer Science Columbus State University Doimukh Georgia College of Engineering Temple University United States
Restoring data is the main purpose of data backup in storage systems. The fragmentation issue, caused by physically scattering logically continuous data across a variety of disk locations, poses a negative impact on t... 详细信息
来源: 评论
Fence Theorem: Towards Dual-Objective Semantic-Structure Isolation in Preprocessing Phase for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Liang, Hanzhe Zhou, Jie Chen, Xuanxin Dai, Tao Wang, Jinbao Gao, Can College of Computer Science and Software Engineering Shenzhen University China Shenzhen Audencia Financial Technology Institute Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Faculty of Education Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
3D anomaly detection (AD) is prominent but difficult due to lacking a unified theoretical foundation for preprocessing design. We establish the Fence Theorem, formalizing preprocessing as a dual-objective semantic iso... 详细信息
来源: 评论
AutoQNN: An End-to-End Framework for Automatically Quantizing Neural Networks
arXiv
收藏 引用
arXiv 2023年
作者: Gong, Cheng Lu, Ye Dai, Surong Qian, Deng Du, Chenkun Li, Tao College of Software Nankai University Tianjin300350 China College of Computer Science Nankai University Tianjin300350 China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China
Exploring the expected quantizing scheme with suitable mixed-precision policy is the key point to compress deep neural networks (DNNs) in high efficiency and accuracy. This exploration implies heavy workloads for doma... 详细信息
来源: 评论
NavG: Risk-Aware Navigation in Crowded Environments Based on Reinforcement Learning with Guidance Points
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Qianyi Luo, Wentao Liu, Boyi Zhang, Ziyang Wang, Yaoyuan Liu, Jingtai Institute of Robotics and Automatic Information System Nankai University Tianjin Key Laboratory of Intelligent Robotics Tianjin China Advanced Computing and Storage Lab Huawei 2012 Lab China Department of Electronic and Computer Engineering The Kong Kong University of Science and Technology Hong Kong
Motion planning in navigation systems is highly susceptible to upstream perceptual errors, particularly in human detection and tracking. To mitigate this issue, the concept of guidance points—a novel directional cue ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论