咨询与建议

限定检索结果

文献类型

  • 631 篇 会议
  • 376 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,009 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 688 篇 工学
    • 507 篇 计算机科学与技术...
    • 308 篇 软件工程
    • 116 篇 电子科学与技术(可...
    • 100 篇 信息与通信工程
    • 78 篇 控制科学与工程
    • 57 篇 电气工程
    • 54 篇 机械工程
    • 48 篇 动力工程及工程热...
    • 46 篇 生物工程
    • 23 篇 光学工程
    • 23 篇 化学工程与技术
    • 23 篇 生物医学工程(可授...
    • 20 篇 材料科学与工程(可...
    • 18 篇 建筑学
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 15 篇 环境科学与工程(可...
    • 14 篇 土木工程
    • 14 篇 交通运输工程
  • 254 篇 理学
    • 140 篇 数学
    • 52 篇 生物学
    • 45 篇 物理学
    • 41 篇 系统科学
    • 31 篇 统计学(可授理学、...
    • 27 篇 化学
  • 149 篇 管理学
    • 122 篇 管理科学与工程(可...
    • 39 篇 工商管理
    • 32 篇 图书情报与档案管...
  • 27 篇 医学
    • 24 篇 临床医学
    • 21 篇 基础医学(可授医学...
  • 12 篇 经济学
  • 8 篇 法学
  • 7 篇 农学
  • 2 篇 教育学
  • 2 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 73 篇 computer archite...
  • 38 篇 laboratories
  • 35 篇 hardware
  • 33 篇 delay
  • 30 篇 circuit faults
  • 26 篇 computational mo...
  • 24 篇 bandwidth
  • 20 篇 circuit testing
  • 20 篇 costs
  • 20 篇 clocks
  • 19 篇 throughput
  • 19 篇 wireless sensor ...
  • 19 篇 protocols
  • 19 篇 training
  • 18 篇 optimization
  • 18 篇 microprocessors
  • 17 篇 benchmarking
  • 16 篇 routing
  • 16 篇 fault tolerance
  • 16 篇 neural networks

机构

  • 272 篇 state key labora...
  • 164 篇 university of ch...
  • 94 篇 key laboratory o...
  • 82 篇 key laboratory o...
  • 54 篇 institute of com...
  • 41 篇 graduate univers...
  • 33 篇 chinese academy ...
  • 31 篇 key laboratory o...
  • 27 篇 national enginee...
  • 26 篇 state key labora...
  • 24 篇 graduate univers...
  • 22 篇 key laboratory o...
  • 19 篇 school of comput...
  • 19 篇 loongson technol...
  • 19 篇 state key labora...
  • 17 篇 chinese academy ...
  • 17 篇 department of el...
  • 16 篇 key laboratory o...
  • 15 篇 school of comput...
  • 15 篇 graduate school ...

作者

  • 89 篇 xiaowei li
  • 48 篇 li xiaowei
  • 43 篇 huawei li
  • 33 篇 yu hu
  • 33 篇 yinhe han
  • 30 篇 zhou mengchu
  • 29 篇 wang lei
  • 29 篇 zhan jianfeng
  • 27 篇 fan dongrui
  • 25 篇 hu yu
  • 24 篇 dongrui fan
  • 24 篇 li huawei
  • 24 篇 sun ninghui
  • 22 篇 tan guangming
  • 22 篇 chen mingyu
  • 22 篇 ye xiaochun
  • 21 篇 gao wanling
  • 19 篇 shen linlin
  • 18 篇 han yinhe
  • 17 篇 ninghui sun

语言

  • 929 篇 英文
  • 61 篇 中文
  • 21 篇 其他
检索条件"机构=Key Laboratory of Computer System and Architecture Institute of Computing Technology"
1009 条 记 录,以下是901-910 订阅
排序:
New reachability trees for unbounded Petri nets
New reachability trees for unbounded Petri nets
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: ShouGuang Wang MengChu Zhou MengDi Gan Dan You Yue Li School of Information & Electronic Engineering Zhejiang Gongshang University Hangzhou China State Key Laboratory for Manufacturing Systems Engineering Xi'an Jiaotong University Xi'an China MoE Key Laboratory of Embedded System and Service Computing Tongji University Shanghai China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ USA
Reachability is an important dynamic property of Petri nets. Its determination given an unbounded net and initial marking has remained an open problem since 1960s. Due to its extreme difficulty, a great deal of resear... 详细信息
来源: 评论
AIBench Training: Balanced Industry-Standard AI Training Benchmarking
AIBench Training: Balanced Industry-Standard AI Training Ben...
收藏 引用
IEEE International Symposium on Performance Analysis of systems and Software
作者: Fei Tang Wanling Gao Jianfeng Zhan Chuanxin Lan Xu Wen Lei Wang Chunjie Luo Zheng Cao Xingwang Xiong Zihan Jiang Tianshu Hao Fanda Fan Fan Zhang Yunyou Huang Jianan Chen Mengjia Du Rui Ren Chen Zheng Daoyi Zheng Haoning Tang Kunlin Zhan Biao Wang Defei Kong Minghe Yu Chongkang Tan Huan Li Xinhui Tian Yatao Li Junchao Shao Zhenyu Wang Xiaoyu Wang Jiahui Dai Hainan Ye University of Chinese Academy of Sciences State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Alibaba International Open Benchmark Council (BenchCouncil) Baidu Tencent *** NetEase ByteDance Zhihu Lenovo Paypal Moqi Microsoft Research Asia *** CloudTa Intellifusion
Earlier-stage evaluations of a new AI architecture/system need affordable AI benchmarks. Only using a few AI component benchmarks like MLPerf alone in the other stages may lead to misleading conclusions. Moreover, the... 详细信息
来源: 评论
A systematic view of leakage risks in deep neural network systems
TechRxiv
收藏 引用
TechRxiv 2021年
作者: Hu, Xing Liang, Ling Chen, Xiaobing Deng, Lei Ji, Yu Ding, Yufei Du, Zidong Guo, Qi Sherwood, Timothy Xie, Yuan State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China Department of Electrical and Computer Engineering University of California Santa Barbara United States Department of Computer Science University of California Santa Barbara United States Tsinghua University China University of California Santa Barbara United States
As deep neural networks (DNNs) continue their reach into a wide range of application domains, the neural network architecture of DNN models becomes an increasingly sensitive subject, due to either intellectual propert... 详细信息
来源: 评论
Joint Entity and Relation Extraction Based on Prompt Learning and Multi-channel Heterogeneous Graph Enhancement
Joint Entity and Relation Extraction Based on Prompt Learnin...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Haiqing Lv Xiaohui Han Peipei Wang Wenbo Zuo Jing Guo Lijuan Xu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China Information Research Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Joint extraction of entity and relation is crucial in information extraction, aiming to extract all relation triples from unstructured text. However, current joint extraction methods face two main issues. Firstly, the... 详细信息
来源: 评论
Real-Time Task Scheduling for Joint Energy Efficiency Optimization in Data Centers
Real-Time Task Scheduling for Joint Energy Efficiency Optimi...
收藏 引用
IEEE Symposium on computers and Communications
作者: Youshi Wang Fa Zhang Rui Wang Yangguang Shi Hua Guo Zhiyong Liu Chinese Academy of Sciences (CAS) Institute of Computing Technology (ICT) Beijing China University of Chinese Academy of Sciences Beijing China ICT Key Laboratory of Intelligent Information Processing Beijing China Hong Kong University of Science and Technology Hong Kong China Technion - Israel Institute of Technology Haifa Israel State Grid Jingzhou Electric Power Company Jingzhou Hubei China ICT State Key Laboratory for Computer Architecture Beijing China
The high energy consumption has become one bottleneck in the development of the data centers (DCs), where the main energy consumers are the cooling system and the servers. Therefore, the joint optimization for the ene... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi... 详细信息
来源: 评论
Distilled Transformers with Locally Enhanced Global Representations for Face Forgery Detection
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Yaning Li, Qiufu Yu, Zitong Shen, Linlin Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Guangdong Shenzhen518060 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Shenzhen518129 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Guangdong Shenzhen518060 China School of Computing and Information Technology Great Bay University Guangdong Dongguan523000 China
Face forgery detection (FFD) is devoted to detecting the authenticity of face images. Although current CNN-based works achieve outstanding performance in FFD, they are susceptible to capturing local forgery patterns g... 详细信息
来源: 评论
Artificial intelligence for geoscience:Progress,challenges,and perspectives
收藏 引用
The Innovation 2024年 第5期5卷 136-160,135页
作者: Tianjie Zhao Sheng Wang Chaojun Ouyang Min Chen Chenying Liu Jin Zhang Long Yu Fei Wang Yong Xie Jun Li Fang Wang Sabine Grunwald Bryan MWong Fan Zhang Zhen Qian Yongjun Xu Chengqing Yu Wei Han Tao Sun Zezhi Shao Tangwen Qian Zhao Chen Jiangyuan Zeng Huai Zhang Husi Letu Bing Zhang Li Wang Lei Luo Chong Shi Hongjun Su Hongsheng Zhang Shuai Yin Ni Huang Wei Zhao Nan Li Chaolei Zheng Yang Zhou Changping Huang Defeng Feng Qingsong Xu Yan Wu Danfeng Hong Zhenyu Wang Yinyi Lin Tangtang Zhang Prashant Kumar Antonio Plaza Jocelyn Chanussot Jiabao Zhang Jiancheng Shi Lizhe Wang Aerospace Information Research Institute Chinese Academy of SciencesBeijing 100094China School of Computer Science China University of GeosciencesWuhan 430078China State Key Laboratory of Mountain Hazards and Engineering Resilience Institute of Mountain Hazards and EnvironmentChinese Academy of SciencesChengdu 610299China Key Laboratory of Virtual Geographic Environment(Ministry of Education of PRC) Nanjing Normal UniversityNanjing 210023China Data Science in Earth Observation Technical University of Munich80333 MunichGermany The National Key Laboratory of Water Disaster Prevention Yangtze Institute for Conservation and DevelopmentHohai UniversityNanjing 210098China Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China School of Geographical Sciences Nanjing University of Information Science and TechnologyNanjing 210044China State Key Laboratory of Soil and Sustainable Agriculture Institute of Soil ScienceChinese Academy of SciencesNanjing 210008China Soil Water and Ecosystem Sciences DepartmentUniversity of FloridaPO Box 110290GainesvilleFLUSA Materials Science Engineering Program Cooperating Faculty Member in the Department of Chemistry and Department of Physics Astronomy University of CaliforniaCaliforniaRiversideCA 92521USA Institute of Remote Sensing and Geographical Information System School of Earth and Space SciencesPeking UniversityBeijing 100871China Key Laboratory of Computational Geodynamics University of Chinese Academy of SciencesBeijing 100049China International Research Center of Big Data for Sustainable Development Goals Beijing 100094China College of Geography and Remote Sensing Hohai UniversityNanjing 211100China Department of Geography The University of Hong KongHong Kong 999077SARChina Jiangsu Key Laboratory of Atmospheric Environment Monitoring and Pollution Control Nanjing 210044China School of Environmental Science and Engineering Nanjing University of Information Science&TechnologyNanjing 210044China Collaborative Inno
This paper explores the evolution of geoscientific inquiry,tracing the progression from traditional physics-based models to modern data-driven approaches facilitated by significant advancements in artificial intellige... 详细信息
来源: 评论
Sample hardness based gradient loss for long-tailed cervical cell detection
arXiv
收藏 引用
arXiv 2022年
作者: Liu, Minmin Li, Xuechen Gao, Xiangbo Chen, Junliang Shen, Linlin Wu, Huisi Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University China Shenzhen Institute of Artificial Intelligence of Robotics of Society Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China University of California Irvine United States
Due to the difficulty of cancer samples collection and annotation, cervical cancer datasets usually exhibit a long-tailed data distribution. When training a detector to detect the cancer cells in a WSI (Whole Slice Im... 详细信息
来源: 评论
Prototype Guided Personalized Federated Intrusion Detection system
Prototype Guided Personalized Federated Intrusion Detection ...
收藏 引用
Smart World Congress (SWC), IEEE
作者: Long Cheng Huiru Yan Hanlin Zhou Ying Wang Haichuan Tang Fang Fang State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources School of Control and Computer Engineering North China Electric Power University Beijing China Chinese Academy of Sciences Institute of Computing Technology Beijing China AI Lab of CRRC Academy Beijing China
Preventing network attacks and protecting user privacy are consistently hot research topics in the Internet of Things (IoT) and edge computing fields. Recent advancements in Federated Learning (FL) have shown promise ... 详细信息
来源: 评论