咨询与建议

限定检索结果

文献类型

  • 343 篇 会议
  • 173 篇 期刊文献

馆藏范围

  • 516 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 331 篇 工学
    • 233 篇 计算机科学与技术...
    • 142 篇 软件工程
    • 61 篇 电子科学与技术(可...
    • 54 篇 信息与通信工程
    • 49 篇 控制科学与工程
    • 32 篇 机械工程
    • 31 篇 电气工程
    • 19 篇 生物工程
    • 15 篇 材料科学与工程(可...
    • 14 篇 光学工程
    • 12 篇 动力工程及工程热...
    • 12 篇 化学工程与技术
    • 10 篇 网络空间安全
    • 9 篇 交通运输工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 仪器科学与技术
    • 7 篇 建筑学
    • 7 篇 土木工程
    • 6 篇 冶金工程
  • 134 篇 理学
    • 70 篇 数学
    • 26 篇 系统科学
    • 24 篇 物理学
    • 22 篇 生物学
    • 14 篇 统计学(可授理学、...
    • 12 篇 化学
  • 68 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 20 篇 工商管理
    • 19 篇 图书情报与档案管...
  • 14 篇 医学
    • 12 篇 临床医学
    • 10 篇 基础医学(可授医学...
  • 5 篇 经济学
  • 3 篇 法学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 56 篇 computer archite...
  • 34 篇 laboratories
  • 29 篇 delay
  • 24 篇 circuit faults
  • 22 篇 hardware
  • 20 篇 circuit testing
  • 20 篇 costs
  • 19 篇 bandwidth
  • 18 篇 clocks
  • 16 篇 system testing
  • 16 篇 microprocessors
  • 15 篇 protocols
  • 14 篇 throughput
  • 13 篇 routing
  • 13 篇 fault tolerance
  • 13 篇 wireless sensor ...
  • 13 篇 automatic test p...
  • 13 篇 computer network...
  • 12 篇 petri nets
  • 12 篇 system-on-a-chip

机构

  • 94 篇 key laboratory o...
  • 83 篇 key laboratory o...
  • 34 篇 institute of com...
  • 31 篇 key laboratory o...
  • 31 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 26 篇 national enginee...
  • 23 篇 key laboratory o...
  • 19 篇 graduate univers...
  • 18 篇 department of el...
  • 17 篇 key laboratory o...
  • 16 篇 chinese academy ...
  • 13 篇 department of el...
  • 12 篇 guangdong provin...
  • 11 篇 department of co...
  • 11 篇 shenzhen institu...
  • 11 篇 university of ch...
  • 10 篇 chinese academy ...
  • 10 篇 loongson technol...
  • 10 篇 school of comput...

作者

  • 51 篇 xiaowei li
  • 31 篇 huawei li
  • 30 篇 zhou mengchu
  • 25 篇 li xiaowei
  • 21 篇 yu hu
  • 19 篇 shen linlin
  • 18 篇 yinhe han
  • 17 篇 mengchu zhou
  • 15 篇 dongrui fan
  • 14 篇 weiwu hu
  • 14 篇 changjun jiang
  • 13 篇 li huawei
  • 12 篇 cheng wang
  • 12 篇 xiang-yang li
  • 12 篇 hu yu
  • 11 篇 sun ninghui
  • 11 篇 han yinhe
  • 10 篇 jiang changjun
  • 9 篇 hu weiwu
  • 9 篇 yuzhong sun

语言

  • 467 篇 英文
  • 29 篇 中文
  • 20 篇 其他
检索条件"机构=Key Laboratory of Computer System and Architeture Institute of Computing Technology"
516 条 记 录,以下是1-10 订阅
排序:
Multi‐granularity re‐ranking for visible‐infrared person re‐identification
收藏 引用
CAAI Transactions on Intelligence technology 2023年 第3期8卷 770-779页
作者: Yadi Wang Hongyun Zhang Duoqian Miao Witold Pedrycz Department of Computer Science and Technology Tongji UniversityShanghaiChina Key Laboratory of Embedded System and Service Computing Ministry of EducationShanghaiChina Department of Electrical and Computer Engineering University of AlbertaEdmontonAlbertaCanada System Research Institute Polish Academy of SciencesWarsawPoland
Visible‐infrared person re‐identification(VI‐ReID)is a supplementary task of single‐modality re‐identification,which makes up for the defect of conventional re‐identification under insufficient *** is more chall... 详细信息
来源: 评论
Formalization of Android Activity-Fragment Multitasking Mechanism and Static Analysis of Mobile Apps
收藏 引用
Formal Aspects of computing 2025年 第2期37卷 1-86页
作者: He, Jinlong Wu, Zhilin Chen, Taolue Key Laboratory of System Software Chinese Academy of Sciences Institute of Software Chinese Academy of Sciences Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China School of Computing and Mathematical Sciences Birkbeck University of London Northern Ireland London United Kingdom
The multitasking mechanism between activities and fragments plays a fundamental role in the Android operating system, which involves a wide range of features, including launch modes, intent flags, task affinities, and... 详细信息
来源: 评论
Fractional Order Differential Evolution
收藏 引用
IEEE Transactions on Evolutionary Computation 2024年 第3期29卷 1-1页
作者: Wang, Kaiyu Gao, Shangce Zhou, MengChu Zhan, Zhi-Hui Cheng, Jiujun Faculty of Engineering University of Toyama Toyama-shi Japan Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ USA College of Artificial Intelligence Nankai University Tianjin China Ministry of Education Key Laboratory of Embedded System and Service Computing Tongji University Shanghai China
Differential evolution (DE) is a widely recognized method to solve complex optimization problems as shown by many researchers. Yet, non-adaptive versions of DE suffer from insufficient exploration ability and uses no ... 详细信息
来源: 评论
Data quantity governance for machine learning in materials science
收藏 引用
National Science Review 2023年 第7期10卷 234-250页
作者: Yue Liu Zhengwei Yang Xinxin Zou Shuchang Ma Dahui Liu Maxim Avdeev Siqi Shi School of Computer Engineering and Science Shanghai University Shanghai Engineering Research Center of Intelligent Computing System Australian Nuclear Science and Technology Organisation School of Chemistry The University of Sydney State Key Laboratory of Advanced Special Steel School of Materials Science and Engineering Shanghai University Materials Genome Institute Shanghai University
Data-driven machine learning(ML) is widely employed in the analysis of materials structure-activity relationships,performance optimization and materials design due to its superior ability to reveal latent data pattern... 详细信息
来源: 评论
HairDiffusion: Vivid Multi-Colored Hair Editing via Latent Diffusion  38
HairDiffusion: Vivid Multi-Colored Hair Editing via Latent D...
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Zeng, Yu Zhang, Yang Liu, Jiachen Shen, Linlin Deng, Kaijun He, Weizhao Wang, Jinbao Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University China Shenzhen Institute of Artificial Intelligence and Robotics for Society China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
Hair editing is a critical image synthesis task that aims to edit hair color and hairstyle using text descriptions or reference images, while preserving irrelevant attributes (e.g., identity, background, cloth). Many ...
来源: 评论
FIRE: A Dataset for Feedback Integration and Refinement Evaluation of Multimodal Models  38
FIRE: A Dataset for Feedback Integration and Refinement Eval...
收藏 引用
38th Conference on Neural Information Processing systems, NeurIPS 2024
作者: Li, Pengxiang Gao, Zhi Zhang, Bofei Yuan, Tao Wu, Yuwei Harandi, Mehrtash Jia, Yunde Zhu, Song-Chun Li, Qing Beijing Key Laboratory of Intelligent Information Technology School of Computer Science & Technology Beijing Institute of Technology China State Key Laboratory of General Artificial Intelligence BIGAI China State Key Laboratory of General Artificial Intelligence Peking University China Department of Electrical and Computer System Engineering Monash University Australia Guangdong Laboratory of Machine Perception and Intelligent Computing Shenzhen MSU-BIT University China Department of Automation Tsinghua University China
Vision language models (VLMs) have achieved impressive progress in diverse applications, becoming a prevalent research direction. In this paper, we build FIRE, a feedback-refinement dataset, consisting of 1.1M multi-t...
来源: 评论
ESNet: Evolution and Succession Network for High-Resolution Salient Object Detection  41
ESNet: Evolution and Succession Network for High-Resolution ...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Liu, Hongyu Cong, Runmin Li, Hua Xu, Qianqian Huang, Qingming Zhang, Wei Institute of Information Science Beijing Jiaotong University Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing China School of Control Science and Engineering Shandong University Key Laboratory of Machine Intelligence and System Control Ministry of Education Jinan China School of Computer Science and Technology Hainan University Hainan China Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China
Preserving details and avoiding high computational costs are the two main challenges for the High-Resolution Salient Object Detection (HRSOD) task. In this paper, we propose a two-stage HRSOD model from the perspectiv... 详细信息
来源: 评论
On the Security of Smart Home systems:A Survey
收藏 引用
Journal of computer Science & technology 2023年 第2期38卷 228-247页
作者: 袁斌 万俊 吴宇晗 邹德清 金海 School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Distributed System Security Huazhong University of Science and Technology Wuhan 430074China Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan 430074China National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen 518057China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Evolutionary Reinforcement Learning via Cooperative Coevolution  27
Evolutionary Reinforcement Learning via Cooperative Coevolut...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Hu, Chengpeng Liu, Jialin Yao, Xin Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China Research Institute of Trustworthy Autonomous System Southern University of Science and Technology Shenzhen China Department of Computing and Decision Sciences Lingnan University Hong Kong
Recently, evolutionary reinforcement learning has obtained much attention in various *** a population of actors, evolutionary reinforcement learning utilises the collected experiences to improve the behaviour policy t... 详细信息
来源: 评论