咨询与建议

限定检索结果

文献类型

  • 343 篇 会议
  • 173 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 517 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 331 篇 工学
    • 233 篇 计算机科学与技术...
    • 142 篇 软件工程
    • 61 篇 电子科学与技术(可...
    • 54 篇 信息与通信工程
    • 49 篇 控制科学与工程
    • 32 篇 机械工程
    • 31 篇 电气工程
    • 19 篇 生物工程
    • 15 篇 材料科学与工程(可...
    • 14 篇 光学工程
    • 12 篇 动力工程及工程热...
    • 12 篇 化学工程与技术
    • 10 篇 网络空间安全
    • 9 篇 交通运输工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 仪器科学与技术
    • 7 篇 建筑学
    • 7 篇 土木工程
    • 6 篇 冶金工程
  • 134 篇 理学
    • 70 篇 数学
    • 26 篇 系统科学
    • 24 篇 物理学
    • 22 篇 生物学
    • 14 篇 统计学(可授理学、...
    • 12 篇 化学
  • 68 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 20 篇 工商管理
    • 19 篇 图书情报与档案管...
  • 14 篇 医学
    • 12 篇 临床医学
    • 10 篇 基础医学(可授医学...
  • 5 篇 经济学
  • 3 篇 法学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 56 篇 computer archite...
  • 34 篇 laboratories
  • 29 篇 delay
  • 24 篇 circuit faults
  • 22 篇 hardware
  • 20 篇 circuit testing
  • 20 篇 costs
  • 19 篇 bandwidth
  • 18 篇 clocks
  • 16 篇 system testing
  • 16 篇 microprocessors
  • 15 篇 protocols
  • 14 篇 throughput
  • 13 篇 routing
  • 13 篇 fault tolerance
  • 13 篇 wireless sensor ...
  • 13 篇 automatic test p...
  • 13 篇 computer network...
  • 12 篇 petri nets
  • 12 篇 system-on-a-chip

机构

  • 94 篇 key laboratory o...
  • 83 篇 key laboratory o...
  • 34 篇 institute of com...
  • 31 篇 key laboratory o...
  • 31 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 26 篇 national enginee...
  • 23 篇 key laboratory o...
  • 19 篇 graduate univers...
  • 18 篇 department of el...
  • 17 篇 key laboratory o...
  • 16 篇 chinese academy ...
  • 13 篇 department of el...
  • 12 篇 guangdong provin...
  • 11 篇 department of co...
  • 11 篇 shenzhen institu...
  • 11 篇 university of ch...
  • 10 篇 chinese academy ...
  • 10 篇 loongson technol...
  • 10 篇 school of comput...

作者

  • 51 篇 xiaowei li
  • 31 篇 huawei li
  • 30 篇 zhou mengchu
  • 25 篇 li xiaowei
  • 21 篇 yu hu
  • 19 篇 shen linlin
  • 18 篇 yinhe han
  • 17 篇 mengchu zhou
  • 15 篇 dongrui fan
  • 14 篇 weiwu hu
  • 14 篇 changjun jiang
  • 13 篇 li huawei
  • 12 篇 cheng wang
  • 12 篇 xiang-yang li
  • 12 篇 hu yu
  • 11 篇 sun ninghui
  • 11 篇 han yinhe
  • 10 篇 jiang changjun
  • 9 篇 hu weiwu
  • 9 篇 yuzhong sun

语言

  • 468 篇 英文
  • 29 篇 中文
  • 20 篇 其他
检索条件"机构=Key Laboratory of Computer System and Architeture Institute of Computing Technology"
517 条 记 录,以下是441-450 订阅
排序:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
Petri net-based scheduling analysis of dual-arm cluster tools with wafer revisiting
Petri net-based scheduling analysis of dual-arm cluster tool...
收藏 引用
IEEE International Conference on Automation Science and Engineering (CASE)
作者: Yan Qiao NaiQi Wu MengChu Zhou Department of Industrial Engineering School of Electro-Mechanical Engineering Guangdong University of Technology Guangzhou China The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ USA
With wafer revisit, it is complicated to schedule cluster tools in semiconductor fabrication. In wafer fabrication processes, such as atomic layer deposition (ALD), the wafers need to visit some process modules for a ... 详细信息
来源: 评论
DAMPER: A Dual-Stage Medical Report Generation Framework with Coarse-Grained MeSH Alignment and Fine-Grained Hypergraph Matching
arXiv
收藏 引用
arXiv 2024年
作者: Huang, Xiaofei Chen, Wenting Liu, Jie Lu, Qisheng Luo, Xiaoling Shen, Linlin Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Electrical Engineering City University of Hong Kong Kowloon Hong Kong National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
Medical report generation is crucial for clinical diagnosis and patient management, summarizing diagnoses and recommendations based on medical imaging. However, existing work often overlook the clinical pipeline invol... 详细信息
来源: 评论
Generalized Visual Quality Assessment of GAN-Generated Face Images
arXiv
收藏 引用
arXiv 2022年
作者: Tian, Yu Ni, Zhangkai Chen, Baoliang Wang, Shiqi Wang, Hanli Kwong, Sam The Department of Computer Science City University of Hong Kong 999077 Hong Kong The Department of Computer Science & Technology Tongji University Shanghai 200092 China The Department of Computer Science & Technology Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai Institute of Intelligent Science and Technology Tongji University Shanghai 200092 China The City University of Hong Kong Shenzhen Research Institute Shenzhen518057 China
Recent years have witnessed the dramatically increased interest in face generation with generative adversarial networks (GANs). A number of successful GAN algorithms have been developed to produce vivid face images to... 详细信息
来源: 评论
General capacity scaling of wireless networks
General capacity scaling of wireless networks
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Cheng Wang Changjun Jiang Xiang-Yang Li Shaojie Tang Panlong Yang Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai China Department of Computer Science University of Tongji Shanghai China Department of Computer Science Illinois Institute of Technology Chicago IL USA TNLIST School of Software Tsinghua University China People''s Liberation Army University of Science and Technology China
We study the general scaling laws of the capacity for random wireless networks under the generalized physical model. The generality of this work is embodied in three dimensions denoted by (λ ∈ [1, n], n d ∈ [1, n]... 详细信息
来源: 评论
Capacity-shared heterogeneous CMP cache
收藏 引用
Jisuanji Yanjiu yu Fazhan/computer Research and Development 2008年 第5期45卷 877-885页
作者: Gao, Xiang Zhang, Longbing Hu, Weiwu Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Department of Computer Science and Technology University of Science and Technology of China Hefei 230027 China
The characteristics of advanced integrated circuit technologies require architects to look for new ways to utilize large numbers of gates and mitigate the effects of high interconnect delays. Chip multiprocessors (CMP... 详细信息
来源: 评论
Optimal Linear Crossover for Mitigating Negative Transfer in Evolutionary Multitasking
收藏 引用
IEEE Transactions on Evolutionary Computation 2024年
作者: Liu, Zhaobo Yuan, Jianhua Zhang, Haili Zeng, Tao Zhu, Zexuan Shenzhen University Institute for Advanced Study Shenzhen518060 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China Shenzhen Polytechnic University School of Undergraduate Education Shenzhen518055 China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China Shenzhen University Shenzhen City Key Laboratory of Embedded System Design Shenzhen518060 China Chongqing University Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education of China Chongqing400044 China
Evolutionary multitasking algorithms use information exchange among individuals in a population to solve multiple optimization problems simultaneously. Negative transfer is a critical factor that affects the performan... 详细信息
来源: 评论
An Automatic Tooth Position and Dental Disease Detection Algorithm Based on YOLOv8
An Automatic Tooth Position and Dental Disease Detection Alg...
收藏 引用
International Conference on computer and Communications (ICCC)
作者: Hongliang Wang Ke Diao Lin Wu Xuerao Li Xin Zhou Xiaozhou Liu Shenyang Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Liaoning Province Human-Computer Interaction System Engineering Research Center Based on Digital Twin Shenyang China Shenyang Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Shenyang China School and Hospital of Stomatology China Medical University Liaoning Provincial Key Laboratory of Oral Diseases Shenyang China Shenyang Institute of Computing Technology Chinese Academy of Sciences Liaoning Province Human-Computer Interaction System Engineering Research Center Based on Digital Twin Shenyang China
With the development of digital dental imaging technology, panoramic tomographic images have become an effective tool for diagnosing dental diseases. However, due to the diversity and complexity of dental lesions, acc... 详细信息
来源: 评论
GenFace: A Large-Scale Fine-Grained Face Forgery Benchmark and Cross Appearance-Edge Learning
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Yaning Yu, Zitong Wang, Tianyi Huang, Xiaobin Shen, Linlin Gao, Zan Ren, Jianfeng Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China School of Computing and Information Technology Great Bay University Dongguan523000 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Nanyang Technological University 50 Nanyang Ave Block N 4 639798 Singapore Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen518129 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University China Jinan250014 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China School of Computer Science University of Nottingham Ningbo China
The rapid advancement of photorealistic generators has reached a critical juncture where the discrepancy between authentic and manipulated images is increasingly indistinguishable. Thus, benchmarking and advancing tec... 详细信息
来源: 评论
Model checking cooperative multi-agent systems in BDI logic
收藏 引用
Journal of Information and Computational Science 2012年 第5期9卷 1185-1194页
作者: Chen, Qingliang Su, Kaile Wu, Lijun Xu, Zhaocheng School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Department of Computer Science Jinan University Guangzhou 510632 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China Institute for Integrated and Intelligent Systems Griffith University Brisbane Australia School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Traditional temporal logics such as LTL (Linear Temporal Logic) and CTL (Computation Tree Logic) have shown tremendous success in specifying and verifying hardware and software systems. However, this kind of logic can... 详细信息
来源: 评论