咨询与建议

限定检索结果

文献类型

  • 343 篇 会议
  • 176 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 520 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 334 篇 工学
    • 234 篇 计算机科学与技术...
    • 143 篇 软件工程
    • 62 篇 电子科学与技术(可...
    • 55 篇 信息与通信工程
    • 49 篇 控制科学与工程
    • 34 篇 电气工程
    • 33 篇 机械工程
    • 19 篇 生物工程
    • 15 篇 材料科学与工程(可...
    • 14 篇 光学工程
    • 12 篇 动力工程及工程热...
    • 12 篇 化学工程与技术
    • 10 篇 网络空间安全
    • 9 篇 交通运输工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 仪器科学与技术
    • 7 篇 建筑学
    • 7 篇 土木工程
  • 135 篇 理学
    • 71 篇 数学
    • 26 篇 系统科学
    • 24 篇 物理学
    • 22 篇 生物学
    • 15 篇 统计学(可授理学、...
    • 12 篇 化学
  • 70 篇 管理学
    • 55 篇 管理科学与工程(可...
    • 21 篇 工商管理
    • 19 篇 图书情报与档案管...
  • 15 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 4 篇 法学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 56 篇 computer archite...
  • 34 篇 laboratories
  • 29 篇 delay
  • 24 篇 circuit faults
  • 22 篇 hardware
  • 20 篇 circuit testing
  • 20 篇 costs
  • 19 篇 bandwidth
  • 18 篇 clocks
  • 16 篇 system testing
  • 16 篇 microprocessors
  • 15 篇 protocols
  • 14 篇 throughput
  • 13 篇 routing
  • 13 篇 fault tolerance
  • 13 篇 wireless sensor ...
  • 13 篇 automatic test p...
  • 13 篇 computer network...
  • 12 篇 petri nets
  • 12 篇 system-on-a-chip

机构

  • 94 篇 key laboratory o...
  • 83 篇 key laboratory o...
  • 34 篇 institute of com...
  • 31 篇 key laboratory o...
  • 31 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 26 篇 national enginee...
  • 23 篇 key laboratory o...
  • 19 篇 graduate univers...
  • 18 篇 department of el...
  • 17 篇 key laboratory o...
  • 16 篇 chinese academy ...
  • 13 篇 department of el...
  • 12 篇 guangdong provin...
  • 11 篇 department of co...
  • 11 篇 shenzhen institu...
  • 11 篇 university of ch...
  • 10 篇 chinese academy ...
  • 10 篇 loongson technol...
  • 10 篇 school of comput...

作者

  • 51 篇 xiaowei li
  • 31 篇 huawei li
  • 30 篇 zhou mengchu
  • 25 篇 li xiaowei
  • 21 篇 yu hu
  • 19 篇 shen linlin
  • 18 篇 yinhe han
  • 17 篇 mengchu zhou
  • 15 篇 dongrui fan
  • 14 篇 weiwu hu
  • 14 篇 changjun jiang
  • 13 篇 li huawei
  • 12 篇 cheng wang
  • 12 篇 xiang-yang li
  • 12 篇 hu yu
  • 11 篇 jiang changjun
  • 11 篇 sun ninghui
  • 11 篇 han yinhe
  • 9 篇 hu weiwu
  • 9 篇 yuzhong sun

语言

  • 470 篇 英文
  • 29 篇 中文
  • 21 篇 其他
检索条件"机构=Key Laboratory of Computer System and Architeture Institute of Computing Technology"
520 条 记 录,以下是451-460 订阅
排序:
An Automatic Tooth Position and Dental Disease Detection Algorithm Based on YOLOv8
An Automatic Tooth Position and Dental Disease Detection Alg...
收藏 引用
International Conference on computer and Communications (ICCC)
作者: Hongliang Wang Ke Diao Lin Wu Xuerao Li Xin Zhou Xiaozhou Liu Shenyang Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Liaoning Province Human-Computer Interaction System Engineering Research Center Based on Digital Twin Shenyang China Shenyang Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Shenyang China School and Hospital of Stomatology China Medical University Liaoning Provincial Key Laboratory of Oral Diseases Shenyang China Shenyang Institute of Computing Technology Chinese Academy of Sciences Liaoning Province Human-Computer Interaction System Engineering Research Center Based on Digital Twin Shenyang China
With the development of digital dental imaging technology, panoramic tomographic images have become an effective tool for diagnosing dental diseases. However, due to the diversity and complexity of dental lesions, acc... 详细信息
来源: 评论
GenFace: A Large-Scale Fine-Grained Face Forgery Benchmark and Cross Appearance-Edge Learning
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Yaning Yu, Zitong Wang, Tianyi Huang, Xiaobin Shen, Linlin Gao, Zan Ren, Jianfeng Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China School of Computing and Information Technology Great Bay University Dongguan523000 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Nanyang Technological University 50 Nanyang Ave Block N 4 639798 Singapore Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen518129 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University China Jinan250014 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China School of Computer Science University of Nottingham Ningbo China
The rapid advancement of photorealistic generators has reached a critical juncture where the discrepancy between authentic and manipulated images is increasingly indistinguishable. Thus, benchmarking and advancing tec... 详细信息
来源: 评论
Model checking cooperative multi-agent systems in BDI logic
收藏 引用
Journal of Information and Computational Science 2012年 第5期9卷 1185-1194页
作者: Chen, Qingliang Su, Kaile Wu, Lijun Xu, Zhaocheng School of Electronics Engineering and Computer Science Peking University Beijing 100871 China Department of Computer Science Jinan University Guangzhou 510632 China Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai China Institute for Integrated and Intelligent Systems Griffith University Brisbane Australia School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
Traditional temporal logics such as LTL (Linear Temporal Logic) and CTL (Computation Tree Logic) have shown tremendous success in specifying and verifying hardware and software systems. However, this kind of logic can... 详细信息
来源: 评论
Design of a flip-flop circuit within digital logic analyzer based on FPGA
收藏 引用
Harbin Gongye Daxue Xuebao/Journal of Harbin institute of technology 2009年 第SUPPL. 1期41卷 58-62页
作者: Xiao, Ling-Li Xu, Ning Han, Yin-He School of Computer Science and Technology Wuhan University Of Technology Wuhan 430070 China System Architecture Key Laboratory Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China
With the wide application of EDA technique, the period for the development of electronic products has been shortened. That implements the software of the hardware design and reduces the costs. Based on the analysis of... 详细信息
来源: 评论
Evolutionary Reinforcement Learning via Cooperative Coevolution
arXiv
收藏 引用
arXiv 2024年
作者: Hu, Chengpeng Liu, Jialin Yao, Xin Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China Research Institute of Trustworthy Autonomous System Southern University of Science and Technology Shenzhen China Department of Computing and Decision Sciences Lingnan University Hong Kong
Recently, evolutionary reinforcement learning has obtained much attention in various domains. Maintaining a population of actors, evolutionary reinforcement learning utilises the collected experiences to improve the b...
来源: 评论
Multi-scale Contrastive Learning for Gastroenteroscopy Classification
Multi-scale Contrastive Learning for Gastroenteroscopy Class...
收藏 引用
Annual IEEE Symposium on computer-Based Medical systems
作者: Dan Li Xuechen Li Zhibin Peng Wenting Chen Linlin Shen Guangyao Wu Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology ShenZhen University Shenzhen China City University of Hong Kong Hong Kong SAR China Shenzhen Institute of Artificial Intelligence & Robotics for Society Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University General Hospital
In gastroenteroscopy image analysis, numerous CADs demonstrate that deep learning aids doctors' diagnosis. The shapes and sizes of the lesions are varied. And in the clinic, the dataset appears to be data imbalanc...
来源: 评论
New reachability trees for unbounded Petri nets
New reachability trees for unbounded Petri nets
收藏 引用
IEEE International Conference on Robotics and Automation (ICRA)
作者: ShouGuang Wang MengChu Zhou MengDi Gan Dan You Yue Li School of Information & Electronic Engineering Zhejiang Gongshang University Hangzhou China State Key Laboratory for Manufacturing Systems Engineering Xi'an Jiaotong University Xi'an China MoE Key Laboratory of Embedded System and Service Computing Tongji University Shanghai China Department of Electrical and Computer Engineering New Jersey Institute of Technology Newark NJ USA
Reachability is an important dynamic property of Petri nets. Its determination given an unbounded net and initial marking has remained an open problem since 1960s. Due to its extreme difficulty, a great deal of resear... 详细信息
来源: 评论
Joint Entity and Relation Extraction Based on Prompt Learning and Multi-channel Heterogeneous Graph Enhancement
Joint Entity and Relation Extraction Based on Prompt Learnin...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Haiqing Lv Xiaohui Han Peipei Wang Wenbo Zuo Jing Guo Lijuan Xu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China Quan Cheng Laboratory Jinan China Information Research Institute Qilu University of Technology (Shandong Academy of Sciences) Jinan China
Joint extraction of entity and relation is crucial in information extraction, aiming to extract all relation triples from unstructured text. However, current joint extraction methods face two main issues. Firstly, the... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi... 详细信息
来源: 评论
Distilled Transformers with Locally Enhanced Global Representations for Face Forgery Detection
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Yaning Li, Qiufu Yu, Zitong Shen, Linlin Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Guangdong Shenzhen518060 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Shenzhen518129 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Guangdong Shenzhen518060 China School of Computing and Information Technology Great Bay University Guangdong Dongguan523000 China
Face forgery detection (FFD) is devoted to detecting the authenticity of face images. Although current CNN-based works achieve outstanding performance in FFD, they are susceptible to capturing local forgery patterns g... 详细信息
来源: 评论