咨询与建议

限定检索结果

文献类型

  • 351 篇 会议
  • 174 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 526 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 337 篇 工学
    • 239 篇 计算机科学与技术...
    • 142 篇 软件工程
    • 61 篇 电子科学与技术(可...
    • 55 篇 控制科学与工程
    • 54 篇 信息与通信工程
    • 32 篇 机械工程
    • 31 篇 电气工程
    • 19 篇 生物工程
    • 15 篇 材料科学与工程(可...
    • 14 篇 光学工程
    • 12 篇 动力工程及工程热...
    • 12 篇 化学工程与技术
    • 10 篇 网络空间安全
    • 9 篇 交通运输工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 仪器科学与技术
    • 7 篇 建筑学
    • 7 篇 土木工程
    • 6 篇 冶金工程
  • 133 篇 理学
    • 70 篇 数学
    • 26 篇 系统科学
    • 23 篇 物理学
    • 22 篇 生物学
    • 14 篇 统计学(可授理学、...
    • 12 篇 化学
  • 68 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 20 篇 工商管理
    • 19 篇 图书情报与档案管...
  • 14 篇 医学
    • 12 篇 临床医学
    • 10 篇 基础医学(可授医学...
  • 5 篇 经济学
  • 3 篇 法学
  • 3 篇 农学
  • 1 篇 教育学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 56 篇 computer archite...
  • 34 篇 laboratories
  • 29 篇 delay
  • 24 篇 circuit faults
  • 22 篇 hardware
  • 20 篇 circuit testing
  • 20 篇 costs
  • 19 篇 bandwidth
  • 18 篇 clocks
  • 16 篇 system testing
  • 16 篇 microprocessors
  • 15 篇 protocols
  • 14 篇 throughput
  • 13 篇 routing
  • 13 篇 fault tolerance
  • 13 篇 wireless sensor ...
  • 13 篇 automatic test p...
  • 13 篇 computer network...
  • 12 篇 petri nets
  • 12 篇 system-on-a-chip

机构

  • 94 篇 key laboratory o...
  • 83 篇 key laboratory o...
  • 34 篇 institute of com...
  • 31 篇 key laboratory o...
  • 31 篇 graduate univers...
  • 30 篇 national enginee...
  • 30 篇 chinese academy ...
  • 23 篇 key laboratory o...
  • 19 篇 graduate univers...
  • 18 篇 department of el...
  • 17 篇 key laboratory o...
  • 16 篇 chinese academy ...
  • 16 篇 guangdong provin...
  • 13 篇 department of el...
  • 12 篇 university of ch...
  • 11 篇 department of co...
  • 11 篇 shenzhen institu...
  • 10 篇 chinese academy ...
  • 10 篇 loongson technol...
  • 10 篇 school of comput...

作者

  • 51 篇 xiaowei li
  • 31 篇 huawei li
  • 30 篇 zhou mengchu
  • 25 篇 li xiaowei
  • 22 篇 shen linlin
  • 21 篇 yu hu
  • 18 篇 yinhe han
  • 17 篇 mengchu zhou
  • 15 篇 dongrui fan
  • 14 篇 weiwu hu
  • 14 篇 changjun jiang
  • 13 篇 li huawei
  • 12 篇 cheng wang
  • 12 篇 xiang-yang li
  • 12 篇 hu yu
  • 11 篇 sun ninghui
  • 11 篇 han yinhe
  • 10 篇 jiang changjun
  • 9 篇 hu weiwu
  • 9 篇 yuzhong sun

语言

  • 466 篇 英文
  • 31 篇 其他
  • 29 篇 中文
检索条件"机构=Key Laboratory of Computer System and Architeture Institute of Computing Technology"
526 条 记 录,以下是51-60 订阅
$k$k-TEVS: A $ k$k-Times E-Voting Scheme on Blockchain With Supervision
收藏 引用
IEEE Transactions on Dependable and Secure computing 2024年 第3期22卷 2326-2337页
作者: Yang Liu Debiao He Min Luo Lianhai Wang Cong Peng School of Cyber Science and Engineering Wuhan University Wuhan China Institute of Information Technology Shenzhen Institute of Information Technology Shenzhen China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Shanghai China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan China
The e-vote is regarded as a way to express the opinion that the voters ask for. Actually, the e-vote could be applied wildly like questionnaire, survey and feedback. Moreover, the coexistences of efficiency and securi... 详细信息
来源: 评论
DAMPER: A Dual-Stage Medical Report Generation Framework with Coarse-Grained MeSH Alignment and Fine-Grained Hypergraph Matching  39
DAMPER: A Dual-Stage Medical Report Generation Framework wit...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Huang, Xiaofei Chen, Wenting Liu, Jie Lu, Qisheng Luo, Xiaoling Shen, Linlin Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Electrical Engineering City University of Hong Kong Kowloon Hong Kong National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
Medical report generation is crucial for clinical diagnosis and patient management, summarizing diagnoses and recommendations based on medical imaging. However, existing work often overlook the clinical pipeline invol... 详细信息
来源: 评论
Fence Theorem: Towards Dual-Objective Semantic-Structure Isolation in Preprocessing Phase for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Liang, Hanzhe Zhou, Jie Chen, Xuanxin Dai, Tao Wang, Jinbao Gao, Can College of Computer Science and Software Engineering Shenzhen University China Shenzhen Audencia Financial Technology Institute Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Faculty of Education Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
3D anomaly detection (AD) is prominent but difficult due to lacking a unified theoretical foundation for preprocessing design. We establish the Fence Theorem, formalizing preprocessing as a dual-objective semantic iso... 详细信息
来源: 评论
NavG: Risk-Aware Navigation in Crowded Environments Based on Reinforcement Learning with Guidance Points
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Qianyi Luo, Wentao Liu, Boyi Zhang, Ziyang Wang, Yaoyuan Liu, Jingtai Institute of Robotics and Automatic Information System Nankai University Tianjin Key Laboratory of Intelligent Robotics Tianjin China Advanced Computing and Storage Lab Huawei 2012 Lab China Department of Electronic and Computer Engineering The Kong Kong University of Science and Technology Hong Kong
Motion planning in navigation systems is highly susceptible to upstream perceptual errors, particularly in human detection and tracking. To mitigate this issue, the concept of guidance points—a novel directional cue ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado SpringsCO United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab China JinYinHu Laboratory Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Zhen Li Ning Wang Deqing Zou Yating Li Ruqian Zhang Shouhuai Xu Chao Zhang Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jin YinHu Laboratory Wuhan China Department of Computer Science University of Colorado Colorado Springs Colorado Springs Colorado USA Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
StyleGene: Crossover and Mutation of Region-level Facial Genes for Kinship Face Synthesis
StyleGene: Crossover and Mutation of Region-level Facial Gen...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Hao Li Xianxu Hou Zepeng Huang Linlin Shen Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University School of AI and Advanced Computing Xi'an Jiaotong-Liverpool University Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University
High-fidelity kinship face synthesis has many potential applications, such as kinship verification, missing child identification, and social media analysis. However, it is challenging to synthesize high-quality descen...
来源: 评论
DAMPER: A Dual-Stage Medical Report Generation Framework with Coarse-Grained MeSH Alignment and Fine-Grained Hypergraph Matching
arXiv
收藏 引用
arXiv 2024年
作者: Huang, Xiaofei Chen, Wenting Liu, Jie Lu, Qisheng Luo, Xiaoling Shen, Linlin Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen China Department of Electrical Engineering City University of Hong Kong Kowloon Hong Kong National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
Medical report generation is crucial for clinical diagnosis and patient management, summarizing diagnoses and recommendations based on medical imaging. However, existing work often overlook the clinical pipeline invol... 详细信息
来源: 评论
Optimal Linear Crossover for Mitigating Negative Transfer in Evolutionary Multitasking
收藏 引用
IEEE Transactions on Evolutionary Computation 2024年
作者: Liu, Zhaobo Yuan, Jianhua Zhang, Haili Zeng, Tao Zhu, Zexuan Shenzhen University Institute for Advanced Study Shenzhen518060 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China Shenzhen Polytechnic University School of Undergraduate Education Shenzhen518055 China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China Shenzhen University Shenzhen City Key Laboratory of Embedded System Design Shenzhen518060 China Chongqing University Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education of China Chongqing400044 China
Evolutionary multitasking algorithms use information exchange among individuals in a population to solve multiple optimization problems simultaneously. Negative transfer is a critical factor that affects the performan... 详细信息
来源: 评论
An Automatic Tooth Position and Dental Disease Detection Algorithm Based on YOLOv8
An Automatic Tooth Position and Dental Disease Detection Alg...
收藏 引用
International Conference on computer and Communications (ICCC)
作者: Hongliang Wang Ke Diao Lin Wu Xuerao Li Xin Zhou Xiaozhou Liu Shenyang Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Liaoning Province Human-Computer Interaction System Engineering Research Center Based on Digital Twin Shenyang China Shenyang Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Shenyang China School and Hospital of Stomatology China Medical University Liaoning Provincial Key Laboratory of Oral Diseases Shenyang China Shenyang Institute of Computing Technology Chinese Academy of Sciences Liaoning Province Human-Computer Interaction System Engineering Research Center Based on Digital Twin Shenyang China
With the development of digital dental imaging technology, panoramic tomographic images have become an effective tool for diagnosing dental diseases. However, due to the diversity and complexity of dental lesions, acc... 详细信息
来源: 评论