咨询与建议

限定检索结果

文献类型

  • 862 篇 会议
  • 810 篇 期刊文献

馆藏范围

  • 1,672 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,105 篇 工学
    • 705 篇 计算机科学与技术...
    • 587 篇 软件工程
    • 238 篇 信息与通信工程
    • 148 篇 控制科学与工程
    • 135 篇 生物工程
    • 122 篇 电气工程
    • 109 篇 电子科学与技术(可...
    • 94 篇 光学工程
    • 90 篇 核科学与技术
    • 80 篇 机械工程
    • 77 篇 生物医学工程(可授...
    • 53 篇 仪器科学与技术
    • 50 篇 化学工程与技术
    • 44 篇 材料科学与工程(可...
    • 35 篇 网络空间安全
    • 34 篇 动力工程及工程热...
    • 31 篇 交通运输工程
  • 709 篇 理学
    • 330 篇 物理学
    • 281 篇 数学
    • 148 篇 生物学
    • 93 篇 统计学(可授理学、...
    • 52 篇 化学
    • 41 篇 系统科学
  • 265 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 127 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 66 篇 医学
    • 50 篇 临床医学
    • 46 篇 基础医学(可授医学...
    • 27 篇 药学(可授医学、理...
  • 40 篇 法学
    • 34 篇 社会学
  • 20 篇 经济学
  • 20 篇 教育学
  • 19 篇 农学
  • 9 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 100 篇 hadron colliders
  • 50 篇 deep learning
  • 37 篇 semantics
  • 33 篇 feature extracti...
  • 32 篇 training
  • 29 篇 w & z bosons
  • 28 篇 higgs bosons
  • 26 篇 data mining
  • 24 篇 computational mo...
  • 23 篇 graph neural net...
  • 22 篇 machine learning
  • 20 篇 accuracy
  • 20 篇 data models
  • 18 篇 convolutional ne...
  • 17 篇 object detection
  • 17 篇 convolution
  • 16 篇 semantic segment...
  • 16 篇 relativistic hea...
  • 16 篇 computer vision
  • 16 篇 forecasting

机构

  • 140 篇 irfu cea univers...
  • 133 篇 yerevan physics ...
  • 130 篇 national and kap...
  • 130 篇 centro brasileir...
  • 130 篇 istanbul technic...
  • 128 篇 university of sp...
  • 128 篇 indian institute...
  • 127 篇 universidad iber...
  • 126 篇 brunel universit...
  • 126 篇 charles universi...
  • 125 篇 università di to...
  • 125 篇 academy of scien...
  • 125 篇 infn sezione di ...
  • 124 篇 department of ph...
  • 123 篇 zhejiang univers...
  • 122 篇 infn sezione di ...
  • 122 篇 department of ph...
  • 121 篇 imperial college...
  • 121 篇 university of de...
  • 119 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 1,552 篇 英文
  • 88 篇 其他
  • 35 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Computer Technology Application"
1672 条 记 录,以下是411-420 订阅
排序:
Domain Adaptive Code Completion via Language Models and Decoupled Domain Databases
Domain Adaptive Code Completion via Language Models and Deco...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Ze Tang Jidong Ge Shangqing Liu Tingwei Zhu Tongtong Xu Liguo Huang Bin Luo National Key Laboratory for Novel Software Technology Nanjing University China Nanyang Technological University Singapore Huawei Software Engineering Application Technology China Department of Computer Science Southern Methodist University USA
Large Language Models (LLMs) have demonstrated remarkable performance in code completion. However, due to the lack of domain-specific knowledge, they may not be optimal in completing code that requires intensive domai...
来源: 评论
A Grouping Strategy-Based Progressive Fusion Network for Hyperspectral Image Super-Resolution
A Grouping Strategy-Based Progressive Fusion Network for Hyp...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guohua Lv Baodong Zhang Yongbiao Gao Guixin Zhao Guotao Wang Juncan Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Shandong Key Laboratory of Ubiquitous Intelligent Computing Jinan China Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Application (Southeast University) Ministry of Education China Beihang University Beijing China
Hyperspectral super-resolution involves combining low-resolution hyperspectral images with high-resolution multispectral images to produce a high-resolution hyperspectral image. Recently, although many methods for hyp... 详细信息
来源: 评论
MyWAL:performance optimization by removing redundant input/output stack in key-value store
收藏 引用
Frontiers of Information technology & Electronic Engineering 2023年 第7期24卷 980-993页
作者: Xiao ZHANG Mengyu LI Michael NGULUBE Yonghao CHEN Yiping ZHAO School of Computer Science Northwestern Polytechnical UniversityXi'an 710072China MIIT Key Laboratory of Big Data Storage and Management Northwestern Polytechnical UniversityXi'an 710072China National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology Northwestern Polytechnical UniversityXi'an 710072China School of Software Northwestern Polytechnical UniversityXi'an 710072China
Based on a log-structured merge(LSM)tree,the key-value(KV)storage system can provide high reading performance and optimize random writing *** is widely used in modern data storage systems like e-commerce,online analyt... 详细信息
来源: 评论
Epidemic Prevention System Based on Voice Recognition Combined with Intelligent Recognition of Mask and Helmet  3
Epidemic Prevention System Based on Voice Recognition Combin...
收藏 引用
3rd International Conference on Video, Signal and Image Processing, VSIP 2021
作者: Zhou, Huaming Wang, Aili Li, Meixin Zhao, Yinghui Iwahori, Yuji Heilongjiang Province Key Laboratory Of Laser Spectroscopy Technology And Application Harbin University Of Science And Technology Heilongjiang Harbin China Department Of Computer Science Chubu University Aichi487-8501 Japan
At present, COVID-19 cross-infection is easy to occur in dense places such as elevators. There are no epidemic prevention measures for construction site elevators on the market, and most of them require manual tempera... 详细信息
来源: 评论
Research on Task Scheduling in Distributed Vulnerability Scanning System  10th
Research on Task Scheduling in Distributed Vulnerability Sca...
收藏 引用
10th International Conference on computer Engineering and Networks, CENet 2020
作者: Jiang, Jie Tang, Sixin College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Network threats caused by system vulnerabilities is increasing gradually, the distributed vulnerability scanning system can scan large-scale and complex networks and report the vulnerability information. Task scheduli... 详细信息
来源: 评论
Multi-Scale Automated Self-Supervised Learning for Recommendation
Multi-Scale Automated Self-Supervised Learning for Recommend...
收藏 引用
Intelligent Management and Software Engineering (IMSE), International Conference on
作者: Yuhang Yan Liqin Tian Yujie Gao School of Computer Science Qinghai Normal University Xining China The State Key Laboratory of Tibetan Intelligent Information Processing and Application Xining China School of Computer North China Institute of Science and Technology Yanjiao China
Automated self-supervised learning frameworks have shown significant results in the recommendation domain. However, existing methods such as AutoCF use graph convolutional networks and graph attention mechanisms that ...
来源: 评论
Personalized Learning Path Recommendation Driven by Multi-Modal Knowledge Graphs and Large Models Collaboration
Personalized Learning Path Recommendation Driven by Multi-Mo...
收藏 引用
Information technology, Communication Ecosystem and Management (ITCEM), International Conference on
作者: Changhua Zhao Yimei Yang Yujun Yang Bo Tang Chunqiao Mi College of Computer and Artificial Intelligence(Software College) Huaihua University Huaihua China Hunan Provincial Key Laboratory of Ecological Agriculture Intelligent Control Technology Huaihua China Key Laboratory of Wuling-Mountain Health Big Data Intelligent Processing and Application in Hunan Province Universities Huaihua Hunan China
This study examines ways to create personalized learning pathways that are influenced by large collaborative models and multi-modal knowledge graphs. By integrating multi-modal data to construct a comprehensive knowle... 详细信息
来源: 评论
Research on Crop Disease and Pest Surveillance based on Big Data and Image Processing Technologies
Research on Crop Disease and Pest Surveillance based on Big ...
收藏 引用
Information technology, Communication Ecosystem and Management (ITCEM), International Conference on
作者: Yimei Yang Yujun Yang Huixia Shu Changhua Zhao Shaowei Deng College of Computer and Artificial Intelligence(Software College) Huaihua University Huaihua China Hunan Provincial Key Laboratory of Ecological Agriculture Intelligent Control Technology Huaihua China Key Laboratory of Wuling-Mountain Health Big Data Intelligent Processing and Application in Hunan Province Universities Huaihua Hunan China
Recently, with the increasing complexity of agricultural systems and climate change, agricultural pest and disease surveillance and early detection have become critical tasks for guaranteeing food stability and promot... 详细信息
来源: 评论
Multi-Domains Personalized Local Differential Privacy Frequency Estimation Mechanism for Utility Optimization
SSRN
收藏 引用
SSRN 2024年
作者: Li, Yunfei Fu, Xiaodong Liu, Li Ding, Jiaman Peng, Wei Jia, Lianyin Faculty of Information Engineering and Automation Kunming University of Science and Technology Kunming650500 China Graduate School Yunnan University of Finance and Economics Kunming650221 China Yunnan Provincial Key Laboratory of Computer Technology Application Kunming University of Science and Technology Kunming650500 China
Local Differential Privacy (LDP) has garnered considerable attention in recent years because it does not rely on trusted third parties and has low interactivity and high operational efficiency. However, current LDP fr... 详细信息
来源: 评论
Power Analysis Attack on a Lightweight Block Cipher GIFT  9th
Power Analysis Attack on a Lightweight Block Cipher GIFT
收藏 引用
9th International Conference on computer Engineering and Networks, CENet2019
作者: Zhang, Jian Li, Lang Li, Qiuping Zhao, Junxia Liang, Xiaoman College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
GIFT is a new lightweight block cipher with smaller area and higher efficiency, which is very suitable for the Internet of Things (IoT) devices with constrained resources. The power analysis attack is an efficient met... 详细信息
来源: 评论