咨询与建议

限定检索结果

文献类型

  • 2,076 篇 期刊文献
  • 1,296 篇 会议
  • 3 册 图书

馆藏范围

  • 3,375 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,198 篇 工学
    • 1,204 篇 计算机科学与技术...
    • 987 篇 软件工程
    • 328 篇 信息与通信工程
    • 300 篇 电气工程
    • 292 篇 电子科学与技术(可...
    • 262 篇 控制科学与工程
    • 217 篇 生物工程
    • 214 篇 化学工程与技术
    • 178 篇 材料科学与工程(可...
    • 174 篇 光学工程
    • 142 篇 机械工程
    • 137 篇 生物医学工程(可授...
    • 109 篇 力学(可授工学、理...
    • 101 篇 网络空间安全
    • 95 篇 仪器科学与技术
    • 95 篇 动力工程及工程热...
    • 63 篇 交通运输工程
    • 54 篇 安全科学与工程
  • 1,751 篇 理学
    • 849 篇 物理学
    • 764 篇 数学
    • 243 篇 生物学
    • 229 篇 统计学(可授理学、...
    • 223 篇 化学
    • 142 篇 系统科学
    • 94 篇 地球物理学
  • 393 篇 管理学
    • 244 篇 管理科学与工程(可...
    • 157 篇 图书情报与档案管...
    • 67 篇 工商管理
  • 95 篇 医学
    • 77 篇 临床医学
    • 64 篇 基础医学(可授医学...
  • 54 篇 法学
  • 28 篇 经济学
  • 23 篇 农学
  • 18 篇 军事学
  • 15 篇 教育学
  • 6 篇 文学
  • 3 篇 艺术学

主题

  • 65 篇 feature extracti...
  • 57 篇 deep learning
  • 56 篇 semantics
  • 52 篇 training
  • 50 篇 machine learning
  • 29 篇 network security
  • 28 篇 cosmic rays
  • 28 篇 security
  • 27 篇 cryptography
  • 26 篇 neural networks
  • 26 篇 computational mo...
  • 24 篇 software
  • 21 篇 conferences
  • 21 篇 optimization
  • 21 篇 data models
  • 20 篇 data mining
  • 20 篇 graph neural net...
  • 20 篇 algorithm design...
  • 20 篇 malware
  • 20 篇 forecasting

机构

  • 623 篇 state key labora...
  • 176 篇 school of comput...
  • 129 篇 key laboratory o...
  • 117 篇 university of ch...
  • 110 篇 university of sc...
  • 99 篇 hebei normal uni...
  • 98 篇 tianfu cosmic ra...
  • 98 篇 state key labora...
  • 94 篇 yunnan observato...
  • 89 篇 school of physic...
  • 87 篇 department of ph...
  • 83 篇 key laboratory f...
  • 83 篇 center for astro...
  • 80 篇 college of physi...
  • 78 篇 school of physic...
  • 77 篇 institute of fro...
  • 76 篇 school of physic...
  • 73 篇 national space s...
  • 71 篇 moscow institute...
  • 67 篇 national astrono...

作者

  • 81 篇 axikegu
  • 79 篇 zheng wei-shi
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 76 篇 jiang k.
  • 75 篇 bastieri d.
  • 71 篇 liu d.
  • 70 篇 kuleshov d.
  • 69 篇 li cheng
  • 69 篇 danzengluobu
  • 68 篇 chen m.j.
  • 68 篇 liu s.m.
  • 68 篇 huang d.h.
  • 68 篇 dai h.l.
  • 67 篇 guo y.q.
  • 66 篇 li xin
  • 65 篇 bao y.w.
  • 65 篇 hu h.b.
  • 65 篇 liu b.
  • 62 篇 min z.

语言

  • 2,791 篇 英文
  • 523 篇 其他
  • 70 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Mathematical Engineering and Advanced Computing"
3375 条 记 录,以下是651-660 订阅
排序:
AIoT-Enabled Data Management for Smart Agriculture: A Comprehensive Review on Emerging Technologies
收藏 引用
IEEE Access 2025年 13卷 102964-102993页
作者: Xu Luo Shuming Xiong Xiangchen Jia Yu Zeng Xiao Chen School of Computer Science and Communication Engineering Jiangsu University Zhenjiang Jiangsu China Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace Jiangsu University Zhenjiang Jiangsu China School of Mathematical Science Jiangsu University Zhenjiang Jiangsu China School of Computing and Mathematical Sciences University of Leicester Leicester U.K.
The deep integration of artificial intelligence (AI) and Internet of Things (IoT) technologies has promoted the application of Artificial Intelligence of Things (AIoT) in smart agriculture, driving substantial transfo... 详细信息
来源: 评论
DiffuVolume: Diffusion Model for Volume based Stereo Matching
arXiv
收藏 引用
arXiv 2023年
作者: Zheng, Dian Wu, Xiao-Ming Liu, Zuhao Meng, Jingke Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University China Key Laboratory of MachineIntelligence and Advanced Computing Ministry of Education China
Stereo matching is a significant part in many computer vision tasks and driving-based applications. Recently cost volume-based methods have achieved great success benefiting from the rich geometry information in paire... 详细信息
来源: 评论
ID-Guard: A Universal Framework for Combating Facial Manipulation via Breaking Identification
arXiv
收藏 引用
arXiv 2024年
作者: Qu, Zuomin Lu, Wei Luo, Xiangyang Wang, Qian Cao, Xiaochun School of Computer Science and Engineering Ministry of Education Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China School of Cyber Science and Engineering Wuhan University Wuhan430072 China School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University Shenzhen518107 China
The misuse of deep learning-based facial manipulation poses a significant threat to civil rights. To prevent this fraud at its source, proactive defense has been proposed to disrupt the manipulation process by adding ... 详细信息
来源: 评论
mathematical modeling of intelligent RGV simulation scheduling system based on simulated annealing algorithm
Mathematical modeling of intelligent RGV simulation scheduli...
收藏 引用
International Symposium on Computational Intelligence and Design, ISCID
作者: Benchao Yang Hongchuan Zhou Jiaqi Liu State Key Laboratory of Mathematical Engineering and advanced computing Information Engineering University Zhengzhou China
By establishing a mathematical model, the intelligent RGV scheduling scheme is optimized to design an efficient and stable intelligent RGV simulation scheduling system. This paper studies two different situations, inc... 详细信息
来源: 评论
Interpolated multiple t-values of general level with fixed weight, depth and height
arXiv
收藏 引用
arXiv 2025年
作者: Li, Zhonghua Wang, Zhenlu School of Mathematical Sciences Key Laboratory of Intelligent Computing and Applications Ministry of Education Tongji University Shanghai200092 China School of Electronics and Information Engineering Taizhou University Zhejiang Taizhou318000 China
In this paper, we introduce the interpolated multiple t-values of general level and represent a generating function for sums of interpolated multiple t-values of general level with fixed weight, depth, and height in t... 详细信息
来源: 评论
A LOCALLY MASS-CONSERVATIVE ENRICHED PETROV-GALERKIN METHOD WITHOUT PENALTY FOR THE DARCY FLOW IN POROUS MEDIA
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Huangxin Dong, Piaopiao Sun, Shuyu Wang, Zixuan School of Mathematical Sciences Fujian Provincial Key Laboratory on Mathematical Modeling and High Performance Scientific Computing Xiamen University Fujian361005 China Computational Transport Phenomena Laboratory Division of Physical Science and Engineering King Abdullah University of Science and Technology Thuwal Saudi Arabia
In this work we present an enriched Petrov-Galerkin (EPG) method for the simulation of the Darcy flow in porous media. The new method enriches the approximation trial space of the conforming continuous Galerkin (CG) m... 详细信息
来源: 评论
Approximate k-Nearest Neighbor Query over Spatial Data Federation  28th
Approximate k-Nearest Neighbor Query over Spatial Data Fede...
收藏 引用
28th International Conference on Database Systems for advanced Applications, DASFAA 2023
作者: Zhang, Kaining Tong, Yongxin Shi, Yexuan Zeng, Yuxiang Xu, Yi Chen, Lei Zhou, Zimu Xu, Ke Lv, Weifeng Zheng, Zhiming State Key Laboratory of Software Development Environment Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing School of Computer Science and Engineering and Institute of Artificial Intelligence Beihang University Beijing China Department of Computer Science and Engineering HKUST Hong Kong Guangzhou China City University of Hong Kong Hong Kong
Approximate nearest neighbor query is a fundamental spatial query widely applied in many real-world applications. In the big data era, there is an increasing demand to scale these queries over a spatial data federatio... 详细信息
来源: 评论
PRET: Planning with Directed Fidelity Trajectory for Vision and Language Navigation
arXiv
收藏 引用
arXiv 2024年
作者: Lu, Renjie Meng, Jingke Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Peng Cheng Laboratory Shenzhen China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou China
Vision and language navigation is a task that requires an agent to navigate according to a natural language instruction. Recent methods predict sub-goals on constructed topology map at each step to enable long-term ac... 详细信息
来源: 评论
THE Furnace temperature curve based on one-dimensional unsteady heat conduction model
THE Furnace temperature curve based on one-dimensional unste...
收藏 引用
International Symposium on Computational Intelligence and Design, ISCID
作者: Jiaqi Liu Hongchuan Zhou Benchao Yang State Key Laboratory of Mathematical Engineering and advanced computing Information Engineering University Zhengzhou China
This paper mainly studies the change rule of center temperature of welding zone in backwelding furnace under different set temperature and transfer rate conditions, and searches for appropriate temperature and rate to... 详细信息
来源: 评论
Safe Reinforcement Learning for Social Motor Coordination in Two Dimensional Space  26
Safe Reinforcement Learning for Social Motor Coordination in...
收藏 引用
26th International Conference on Industrial Technology, ICIT 2025
作者: Yang, Fan Huang, Yuening Zhai, Chao Zhang, Hehong China University of Geosciences School of Automation Wuhan Campus China Hubei Key Laboratory of Advanced Control and Intelligent Automation for Complex Systems China Engineering Research Center of Intelligent Technology for Geo-Exploration Ministry of Education Wuhan China Rice University George R. Brown School of Engineering and Computing HoustonTX United States Fuzhou University School of Computer and Data Science Fuzhou China
This paper presents an interactive motion control method based on reinforcement learning, designed to assist children with autism who have social motor impairments through a mirror game intervention. The virtual teach... 详细信息
来源: 评论