咨询与建议

限定检索结果

文献类型

  • 3,627 篇 期刊文献
  • 2,477 篇 会议
  • 4 册 图书

馆藏范围

  • 6,108 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,819 篇 工学
    • 2,506 篇 计算机科学与技术...
    • 2,033 篇 软件工程
    • 896 篇 信息与通信工程
    • 507 篇 电气工程
    • 475 篇 生物工程
    • 405 篇 控制科学与工程
    • 368 篇 电子科学与技术(可...
    • 283 篇 光学工程
    • 273 篇 生物医学工程(可授...
    • 222 篇 机械工程
    • 202 篇 化学工程与技术
    • 199 篇 仪器科学与技术
    • 139 篇 动力工程及工程热...
    • 134 篇 核科学与技术
    • 133 篇 网络空间安全
    • 130 篇 力学(可授工学、理...
    • 127 篇 交通运输工程
  • 2,866 篇 理学
    • 1,472 篇 物理学
    • 1,040 篇 数学
    • 558 篇 生物学
    • 393 篇 统计学(可授理学、...
    • 263 篇 化学
    • 158 篇 地球物理学
    • 138 篇 系统科学
  • 884 篇 管理学
    • 497 篇 管理科学与工程(可...
    • 435 篇 图书情报与档案管...
    • 150 篇 工商管理
  • 246 篇 医学
    • 215 篇 临床医学
    • 173 篇 基础医学(可授医学...
    • 124 篇 药学(可授医学、理...
  • 129 篇 法学
  • 65 篇 经济学
  • 63 篇 农学
  • 35 篇 教育学
  • 19 篇 文学
  • 13 篇 军事学
  • 10 篇 艺术学
  • 1 篇 哲学

主题

  • 228 篇 bosons
  • 186 篇 feature extracti...
  • 153 篇 hadron colliders
  • 146 篇 semantics
  • 142 篇 training
  • 128 篇 deep learning
  • 126 篇 computational mo...
  • 119 篇 accuracy
  • 117 篇 data models
  • 92 篇 federated learni...
  • 77 篇 machine learning
  • 76 篇 neural networks
  • 72 篇 convolution
  • 68 篇 predictive model...
  • 65 篇 data mining
  • 65 篇 robustness
  • 64 篇 photons
  • 59 篇 deep neural netw...
  • 59 篇 generative adver...
  • 59 篇 optimization

机构

  • 896 篇 yerevan physics ...
  • 875 篇 centro brasileir...
  • 851 篇 university of de...
  • 849 篇 charles universi...
  • 844 篇 department of ph...
  • 822 篇 institute rudjer...
  • 816 篇 university of so...
  • 804 篇 helsinki institu...
  • 795 篇 academy of scien...
  • 789 篇 rwth aachen univ...
  • 786 篇 university of cy...
  • 777 篇 institute of hig...
  • 771 篇 university of sp...
  • 767 篇 indian institute...
  • 758 篇 national and kap...
  • 747 篇 ghent university...
  • 743 篇 infn sezione di ...
  • 743 篇 deutsches elektr...
  • 742 篇 vrije universite...
  • 739 篇 panjab universit...

作者

  • 585 篇 lowette s.
  • 584 篇 waltenberger w.
  • 530 篇 tavernier s.
  • 506 篇 lemaitre v.
  • 502 篇 adam w.
  • 500 篇 skovpen k.
  • 500 篇 schieck j.
  • 498 篇 sznajder a.
  • 496 篇 tytgat m.
  • 491 篇 vannerom d.
  • 488 篇 tumasyan a.
  • 481 篇 alves g.a.
  • 472 篇 delaere c.
  • 471 篇 jeitler m.
  • 465 篇 van mechelen p.
  • 464 篇 giammanco a.
  • 452 篇 moraes a.
  • 449 篇 carvalho w.
  • 440 篇 delcourt m.
  • 439 篇 wulz c.-e.

语言

  • 4,808 篇 英文
  • 1,214 篇 其他
  • 112 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Network Data Science and Technology Institute of Computing Technology"
6108 条 记 录,以下是101-110 订阅
排序:
Temporal Knowledge Graph Question Answering: A Survey
arXiv
收藏 引用
arXiv 2024年
作者: Su, Miao Li, Zixuan Chen, Zhuo Bai, Long Jin, Xiaolong Guo, Jiafeng CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
Knowledge Base Question Answering (KBQA) has been a long-standing field to answer questions based on knowledge bases. Recently, the evolving dynamics of knowledge have attracted a growing interest in Temporal Knowledg... 详细信息
来源: 评论
Tolerance-based Elite Mutation Firefly Algorithm
Journal of Network Intelligence
收藏 引用
Journal of network Intelligence 2023年 第4期8卷 1406-1425页
作者: Chen, Juan Zeng, Ren-Xian Qiu, Shen-Yu Kang, Ping Zhao, Jia School of Information Engineering Nanchang Institute of Technology Nanchang Key Laboratory of IoT Perception and Collaborative Computing for Smart City China School of Information Engineering Nanchang Institute of Technology China College of Science Nanchang Institute of Technology China
For the firefly algorithm in the solution of complex functions are prone to low accuracy and "premature" phenomenon. In this paper, we propose a tolerance-based elite mutation firefly algorithm (MOFA-TEM). T... 详细信息
来源: 评论
AutoQNN: An End-to-End Framework for Automatically Quantizing Neural networks
收藏 引用
Journal of Computer science & technology 2024年 第2期39卷 401-420页
作者: 龚成 卢冶 代素蓉 邓倩 杜承昆 李涛 College of Software Nankai UniversityTianjin 300350China College of Computer Science Nankai UniversityTianjin 300350China State Key Laboratory of Processors Institute of Computing TechnologyChinese Academy of Sciences Beijing 100190China
Exploring the expected quantizing scheme with suitable mixed-precision policy is the key to compress deep neural networks(DNNs)in high efficiency and *** exploration implies heavy workloads for domain experts,and an a... 详细信息
来源: 评论
A Sharding Scheme Based on Graph Partitioning Algorithm for Public Blockchain
收藏 引用
Computer Modeling in Engineering & sciences 2024年 第6期139卷 3311-3327页
作者: Shujiang Xu Ziye Wang Lianhai Wang Miodrag J.Mihaljevi′c Shuhui Zhang Wei Shao Qizheng Wang Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan250014China Mathematical Institute The Serbian Academy of Sciences and ArtsBelgrade11000Serbia
Blockchain technology,with its attributes of decentralization,immutability,and traceability,has emerged as a powerful catalyst for enhancing traditional industries in terms of optimizing business ***,transaction perfo... 详细信息
来源: 评论
KnowCoder: Coding Structured Knowledge into LLMs for Universal Information Extraction
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zixuan Zeng, Yutao Zuo, Yuxin Ren, Weicheng Liu, Wenxuan Su, Miao Guo, Yucan Liu, Yantao Li, Xiang Hu, Zhilei Bai, Long Li, Wei Liu, Yidan Yang, Pan Jin, Xiaolong Guo, Jiafeng Cheng, Xueqi CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China
In this paper, we propose KnowCoder, a Large Language Model (LLM) to conduct Universal Information Extraction (UIE) via code generation. KnowCoder aims to develop a kind of unified schema representation that LLMs can ... 详细信息
来源: 评论
Type-Representation Enhanced Event Detection via Structure Encoder  1
Type-Representation Enhanced Event Detection via Structure E...
收藏 引用
1st IEEE International Conference on Medical Artificial Intelligence, MedAI 2023
作者: Feng, Yuming Huang, Linmeng Liang, Haozhe Jin, Xiaolong Guan, Saiping Guo, Jiafeng School of Computer Science and Technology University of Chinese Academy of Sciences China Institute of Computing Technology Chinese Academy of Sciences Key Lab of Network Data Science and Technology China Institute of Systems Engineering Academy of Military Science Beijing China
Event detection, aiming to detect whether a sentence contains the type of events of interest, is one of the important tasks in information Extraction. There exist many methods for event detection, which usually treat ... 详细信息
来源: 评论
Provably Secure Efficient key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 21784-21792页
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J. F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Douliu64002 Taiwan King Saud University College of Computer and Information Sciences Department of Computer Engineering Riyadh12311 Saudi Arabia International Institute of Information Technology Hyderabad Center for Security Theory and Algorithmic Research Hyderabad500032 India Korea University College of Informatics Department of Computer Science and Engineering Seoul02841 Korea Republic of Key Laboratory of Computing Power Network and Information Security Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Ministry of Education Shandong Computer Science Center Jinan250353 China
Intelligent supply line surveillance is critical for modern smart grids (SGs). Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data conti... 详细信息
来源: 评论
Discriminative feature encoding for intrinsic image decomposition
收藏 引用
Computational Visual Media 2023年 第3期9卷 597-618页
作者: Zongji Wang Yunfei Liu Feng Lu Key Laboratory of Network Information System Technology(NIST) Aerospace Information Research InstituteChinese Academy of SciencesBeijing 100190China State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and EngineeringBeihang UniversityBeijing 100191China Peng Cheng Laboratory Shenzhen 518000China
Intrinsic image decomposition is an important and long-standing computer vision *** an input image,recovering the physical scene properties is *** physically motivated priors have been used to restrict the solution sp... 详细信息
来源: 评论
CausalDiff: causality-inspired disentanglement via diffusion model for adversarial defense  24
CausalDiff: causality-inspired disentanglement via diffusion...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Mingkun Zhang Keping Bi Wei Chen Quanrun Chen Jiafeng Guo Xueqi Cheng CAS Key Laboratory of AI Safety Institute of Computing Technology CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology CAS School of Statistics University of International Business and Economics
Despite ongoing efforts to defend neural classifiers from adversarial attacks, they remain vulnerable, especially to unseen attacks. In contrast, humans are difficult to be cheated by subtle manipulations, since we ma...
来源: 评论
GoPIM: GCN-Oriented Pipeline Optimization for PIM Accelerators  31
GoPIM: GCN-Oriented Pipeline Optimization for PIM Accelerato...
收藏 引用
31st IEEE International Symposium on High Performance Computer Architecture, HPCA 2025
作者: Yang, Siling He, Shuibing Wang, Wenjiong Yin, Yanlong Wu, Tong Chen, Weijian Zhang, Xuechen Sun, Xian-He Feng, Dan The State Key Laboratory of Blockchain and Data Security Zhejiang University China Zhejiang Lab China Institute of Blockchain and Data Security China Zhejiang Key Laboratory of Big Data Intelligent Computing China Washington State University Vancouver United States Illinois Institute of Technology United States Huazhong University of Science and Technology China Wuhan National Laboratory for Optoelectronics China
Graph convolutional networks (GCNs) are popular for a variety of graph learning tasks. ReRAM-based processing-in-memory (PIM) accelerators are promising to expedite GCN training owing to their in-situ computing capabi... 详细信息
来源: 评论