咨询与建议

限定检索结果

文献类型

  • 1,088 篇 会议
  • 719 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,810 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,149 篇 工学
    • 747 篇 计算机科学与技术...
    • 553 篇 软件工程
    • 214 篇 信息与通信工程
    • 155 篇 控制科学与工程
    • 140 篇 电子科学与技术(可...
    • 124 篇 电气工程
    • 106 篇 机械工程
    • 87 篇 生物工程
    • 51 篇 材料科学与工程(可...
    • 50 篇 光学工程
    • 46 篇 化学工程与技术
    • 45 篇 仪器科学与技术
    • 44 篇 交通运输工程
    • 43 篇 生物医学工程(可授...
    • 39 篇 网络空间安全
    • 37 篇 动力工程及工程热...
    • 25 篇 安全科学与工程
  • 563 篇 理学
    • 314 篇 数学
    • 120 篇 物理学
    • 108 篇 生物学
    • 87 篇 统计学(可授理学、...
    • 82 篇 系统科学
    • 37 篇 化学
  • 304 篇 管理学
    • 202 篇 管理科学与工程(可...
    • 113 篇 图书情报与档案管...
    • 64 篇 工商管理
  • 50 篇 医学
    • 42 篇 临床医学
    • 31 篇 基础医学(可授医学...
  • 41 篇 法学
    • 33 篇 社会学
  • 23 篇 经济学
    • 23 篇 应用经济学
  • 17 篇 农学
  • 10 篇 教育学
  • 3 篇 军事学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 70 篇 computer archite...
  • 51 篇 laboratories
  • 47 篇 feature extracti...
  • 38 篇 hardware
  • 37 篇 delay
  • 36 篇 costs
  • 35 篇 bandwidth
  • 35 篇 training
  • 33 篇 protocols
  • 32 篇 computational mo...
  • 31 篇 grid computing
  • 29 篇 optimization
  • 29 篇 servers
  • 28 篇 throughput
  • 28 篇 virtual machinin...
  • 27 篇 kernel
  • 26 篇 cloud computing
  • 25 篇 computer science
  • 25 篇 accuracy
  • 24 篇 resource managem...

机构

  • 97 篇 tianjin key labo...
  • 88 篇 key laboratory o...
  • 85 篇 key laboratory o...
  • 76 篇 key laboratory o...
  • 73 篇 department of co...
  • 71 篇 key laboratory o...
  • 50 篇 services computi...
  • 46 篇 the key laborato...
  • 41 篇 national enginee...
  • 41 篇 institute of com...
  • 40 篇 school of comput...
  • 40 篇 key laboratory o...
  • 37 篇 school of cyber ...
  • 35 篇 key laboratory o...
  • 32 篇 university of ch...
  • 31 篇 graduate univers...
  • 30 篇 key laboratory o...
  • 29 篇 chinese academy ...
  • 27 篇 national enginee...
  • 27 篇 shandong provinc...

作者

  • 127 篇 hai jin
  • 46 篇 xiaowei li
  • 44 篇 jin hai
  • 31 篇 zhou mengchu
  • 27 篇 huawei li
  • 25 篇 zhang hua
  • 25 篇 changjun jiang
  • 23 篇 xiaofei liao
  • 23 篇 li xiaowei
  • 22 篇 deqing zou
  • 21 篇 yu hu
  • 20 篇 shen linlin
  • 20 篇 song wu
  • 20 篇 wang chundong
  • 19 篇 xiao yingyuan
  • 18 篇 hu shengshan
  • 16 篇 cheng wang
  • 16 篇 jiang changjun
  • 16 篇 yinhe han
  • 15 篇 r. takahashi

语言

  • 1,671 篇 英文
  • 82 篇 中文
  • 62 篇 其他
检索条件"机构=Key Laboratory of Services Computing Technology and System"
1810 条 记 录,以下是621-630 订阅
排序:
Optical Remote Sensing Image Understanding with Weak Supervision: Concepts, Methods, and Perspectives
arXiv
收藏 引用
arXiv 2022年
作者: Yue, Jun Fang, Leyuan Ghamisi, Pedram Xie, Weiying Li, Jun Chanussot, Jocelyn Plaza, Antonio The Department of Geomatics Engineering Changsha University of Science and Technology Changsha410114 China The College of Electrical and Information Engineering Hunan University Changsha410082 China The Peng Cheng Laboratory Shenzhen518000 China Helmholtz Institute Freiberg for Resource Technology Freiberg09599 Germany Vienna1030 Austria The State Key Laboratory of Integrated Services Networks Xidian University Xi'An710071 China The Guangdong Provincial Key Laboratory of Urbanization and Geo-Simulation School of Geography and Planning Sun Yat-Sen University Guangzhou510275 China Université Grenoble Alpes Inria CNRS Grenoble INP LJK Grenoble38000 France The Hyperspectral Computing Laboratory Department of Technology of Computers and Communications University of Extremadura Cáceres10003 Spain
In recent years, supervised learning has been widely used in various tasks of optical remote sensing image understanding, including remote sensing image classification, pixel-wise segmentation, change detection, and o... 详细信息
来源: 评论
Global µ-stability and finite-time control of octonion-valued neural networks with unbounded delays✡
arXiv
收藏 引用
arXiv 2020年
作者: Wang, Jingzhu Liu, Xiwei Department of Computer Science and Technology Tongji University Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China
Octonion-valued neural networks (OVNNs) are a type of neural networks for which the states and weights are octonions. In this paper, the global µ-stability and finite-time stability problems for octonion-valued n... 详细信息
来源: 评论
Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Granular Balls
arXiv
收藏 引用
arXiv 2025年
作者: Gao, Can Tan, Xiaofeng Zhou, Jie Ding, Weiping Pedrycz, Witold The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen518060 China The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China The School of Artificial Intelligence and Computer Science Nantong University Nantong226019 China The Faculty of Data Science City University of Macau Macau999078 China The Department of Electrical and Computer Engineering University of Alberta Edmonton Canada Systems Research Institute Polish Academy of Sciences Warsaw Poland The Department of Electrical and Computer Engineering King Abdulaziz University Jeddah Saudi Arabia The Department of Computer Engineering Istinye University Istanbul Turkey
Outlier detection refers to the identification of anomalous samples that deviate significantly from the distribution of normal data and has been extensively studied and used in a variety of practical tasks. However, m... 详细信息
来源: 评论
Quantum machine learning of eco-environmental surfaces
收藏 引用
科学通报(英文版) 2022年 第10期67卷 1031-1033页
作者: Tianxiang Yue Yi Liu Zhengping Du John Wilson Dongyi Zhao Yu Wang Na Zhao Wenjiao Shi Zemeng Fan Xiaomin Zhao Qin Zhang Hongsheng Huang Qingyuan Wu Wei Zhou Yimeng Jiao Zhe Xu Saibo Li Yang Yang Bojie Fu State Key Laboratory of Resources and Environment Information System Institute of Geographic Sciences and Natural Resources ResearchChinese Academy of SciencesBeijing 100101China College of Resources and Environment University of Chinese Academy of SciencesBeijing 100190China College of Land Resources and Environment Jiangxi Agricultural UniversityNanchang 330045China Jiangsu Center for Collaborative Innovation in Geographical Information Resource Development and Application Nanjing 210023China State Key Laboratory of Resources and Environment Information System Institute of Geographic Sciences and Natural Resources ResearchChinese Academy of SciencesBeijing 100101China College of Resources and Environment University of Chinese Academy of SciencesBeijing 100190China State Key Laboratory of Resources and Environment Information System Institute of Geographic Sciences and Natural Resources ResearchChinese Academy of SciencesBeijing 100101China State Key Laboratory of Resources and Environment Information System Institute of Geographic Sciences and Natural Resources ResearchChinese Academy of SciencesBeijing 100101China College of Resources and Environment University of Chinese Academy of SciencesBeijing 100190China Spatial Sciences Institute University of Southern CaliforniaLos AngelesCA 90089-0374USA Origin Quantum Computing Technology Company Limited Hefei 230093China Yanqi Lake Beijing Institute of Mathematical Sciences and Applications Beijing 101408China College of Land Resources and Environment Jiangxi Agricultural UniversityNanchang 330045China Monitoring Station for Weather and Eco-Environment of WuGong Mountain Pingxiang 337000China School of Geographical Sciences Southwest UniversityChongqing 400715China Research Center for Eco-Environmental Sciences Chinese Academy of SciencesBeijing 100085China Faculty of Geographical Science Beijing Normal UniversityBeijing 100875China
The computer advances of the past century can be traced to the increase in their numbers on chips that has accompanied the miniaturization of ***,computers are nearing the fundamental limits of such miniaturization[1]...
来源: 评论
Learning from pseudo lesion: A self-supervised framework for covid-19 diagnosis
arXiv
收藏 引用
arXiv 2021年
作者: Li, Zhongliang Jin, Zhihao Li, Xuechen Shen, Linlin Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China
The Coronavirus disease 2019 (COVID-19) has rapidly spread all over the world since its first report in December 2019 and thoracic computed tomography (CT) has become one of the main tools for its diagnosis. In recent... 详细信息
来源: 评论
Android Malware Detection Based on Sensitive Permissions and APIs  2nd
Android Malware Detection Based on Sensitive Permissions and...
收藏 引用
2nd EAI International Conference on Security and Privacy in New computing Environments, SPNCE 2019
作者: Zhao, Chunhui Wang, Chundong Zheng, Wenbai Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Ministry of Education Tianjin University of Technology Tianjin300384 China
With the widespread use of the Android operating system, the number of applications based on the Android platform is growing. How to effectively identify malware is critical to the security of phones. This paper propo... 详细信息
来源: 评论
Modeling and analysis of three properties of mobile interactive systems based on variable Petri nets
arXiv
收藏 引用
arXiv 2021年
作者: Yang, Ru Ding, Zhijun Jiang, Changjun Zhou, MengChu The Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University The Department of Computer Science and Technology Tongji University Shanghai201804 China The Institute of Systems Engineering Macau University of Science and Technology 999078 China The Department of Electrical and Computer Engineering New Jersey Institute of Technology NewarkNJ07102 United States
Due to the mobility and frequent disconnections, the correctness of mobile interaction systems, such as mobile robot systems and mobile payment systems, are often difficult to analyze. This paper introduces three crit... 详细信息
来源: 评论
A new method of mobile Ad Hoc network routing based on improved GF strategy  3
A new method of mobile Ad Hoc network routing based on impro...
收藏 引用
3rd IEEE International Conference on Smart Internet of Things, SmartIoT 2019
作者: Li, Ke Zhang, De-Gan Qiu, Jian-Ning Chen, Lu Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin300384 China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education Tianjin China
We propose a new mobile ad hoc network routing method based on improved GF (greedy forwarding) strategy in this paper. In the greedy forwarding phase, the reliable communication area is calculated, and then the qualit... 详细信息
来源: 评论
Learnable Bag Similarity Based Deep Multi-Instance Network for Breast Cancer Diagnosis
Learnable Bag Similarity Based Deep Multi-Instance Network f...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Rui Cheng Liming Yuan Haixia Xu Zhenliang Li Xianbin Wen School of Computer Science and Engineering Tianjin University of Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China
Computer-aided diagnosis for breast cancer is an important and challenging research problem in medical image analysis. The main difficulty lies in that only image-level labels rather than fine-grained patch-level labe... 详细信息
来源: 评论
Deep Multi-Instance Learning with Induced Self-Attention for Medical Image Classification
Deep Multi-Instance Learning with Induced Self-Attention for...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Zhenliang Li Liming Yuan Haixia Xu Rui Cheng Xianbin Wen School of Computer Science and Engineering Tianjin University of Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China
Existing Multi-Instance learning (MIL) methods for medical image classification typically segment an image (bag) into small patches (instances) and learn a classifier to predict the label of an unknown bag. Most of su... 详细信息
来源: 评论