咨询与建议

限定检索结果

文献类型

  • 860 篇 会议
  • 800 篇 期刊文献

馆藏范围

  • 1,660 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,095 篇 工学
    • 692 篇 计算机科学与技术...
    • 588 篇 软件工程
    • 234 篇 信息与通信工程
    • 135 篇 控制科学与工程
    • 135 篇 生物工程
    • 118 篇 电气工程
    • 106 篇 电子科学与技术(可...
    • 96 篇 光学工程
    • 90 篇 核科学与技术
    • 79 篇 机械工程
    • 76 篇 生物医学工程(可授...
    • 53 篇 仪器科学与技术
    • 50 篇 化学工程与技术
    • 43 篇 材料科学与工程(可...
    • 34 篇 动力工程及工程热...
    • 33 篇 网络空间安全
    • 31 篇 交通运输工程
    • 29 篇 土木工程
  • 708 篇 理学
    • 330 篇 物理学
    • 281 篇 数学
    • 147 篇 生物学
    • 93 篇 统计学(可授理学、...
    • 52 篇 化学
    • 41 篇 系统科学
  • 265 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 126 篇 图书情报与档案管...
    • 42 篇 工商管理
  • 63 篇 医学
    • 49 篇 临床医学
    • 44 篇 基础医学(可授医学...
  • 41 篇 法学
    • 35 篇 社会学
  • 20 篇 经济学
  • 20 篇 教育学
  • 19 篇 农学
  • 9 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 100 篇 hadron colliders
  • 47 篇 deep learning
  • 37 篇 semantics
  • 33 篇 feature extracti...
  • 32 篇 training
  • 29 篇 w & z bosons
  • 28 篇 higgs bosons
  • 26 篇 data mining
  • 24 篇 computational mo...
  • 22 篇 graph neural net...
  • 21 篇 machine learning
  • 20 篇 accuracy
  • 20 篇 data models
  • 18 篇 object detection
  • 18 篇 convolutional ne...
  • 17 篇 convolution
  • 16 篇 semantic segment...
  • 16 篇 relativistic hea...
  • 16 篇 computer vision
  • 16 篇 forecasting

机构

  • 140 篇 irfu cea univers...
  • 133 篇 yerevan physics ...
  • 130 篇 national and kap...
  • 130 篇 centro brasileir...
  • 130 篇 istanbul technic...
  • 128 篇 university of sp...
  • 128 篇 indian institute...
  • 127 篇 universidad iber...
  • 126 篇 brunel universit...
  • 126 篇 charles universi...
  • 125 篇 università di to...
  • 125 篇 academy of scien...
  • 125 篇 infn sezione di ...
  • 124 篇 department of ph...
  • 123 篇 zhejiang univers...
  • 122 篇 infn sezione di ...
  • 122 篇 department of ph...
  • 121 篇 imperial college...
  • 121 篇 university of de...
  • 119 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 1,549 篇 英文
  • 78 篇 其他
  • 35 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory on Computer Technology Application"
1660 条 记 录,以下是1631-1640 订阅
排序:
Research on passage retrieval in Chinese question answering system
收藏 引用
Journal of Computational Information Systems 2007年 第6期3卷 2367-2373页
作者: Yu, Zhengtao Han, Lu Wan, Zhou Xiang, Fenghong Mao, Cunli Guo, Jianyi School of Information Engineering and Automation Kunming University of Science and Technology Kunming 650051 China Computer Technology Application Key Laboratory of Yunnan Province Institute of Intelligent Information Processing Kunming 650051 China
In Chinese Question Answering System, in order to improve the accuracy of the passage retrieval which includes answers, this paper presents a method to compute the weight of passage based on the analysis of current pa... 详细信息
来源: 评论
Answer extracting based on pattern learning and pattern matching in Chinese question answering system
收藏 引用
Journal of Computational Information Systems 2007年 第3期3卷 957-964页
作者: Yu, Zhengtao Han, Lu Mao, Cunli Deng, Jinhui Zhang, Cheng School of Information Engineering and Automation Kunming University of Science and Technology Kunming 650051 China Computer Technology Application Key Laboratory of Yunnan Province Institute of Intelligent Information Processing Kunming 650051 China
In the Chinese question answering system, the answer extraction is generally realized by extracting answers from answer sentence pattern which is corresponded to the question. But the extraction of answer sentence pat... 详细信息
来源: 评论
Interpolatory subdivision scheme for triangular meshes with bounded curvature
收藏 引用
Journal of Information and Computational Science 2007年 第2期4卷 597-608页
作者: Ling, Ruotian Luo, Xiaonan Zheng, Guifeng Chen, Ren She, Xieyuan Computer Application Institute Sun Yat-Sen University Guangzhou 510275 China Guangdong Key Laboratory of Common Technology in Software Guangdong Software Science Park Guangzhou 510663 China
This paper proposes a new interpolatory subdivision scheme for triangular meshes with arbitrary topology. This scheme generates C1-continuous limit surfaces with bounded curvature property, which leads to improved qua... 详细信息
来源: 评论
Self-adjusting predicted particle swarm optimization
收藏 引用
Journal of Information and Computational Science 2007年 第2期4卷 483-496页
作者: Cui, Zhihua Zeng, Jianchao Sun, Guoji State Key Laboratory for Manufacturing Systems Engineering Xi'an Jiaotong University Xi'an 710049 China Division of System Simulation and Computer Application Taiyuan University of Science and Technology Taiyuan 030024 China
Predicted particle swarm optimization is an enhanced version aiming to increase the utilization ratio of velocity information, and the performance heavily relies upon the parameters settings. According to control theo... 详细信息
来源: 评论
MPUS: A scalable parallel simulator for RedNeurons parallel computer (work-in-progress)  2
MPUS: A scalable parallel simulator for RedNeurons parallel ...
收藏 引用
2nd International Conference on Scalable Information Systems, InfoScale 2007
作者: Hui, Li Junming, Wu Guoliang, Chen Xiufeng, Sui Department of Computer Science and Technology Anhui Province Co-Key Laboratory of High Performance Computing and Application University of Science and Technology of China China
In this paper, we present a scalable parallel simulator - MPUS - for verifying the design of our next generation high performance parallel computer - RedNeurons(RN) parallel computer. The RedNeurons parallel computer ... 详细信息
来源: 评论
A novel virtual anchor node-based localization algorithm for wireless sensor networks
A novel virtual anchor node-based localization algorithm for...
收藏 引用
6th International Conference on Networking, ICN'07
作者: Liu, Pengxi Zhang, Xinming Tian, Shuang Zhao, Zhiwei Sun, Peng Department of Computer Science and Technology University of Science and Technology of China MOST Co-Key Laboratory of High Performance Computing and Its Application Anhui Province Hefei 230027 China
The accuracy of localization is a significant criterion to evaluate the practical utility of localization algorithm in wireless sensor networks. In mostly localization algorithms, one of the main methods to improve lo... 详细信息
来源: 评论
A practical low interference topology control for mobile ad hoc networks
A practical low interference topology control for mobile ad ...
收藏 引用
6th International Conference on Networking, ICN'07
作者: Yu, Xiang Zhang, Xinming Que, Can Liu, Qiong Department of Computer Science and Technology University of Science and Technology of China Anhui Province - MOST Co-Key Laboratory of High Performance Computing and Its Application Hefei 230027 China
The interference imposes a potential negative impact on the performance of a wireless network. A device is interfered if it receives a transmission not intended for it. In this paper, we introduce an explicit computat... 详细信息
来源: 评论
A transmission power control MAC protocol for wireless sensor networks
A transmission power control MAC protocol for wireless senso...
收藏 引用
6th International Conference on Networking, ICN'07
作者: Zhao, Zhiwei Zhang, Xinming Sun, Peng Liu, Pengxi Department of Computer Science and Technology University of Science and Technology of China MOST Co-Key Laboratory of High Performance Computing and Its Application Anhui Province Hefei 230027 China
Wireless sensor networks have been widely used in many important fields. Medium Access Control (MAC) protocols have a significant effect on the function and performance of sensor networks. At present, most MAC protoco... 详细信息
来源: 评论
A link reliability-aware route maintenance mechanism for mobile ad hoc networks
A link reliability-aware route maintenance mechanism for mob...
收藏 引用
6th International Conference on Networking, ICN'07
作者: Shi, Dong Zhang, Xinming Gao, Xuemei Zhu, Wenbo Zou, Fengfu Department of Computer Science and Technology University of Science and Technology of China MOST Co-Key Laboratory of High Performance Computing and Its Application Anhui Province Hefei 230027 China
Hosts in mobile ad hoc networks (MANET) are capable of self-configuration and they can migrate at will, which makes the network topology highly dynamic. Thus, routes may break easily since the data session fails when ... 详细信息
来源: 评论
Information security audit system based on unlisted words
收藏 引用
Journal of Computational Information Systems 2007年 第4期3卷 1489-1494页
作者: Wu, Ronghui Yu, Fei Li, Renfa Xu, Cheng Yue, Guangxue College of Computer and Communication Hunan University Changsha 410082 China Guangdong Province Key Lab. of Electronic Commerce Market Application Technology Guangdong University of Business Studies Guangzhou 510320 China State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing 100049 China
This paper proposes a filtering technology based on content. This technology constructs an estimation function, and estimates the candidate properties, then chooses several properties with the highest value which are ... 详细信息
来源: 评论