咨询与建议

限定检索结果

文献类型

  • 865 篇 会议
  • 807 篇 期刊文献

馆藏范围

  • 1,672 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,102 篇 工学
    • 698 篇 计算机科学与技术...
    • 590 篇 软件工程
    • 237 篇 信息与通信工程
    • 137 篇 控制科学与工程
    • 135 篇 生物工程
    • 120 篇 电气工程
    • 109 篇 电子科学与技术(可...
    • 94 篇 光学工程
    • 90 篇 核科学与技术
    • 78 篇 机械工程
    • 76 篇 生物医学工程(可授...
    • 53 篇 仪器科学与技术
    • 49 篇 化学工程与技术
    • 43 篇 材料科学与工程(可...
    • 36 篇 动力工程及工程热...
    • 33 篇 网络空间安全
    • 31 篇 交通运输工程
    • 29 篇 土木工程
  • 709 篇 理学
    • 330 篇 物理学
    • 282 篇 数学
    • 147 篇 生物学
    • 92 篇 统计学(可授理学、...
    • 54 篇 化学
    • 41 篇 系统科学
  • 265 篇 管理学
    • 141 篇 管理科学与工程(可...
    • 128 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 66 篇 医学
    • 52 篇 临床医学
    • 44 篇 基础医学(可授医学...
  • 41 篇 法学
    • 35 篇 社会学
  • 21 篇 教育学
  • 20 篇 经济学
  • 19 篇 农学
  • 9 篇 文学
  • 7 篇 军事学
  • 4 篇 艺术学

主题

  • 100 篇 hadron colliders
  • 46 篇 deep learning
  • 38 篇 semantics
  • 35 篇 feature extracti...
  • 32 篇 training
  • 29 篇 w & z bosons
  • 28 篇 higgs bosons
  • 26 篇 data mining
  • 24 篇 computational mo...
  • 22 篇 graph neural net...
  • 21 篇 machine learning
  • 21 篇 accuracy
  • 20 篇 data models
  • 18 篇 convolutional ne...
  • 17 篇 object detection
  • 17 篇 convolution
  • 16 篇 relativistic hea...
  • 16 篇 computer vision
  • 16 篇 forecasting
  • 15 篇 conferences

机构

  • 139 篇 irfu cea univers...
  • 132 篇 yerevan physics ...
  • 129 篇 national and kap...
  • 129 篇 centro brasileir...
  • 129 篇 istanbul technic...
  • 127 篇 university of sp...
  • 127 篇 indian institute...
  • 126 篇 universidad iber...
  • 125 篇 brunel universit...
  • 125 篇 charles universi...
  • 124 篇 università di to...
  • 124 篇 academy of scien...
  • 124 篇 infn sezione di ...
  • 123 篇 department of ph...
  • 122 篇 zhejiang univers...
  • 121 篇 infn sezione di ...
  • 121 篇 department of ph...
  • 120 篇 imperial college...
  • 120 篇 university of de...
  • 118 篇 rwth aachen univ...

作者

  • 125 篇 m. lu
  • 95 篇 g. tonelli
  • 95 篇 d. barney
  • 95 篇 l. valencia palo...
  • 95 篇 t. liu
  • 95 篇 c. hensel
  • 95 篇 a. garcia-bellid...
  • 95 篇 a. steen
  • 95 篇 n. cartiglia
  • 95 篇 d. eliseev
  • 94 篇 a. babaev
  • 94 篇 v. karjavine
  • 93 篇 n. colino
  • 93 篇 f. moortgat
  • 92 篇 b. clerbaux
  • 91 篇 g. sultanov
  • 91 篇 a. mallampalli
  • 91 篇 m. a. ciocci
  • 91 篇 k. lamichhane
  • 91 篇 s. maselli

语言

  • 1,413 篇 英文
  • 228 篇 其他
  • 46 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Key Laboratory on Computer Technology Application"
1672 条 记 录,以下是421-430 订阅
排序:
Adaptive Ensemble Model for Ultra-short-term Wind Power Forecasting  11
Adaptive Ensemble Model for Ultra-short-term Wind Power Fore...
收藏 引用
11th IEEE Data Driven Control and Learning Systems Conference, DDCLS 2022
作者: Li, Yunlong Jin, Huaiping Jin, Huaikang Cao, Yundong Kunming University of Science and Technology Faculty of Information Engineering and Automation Department of Automation Kunming650500 China Yunnan Key Laboratory of Computer Technologies Application Kunming650500 China Huaneng Renewables Co. Ltd. Yunnan Branch Kunming650000 China
Stable and reliable wind power forecasting is of great significance for grid dispatching. However, wind power has strong nonlinear characteristics. Its amount of historical data is very large, and traditional machine ... 详细信息
来源: 评论
Gender Identification for Coloring Black and White Portrait with cGan  10th
Gender Identification for Coloring Black and White Portrait ...
收藏 引用
10th International Conference on computer Engineering and Networks, CENet 2020
作者: Liu, Qingyun Lin, Mugang Sun, Yaqi Zhang, Feng College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
This paper proposes a method to color black & white portrait images with gender recognition model and condition generation network (cGan). As a cGan model essentially, a method named pix2pix interprets image style... 详细信息
来源: 评论
Analysis and Design of Image Encryption Algorithms Based on Interlaced Chaos  10th
Analysis and Design of Image Encryption Algorithms Based on ...
收藏 引用
10th International Conference on computer Engineering and Networks, CENet 2020
作者: Li, Kangman Li, Qiuping College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
For chaotic encryption algorithm, the algorithm of generating chaotic sequence is complex, and the data is float, which directly affects the speed of encryption. In this paper, an interlaced chaotic encryption algorit... 详细信息
来源: 评论
A Image Adaptive Steganography Algorithm Combining Chaotic Encryption and Minimum Distortion Function  10th
A Image Adaptive Steganography Algorithm Combining Chaotic E...
收藏 引用
10th International Conference on computer Engineering and Networks, CENet 2020
作者: Jiao, Ge Liu, Jiahao Zhou, Sheng Luo, Ning College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Digital image has the characteristics of high redundancy and convenient processing, which is the ideal carrier of information hiding application. Therefore, digital image steganography has become a hot research direct... 详细信息
来源: 评论
Domain Adaptive Code Completion via Language Models and Decoupled Domain Databases
Domain Adaptive Code Completion via Language Models and Deco...
收藏 引用
IEEE International Conference on Automated Software Engineering (ASE)
作者: Ze Tang Jidong Ge Shangqing Liu Tingwei Zhu Tongtong Xu Liguo Huang Bin Luo National Key Laboratory for Novel Software Technology Nanjing University China Nanyang Technological University Singapore Huawei Software Engineering Application Technology China Department of Computer Science Southern Methodist University USA
Large Language Models (LLMs) have demonstrated remarkable performance in code completion. However, due to the lack of domain-specific knowledge, they may not be optimal in completing code that requires intensive domai...
来源: 评论
Epidemic Prevention System Based on Voice Recognition Combined with Intelligent Recognition of Mask and Helmet  3
Epidemic Prevention System Based on Voice Recognition Combin...
收藏 引用
3rd International Conference on Video, Signal and Image Processing, VSIP 2021
作者: Zhou, Huaming Wang, Aili Li, Meixin Zhao, Yinghui Iwahori, Yuji Heilongjiang Province Key Laboratory Of Laser Spectroscopy Technology And Application Harbin University Of Science And Technology Heilongjiang Harbin China Department Of Computer Science Chubu University Aichi487-8501 Japan
At present, COVID-19 cross-infection is easy to occur in dense places such as elevators. There are no epidemic prevention measures for construction site elevators on the market, and most of them require manual tempera... 详细信息
来源: 评论
A Grouping Strategy-Based Progressive Fusion Network for Hyperspectral Image Super-Resolution
A Grouping Strategy-Based Progressive Fusion Network for Hyp...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guohua Lv Baodong Zhang Yongbiao Gao Guixin Zhao Guotao Wang Juncan Wang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Shandong Key Laboratory of Ubiquitous Intelligent Computing Jinan China Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Application (Southeast University) Ministry of Education China Beihang University Beijing China
Hyperspectral super-resolution involves combining low-resolution hyperspectral images with high-resolution multispectral images to produce a high-resolution hyperspectral image. Recently, although many methods for hyp... 详细信息
来源: 评论
MyWAL:performance optimization by removing redundant input/output stack in key-value store
收藏 引用
Frontiers of Information technology & Electronic Engineering 2023年 第7期24卷 980-993页
作者: Xiao ZHANG Mengyu LI Michael NGULUBE Yonghao CHEN Yiping ZHAO School of Computer Science Northwestern Polytechnical UniversityXi'an 710072China MIIT Key Laboratory of Big Data Storage and Management Northwestern Polytechnical UniversityXi'an 710072China National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology Northwestern Polytechnical UniversityXi'an 710072China School of Software Northwestern Polytechnical UniversityXi'an 710072China
Based on a log-structured merge(LSM)tree,the key-value(KV)storage system can provide high reading performance and optimize random writing *** is widely used in modern data storage systems like e-commerce,online analyt... 详细信息
来源: 评论
Research on Task Scheduling in Distributed Vulnerability Scanning System  10th
Research on Task Scheduling in Distributed Vulnerability Sca...
收藏 引用
10th International Conference on computer Engineering and Networks, CENet 2020
作者: Jiang, Jie Tang, Sixin College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Network threats caused by system vulnerabilities is increasing gradually, the distributed vulnerability scanning system can scan large-scale and complex networks and report the vulnerability information. Task scheduli... 详细信息
来源: 评论
Multi-Scale Automated Self-Supervised Learning for Recommendation
Multi-Scale Automated Self-Supervised Learning for Recommend...
收藏 引用
Intelligent Management and Software Engineering (IMSE), International Conference on
作者: Yuhang Yan Liqin Tian Yujie Gao School of Computer Science Qinghai Normal University Xining China The State Key Laboratory of Tibetan Intelligent Information Processing and Application Xining China School of Computer North China Institute of Science and Technology Yanjiao China
Automated self-supervised learning frameworks have shown significant results in the recommendation domain. However, existing methods such as AutoCF use graph convolutional networks and graph attention mechanisms that ...
来源: 评论