咨询与建议

限定检索结果

文献类型

  • 1,194 篇 会议
  • 1,163 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 2,377 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,623 篇 工学
    • 911 篇 计算机科学与技术...
    • 806 篇 软件工程
    • 428 篇 控制科学与工程
    • 290 篇 信息与通信工程
    • 232 篇 机械工程
    • 228 篇 电气工程
    • 178 篇 生物工程
    • 141 篇 生物医学工程(可授...
    • 136 篇 电子科学与技术(可...
    • 116 篇 光学工程
    • 87 篇 仪器科学与技术
    • 81 篇 化学工程与技术
    • 71 篇 动力工程及工程热...
    • 50 篇 材料科学与工程(可...
    • 47 篇 交通运输工程
    • 40 篇 建筑学
    • 40 篇 安全科学与工程
    • 37 篇 力学(可授工学、理...
  • 915 篇 理学
    • 497 篇 数学
    • 195 篇 生物学
    • 193 篇 系统科学
    • 183 篇 物理学
    • 142 篇 统计学(可授理学、...
    • 75 篇 化学
  • 372 篇 管理学
    • 255 篇 管理科学与工程(可...
    • 127 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 101 篇 医学
    • 91 篇 临床医学
    • 69 篇 基础医学(可授医学...
    • 48 篇 药学(可授医学、理...
  • 37 篇 法学
  • 26 篇 经济学
  • 19 篇 农学
  • 13 篇 教育学
  • 11 篇 艺术学
  • 7 篇 文学
  • 1 篇 军事学

主题

  • 54 篇 feature extracti...
  • 51 篇 automation
  • 43 篇 control systems
  • 37 篇 reinforcement le...
  • 35 篇 neural networks
  • 35 篇 training
  • 34 篇 laboratories
  • 32 篇 optimization
  • 31 篇 machine learning
  • 30 篇 deep learning
  • 30 篇 accuracy
  • 29 篇 image segmentati...
  • 27 篇 computational mo...
  • 27 篇 artificial intel...
  • 27 篇 robustness
  • 25 篇 trajectory
  • 25 篇 mathematical mod...
  • 24 篇 semantics
  • 23 篇 computer science
  • 22 篇 pattern recognit...

机构

  • 73 篇 school of automa...
  • 67 篇 department of au...
  • 57 篇 faculty of infor...
  • 56 篇 national laborat...
  • 51 篇 university of ch...
  • 46 篇 beijing key labo...
  • 46 篇 school of electr...
  • 44 篇 state key labora...
  • 39 篇 school of automa...
  • 37 篇 institute of aut...
  • 35 篇 ieee
  • 34 篇 school of artifi...
  • 31 篇 peng cheng labor...
  • 29 篇 school of comput...
  • 28 篇 school of comput...
  • 28 篇 institutes for r...
  • 28 篇 state key labora...
  • 27 篇 school of automa...
  • 27 篇 school of inform...
  • 26 篇 school of automa...

作者

  • 41 篇 niyato dusit
  • 39 篇 yingmin jia
  • 38 篇 junping du
  • 37 篇 kang jiawen
  • 28 篇 fashan yu
  • 22 篇 fei-yue wang
  • 19 篇 kang li
  • 19 篇 johansson karl h...
  • 19 篇 li kang
  • 18 篇 du hongyang
  • 18 篇 yang tao
  • 17 篇 shi ling
  • 17 篇 yi xinlei
  • 15 篇 du junping
  • 15 篇 jia yingmin
  • 15 篇 derong liu
  • 15 篇 fei minrui
  • 14 篇 li stan z.
  • 14 篇 li xiang
  • 14 篇 xiong zehui

语言

  • 2,045 篇 英文
  • 285 篇 其他
  • 49 篇 中文
检索条件"机构=Laboratory of Computer Science Engineering and Automation"
2377 条 记 录,以下是1671-1680 订阅
排序:
LSSLP – Local structure sensitive label propagation
收藏 引用
Information sciences 2016年 332卷 19-32页
作者: Zhenfeng Zhu Jian Cheng Yao Zhao Jieping Ye Institute of Information Science Beijing Jiaotong University Beijing 100044 China Beijing Key Laboratory of Advanced Information Science and Network Technology Beijing 100044 China National Laboratory of Pattern Recognition Institute of Automation Chinese Academy of Sciences (CAS) 100190 China Department of Electrical Engineering and Computer Science University of Michigan Ann Arbor MI 48109-2218 USA
Label propagation is an approach to iteratively spread the prior state of label confidence associated with each of samples to its neighbors until achieving a global convergence state. Such process has been shown to ho...
来源: 评论
Index Modulated OFDM with ICI Self-Cancellation for V2X Communications
Index Modulated OFDM with ICI Self-Cancellation for V2X Comm...
收藏 引用
International Conference on Computing, Networking and Communications
作者: Yuke Li Miaowen Wen Xiang Cheng Liu-Qing Yang State Key Laboratory of Management and Control for Complex Systems Institute of Automation Chinese Academy of Sciences School of Electronic and Information Engineering South China University of Technology School of Electronics Engineering and Computer Science Peking University
Recent years have witnessed the rapid development of intelligent transportation systems (ITS), which urgently call for highly reliable and effective communication technologies for vehicle-to-vehicle and vehicle-to-inf... 详细信息
来源: 评论
Index Modulated OFDM with ICI Self-Cancellation
Index Modulated OFDM with ICI Self-Cancellation
收藏 引用
IEEE Vehicular Technology Conference
作者: Yuke Li Miaowen Wen Xiang Cheng Liu-Qing Yang State Key Laboratory of Management and Control for Complex Systems Institute of Automation Chinese Academy of Sciences School of Electronic and Information Engineering South China University of Technology School of Electronics Engineering and Computer Science Peking University
Orthogonal frequency division multiplexing (OFDM) is prone to frequency offset which gives rise to intercarrier interference (ICI). Recently, a novel OFDM transmission scheme called OFDM with index modulation (IM-OFDM... 详细信息
来源: 评论
Matrix flat splicing systems  11th
Matrix flat splicing systems
收藏 引用
11th International Conference on Bio-inspired Computing – Theories and Applications, BIC-TA 2016
作者: Ceterchi, Rodica Pan, Linqiang Song, Bosheng Subramanian, K.G. Faculty of Mathematics and Computer Science University of Bucharest 14 Academiei Street Bucharest010014 Romania School of Electric and Information Engineering Zhengzhou University of Light Industry ZhengzhouHenan450002 China Key Laboratory of Image Information Processing and Intelligent Control of Education Ministry of China School of Automation Huazhong University of Science and Technology WuhanHubei430074 China Department of Mathematics Madras Christian College Chennai600059 India
In dealing with the problem of modelling DNA recombination, the operation of splicing on linear and circular strings of symbols was introduced. Inspired by splicing on circular strings, the operation of flat splicing ... 详细信息
来源: 评论
Special Issue on Unsupervised Feature Learning for Vision
收藏 引用
IET computer VISION 2015年 第5期9卷 627-628页
作者: Zhang, Shengping Zhang, Baochang Ye, Qixiang School of Computer Science and Technology Harbin Institute of Technology Weihai China Science and Technology on Aircraft Control Laboratory School of Automation Science and Electrical Engineering Beihang University Beijing China Institute of Advanced Computer Studies (UMIACS) University of Maryland College Park United States
来源: 评论
Multistability of Recurrent Neural Networks with Nonmonotonic Activation Functions and Mixed Time Delays
收藏 引用
IEEE Transactions on Systems, Man, and Cybernetics: Systems 2016年 第4期46卷 512-523页
作者: Liu, Peng Zeng, Zhigang Wang, Jun School of Automation Huazhong University of Science and Technology Wuhan430074 China Key Laboratory of Image Processing and Intelligent Control of Education Ministry of China Wuhan430074 China Department of Mechanical and Automation Engineering Chinese University of Hong Kong Hong Kong Department of Computer Science City University of Hong Kong Kowloon Tong Hong Kong
This paper presents new theoretical results on the multistability analysis of a class of recurrent neural networks with nonmonotonic activation functions and mixed time delays. Several sufficient conditions are derive... 详细信息
来源: 评论
Smart Grid Data Analysis and Prediction Modeling
Smart Grid Data Analysis and Prediction Modeling
收藏 引用
2016 IEEE International Conference on Progress in Informatics and Computing
作者: Hang Yang Ping Li Anum Masood Yuning Xiao Bin Sheng Qichen Yu Information Department China Southern Power Grid Department of Mathematics and Information Technology The Education University of Hong Kong Department of Computer Science and Engineering Shanghai Jiao Tong University Department of Computer Science COMSATS Institute of Information Technology The State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Department of electrical engineering and automation Shanghai Jiao Tong University
With the rapiddevelopment of power grid, prediction ofelectric quantity changes has become increasingly important. High-performance power grid systems can improve economic effectiveness and operational efficiency thro... 详细信息
来源: 评论
Linear perspective shape-from-shading method with two images
收藏 引用
Journal of Systems science & Complexity 2015年 第5期28卷 1080-1087页
作者: Lei Yang Ning Zhang Yanyun Ren Huosheng Hu Shanghai Key Laboratory of Power Station Automation Technology School of Mechatronics Engineering and AutomationShanghai University School of Computer Science and Electrical Engineering University of Essex
Shape-from-shading(SFS) is one of the important approaches of 3-D surface reconstruction in computer vision. Since reflectance map equation in SFS is a nonlinear partial differential equation(PDE) with two unknown var... 详细信息
来源: 评论
Policy iteration for optimal control of weakly coupled nonlinear systems with completely unknown dynamics
Policy iteration for optimal control of weakly coupled nonli...
收藏 引用
American Control Conference
作者: Chao Li Ding Wang Derong Liu Haibo He The State Key Laboratory of Management and Control for Complex Systems Institute of Automation Chinese Academy of Sciences Beijing 100190 China School of Automation and Electrical Engineering University of Science and Technology Beijing 100083 China Department of Electrical Computer and Biomedical Engineering University of Rhode Island Kingston 02881 USA
In this paper, an online learning algorithm based on policy iteration is established to solve the optimal control problem for weakly coupled nonlinear continuous-time systems. Using the weak coupling theory, the origi... 详细信息
来源: 评论
Quantum key distribution with distinguishable decoy states
arXiv
收藏 引用
arXiv 2017年
作者: Huang, Anqi Sun, Shi-Hai Liu, Zhihong Makarov, Vadim Institute for Quantum Information State Key Laboratory of High Performance Computing College of Computer National University of Defense Technology Changsha410073 China Institute for Quantum Computing University of Waterloo WaterlooONN2L 3G1 Canada Department of Electrical and Computer Engineering University of Waterloo WaterlooONN2L 3G1 Canada College of Science National University of Defense Technology Changsha410073 China College of Mechatronic Engineering and Automation National University of Defense Technology Changsha410073 China Russian Quantum Center MISIS University Moscow Department of Physics and Astronomy University of Waterloo WaterlooONN2L 3G1 Canada
The decoy state protocol has been considered to be one of the most important methods to protect the security of quantum key distribution (QKD) with a weak coherent source. Here we test two experimental approaches to g... 详细信息
来源: 评论