咨询与建议

限定检索结果

文献类型

  • 2,237 篇 期刊文献
  • 1,642 篇 会议
  • 1 册 图书

馆藏范围

  • 3,880 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,596 篇 工学
    • 1,403 篇 计算机科学与技术...
    • 1,107 篇 软件工程
    • 519 篇 信息与通信工程
    • 393 篇 电气工程
    • 327 篇 控制科学与工程
    • 314 篇 电子科学与技术(可...
    • 273 篇 生物工程
    • 270 篇 化学工程与技术
    • 214 篇 生物医学工程(可授...
    • 194 篇 光学工程
    • 182 篇 机械工程
    • 180 篇 材料科学与工程(可...
    • 152 篇 仪器科学与技术
    • 128 篇 动力工程及工程热...
    • 96 篇 交通运输工程
    • 94 篇 土木工程
    • 85 篇 网络空间安全
    • 81 篇 建筑学
  • 1,659 篇 理学
    • 776 篇 数学
    • 561 篇 物理学
    • 329 篇 生物学
    • 254 篇 化学
    • 219 篇 统计学(可授理学、...
    • 137 篇 系统科学
    • 85 篇 地球物理学
  • 505 篇 管理学
    • 286 篇 管理科学与工程(可...
    • 238 篇 图书情报与档案管...
    • 108 篇 工商管理
  • 167 篇 医学
    • 133 篇 临床医学
    • 113 篇 基础医学(可授医学...
  • 77 篇 农学
  • 54 篇 法学
  • 37 篇 经济学
  • 15 篇 教育学
  • 9 篇 军事学
  • 7 篇 艺术学
  • 2 篇 文学
  • 1 篇 历史学

主题

  • 96 篇 semantics
  • 78 篇 feature extracti...
  • 60 篇 training
  • 57 篇 deep learning
  • 53 篇 accuracy
  • 50 篇 computational mo...
  • 43 篇 neural networks
  • 42 篇 optimization
  • 40 篇 machine learning
  • 38 篇 object detection
  • 36 篇 image segmentati...
  • 35 篇 data mining
  • 32 篇 predictive model...
  • 30 篇 simulation
  • 29 篇 correlation
  • 29 篇 privacy
  • 28 篇 federated learni...
  • 28 篇 data models
  • 27 篇 cosmic rays
  • 27 篇 contrastive lear...

机构

  • 195 篇 key laboratory o...
  • 156 篇 school of comput...
  • 137 篇 key laboratory o...
  • 99 篇 university of sc...
  • 99 篇 university of ch...
  • 96 篇 hebei normal uni...
  • 96 篇 state key labora...
  • 95 篇 yunnan observato...
  • 94 篇 tianfu cosmic ra...
  • 87 篇 key laboratory o...
  • 87 篇 school of physic...
  • 86 篇 department of ph...
  • 86 篇 key laboratory f...
  • 85 篇 center for astro...
  • 85 篇 college of physi...
  • 84 篇 institute of fro...
  • 84 篇 school of physic...
  • 83 篇 school of physic...
  • 81 篇 national space s...
  • 79 篇 moscow institute...

作者

  • 82 篇 axikegu
  • 78 篇 fang j.
  • 78 篇 feng c.f.
  • 77 篇 bastieri d.
  • 77 篇 jiang k.
  • 73 篇 danzengluobu
  • 72 篇 kuleshov d.
  • 72 篇 liu d.
  • 71 篇 chen m.j.
  • 71 篇 liu s.m.
  • 71 篇 huang d.h.
  • 71 篇 dai h.l.
  • 70 篇 guo y.q.
  • 69 篇 li xin
  • 68 篇 li cheng
  • 68 篇 bao y.w.
  • 68 篇 liu b.
  • 67 篇 hu h.b.
  • 65 篇 min z.
  • 64 篇 zheng wei-shi

语言

  • 3,496 篇 英文
  • 310 篇 其他
  • 84 篇 中文
检索条件"机构=Ministry of Education Key Laboratory in Scientific and Engineering Computing"
3880 条 记 录,以下是401-410 订阅
排序:
Determination of Continuous Dielectric Properties of Clothing Materials Using Hybrid Method
Determination of Continuous Dielectric Properties of Clothin...
收藏 引用
2023 IEEE International Workshop on Electromagnetics: Applications and Student Innovation Competition, iWEM 2023
作者: Chen, Manni Chung, Kwok L. Huang, Zhining Wen, Jiating Li, Yingsong Huizhou University School of Computer Science and Engineering Guangdong516007 China Huizhou University Glorious Sun Guangdong School of Fashion Guangdong516007 China Ministry of Education Anhui University Key Laboratory of Intelligent Computing and Signal Processing China
This paper presents a hybrid method for determination of continuous dielectric properties of clothing materials. The dielectric constant and loss tangent of three types of materials are firstly investigated using open... 详细信息
来源: 评论
Task-Oriented 6-DoF Grasp Pose Detection in Clutters
arXiv
收藏 引用
arXiv 2025年
作者: Wang, An-Lan Chen, Nuo Lin, Kun-Yu Li, Yuan-Ming Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
In general, humans would grasp an object differently for different tasks, e.g., "grasping the handle of a knife to cut" vs. "grasping the blade to hand over". In the field of robotic grasp pose det... 详细信息
来源: 评论
Wrong-of-Thought: An Integrated Reasoning Framework with Multi-Perspective Verification and Wrong Information
Wrong-of-Thought: An Integrated Reasoning Framework with Mul...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Zhang, Yongheng Chen, Qiguang Zhou, Jingxuan Wang, Peng Si, Jiasheng Wang, Jin Lu, Wenpeng Qin, Libo School of Computer Science and Engineering Central South University China Research Center for SCIR Harbin Institute of Technology Harbin China Key Laboratory of Computing Power Network and Information Security Ministry of Education Qilu University of Technology Shandong Academy of Sciences China Yunnan University Kunming China
Chain-of-Thought (CoT) has become a vital technique for enhancing the performance of Large Language Models (LLMs), attracting increasing attention from researchers. One stream of approaches focuses on the iterative en...
来源: 评论
Research on Static Reverse Analysis Technology for Security Detection of Power Industrial Control Software  3
Research on Static Reverse Analysis Technology for Security ...
收藏 引用
3rd International Conference on Intelligent Power and Systems, ICIPS 2023
作者: Chen, Jinshan Yu, Sihang Xie, Xuanxuan Cheng, Yu Tang, Zhijun Deng, Chaoping Li, June State Grid Fujian Electric Power Research Institute Fujian Fuzhou350000 China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Hubei Wuhan430072 China
In the power industrial control software, defects of software and possible pre-implanted backdoors and malicious codes are important factors that threaten the security of the power industrial control system. The compl... 详细信息
来源: 评论
An efficient group key agreement protocol with administrator  3
An efficient group key agreement protocol with administrator
收藏 引用
3rd International Conference on Internet of Things and Smart City, IoTSC 2023
作者: Fang, Qihao Zhang, Lei Zhang, Mingrui Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai200062 China Science and Technology on Communication Security Laboratory Chengdu610041 China Engineering Research Center of Software/Hardware Co-design Technology and Application Ministry of Education Shanghai200062 China
Group key agreement technology is one of the most popular solution to establish a reliable secure channel between communicating entities of a group. Group key agreement protocol with administrator (GKAA) can handle a ... 详细信息
来源: 评论
Practical privacy-preserving mixing protocol for Bitcoin  26
Practical privacy-preserving mixing protocol for Bitcoin
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Chang, Qianqian Xu, Lin Zhang, Lei Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai200062 China Science and Technology on Communication Security Laboratory Chengdu610041 China Engineering Research Center of Software/Hardware Co-design Technology and Application Ministry of Education Shanghai200062 China
The privacy of Cryptocurrencies are of great concern in various fields. Researches has shown that pseudonyms, which are used in Bitcoin, only provide weak privacy. The privacy of users may be put at risk under deanony... 详细信息
来源: 评论
Blockchain-based Transaction Scheme for Massive MIMO Channel Estimation  11
Blockchain-based Transaction Scheme for Massive MIMO Channel...
收藏 引用
11th International Conference on Networks, Communication and computing, ICNCC 2022
作者: Huang, Yu Zhi, Hui Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei230601 China School of Electronic and Information Engineering Anhui University Hefei230601 China
In wireless communication systems, accurate channel estimation is essential to ensure the performance of wireless communication systems. Massive Multiple Input Multiple Output (M-MIMO) systems have a dramatic increase... 详细信息
来源: 评论
VHASR: A Multimodal Speech Recognition System With Vision Hotwords
VHASR: A Multimodal Speech Recognition System With Vision Ho...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Hu, Jiliang Li, Zuchao Wang, Ping Ai, Haojun Zhang, Lefei Zhao, Hai Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China School of Computer Science Wuhan University Wuhan China School of Information Management Wuhan University Wuhan China Department of Computer Science and Engineering Shanghai Jiao Tong University China
The image-based multimodal automatic speech recognition (ASR) model enhances speech recognition performance by incorporating audio-related image. However, some works suggest that introducing image information to model... 详细信息
来源: 评论
Effect of Aircraft Sliding Load on Dynamic Response of Cement-Concrete Pavement and Underpass Structure  9
Effect of Aircraft Sliding Load on Dynamic Response of Cemen...
收藏 引用
9th International Technical Conference on Frontiers of Hydraulic and Civil engineering Technology, HCET 2024
作者: Li, Feilong Jiang, Changshan Yu, Qian Han, Jinbao Zhang, Heqing China Airport Planning and Design Institute Co. Ltd. Beijing100029 China Airport Engineering Safety and Long-Term Performance Field Scientific Observation and Research Base of Transportation Industry Beijing101312 China Key Laboratory of Urban Underground Engineering The Ministry of Education Beijing Jiaotong University Beijing100044 China
According to the characteristics of an underpass under the runway in a flight area, a subprogram of the aircraft moving load was compiled, and the reliability of the model was verified using numerical examples. At the... 详细信息
来源: 评论
Self-supervised fast reconstruction method for diffusion MRI based on multi-directional assistance  17
Self-supervised fast reconstruction method for diffusion MRI...
收藏 引用
17th IEEE International Conference on Signal Processing, ICSP 2024
作者: Wu, Yuxin Zhang, Jian Wang, Lihui Cao, Ying Wu, Linhai Wu, Yunjia Ye, Chen Zhu, Yuemin Guizhou University Key Laboratory of Intelligent Medical Image Analysis and Precise Diagnosis of Guizhou Province Engineering Research Center of Text Computing & Cognitive Intelligence Ministry of Education State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang China Univ Lyon Insa Lyon Cnrs Inserm Creatis Umr 5220 U1206 France
Diffusion MRI (dMRI) is widely used for the detection and diagnosis of various pathologies due to its non-invasive nature. However, its signal acquisition process is relatively slow and susceptible to motions. In orde... 详细信息
来源: 评论