咨询与建议

限定检索结果

文献类型

  • 289 篇 会议
  • 205 篇 期刊文献

馆藏范围

  • 494 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 288 篇 工学
    • 193 篇 计算机科学与技术...
    • 155 篇 软件工程
    • 59 篇 信息与通信工程
    • 40 篇 电气工程
    • 37 篇 控制科学与工程
    • 31 篇 生物工程
    • 28 篇 电子科学与技术(可...
    • 23 篇 光学工程
    • 21 篇 生物医学工程(可授...
    • 19 篇 仪器科学与技术
    • 17 篇 机械工程
    • 15 篇 核科学与技术
    • 12 篇 化学工程与技术
    • 9 篇 动力工程及工程热...
    • 9 篇 航空宇航科学与技...
    • 9 篇 网络空间安全
    • 7 篇 安全科学与工程
  • 183 篇 理学
    • 76 篇 物理学
    • 67 篇 数学
    • 37 篇 生物学
    • 16 篇 化学
    • 15 篇 系统科学
    • 14 篇 统计学(可授理学、...
  • 62 篇 管理学
    • 38 篇 图书情报与档案管...
    • 26 篇 管理科学与工程(可...
    • 15 篇 工商管理
  • 23 篇 医学
    • 21 篇 基础医学(可授医学...
    • 20 篇 临床医学
    • 12 篇 药学(可授医学、理...
  • 10 篇 农学
  • 6 篇 教育学
    • 6 篇 教育学
  • 5 篇 法学
  • 1 篇 经济学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 15 篇 information syst...
  • 15 篇 feature extracti...
  • 13 篇 virtual machinin...
  • 12 篇 support vector m...
  • 11 篇 computer archite...
  • 11 篇 gravitational wa...
  • 11 篇 laboratories
  • 10 篇 data mining
  • 10 篇 multimedia syste...
  • 10 篇 semantics
  • 10 篇 machine learning
  • 10 篇 ip networks
  • 10 篇 computer network...
  • 9 篇 grid computing
  • 9 篇 computational mo...
  • 9 篇 clustering algor...
  • 9 篇 distributed comp...
  • 8 篇 peer to peer com...
  • 8 篇 internet
  • 7 篇 reinforcement le...

机构

  • 20 篇 institute for pl...
  • 19 篇 university of so...
  • 17 篇 department of as...
  • 17 篇 scuola di ingegn...
  • 17 篇 infn sezione di ...
  • 17 篇 dipartimento di ...
  • 17 篇 università degli...
  • 17 篇 infn trento inst...
  • 16 篇 advanced technol...
  • 16 篇 king’s college l...
  • 16 篇 kamioka branch n...
  • 16 篇 the university o...
  • 16 篇 ligo laboratory ...
  • 16 篇 university of ma...
  • 16 篇 stony brook univ...
  • 16 篇 università di tr...
  • 16 篇 university of mi...
  • 16 篇 nasa goddard spa...
  • 16 篇 university of rh...
  • 16 篇 department of ph...

作者

  • 18 篇 r. takahashi
  • 18 篇 k. komori
  • 18 篇 t. kajita
  • 18 篇 t. sawada
  • 18 篇 c. kim
  • 17 篇 j. c. bayley
  • 17 篇 f. hellman
  • 17 篇 m. kinley-hanlon
  • 17 篇 t. mcrae
  • 17 篇 a. parisi
  • 17 篇 s. rowan
  • 17 篇 s. m. aronson
  • 17 篇 v. p. mitrofanov
  • 17 篇 g. moreno
  • 17 篇 g. hemming
  • 17 篇 f. muciaccia
  • 17 篇 b. garaventa
  • 17 篇 d. p. kapasi
  • 17 篇 e. payne
  • 17 篇 j. sadiq

语言

  • 474 篇 英文
  • 13 篇 其他
  • 5 篇 中文
  • 2 篇 法文
检索条件"机构=Multimedia Information Systems and Advanced Computing Laboratory"
494 条 记 录,以下是41-50 订阅
排序:
Verify All Traffic: Towards Zero-Trust In-Network Intrusion Detection against Multipath Routing
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2155-2171页
作者: Zhao, Ziming Li, Zhaoxuan Xie, Xiaofei Liu, Zhipeng Li, Tingting Yu, Jiongchi Zhang, Fan Chen, Binbin School of Software Technology Zhejiang University Ningbo315100 China College of Computer Science and Technology Zhejiang University Hangzhou310027 China ZJU-Hangzhou Global Scientific and Technological Innovation Center 311200 China Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province 310027 China Jiaxing Research Institute Zhejiang University 314000 China Zhengzhou Xinda Institute of Advanced Technology Zhengzhou450001 China Singapore State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Cyber Security UCAS Beijing100049 China School of Computing and Information Systems Singapore Management University Singapore188065 Singapore Advanced Digital Sciences Center Singapore138632 Singapore Singapore University of Technology and Design SingaporeB96049 Singapore
With the popularity of encryption protocols, machine learning (ML)-based traffic analysis technologies have attracted widespread attention. To adapt to modern high-speed bandwidth, recent research is dedicated to adva... 详细信息
来源: 评论
Image-Based Visual Servoing under Field of View Constraints for Robot Manipulators  12
Image-Based Visual Servoing under Field of View Constraints ...
收藏 引用
12th International Conference on CYBER Technology in Automation, Control, and Intelligent systems, CYBER 2022
作者: Zuo, Guoyu Liu, Yan Huang, Gao Gong, Daoxiong Faculty of Information Beijing University of Technology Beijing100124 China Beijing Key Laboratory of Computing Intelligence and Intelligent Systems Beijing100124 China Beijing Advanced Innovation Center for Intelligent Robots and Systems Beijing100081 China
The challenge in image-based visual servoing is to deal with the visibility constraints, which require the image features to always remain in the field of view (FOV) of the camera. In this paper, a novel constraint fu... 详细信息
来源: 评论
Bridging the Gap using Contrastive Learning and Semantic Consistency for Unsupervised Neural Machine Translation
Bridging the Gap using Contrastive Learning and Semantic Con...
收藏 引用
Artificial Intelligence and Computer Engineering (ICAICE), International Conference on
作者: Chuancai Zhang Dan Qu Liming Du Kaiyuan Yang School of Information Systems Engineering University of Information Engineering Zhengzhou China Laboratory for Advanced Computing and Intelligence Engineering Zhengzhou China School of Cyberspace Security Zhengzhou University Zhengzhou China
In Unsupervised Neural Machine Translation (UNMT) tasks, the lack of extensive parallel corpora makes it challenging for the model to directly optimize the correspondence between the source and target languages. UNMT ... 详细信息
来源: 评论
NewsBench: A Systematic Evaluation Framework for Assessing Editorial Capabilities of Large Language Models in Chinese Journalism
arXiv
收藏 引用
arXiv 2024年
作者: Li, Miao Chen, Ming-Bin Tang, Bo Hou, Shengbin Wang, Pengyu Deng, Haiying Li, Zhiyu Xiong, Feiyu Mao, Keming Cheng, Peng Luo, Yi School of Computing and Information Systems The University of Melbourne Australia Institute for Advanced Algorithms Research China Northeastern University China State Key Laboratory of Media Convergence Production Technology and Systems China
We present NewsBench, a novel evaluation framework to systematically assess the capabilities of Large Language Models (LLMs) for editorial capabilities in Chinese journalism. Our constructed benchmark dataset is focus... 详细信息
来源: 评论
Hybrid Signal Integrity Modeling and Analysis of Heterogeneous Integrated System With Neuromorphic Darwin Chip
IEEE Transactions on Signal and Power Integrity
收藏 引用
IEEE Transactions on Signal and Power Integrity 2024年 3卷 37-46页
作者: Chen, Quankun Ma, Hanzhi Li, Da Tao, Tuomin Tan, Shurun Liu, En-Xiao Schutt-Aine, Jose Li, Er-Ping Zhejiang University Key Laboratory of Advanced Micro/Nano Electronic Devices and Smart Systems and Applications College of Information Science and Electronic Engineering Hangzhou310027 China Zhejiang University University of Illinois at Urbana-Champaign Institute Haining314400 China A∗star Institute of High Performance Computing Singapore138632 Singapore University of Illinois at Urbana-Champaign Department of Electrical and Computer Engineering UrbanaIL61820 United States
This article introduces a comprehensive approach for designing and analyzing signal integrity in heterogeneous integrated systems that incorporate neuromorphic Darwin chips. The proposed integrated system architecture... 详细信息
来源: 评论
Edge-Driven Industrial computing Power Networks: Digital Twin-Empowered Service Provisioning by Hybrid Soft Actor-Critic
收藏 引用
IEEE Transactions on Vehicular Technology 2025年 第5期74卷 8095-8109页
作者: Zhang, Long Song, Deng-Ao Zhang, Hongliang Tian, Ni Zhuang, Zirui Niyato, Dusit Han, Zhu Hebei University of Engineering School of Information and Electrical Engineering Handan056038 China Peking University State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Beijing100871 China Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China Nanyang Technological University College of Computing and Data Science 639798 Singapore University of Houston Department of Electrical and Computer Engineering HoustonTX77004 United States Kyung Hee University Department of Computer Science and Engineering Seoul446-701 Korea Republic of
With the proliferation of data-intensive industrial applications, the collaboration of computing powers among standalone edge servers is vital to provision such services for smart devices. In this paper, we propose an... 详细信息
来源: 评论
A Multi-DOF Robot System Based on LightGBM-Driven EEG Decoding Model for BCI Human-Machine Interaction  42
A Multi-DOF Robot System Based on LightGBM-Driven EEG Decodi...
收藏 引用
42nd Chinese Control Conference, CCC 2023
作者: Yan, Weidong Xu, Zhaoliang Li, Yang Beihang University The Department of Automation Science and Electrical Engineering Beijing100191 China The Beijing Advanced Innovation Center for Big Data and Brain Computing Beijing100191 China Beihang University State Key Laboratory of Virtual Reality Technology and Systems Beijing100191 China Advanced Institute of Information Technology Peking University Hangzhou310000 China
In this study, a multi-degree-of-freedom (Multi-DOF) robot (MDR) system based on a LightGBM-driven electroencephalogram (EEG) decoding model is designed and developed to assist subjects with hand motor dysfunction in ... 详细信息
来源: 评论
A Multi-Head Convolution Network with Attention Consistency for Facial Expression Recognition  42
A Multi-Head Convolution Network with Attention Consistency ...
收藏 引用
42nd Chinese Control Conference, CCC 2023
作者: Liu, Wenkang Sun, Mingyi Li, Yang Beihang University The Department of Automation Science and Electrical Engineering Beijing100191 China The Beijing Advanced Innovation Center for Big Data and Brain Computing Beijing100191 China Beihang University State Key Laboratory of Virtual Reality Technology and Systems Beijing100191 China Peking University Advanced Institute of Information Technology Hangzhou310000 China
In recent years, the demand for facial expression recognition applications has increased rapidly, and its research has received extensive attention from researchers. However, the current recognition methods based on d... 详细信息
来源: 评论
Audit-LLM: Multi-Agent Collaboration for Log-based Insider Threat Detection
arXiv
收藏 引用
arXiv 2024年
作者: Song, Chengyu Ma, Linru Zheng, Jianming Liao, Jinzhi Kuang, Hongyu Yang, Lin Systems Engineering Institute Academy of Military Sciences Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China National University of Defense Technology National Key Laboratory of Information Systems Engineering Changsha China
Log-based insider threat detection (ITD) detects malicious user activities by auditing log entries. Recently, Large Language Models (LLMs) with strong common sense knowledge are emerging in the domain of ITD. Neverthe... 详细信息
来源: 评论
Long‐time target tracking algorithm based on re‐detection multi‐feature fusion
收藏 引用
IET Cyber-systems and Robotics 2022年 第1期4卷 38-50页
作者: Junsuo Qu Chenxue Tang Yuan Zhang Kai Zhou Abolfazl Razi School of Automation Xi'an Key Laboratory of Advanced Control and Intelligent ProcessXi'an University of Posts and TelecommunicationsXi'anShaanxiChina School of Communication and Information Engineering Xi'an University of Posts and TelecommunicationsXi'anShaanxiChina School of Informatics Computing and Cyber SystemsNorthern Arizona UniversityFlagstaffAZUSA
This paper considers the problem of long-term target tracking in complex scenes when tracking failures are unavoidable due to illumination change,target deformation,scale change,motion blur,and other *** specifically,... 详细信息
来源: 评论