咨询与建议

限定检索结果

文献类型

  • 101 篇 期刊文献
  • 78 篇 会议

馆藏范围

  • 179 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 114 篇 工学
    • 75 篇 计算机科学与技术...
    • 62 篇 软件工程
    • 20 篇 生物工程
    • 16 篇 信息与通信工程
    • 15 篇 电气工程
    • 11 篇 电子科学与技术(可...
    • 11 篇 化学工程与技术
    • 10 篇 控制科学与工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 材料科学与工程(可...
    • 6 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 建筑学
    • 5 篇 土木工程
    • 4 篇 力学(可授工学、理...
    • 4 篇 安全科学与工程
  • 85 篇 理学
    • 42 篇 数学
    • 22 篇 物理学
    • 19 篇 生物学
    • 16 篇 统计学(可授理学、...
    • 11 篇 化学
  • 33 篇 管理学
    • 20 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 8 篇 经济学
    • 8 篇 应用经济学
  • 8 篇 法学
    • 7 篇 社会学
  • 7 篇 医学
    • 5 篇 公共卫生与预防医...
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 4 篇 农学
    • 4 篇 作物学
  • 2 篇 教育学
  • 2 篇 文学

主题

  • 5 篇 deep learning
  • 5 篇 forecasting
  • 4 篇 memory managemen...
  • 4 篇 feature extracti...
  • 3 篇 deep neural netw...
  • 3 篇 costs
  • 3 篇 machine learning
  • 3 篇 transforms
  • 3 篇 clustering algor...
  • 3 篇 data visualizati...
  • 3 篇 cryptography
  • 3 篇 transportation
  • 2 篇 parallel process...
  • 2 篇 representation l...
  • 2 篇 distillation
  • 2 篇 data centers
  • 2 篇 motion planning
  • 2 篇 anomaly detectio...
  • 2 篇 planning
  • 2 篇 network topology

机构

  • 16 篇 peng cheng labor...
  • 10 篇 peking universit...
  • 9 篇 national enginee...
  • 8 篇 national enginee...
  • 7 篇 school of comput...
  • 7 篇 college of compu...
  • 6 篇 zte corporation
  • 6 篇 inner mongolia e...
  • 6 篇 peking universit...
  • 6 篇 inner mongolia k...
  • 5 篇 college of compu...
  • 5 篇 school of comput...
  • 5 篇 national enginee...
  • 5 篇 shenyang branch ...
  • 5 篇 college of mecha...
  • 5 篇 national enginee...
  • 5 篇 liaoning provinc...
  • 5 篇 school of inform...
  • 5 篇 beijing normal u...
  • 5 篇 fujian provincia...

作者

  • 11 篇 bin cui
  • 10 篇 tong yang
  • 9 篇 yang tong
  • 9 篇 cui bin
  • 8 篇 jian-tao zhou
  • 6 篇 wei zeng
  • 6 篇 chang kuo-chi
  • 6 篇 jianxiao wang
  • 5 篇 zhao yikai
  • 5 篇 yuhan wu
  • 5 篇 shuai yuan
  • 5 篇 yuan xiaoru
  • 5 篇 yikai zhao
  • 5 篇 wu yuhan
  • 4 篇 deng yongqiang
  • 4 篇 xiong yi
  • 4 篇 guo jiarui
  • 4 篇 zheng zhong
  • 4 篇 yang xinquan
  • 4 篇 li xuguang

语言

  • 168 篇 英文
  • 9 篇 其他
  • 3 篇 中文
检索条件"机构=National Engineering Laboratory for Big Data Algorithm and Analysis Technology"
179 条 记 录,以下是141-150 订阅
排序:
On energy-efficient NOMA designs for heterogeneous low-latency downlink transmissions
arXiv
收藏 引用
arXiv 2018年
作者: Xu, Yanqing Shen, Chao Chang, Tsung-Hui Lin, Shih-Chun Zhao, Yajun Zhu, Gang State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing China School of Science and Engineering Chinese University of Hong Kong Shenzhen China Shenzhen Research Institute of Big Data Shenzhen China Department of Department of Electronic and Computer Engineering National Taiwan University of Science and Technology Taipei Taiwan Algorithm Department Wireless Product RandD Institute ZTE Corporation Shenzhen China
This paper investigates energy-efficient resource allocation for the two-user downlink with strict latency constraints at users. To cope with strict latency constraints, the capacity formula of the finite blocklength ... 详细信息
来源: 评论
Real-time chaotic video encryption based on multithreaded parallel confusion and diffusion
arXiv
收藏 引用
arXiv 2023年
作者: Jiang, Dong Yuan, Zhen Li, Wen-Xin Lu, Liang-Liang School of Internet Anhui University Hefei230039 China National Engineering Research Center of Agro-Ecological Big Data Analysis and Application Anhui University Hefei230601 China Key Laboratory of Optoelectronic Technology of Jiangsu Province Nanjing Normal University Nanjing210023 China School of Physical Science and Technology Nanjing Normal University Nanjing210023 China National Laboratory of Solid State Microstructures Nanjing University Nanjing210093 China
MSC Codes 68P25 (Primary) 68W10 (Secondary)Due to the strong correlation between adjacent pixels, most image encryption schemes perform multiple rounds of confusion and diffusion to protect the image against attacks. ... 详细信息
来源: 评论
Model-enhanced Vector Index
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Hailin Wang, Yujing Chen, Qi Chang, Ruiheng Zhang, Ting Miao, Ziming Hou, Yingyan Ding, Yang Miao, Xupeng Wang, Haonan Pang, Bochen Zhan, Yuefeng Sun, Hao Deng, Weiwei Zhang, Qi Yang, Fan Xie, Xing Yang, Mao Cui, Bin School of Computer Science Key Lab of High Confidence Software Technologies Peking University China Microsoft United States Aerospace Information Research Institute Key Laboratory of Target Cognition and Application Technology Chinese Academy of Sciences China Institute of Information Engineering Chinese Academy of Sciences China Carnegie Mellon University United States National University of Singapore Singapore National Engineering Laboratory for Big Data Analysis and Applications Peking University China
Embedding-based retrieval methods construct vector indices to search for document representations that are most similar to the query representations. They are widely used in document retrieval due to low latency and d... 详细信息
来源: 评论
Research on Pre-view Method of Safety Level of Cascading Trip for Power Grid  6th
Research on Pre-view Method of Safety Level of Cascading Tri...
收藏 引用
6th International Conference on Advanced Machine Learning Technologies and Applications, AMLTA 2021
作者: Deng, Huiqiong Li, Qinbin Zheng, Rongjin Li, Peiqiang Chang, Kuo-Chi School of Information Science and Engineering Fujian University of Technology No. 3 Xueyuan Road University Town Minhou Fuzhou Fujian350118 China Fujian Provincial University Engineering Research Center of Smart Grid Simulation Analysis and Integrated Control Fuzhou Fujian350118 China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology No. 3 Xueyuan Road University Town Minhou Fuzhou Fujian350118 China College of Mechanical & Electrical Engineering National Taipei University of Technology No. 1 Section 3 Zhongxiao East Road Taipei10608 Taiwan Department of Business Administration North Borneo University College Lot 47 Block-F Alamesra Permai Plaza 2 Jln Sulaman Kota Kinabalu Sabah88400 Malaysia
This article introduces a method by which the power grid's security level can be observed in advance based on the expected initial failure. Firstly, based on the general form of cascading trip, this paper gives a ... 详细信息
来源: 评论
Energy-efficient non-orthogonal transmission under reliability and finite blocklength constraints
arXiv
收藏 引用
arXiv 2017年
作者: Xu, Yanqing Shen, Chao Chang, Tsung-Hui Lin, Shih-Chun Zhao, Yajun Zhu, Gang State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing China School of Science and Engineering Chinese University of Hong Kong Shenzhen China Shenzhen Research Institute of Big Data Shenzhen China Department of ECE National Taiwan University of Science and Technology Taipei Taiwan Algorithm Department Wireless Product R&D Institute ZTE Corporation Shenzhen China
This paper investigates an energy-efficient nonorthogonal transmission design problem for two downlink receivers that have strict reliability and finite blocklength (latency) constraints. The Shannon capacity formula ... 详细信息
来源: 评论
Two-Stream Regression Network for Dental Implant Position Prediction
arXiv
收藏 引用
arXiv 2023年
作者: Yang, Xinquan Li, Xuguang Li, Xuechen Chen, Wenting Shen, Linlin Li, Xin Deng, Yongqiang College of Computer Science and Software Engineering Shenzhen University Shenzhen China AI Research Center for Medical Image Analysis and Diagnosis Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Department of Stomatology Shenzhen University General Hospital Shenzhen China Department of Electrical Engineering City University of Hong Kong Hong Kong
In implant prosthesis treatment, the design of surgical guide requires lots of manual labors and is prone to subjective variations. When deep learning based methods has started to be applied to address this problem, t... 详细信息
来源: 评论
Similarity Mining via Implicit Matching Pattern Learning for Kinship Verification
Similarity Mining via Implicit Matching Pattern Learning for...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Xiaoke Zhu Danyang Li Xiaopan Chen Fumin Qi Fan Zhang Xiao-Yuan Jing School of Computer and Information Engineering Henan University Kaifeng China Henan Engineering Research Center of Intelligent Technology and Application Henan University Kaifeng China Department of System Operation National Supercomuting Center in Shenzhen Shenzhen China Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng China School of Computer Science Wuhan University Wuhan China
Facial image based kinship verification aims to decide whether there exists kinship between the given facial images. In practice, the cross-generation differences will cause adverse effects on kinship verification, wh... 详细信息
来源: 评论
The Cauchy problem for two dimensional generalized Kadomtsev-Petviashvili-I equation in anisotropic Sobolev spaces
arXiv
收藏 引用
arXiv 2017年
作者: Yan, Wei Li, Yongsheng Huang, Jianhua Duan, Jinqiao School of Mathematics and Information Science Henan Engineering Laboratory for Big Data Statistical Analysis and Optimal Control Henan Normal University Xinxiang Henan453007 China School of Mathematics South China University of Technology Guangzhou Guangdong510640 China College of Science National University of Defense Technology Changsha Hunan410073 China Department of Applied Mathematics Illinois Institute of Technology ChicagoIL60616 United States
The goal of this paper is three-fold. Firstly, we prove that the Cauchy problem for generalized KP-I equation ut+ |Dx|αθxu + θ-1xθ2yu + 1/2 θx(u2) = 0, α ≥ 4 is locally well-posed in the anisotropic Sobolev spa... 详细信息
来源: 评论
Counterfactual data Augmentation with Denoising Diffusion for Graph Anomaly Detection
arXiv
收藏 引用
arXiv 2024年
作者: Xiao, Chunjing Pang, Shikang Xu, Xovee Li, Xuan Trajcevski, Goce Zhou, Fan The School of Computer and Information Engineering Henan University China The Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng475004 China The University of Electronic Science and Technology of China Sichuan Chengdu610054 China The National Key Laboratory of Fundamental Science on Synthetic Vision Sichuan University Chengdu610065 China The Department of Electrical and Computer Engineering Iowa State University AmesIA50011 United States
A critical aspect of Graph Neural Networks (GNNs) is to enhance the node representations by aggregating node neighborhood information. However, when detecting anomalies, the representations of abnormal nodes are prone... 详细信息
来源: 评论
Generating High-quality Movie Tags from Social Reviews: A Learning-driven Approach
Generating High-quality Movie Tags from Social Reviews: A Le...
收藏 引用
IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social Computing (CPSCom) Green Computing and Communications (GreenCom)
作者: Zhenxiao Luo Guopin Tang Chen Wang Yipeng Zhou Xi Zheng Jessie Hui Wang Gang Liu Di Wu School of Computer Science and Engineering Sun Yat-Sen University Guangzhou China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China Faculty of Science and Engineering Macquarie University Sydney Australia Institute for Network Sciences and Cyberspace Beijing National Research Center for Information Science and Technology Tsinghua University Beijing China College of Computer Science and Software Engineering Shenzhen University Shenzhen China
As a kind of keywords to describe video contents, tags are extremely beneficial for viewers to locate videos when they search the site. Additionally, tags also help video platform operators to better organize and reco... 详细信息
来源: 评论