咨询与建议

限定检索结果

文献类型

  • 594 篇 期刊文献
  • 311 篇 会议

馆藏范围

  • 905 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 550 篇 工学
    • 259 篇 计算机科学与技术...
    • 203 篇 软件工程
    • 121 篇 信息与通信工程
    • 114 篇 电气工程
    • 110 篇 电子科学与技术(可...
    • 69 篇 仪器科学与技术
    • 57 篇 光学工程
    • 52 篇 航空宇航科学与技...
    • 48 篇 控制科学与工程
    • 43 篇 动力工程及工程热...
    • 41 篇 生物工程
    • 36 篇 化学工程与技术
    • 28 篇 环境科学与工程(可...
    • 25 篇 机械工程
    • 19 篇 材料科学与工程(可...
    • 17 篇 力学(可授工学、理...
    • 17 篇 建筑学
    • 16 篇 土木工程
  • 465 篇 理学
    • 188 篇 物理学
    • 168 篇 地球物理学
    • 124 篇 数学
    • 59 篇 生物学
    • 56 篇 统计学(可授理学、...
    • 47 篇 大气科学
    • 34 篇 化学
    • 25 篇 天文学
  • 103 篇 管理学
    • 65 篇 管理科学与工程(可...
    • 44 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 20 篇 农学
  • 15 篇 法学
    • 14 篇 社会学
  • 14 篇 医学
  • 12 篇 经济学
  • 3 篇 教育学
  • 3 篇 文学
  • 3 篇 军事学

主题

  • 14 篇 stars
  • 14 篇 optimization
  • 14 篇 feature extracti...
  • 13 篇 gamma rays
  • 11 篇 polarization
  • 11 篇 galaxies
  • 11 篇 polarimeters
  • 11 篇 training
  • 10 篇 deep learning
  • 10 篇 speech processin...
  • 10 篇 computational mo...
  • 10 篇 machine learning
  • 9 篇 pulsars
  • 9 篇 three-dimensiona...
  • 9 篇 signal processin...
  • 9 篇 semantics
  • 9 篇 remote sensing
  • 9 篇 accuracy
  • 8 篇 throughput
  • 8 篇 supernovae

机构

  • 43 篇 university of ch...
  • 41 篇 school of comput...
  • 37 篇 national astrono...
  • 37 篇 national enginee...
  • 35 篇 department of ph...
  • 32 篇 shanghai astrono...
  • 32 篇 national astrono...
  • 32 篇 perimeter instit...
  • 31 篇 kavli institute ...
  • 30 篇 california insti...
  • 30 篇 waterloo centre ...
  • 30 篇 school of cyber ...
  • 29 篇 instituto de ast...
  • 29 篇 key laboratory o...
  • 29 篇 enrico fermi ins...
  • 28 篇 university of sc...
  • 27 篇 data science ins...
  • 27 篇 cornell center f...
  • 26 篇 hubei key labora...
  • 26 篇 national enginee...

作者

  • 33 篇 gurwell mark
  • 32 篇 bremer michael
  • 32 篇 broderick avery ...
  • 31 篇 fromm christian ...
  • 31 篇 friberg per
  • 30 篇 james david j.
  • 30 篇 christian pierre
  • 30 篇 bronzwaer thomas
  • 30 篇 fish vincent l.
  • 30 篇 blackburn lindy
  • 29 篇 chael andrew
  • 29 篇 brissenden roger
  • 28 篇 chan chi-kwan
  • 28 篇 huang chih-wei l...
  • 28 篇 bower geoffrey c...
  • 27 篇 conway john e.
  • 27 篇 eatough ralph p.
  • 27 篇 davelaar jordy
  • 27 篇 johnson michael ...
  • 27 篇 issaoun sara

语言

  • 805 篇 英文
  • 77 篇 其他
  • 19 篇 中文
检索条件"机构=National Key Laboratory of Data Space Technology and System"
905 条 记 录,以下是41-50 订阅
排序:
Seastar: A Cache-Efficient and Load-Balanced key-Value Store on Disaggregated Memory
Seastar: A Cache-Efficient and Load-Balanced Key-Value Store...
收藏 引用
2024 IEEE International Conference on Cluster Computing, CLUSTER 2024
作者: Du, Jingwen Wang, Fang Feng, Dan Zeng, Dexin Yi, Sheng Engineering Research Center of Data Storage Systems and Technology Ministry of Education of China Wuhan National Laboratory for Optoelectronics Key Laboratory of Information Storage System China School of Computer Science and Technology Huazhong University of Science and Technology China Shenzhen Huazhong University of Science and Technology Research Institute China
In modern datacenters, memory disaggregation un-packs monolithic servers to build independent network-connected compute and memory pools, greatly improving resource uti-lization. Existing memory-disaggregated key-valu... 详细信息
来源: 评论
Few-Shot Source Separation for IoT Anti-Jamming via Multi-Task Learning and Meta-Learning
收藏 引用
IEEE Internet of Things Journal 2025年 第11期12卷 16761-16776页
作者: Guo, Pengcheng Yu, Miao Li, Cheng An, Kang Sun, Yifu Chatzinotas, Symeon Niyato, Dusit National University of Defense Technology Sixty-Third Research Institute China State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System China Kyung Hee University College of Electronics and Information Yongin-si17104 Korea Republic of Nanyang Technological University College of Computing and Data Science Singapore639798 Singapore
Malicious jamming attacks pose a significant threat to the integrity and performance of Internet of Things (IoT) networks. However, many jamming patterns are rare or infrequent, which makes them difficult to counter e... 详细信息
来源: 评论
A Revisit of Landsat-Observed Macroalgal Blooms in the Yellow Sea and East China Sea Before 2008
收藏 引用
Journal of Ocean University of China 2025年 第2期24卷 525-531页
作者: YUAN Chao HUANG Juan WU Lingjuan XIAO Jie ZHANG Xuelei GAO Song LI Yifei XU Jiangling WANG Zongling Shandong Key Laboratory of Marine Ecological Environment and Disaster Prevention and Mitigation North China Sea Marine Forecasting and Hazard Mitigation CenterMinistry of Natural ResourcesQingdao 266061China Laboratory for Marine Ecology and Environmental Science Qingdao Marine Science and Technology CenterQingdao 266061China First Institute of Oceanography Ministry of Natural ResourcesQingdao 266061China National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology Xi’an 710129China
Harmful macroalgal blooms caused by Ulva prolifera and Sargassum horneri are increasing in the Yellow Sea and East China ***,our understanding of macroalgal blooms before 2008 is fragmented and *** time-series Landsat... 详细信息
来源: 评论
On the Security of Smart Home systems:A Survey
收藏 引用
Journal of Computer Science & technology 2023年 第2期38卷 228-247页
作者: 袁斌 万俊 吴宇晗 邹德清 金海 School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Distributed System Security Huazhong University of Science and Technology Wuhan 430074China Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan 430074China National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen 518057China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t... 详细信息
来源: 评论
Improved Demonstration-Knowledge Utilization in Reinforcement Learning
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第5期5卷 2139-2150页
作者: Liu, Yanyu Zeng, Yifeng Ma, Biyang Pan, Yinghui Gao, Huifan Zhang, Yuting Xiamen University Xiamen Key Laboratory of Big Data Intelligent Analysis and Decision Department of Automation Xiamen361102 China Northumbria University Department of Computer and Information Sciences NewcastleNE1 8ST United Kingdom Minnan Normal University Department of Computer Science Zhangzhou363000 China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China
Reinforcement learning (RL) has made great success in recent years. Generally, the learning process requires a huge amount of interaction with the environment before an agent can achieve acceptable performance. This m... 详细信息
来源: 评论
Towards Effective and Efficient Error Handling Code Fuzzing Based on Software Fault Injection  31
Towards Effective and Efficient Error Handling Code Fuzzing ...
收藏 引用
31st IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2024
作者: Chen, Kang Wen, Ming Jia, Haoxiang Wu, Rongxin Jin, Hai Wuhan430074 China Jin YinHu Laboratory Wuhan430074 China School of Informatics Xiamen University Xiamen361005 China School of Computer Science and Technology HUST Wuhan430074 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China
Software systems often encounter various errors or exceptions in practice, and thus proper error handling code is essential to ensure the reliability of software systems. Unfortunately, error handling code is often bu... 详细信息
来源: 评论
Two drifting paths of Sargassum bloom in the Yellow Sea and East China Sea during 2019-2020
收藏 引用
Acta Oceanologica Sinica 2022年 第6期41卷 78-87页
作者: Chao Yuan Jie Xiao Xuelei Zhang Mingzhu Fu Zongling Wang The MNR Key Laboratory of Marine Eco-Environmental Science and Technology First Institute of OceanographyMinistry of Natural ResourcesQingdao 266061China Laboratory of Marine Ecology and Environmental Science Pilot National Laboratory for Marine Science and Technology(Qingdao)Qingdao 266237China National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology Xi'an 710129China
The macroalgal blooms of floating brown algae Sargassum horneri are increasing in the Yellow Sea and East China Sea during the past few ***,the annual pattern of Sargassum bloom is not well *** study the developing pa... 详细信息
来源: 评论
Dual-Polarized Wideband Wide-Beam Millimeter-Wave Magneto-Electric Dipole Antenna
Dual-Polarized Wideband Wide-Beam Millimeter-Wave Magneto-El...
收藏 引用
2023 Cross Strait Radio Science and Wireless technology Conference, CSRSWTC 2023
作者: Gou, Linglong Ma, Jing Shi, Bin Zhu, Zhongbo Peng, Lin Guilin University of Electronic Technology Key Laboratory of Microwave and Optical Wave Application Technology Guangxi Guilin541004 China Beijing Simulation Center The Science and Technology on Special System Simulation Laboratory Beijing100854 China The National Key Laboratory of Science and Technology on Space Microwave Xi'an710100 China
In this manuscript, a dual-polarized wideband wide beamwidth magneto-electric (ME) dipole antenna for millimeter-wave mobile communication is proposed. As can be seen from the simulation results, this design exhibits ... 详细信息
来源: 评论
Intersecting-Boundary-Sensitive Fingerprinting for Tampering Detection of DNN Models  41
Intersecting-Boundary-Sensitive Fingerprinting for Tampering...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Bai, Xiaofan He, Chaoxiang Ma, Xiaojing Zhu, Bin Benjamin Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Microsoft United States School of Computer Science and Technology Huazhong University of Science and Technology China Cluster and Grid Computing Lab China
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr... 详细信息
来源: 评论
AISLE: Self-supervised Representation Learning for the Investigation of Advanced Persistent Threat  7
AISLE: Self-supervised Representation Learning for the Inves...
收藏 引用
7th IEEE International Conference on data Science in Cyberspace, DSC 2022
作者: Jia, Zian Wang, Xiaosu Xiong, Yun Zhang, Yao Zhao, JinJing Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China National Key Laboratory of Science and Technology on Information System Security China
Advanced Persistent Threats (APT) are difficult to detect and defend due to their high variability and concealment. Current APT detection and investigation approaches suffer from two major problems. First, most recent... 详细信息
来源: 评论