咨询与建议

限定检索结果

文献类型

  • 2,569 篇 期刊文献
  • 1,866 篇 会议
  • 26 册 图书

馆藏范围

  • 4,461 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,665 篇 工学
    • 1,409 篇 计算机科学与技术...
    • 1,144 篇 软件工程
    • 414 篇 信息与通信工程
    • 373 篇 电气工程
    • 350 篇 电子科学与技术(可...
    • 302 篇 控制科学与工程
    • 294 篇 光学工程
    • 263 篇 生物工程
    • 237 篇 仪器科学与技术
    • 232 篇 化学工程与技术
    • 206 篇 生物医学工程(可授...
    • 205 篇 机械工程
    • 194 篇 材料科学与工程(可...
    • 147 篇 航空宇航科学与技...
    • 108 篇 力学(可授工学、理...
    • 101 篇 交通运输工程
    • 97 篇 动力工程及工程热...
    • 88 篇 冶金工程
  • 2,103 篇 理学
    • 1,146 篇 物理学
    • 630 篇 数学
    • 376 篇 地球物理学
    • 332 篇 生物学
    • 265 篇 化学
    • 237 篇 统计学(可授理学、...
    • 112 篇 系统科学
  • 524 篇 管理学
    • 341 篇 管理科学与工程(可...
    • 198 篇 图书情报与档案管...
    • 133 篇 工商管理
  • 236 篇 医学
    • 190 篇 临床医学
    • 144 篇 基础医学(可授医学...
  • 83 篇 法学
  • 62 篇 农学
  • 58 篇 经济学
  • 37 篇 教育学
  • 12 篇 艺术学
  • 10 篇 军事学
  • 6 篇 文学
  • 2 篇 历史学
  • 1 篇 哲学

主题

  • 80 篇 computational mo...
  • 78 篇 semantics
  • 73 篇 training
  • 72 篇 deep learning
  • 72 篇 feature extracti...
  • 68 篇 machine learning
  • 48 篇 accuracy
  • 48 篇 gamma rays
  • 46 篇 predictive model...
  • 44 篇 cosmic rays
  • 43 篇 data models
  • 41 篇 robustness
  • 40 篇 computer archite...
  • 40 篇 neural networks
  • 39 篇 cosmology
  • 37 篇 artificial intel...
  • 36 篇 reinforcement le...
  • 34 篇 optimization
  • 33 篇 face recognition
  • 33 篇 visualization

机构

  • 215 篇 university of ch...
  • 127 篇 university of sc...
  • 106 篇 department of ph...
  • 94 篇 tianfu cosmic ra...
  • 88 篇 yunnan observato...
  • 87 篇 national astrono...
  • 86 篇 hebei normal uni...
  • 84 篇 state key labora...
  • 71 篇 key laboratory f...
  • 65 篇 nagoya universit...
  • 58 篇 school of artifi...
  • 58 篇 school of physic...
  • 52 篇 center for astro...
  • 49 篇 institute for nu...
  • 48 篇 center for space...
  • 47 篇 department of el...
  • 46 篇 institute of fro...
  • 44 篇 infn sezione di ...
  • 44 篇 north-west unive...
  • 43 篇 institut univers...

作者

  • 114 篇 bastieri d.
  • 81 篇 axikegu
  • 76 篇 fang j.
  • 76 篇 feng c.f.
  • 72 篇 jiang k.
  • 70 篇 li cheng
  • 69 篇 kuleshov d.
  • 68 篇 liu d.
  • 68 篇 asano k.
  • 67 篇 chen m.j.
  • 66 篇 li xin
  • 66 篇 liu s.m.
  • 66 篇 huang d.h.
  • 65 篇 dai h.l.
  • 62 篇 min z.
  • 61 篇 guo y.q.
  • 55 篇 heller m.
  • 54 篇 tamura t.
  • 54 篇 qin j.j.
  • 54 篇 bao y.w.

语言

  • 4,233 篇 英文
  • 185 篇 其他
  • 53 篇 中文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=National Research Center for Intelligent Computing Systems Institute of Computing Technology"
4461 条 记 录,以下是81-90 订阅
排序:
Reference Implementation of Scalable I/O Low-Level API on Intel Paragon
收藏 引用
Journal of Computer Science & technology 1999年 第3期14卷 206-223页
作者: 孙凝晖 National Research Center for Intelligent Computing systems Institute of Computing Technology Chinese Academy of Sciences Beijing P.R. China
The Scalable I/O (SIO) Initiative's Low-Level Application Pro- gramming Interface (SIO LLAPI)provides file system implementers with a simplelow-Level interface to support high-level parallel I/O interfaces efficie... 详细信息
来源: 评论
Learning to Learn Transferable Generative Attack for Person Re-Identification
收藏 引用
IEEE Transactions on Image Processing 2025年 PP卷 PP页
作者: Bian, Yuan Liu, Min Wang, Xueping Ma, Yunfeng Wang, Yaonan Hunan University National Engineering Research Center of Robot Visual Perception and Control Technology College of Electrical and Information Engineering Hunan Changsha China Hunan Normal University Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing College of Information Science and Engineering Hunan Changsha China
Deep learning-based person re-identification (reid) models are widely employed in surveillance systems and inevitably inherit the vulnerability of deep networks to adversarial attacks. Existing attacks merely consider... 详细信息
来源: 评论
Provably Secure Authenticated Key-Management Mechanism for e-Healthcare Environment
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Saleem, Muhammad Asad Li, Xiong Mahmood, Khalid Ghaffar, Zahid Xie, Yong Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan National Yunlin University of Science and Technology Graduate School of Engineering Science and Technology Douliu64002 Taiwan Qinghai Institute of Technology School of Computer and Information Science China Qinghai Provincial Laboratory for Intelligent Computing and Application China Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan250353 China
The Internet of Things (IoT) is rapidly permeating all aspects of human life, involving a network of devices that share sensitive data. A notable application is the e-healthcare systems, which employ connected sensors... 详细信息
来源: 评论
A Stealthy False Data Injection Attack Scheme Against Sensor Measurements Using Partial System Knowledge
收藏 引用
IEEE Transactions on Automatic Control 2025年
作者: Guo, Haibin Pang, Zhong-Hua Sun, Jian Han, Qing-Long Liu, Guo-Ping North China University of Technology Key Laboratory of Fieldbus Technology and Automation of Beijing Beijing100144 China Beijing University of Technology School of Information Science and Technology Beijing100124 China Beijing Institute of Technology National Key Laboratory of Autonomous Intelligent Unmanned Systems School of Automation Beijing100081 China Swinburne University of Technology School of Science Computing and Engineering Technologies MelbourneVIC3122 Australia Southern University of Science and Technology School of Automation and Intelligent Manufacturing Shenzhen518055 China
Attack design is indispensable for analyzing potential risks of networked control systems (NCSs). However, the remote control center is usually well protected and its knowledge is difficult to be disclosed, which beco... 详细信息
来源: 评论
BADA-LAT: Efficient Local Attention Transformer for Chinese Named Entity Recognition with Boundary and LLM-Based Data Augmentation  27th
BADA-LAT: Efficient Local Attention Transformer for Chinese ...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Qiu, Xiaoping Yang, Ke Du, Shiling School of Computing and Artificial Intelligence Southwest Jiaotong University No. 999 Xi’an Road Sichuan Chengdu611756 China Tangshan Institute of Southwest Jiaotong University No. 6 Jingqu Road Hebei Tangshan063000 China National United Engineering Laboratory of Integrated and Intelligent Transportation No. 111 North Section 1 Second Ring Road Sichuan Chengdu610031 China Sichuan Key Laboratory of Manufacturing Industry Chain Collaboration and Information Support Technology No. 999 Xi’an Road Sichuan Chengdu610016 China Engineering Research Center of Sustainable Urban Intelligent Transportation No. 999 Xi’an Road Sichuan Chengdu611756 China Sichuan Institute of Industrial Software Technology No. 61 Sha’wan Road Sichuan Chengdu610031 China
Progress in Chinese Named Entity Recognition (CNER) has highlighted lexicon-based methods that use word information to boost performance. However, these methods neglect two crucial aspects: the regulari... 详细信息
来源: 评论
A Joint Visual Compression and Perception Framework for Neuralmorphic Spiking Camera
arXiv
收藏 引用
arXiv 2025年
作者: Feng, Kexiang Jia, Chuanmin Ma, Siwei Gao, Wen Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China University of Chinese Academy of Sciences Beijing100049 China National Engineering Research Center of Visual Technology Peking University Beijing100871 China Wangxuan Institute of Computer Technology Peking University Beijing100080 China
The advent of neuralmorphic spike cameras has garnered significant attention for their ability to capture continuous motion with unparalleled temporal resolution. However, this imaging attribute necessitates considera... 详细信息
来源: 评论
Real-world Cyber Security Demonstration for Networked Electric Drives
收藏 引用
IEEE Journal of Emerging and Selected Topics in Power Electronics 2025年
作者: Yang, He Yang, Bowen Coshatt, Stephen Li, Qi Hu, Kun Hammond, Bryan Cooper Ye, Jin Parasuraman, Ramviyas Song, Wenzhan The Intelligent Power Electronics and Electric Machine Laboratory University of Georgia AthensGA30602 United States The Power Systems Engineering Center National Renewable Energy Laboratory GoldenCO80401 United States The Center for Cyber-Physical Systems University of Georgia AthensGA30602 United States Eaton ClevelandOH44122 United States Sino-German College of Intelligent Manufacturing Shenzhen Technology University Guangdong Shenzhen518118 China Research Lab the School of Computing University of Georgia AthensGA30602 United States
In this paper, we present the design and implementation of a cyber-physical security testbed for networked electric drive systems, aimed at conducting real-world security demonstrations. To our knowledge, this is one ... 详细信息
来源: 评论
RobNODDI: Robust NODDI Parameter Estimation with Adaptive Sampling Under Continuous Representation
RobNODDI: Robust NODDI Parameter Estimation with Adaptive S...
收藏 引用
15th International Workshop on Computational Diffusion MRI, CDMRI 2024, held in conjunction with 27th International Conference on Medical Image computing and Computer-Assisted Intervention, MICCAI 2024
作者: Xiao, Taohui Cheng, Jian Fan, Wenxin Yang, Jing Li, Cheng Dong, Enqing Wang, Shanshan School of Mechanical Electrical and Information Engineering Shandong University Weihai264209 China State Key Laboratory of Software Development Environment Beihang University Beijing China Key Laboratory of Data Science and Intelligent Computing Institute of International Innovation Beihang University Zhejiang Hangzhou China Paul C. Lauterbur Research Center for Biomedical Imaging Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Guangdong Shenzhen China Peng Cheng Laboratory Guangdong Shenzhen China
Neurite Orientation Dispersion and Density Imaging (NODDI) is an important imaging technology used to evaluate the microstructure of brain tissue, which is of great significance for the discovery and treatment of vari... 详细信息
来源: 评论
COph100: A comprehensive fundus image registration dataset from infants constituting the "RIDIRP" database
arXiv
收藏 引用
arXiv 2025年
作者: Hu, Yan Gong, Mingdao Qiu, Zhongxi Liu, Jiabao Shen, Hongli Yuan, Mingzhen Zhang, Xiaoqing Li, Heng Lu, Hai Liu, Jiang Research Institute of Trustworthy Autonomous Systems Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China Beijing Tongren Eye Center Beijing Tongren Hospital Capital Medical University Beijing Ophthalmology and Visual Sciences Key Laboratory Beijing China Center for High Performance Computing and Shenzhen Key Laboratory of Intelligent Bioinformatics Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China
Retinal image registration is vital for diagnostic therapeutic applications within the field of ophthalmology. Existing public datasets, focusing on adult retinal pathologies with high-quality images, have limited num... 详细信息
来源: 评论
MS-Glance: Bio-Inspired Non-Semantic Context Vectors and Their Applications in Supervising Image Reconstruction
MS-Glance: Bio-Inspired Non-Semantic Context Vectors and The...
收藏 引用
IEEE Workshop on Applications of Computer Vision (WACV)
作者: Ziqi Gao Wendi Yang Yujia Li Lei Xing S. Kevin Zhou Division of Life Sciences and Medicine School of Biomedical Engineering University of Science and Technology of China (USTC) Hefei Anhui China Center for Medical Imaging Robotics Analytic Computing & Learning (MIRACLE) Suzhou Institute for Advance Research USTC Suzhou Jiangsu China Key Laboratory of Intelligent Information Processing of Chinese Academy of Sciences (CAS) Institute of Computing Technology China Department of Radiation Oncology Stanford University Stanford CA USA Key Laboratory of Precision and Intelligent Chemistry USTC CAS Hefei Anhui
Non-semantic context information is crucial for visual recognition, as the human visual perception system first uses global statistics to process scenes rapidly before identifying specific objects. However, while sema... 详细信息
来源: 评论