咨询与建议

限定检索结果

文献类型

  • 1,428 篇 会议
  • 1,290 篇 期刊文献
  • 36 册 图书

馆藏范围

  • 2,754 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,776 篇 工学
    • 1,145 篇 计算机科学与技术...
    • 938 篇 软件工程
    • 332 篇 信息与通信工程
    • 195 篇 电气工程
    • 184 篇 控制科学与工程
    • 174 篇 生物工程
    • 166 篇 电子科学与技术(可...
    • 148 篇 仪器科学与技术
    • 127 篇 光学工程
    • 118 篇 生物医学工程(可授...
    • 111 篇 机械工程
    • 91 篇 化学工程与技术
    • 85 篇 核科学与技术
    • 76 篇 土木工程
    • 74 篇 动力工程及工程热...
    • 71 篇 安全科学与工程
    • 62 篇 建筑学
    • 58 篇 航空宇航科学与技...
  • 1,025 篇 理学
    • 410 篇 数学
    • 396 篇 物理学
    • 200 篇 生物学
    • 123 篇 统计学(可授理学、...
    • 119 篇 化学
    • 103 篇 地球物理学
    • 71 篇 系统科学
  • 423 篇 管理学
    • 270 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 123 篇 医学
    • 111 篇 临床医学
    • 87 篇 基础医学(可授医学...
  • 62 篇 法学
  • 28 篇 教育学
  • 27 篇 经济学
  • 27 篇 农学
  • 11 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学
  • 2 篇 哲学
  • 1 篇 历史学

主题

  • 106 篇 hadron colliders
  • 54 篇 computer science
  • 54 篇 software
  • 53 篇 computer archite...
  • 52 篇 training
  • 49 篇 semantics
  • 47 篇 computational mo...
  • 46 篇 deep learning
  • 42 篇 machine learning
  • 40 篇 feature extracti...
  • 38 篇 software enginee...
  • 34 篇 accuracy
  • 33 篇 laboratories
  • 32 篇 wireless sensor ...
  • 32 篇 hardware
  • 31 篇 optimization
  • 29 篇 neutrons
  • 28 篇 w & z bosons
  • 28 篇 application soft...
  • 27 篇 monitoring

机构

  • 151 篇 centro brasileir...
  • 150 篇 national and kap...
  • 150 篇 istanbul technic...
  • 150 篇 yerevan physics ...
  • 149 篇 university of sp...
  • 148 篇 universidad iber...
  • 146 篇 brunel universit...
  • 146 篇 indian institute...
  • 146 篇 charles universi...
  • 145 篇 academy of scien...
  • 141 篇 university of de...
  • 139 篇 università di to...
  • 139 篇 imperial college...
  • 139 篇 zhejiang univers...
  • 139 篇 rwth aachen univ...
  • 136 篇 infn sezione di ...
  • 132 篇 department of ph...
  • 131 篇 department of ph...
  • 124 篇 infn sezione di ...
  • 123 篇 università di ca...

作者

  • 129 篇 ardid m.
  • 128 篇 ferrara g.
  • 111 篇 g. tonelli
  • 111 篇 d. barney
  • 111 篇 l. valencia palo...
  • 111 篇 t. liu
  • 111 篇 c. hensel
  • 111 篇 a. garcia-bellid...
  • 111 篇 a. steen
  • 111 篇 n. cartiglia
  • 111 篇 n. colino
  • 111 篇 f. moortgat
  • 111 篇 b. clerbaux
  • 111 篇 g. sultanov
  • 111 篇 m. a. ciocci
  • 111 篇 k. lamichhane
  • 111 篇 s. maselli
  • 111 篇 e. migliore
  • 110 篇 a. babaev
  • 110 篇 v. karjavine

语言

  • 2,533 篇 英文
  • 164 篇 其他
  • 51 篇 中文
  • 1 篇 德文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Research Institute for Computer Architecture and Software Technology"
2754 条 记 录,以下是191-200 订阅
排序:
Few-shot Object Detection Algorithm Based on YOLOv8-Mamba-Like Linear Attention  16
Few-shot Object Detection Algorithm Based on YOLOv8-Mamba-Li...
收藏 引用
16th International Conference on Communication software and Networks, ICCSN 2024
作者: Wang, Hongliang Wang, Kaizhu Ji, Binglong Deng, Changyi Shenyang Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Liaoning Province Human- Computer Interaction System Engineering Research Center Based on DigitTwin Shenyang China Shenyang Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Shenyang China Institute of Software China Industrial Control Systems Cyber Emergency Response Team Beijing China
In the production and assembly process, the accuracy of detection is usually low due to limited resources and small quantities. In this paper, we propose a few-shot learning method for object detection based on the co... 详细信息
来源: 评论
FGLight: Learning Neighbor-level Information for Traffic Signal Control  25
FGLight: Learning Neighbor-level Information for Traffic Sig...
收藏 引用
Proceedings of the 24th International Conference on Autonomous Agents and Multiagent Systems
作者: Hang Xiao Huale Li Shuhan Qi Jiajia Zhang DingZhong Cai School of Software Northwest Polytechnical University Xi'an China School of Software Northwest Polytechnical University & Yangtze River Delta Research Institute of NPU Xi 'an China School of Computer Science and Technology Harbin Insitute of Technology Shenzhen Shenzhen China School of Computer Science and Technology Harbin Institute of Technology Shenzhen Shenzhen China School of Software Northwestern Polytechnical University Xi'an China
In recent years, multi-agent reinforcement learning (MARL) methods have increasingly been applied to traffic signal control and have achieved some success. However, most of existing MARL methods often underemphasize t... 详细信息
来源: 评论
PathLAD+: An Improved Exact Algorithm for Subgraph Isomorphism Problem  32
PathLAD+: An Improved Exact Algorithm for Subgraph Isomorphi...
收藏 引用
32nd International Joint Conference on Artificial Intelligence, IJCAI 2023
作者: Wang, Yiyuan Jin, Chenghou Cai, Shaowei Lin, Qingwei School of Computer Science and Information Technology Northeast Normal University China Key Laboratory of Applied Statistics of MOE Northeast Normal University Changchun China Computer School Beijing Information Science and Technology University Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences China Microsoft Research China
The subgraph isomorphism problem (SIP) is a challenging problem with wide practical applications. In the last decade, despite being a theoretical hard problem, researchers designed various algorithms for solving SIP. ... 详细信息
来源: 评论
Low-rank matrix recovery with total generalized variation for defending adversarial examples
收藏 引用
Frontiers of Information technology & Electronic Engineering 2024年 第3期25卷 432-445页
作者: Wen LI Hengyou WANG Lianzhi HUO Qiang HE Linlin CHEN Zhiquan HE Wing W.Y.Ng School of Science Beijing University of Civil Engineering and ArchitectureBeijing 100044China School of Computer Science and Engineering South China University of TechnologyGuangzhou 510006China Aerospace Information Research Institute Chinese Academy of SciencesBeijing 100094China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen 518060China Institute of Big Data Modeling and Technology Beijing University of Civil Engineering and ArchitectureBeijing 100044China
Low-rank matrix decomposition with first-order total variation(TV)regularization exhibits excellent performance in exploration of image *** advantage of its excellent performance in image denoising,we apply it to impr... 详细信息
来源: 评论
Overview of Medical Data Privacy Protection based on Blockchain technology  7
Overview of Medical Data Privacy Protection based on Blockch...
收藏 引用
7th IEEE International Conference on Smart Cloud, SmartCloud 2022
作者: Chen, Lin Yu, Qingchun Liang, Wei Cai, Jiahong Zhu, Hangyu Xie, Songyou Hunan University of Science and Technology Hunan Key Laboratory for Service computing and Novel Software Technology School of Computer Science and Engineering Xiangtan China Shenzhen Research Institute Sun Yat-sen University and Novel Software Technology ShenZhen China Hunan University College of Computer Science and Electronic Engineering Changsha China
With the increasing growth of electronic medical data, the difficulties of data sharing among medical institutions and the leakage of data privacy have become the focus of the public and medical workers. The blockchai... 详细信息
来源: 评论
Digital Human Techniques for Education Reform  24
Digital Human Techniques for Education Reform
收藏 引用
7th International Conference on Educational technology Management, ICETM 2024
作者: Guo, Peirong Zhang, Qi Tian, Chunwei Xue, Wanli Feng, Xiaocheng School of Software Northwestern Polytechnical University Shaanxi Xi’an China School of Economics and Management Harbin Institute of Technology at Weihai Shandong Weihai China Shenzhen Research Institute of Northwestern Polytechnical University Northwestern Polytechnical University Guangdong Shenzhen China School of Computer Science and Engineering Tianjin University of Technology Tianjin China Research Center for Social Computing and Information Retrieval Harbin Institute of Technology Heilongjiang Harbin China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen University Guangdong Shenzhen China
The rapid evolution of artificial intelligence, big data, and generative AI models has ushered in significant transformations across various sectors, including education. Digital Human Technique, an innovative technol... 详细信息
来源: 评论
3rd Workshop on Adverse Impacts and Collateral Effects of Artificial Intelligence Technologies
收藏 引用
CEUR Workshop Proceedings 2023年 3593卷
作者: Aïmeur, Esma Díaz Ferreyra, Nicolás E. Department of Computer Science and Operations Research University of Montréal Canada Institute of Software Security Hamburg University of Technology Germany
来源: 评论
Hierarchical Machine Unlearning  1
收藏 引用
17th International Conference on Learning and Intelligent Optimization, LION-17 2023
作者: Zhu, HongBin Xia, YuXiao Li, YunZhao Li, Wei Liu, Kang Gao, Xianzhou Big Data Center State Grid of China Beijing100012 China State Grid Smart Grid Research Institute Shanghai200016 China State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing200016 China
In recent years, deep neural networks have enjoyed tremendous success in industry and academia, especially for their applications in visual recognition and natural language processing. While large-scale deep models br... 详细信息
来源: 评论
Towards Query-Efficient Decision-Based Adversarial Attacks Through Frequency Domain
Towards Query-Efficient Decision-Based Adversarial Attacks T...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Jianhao Fu Xiang Ling Yaguan Qian Changjiang Li Tianyue Luo Jingzheng Wu Intelligent Software Research Center Institute of Software Chinese Academy of Sciences University of Chinese Academy of Sciences Nanjing Nanjing Institute of Software Technology Key Laboratory of System Software (Chinese Academy of Sciences) State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Zhejiang University of Science and Technology Stony Brook University
Deep neural networks are vulnerable to adversarial examples, where decision-based attacks can generate adversarial examples based solely on the predicted labels. However, these attacks typically require excessive quer... 详细信息
来源: 评论
Patch Target Guided Dual-Branch Deep Multiple Instance Learning for 3D MRI Analysis
Patch Target Guided Dual-Branch Deep Multiple Instance Learn...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Dai, Mingzhe Shi, Xiaoshuang Zhu, Xiaofeng Pan, Tingrui Li, Kang University of Science and Technology of China School of Software Engineering Hefei China West China Hospital of Sichuan University West China Biomedical Big Data Center Chengdu China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu China Sichuan Artificial Intelligence Research Institute Yibin China University of Science and Technology of China Suzhou Institute for Advanced Research Suzhou China Shanghai Artificial Intelligence Laboratory Shanghai China
Deep multiple instance learning (MIL) has attracted considerable attention in medical image analysis, since it only requires image-level labels for model training without using fine-grained (or patch) annotations. Unf... 详细信息
来源: 评论