咨询与建议

限定检索结果

文献类型

  • 154 篇 会议
  • 128 篇 期刊文献

馆藏范围

  • 282 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 184 篇 工学
    • 116 篇 计算机科学与技术...
    • 100 篇 软件工程
    • 40 篇 信息与通信工程
    • 22 篇 光学工程
    • 21 篇 生物医学工程(可授...
    • 19 篇 控制科学与工程
    • 18 篇 生物工程
    • 16 篇 电气工程
    • 13 篇 机械工程
    • 13 篇 电子科学与技术(可...
    • 13 篇 土木工程
    • 13 篇 航空宇航科学与技...
    • 9 篇 建筑学
    • 9 篇 交通运输工程
    • 8 篇 船舶与海洋工程
    • 7 篇 力学(可授工学、理...
    • 7 篇 化学工程与技术
  • 69 篇 理学
    • 28 篇 数学
    • 22 篇 物理学
    • 22 篇 生物学
    • 7 篇 化学
    • 6 篇 海洋科学
    • 6 篇 系统科学
  • 38 篇 管理学
    • 24 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 13 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
    • 9 篇 药学(可授医学、理...
  • 6 篇 教育学
    • 6 篇 教育学
  • 4 篇 经济学
  • 4 篇 法学
  • 4 篇 军事学
  • 2 篇 文学
  • 1 篇 农学

主题

  • 21 篇 laboratories
  • 20 篇 software enginee...
  • 12 篇 research and dev...
  • 9 篇 humans
  • 9 篇 delay
  • 8 篇 deep learning
  • 7 篇 object detection
  • 7 篇 programming
  • 6 篇 associative memo...
  • 6 篇 reinforcement le...
  • 6 篇 fuzzy systems
  • 6 篇 computational mo...
  • 6 篇 software quality
  • 5 篇 application soft...
  • 5 篇 computer archite...
  • 5 篇 neural networks
  • 5 篇 bandwidth
  • 5 篇 algorithm design...
  • 5 篇 feature extracti...
  • 5 篇 optimization met...

机构

  • 37 篇 state key labora...
  • 17 篇 state key labora...
  • 16 篇 school of comput...
  • 11 篇 school of comput...
  • 8 篇 microsoft resear...
  • 7 篇 research & devel...
  • 7 篇 china ship resea...
  • 7 篇 state key labora...
  • 6 篇 department of re...
  • 5 篇 systems developm...
  • 5 篇 university of ch...
  • 5 篇 state key labora...
  • 5 篇 shenzhen key lab...
  • 4 篇 national institu...
  • 4 篇 school of biomed...
  • 4 篇 china north vehi...
  • 4 篇 school of physic...
  • 4 篇 medical school o...
  • 4 篇 the university o...
  • 4 篇 riken aip

作者

  • 13 篇 bai xiao
  • 12 篇 xu yan
  • 8 篇 zhang xiong
  • 7 篇 s. tsuruta
  • 7 篇 fan yubo
  • 7 篇 t. onoyama
  • 7 篇 t. yamaguchi
  • 6 篇 t. takagi
  • 6 篇 gang zhou
  • 6 篇 zheng jin
  • 6 篇 zhang zhifan
  • 6 篇 chang eric i-cha...
  • 5 篇 wang longkan
  • 5 篇 k. oyanagi
  • 5 篇 lai maode
  • 5 篇 wei bingzheng
  • 5 篇 shen dinggang
  • 5 篇 h. ushida
  • 4 篇 ning xin
  • 4 篇 zhou gang

语言

  • 242 篇 英文
  • 35 篇 其他
  • 4 篇 中文
  • 1 篇 西班牙文
检索条件"机构=Research Laboratory in Development of Software Engineering"
282 条 记 录,以下是31-40 订阅
排序:
RobNODDI: Robust NODDI Parameter Estimation with Adaptive Sampling Under Continuous Representation  15th
RobNODDI: Robust NODDI Parameter Estimation with Adaptive S...
收藏 引用
15th International Workshop on Computational Diffusion MRI, CDMRI 2024, held in conjunction with 27th International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2024
作者: Xiao, Taohui Cheng, Jian Fan, Wenxin Yang, Jing Li, Cheng Dong, Enqing Wang, Shanshan School of Mechanical Electrical and Information Engineering Shandong University Weihai264209 China State Key Laboratory of Software Development Environment Beihang University Beijing China Key Laboratory of Data Science and Intelligent Computing Institute of International Innovation Beihang University Zhejiang Hangzhou China Paul C. Lauterbur Research Center for Biomedical Imaging Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Guangdong Shenzhen China Peng Cheng Laboratory Guangdong Shenzhen China
Neurite Orientation Dispersion and Density Imaging (NODDI) is an important imaging technology used to evaluate the microstructure of brain tissue, which is of great significance for the discovery and treatment of vari... 详细信息
来源: 评论
Computer-Vision-Based Non-Contact Paste Concentration Measurement*
Computer-Vision-Based Non-Contact Paste Concentration Measur...
收藏 引用
Automation in Manufacturing, Transportation and Logistics (ICaMaL), International Conference on
作者: Tailin Liang Zhaolin Yuan State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China Department of Industrial and Systems Engineering Research Institute of Advanced Manufacturing The Hong Kong Polytechnic University Hong Kong China
For monitoring the paste concentration, existing techniques, such as ultrasonic concentration meters and neutron meters, suffer from radiation hazards and low precision in high concentrations. This paper proposes a no... 详细信息
来源: 评论
Data Augmentation for Vulnerability Detection Based on Code Refactoring and Mixup
Data Augmentation for Vulnerability Detection Based on Code ...
收藏 引用
IEEE International Conference on software Reliability engineering Workshops (ISSRE Wksp)
作者: Ying Xing Jiaqi Huang Guilong Wang Yehao You Bin Yang Xiaofeng Li Yixing Luo School of Intelligent Engineering and Automation Beijing University of Posts and Telecommunications Beijing China School of Artifcial Intelligence Beijing University of Posts and Telecommunications Beijing China Yunnan Key Laboratory of Software Engineering Yunnan China China Unicom Research Institute Beijing China Software Development Center Beijing Institute of Control Engineering Beijing China
In recent years, the number of software vulnerabilities has gradually increased, posing a threat to the security of software, and identifying whether there are vulnerabilities in software is crucial for assuring its q...
来源: 评论
UAV navigation in high dynamic environments:A deep reinforcement learning approach
收藏 引用
Chinese Journal of Aeronautics 2021年 第2期34卷 479-489页
作者: Tong GUO Nan JIANG Biyue LI Xi ZHU Ya WANG Wenbo DU School of Electronic and Information Engineering Beihang UniversityBejing 100083China Key Laboratory of Advanced Technology of Near Space Information System(Beihang University) Ministry of Industry and Information Technology of ChinaBeijing 100083China Research Institute of Frontier Science Beihang UniversityBeijing 100083China College of Software Beihang UniversityBeijing 100083China State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100083China
Unmanned Aerial Vehicle(UAV) navigation is aimed at guiding a UAV to the desired destinations along a collision-free and efficient path without human interventions, and it plays a crucial role in autonomous missions i... 详细信息
来源: 评论
An Enhanced Authentication Protocol Suitable for Constrained RFID Systems
收藏 引用
IEEE Access 2024年 12卷 61610-61628页
作者: Hosseinzadeh, Mehdi Servati, Mohammad Reza Rahmani, Amir Masoud Safkhani, Masoumeh Lansky, Jan Janoscova, Renata Ahmed, Omed Hassan Tanveer, Jawad Lee, Sang-Woong Duy Tan University Institute of Research and Development Da Nang550000 Viet Nam Duy Tan University School of Medicine and Pharmacy Da Nang550000 Viet Nam Shahid Rajaee Teacher Training University Department of Computer Engineering Tehran16788-15811 Iran National Yunlin University of Science and Technology Future Technology Research Center Douliou Yunlin64002 Taiwan School of Computer Science Tehran19395-5746 Iran University of Finance and Administration Faculty of Economic Studies Department of Computer Science and Mathematics Prague101 00 Czech Republic University of Human Development Department of Information Technology Sulaymaniyah0778-6 Iraq Sejong University Department of Computer Science and Engineering Seoul05006 Korea Republic of Gachon University Pattern Recognition and Machine Learning Laboratory Department of Ai Software Seongnam-si13557 Korea Republic of
RFID technology offers an affordable and user-friendly solution for contactless identification of objects and individuals. However, the widespread adoption of RFID systems raises concerns regarding security and privac... 详细信息
来源: 评论
Thermodynamic Mechanism of Silica Modified Class G Well Cement Under High Temperature
SSRN
收藏 引用
SSRN 2024年
作者: Liu, Huiting Li, Tong Zhang, Jiaying Xu, Pu Xia, Xiujian Yu, Yongjin Liu, Lin Chen, Huisu CNPC Engineering Technology Research and Development software Company Limited Beijing102206 China Jiangsu Key Laboratory of Construction Materials School of Materials Science and Engineering Southeast University Nanjing211189 China College of Civil and Transportation Engineering Hohai University Nanjing210098 China
Under high temperatures, the strength retrogression caused by the formation of α-C2SH can be prevented by adding silica to generate tobermorite and xonotlite. However, the critical temperature and silica dosage for f... 详细信息
来源: 评论
CLGT: A Graph Transformer for Student Performance Prediction in Collaborative Learning
arXiv
收藏 引用
arXiv 2023年
作者: Peng, Tianhao Liang, Yu Wu, Wenjun Ren, Jian Pengrui, Zhao Pu, Yanjun State Key Laboratory of Software Development Environment Beihang University China School of Computer Science and Engineering Beihang University China Beijing Engineering Research Center for IoT Software and Systems Beijing University of Technology China Institute of Artificial Intelligence Beihang University China
Modeling and predicting the performance of students in collaborative learning paradigms is an important task. Most of the research presented in literature regarding collaborative learning focuses on the discussion for... 详细信息
来源: 评论
Grider-Ho: Rapid and Efficient Parallel software for High-Order Curvilinear Mesh Generation
SSRN
收藏 引用
SSRN 2024年
作者: Liu, Xiangyu Wang, He Zhao, Zhong Wang, Huadong Guan, Zhidong Wang, Nianhua School of Aeronautic Science and Engineering Beihang University Beijing100191 China Tianfu Engineering-oriented Numerical Simulation & Software Innovation Center Sichuan University Chengdu610207 China State Key Laboratory of Aerodynamics China Aerodynamics Research and Development Center Mianyang621000 China Computational Aerodynamics Institute China Aerodynamics Research and Development Center Mianyang621000 China
The advancement in high-order computational methods is reshaping the landscape of mesh generation in Computational Fluid Dynamics (CFD), steering the focus towards curvilinear mesh techniques to meet the escalating ac... 详细信息
来源: 评论
A CPK-Based Identity Authentication Scheme for IoT
收藏 引用
Computer Systems Science & engineering 2022年 第3期40卷 1217-1231页
作者: Mingming Zhang Jiaming Mao Yuanyuan Ma Liangjie Xu Chuanjun Wang Ran Zhao Zhihao Li Lu Chen Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information&Telecommunication BranchNanjing210008China State Grid Key Laboratory of Information&Network Security Institute of Information and CommunicationGlobal Energy Interconnection Research InstituteNanjing210003China Anhui Jiyuan Software Co.Ltd SGITGHefei230088China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Engineering Research Center of Broadband Wireless Communication Technology of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and *** existing ... 详细信息
来源: 评论
Diving into Continual Ultra-fine-grained Visual Categorization
Diving into Continual Ultra-fine-grained Visual Categorizati...
收藏 引用
Proceedings of the Digital Image Computing: Technqiues and Applications (DICTA)
作者: Pengcheng Zhang Xiaohan Yu Xiao Bai Jin Zheng Xiaoyu Wu Yongsheng Gao School of Computer Science and Engineering State Key Laboratory of Software Development Environment Jiangxi Research Institute Beihang University Beijing China Institute for Integrated and Intelligent Systems Griffith University Nathan Australia
Recent advance in ultra-fine-grained visual categorization (ultra-FGVC) has significantly boosted the capability of deep neural networks for ultra-FGVC tasks. However, building models for continually learning to recog...
来源: 评论