咨询与建议

限定检索结果

文献类型

  • 1,467 篇 会议
  • 995 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,464 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,604 篇 工学
    • 1,045 篇 计算机科学与技术...
    • 779 篇 软件工程
    • 322 篇 信息与通信工程
    • 246 篇 控制科学与工程
    • 175 篇 电子科学与技术(可...
    • 171 篇 电气工程
    • 145 篇 机械工程
    • 128 篇 生物工程
    • 77 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 69 篇 材料科学与工程(可...
    • 67 篇 化学工程与技术
    • 65 篇 生物医学工程(可授...
    • 63 篇 动力工程及工程热...
    • 54 篇 网络空间安全
    • 44 篇 安全科学与工程
  • 789 篇 理学
    • 435 篇 数学
    • 154 篇 生物学
    • 144 篇 物理学
    • 128 篇 统计学(可授理学、...
    • 107 篇 系统科学
    • 66 篇 化学
    • 32 篇 大气科学
  • 422 篇 管理学
    • 266 篇 管理科学与工程(可...
    • 176 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 60 篇 医学
    • 45 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 57 篇 法学
    • 47 篇 社会学
  • 29 篇 经济学
  • 24 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 85 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 41 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 35 篇 federated learni...
  • 34 篇 delay
  • 33 篇 web services
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 28 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 71 篇 the key laborato...
  • 55 篇 key laboratory o...
  • 51 篇 national enginee...
  • 47 篇 key laboratory o...
  • 41 篇 school of comput...
  • 41 篇 shandong provinc...
  • 40 篇 school of cyber ...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 33 篇 university of ch...
  • 30 篇 national enginee...
  • 30 篇 key laboratory o...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...

作者

  • 50 篇 xiaowei li
  • 37 篇 jin hai
  • 34 篇 hai jin
  • 33 篇 changjun jiang
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 24 篇 shen linlin
  • 23 篇 li xiaowei
  • 22 篇 cheng wang
  • 22 篇 mengchu zhou
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 20 篇 hu shengshan
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,223 篇 英文
  • 146 篇 其他
  • 102 篇 中文
检索条件"机构=Service Computing Technology and System Key Laboratory"
2464 条 记 录,以下是991-1000 订阅
排序:
PhysLLM: Harnessing Large Language Models for Cross-Modal Remote Physiological Sensing
arXiv
收藏 引用
arXiv 2025年
作者: Xie, Yiping Zhao, Bo Dai, Mingtong Zhou, Jian-Ping Sun, Yue Tan, Tao Xie, Weicheng Shen, Linlin Yu, Zitong Shenzhen University China Great Bay University China National Engineering Laboratory for Big Data System Computing Technology China Dongguan Key Laboratory for Intelligence and Information Technology China Guangdong Medical University China Southern Medical University Dongguan People’s Hospital China Macao Polytechnic University China
Remote photoplethysmography (rPPG) enables noncontact physiological measurement but remains highly susceptible to illumination changes, motion artifacts, and limited temporal modeling. Large Language Models (LLMs) exc... 详细信息
来源: 评论
Detecting Data-flow Errors Based on Petri Nets With Data Operations
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2018年 第1期5卷 251-260页
作者: Dongming Xiang Guanjun Liu Chungang Yan Changjun Jiang Key Laboratory of Embedded System and Service Computing Ministry of Education Tongji University Shanghai 201804 China IEEE
In order to guarantee the correctness of business processes, not only control-flow errors but also data-flow errors should be considered. The control-flow errors mainly focus on deadlock, livelock, soundness, and so o... 详细信息
来源: 评论
Structural controllability of optimized networks with onion-like topologies
Structural controllability of optimized networks with onion-...
收藏 引用
Chinese Intelligent systems Conference, CISC 2018
作者: Li, Manli Sun, Shiwen Wu, Yafang Xia, Chengyi Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin300384 China Key Laboratory of Computer Vision and System Tianjin University of Technology Tianjin300384 China
Recently, an optimization method has been proposed to increase the ability of complex networks to resist intentional attacks on hub nodes. The finally optimized networks exhibit a novel type of "onion-like" ... 详细信息
来源: 评论
Corrigendum to "Event-centric Multi-modal Fusion Method for Dense Video Captioning" [Neural Networks 146 (2022) 120-129]
收藏 引用
Neural networks : the official journal of the International Neural Network Society 2022年 152卷 527页
作者: Zhi Chang Dexin Zhao Huilin Chen Jingdan Li Pengfei Liu Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin 300384 China. Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin 300384 China Key Laboratory of Computer Vision and System Ministry of Education China. Electronic address: zhaodexin@***.
来源: 评论
IGTP: A next point-of-interest recommendation method that integrates geospatial and temporal preferences
Research Square
收藏 引用
Research Square 2021年
作者: Jiao, Xu Xiao, Yingyuan Zheng, Wenguang Zhu, Ke School of General Education Tianjin Foreign Studies University Tianjin China Engineering Research Center of Learning-Based Intelligent System Ministry of Education Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China
With the rapid development of location-based social networks(LBSNs), point-of-interest(POI) recommendation has become an important way to meet the personalized needs of users. The purpose of POI recommendation is to p... 详细信息
来源: 评论
Long-term Dependency for 3D Reconstruction of Freehand Ultrasound Without External Tracker
arXiv
收藏 引用
arXiv 2023年
作者: Li, Qi Shen, Ziyi Li, Qian Barratt, Dean C. Dowrick, Thomas Clarkson, Matthew J. Vercauteren, Tom Hu, Yipeng The UCL Centre for Medical Image Computing The Wellcome/EPSRC Centre for Interventional and Surgical Sciences Department of Medical Physics and Biomedical Engineering University College London LondonWC1E 6BT United Kingdom State Key Laboratory of Robotics and System Harbin Institute of Technology Harbin China School of Biomedical Engineering & Imaging Sciences King’s College London LondonWC2R 2LS United Kingdom
Objective: Reconstructing freehand ultrasound in 3D without any external tracker has been a longstanding challenge in ultrasound-assisted procedures. We aim to define new ways of parameterising long-term dependencies,... 详细信息
来源: 评论
Noncontact Doppler Radar-based Heart Rate Detection on the SVD and ANC
Noncontact Doppler Radar-based Heart Rate Detection on the S...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Qiuxia Shi Bin Hu Fuze Tian Qinglin Zhao Gansu Provincial Key Laboratory of Wearable Computing School of Information Science and Engineering Lanzhou University School of Computer and Communication Lanzhou University of Technology Ministry of Education Key Laboratory of Special Functional Materials and Structural Design (Lanzhou University) Lanzhou China CAS Center for Excellence in Brain Science and Intelligence Technology Shanghai Institutes for Biological Sciences Chinese Academy of Sciences Joint Research Center for Cognitive Neurosensor Technology of Lanzhou University & Institute of Semiconductors Chinese Academy of Sciences Engineering Research Center of Open Source Software and Real-Time System(Lanzhou University) Ministry of Education Key Laboratory of Special Functional Materials and Structural Design Ministry of Education Lanzhou University Lanzhou China
In the Doppler biological radar-based applications of noncontact measurement of vital signs, effectively extracting heartbeat information from weak thoracic mechanical motion is an important problem to be solved. This... 详细信息
来源: 评论
Multi-level Directed Fuzzing for Detecting Use-after-Free Vulnerabilities
Multi-level Directed Fuzzing for Detecting Use-after-Free Vu...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Yuntao Zhang Zhongru Wang Weiqiang Yu Binxing Fang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China Chinese Academy of Cyberspace Studies Beijing China Beijing DigApis Technology Co. Ltd Beijing China
Greybox fuzzing has been widely used in vulnerabilities detection. Most greybox fuzzing tools are coverage-based, which usually use basic block transition to gain code coverage and focus on improving it to trigger mor... 详细信息
来源: 评论
Finedge: A Dynamic Cost-Efficient Edge Resource Management Platform for NFV Network
Finedge: A Dynamic Cost-Efficient Edge Resource Management P...
收藏 引用
International Workshop on Quality of service
作者: Miao Li Qixia Zhang Fangming Liu National Engineering Research Center for Big Data Technology and System Key Laboratory of Services Computing Technology and System Ministry of Education School of Computer Science and Technology Huazhong University of Science and Technology China
With the evolution of network function virtualization (NFV) and edge computing, software-based network functions (NFs) can be deployed on closer-to-end-user edge servers to support a broad range of new services with h... 详细信息
来源: 评论
Chinese named entity recognition method for the field of network security based on RoBERTa
Chinese named entity recognition method for the field of net...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Xiaoyan Zhu Yu Zhang Lei Zhu Xinhong Hei Yichuan Wang Feixiong Hu Yanni Yao School of Computer Science and Engineering Xi’an Jiaotong University Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China School of Computer Science and Technology Xi’an University of technology Xi’an China Shenzhen Tencent Computer System Co. Ltd Shenzhen China
As the mobile Internet is developing rapidly, people who use cell phones to access the Internet dominate, and the mobile Internet has changed the development environment of online public opinion and made online public... 详细信息
来源: 评论