咨询与建议

限定检索结果

文献类型

  • 1,467 篇 会议
  • 995 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,464 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,604 篇 工学
    • 1,045 篇 计算机科学与技术...
    • 779 篇 软件工程
    • 322 篇 信息与通信工程
    • 246 篇 控制科学与工程
    • 175 篇 电子科学与技术(可...
    • 171 篇 电气工程
    • 145 篇 机械工程
    • 128 篇 生物工程
    • 77 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 69 篇 材料科学与工程(可...
    • 67 篇 化学工程与技术
    • 65 篇 生物医学工程(可授...
    • 63 篇 动力工程及工程热...
    • 54 篇 网络空间安全
    • 44 篇 安全科学与工程
  • 789 篇 理学
    • 435 篇 数学
    • 154 篇 生物学
    • 144 篇 物理学
    • 128 篇 统计学(可授理学、...
    • 107 篇 系统科学
    • 66 篇 化学
    • 32 篇 大气科学
  • 422 篇 管理学
    • 266 篇 管理科学与工程(可...
    • 176 篇 图书情报与档案管...
    • 82 篇 工商管理
  • 60 篇 医学
    • 45 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 57 篇 法学
    • 47 篇 社会学
  • 29 篇 经济学
  • 24 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 85 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 41 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 35 篇 federated learni...
  • 34 篇 delay
  • 33 篇 web services
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 28 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 71 篇 the key laborato...
  • 55 篇 key laboratory o...
  • 51 篇 national enginee...
  • 47 篇 key laboratory o...
  • 41 篇 school of comput...
  • 41 篇 shandong provinc...
  • 40 篇 school of cyber ...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 33 篇 university of ch...
  • 30 篇 national enginee...
  • 30 篇 key laboratory o...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...

作者

  • 50 篇 xiaowei li
  • 37 篇 jin hai
  • 34 篇 hai jin
  • 33 篇 changjun jiang
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 24 篇 shen linlin
  • 23 篇 li xiaowei
  • 22 篇 cheng wang
  • 22 篇 mengchu zhou
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 20 篇 hu shengshan
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,223 篇 英文
  • 146 篇 其他
  • 102 篇 中文
检索条件"机构=Service Computing Technology and System Key Laboratory"
2464 条 记 录,以下是1081-1090 订阅
排序:
Hybrid attention network based on progressive embedding scale-context for crowd counting
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Fusen Sang, Jun Wu, Zhongyuan Liu, Qi Sang, Nong Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing University Chongqing400044 China School of Big Data and Software Engineering Chongqing University Chongqing401331 China School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan430000 China
The existing crowd counting methods usually adopted attention mechanism to tackle background noise, or applied multi-level features or multi-scales context fusion to tackle scale variation. However, these ap- proaches... 详细信息
来源: 评论
O2iJoin: An Efficient Index-Based Algorithm for Overlap Interval Join
收藏 引用
Journal of Computer Science & technology 2018年 第5期33卷 1023-1038页
作者: Ji-Zhou Luo Sheng-Fei Shi Guang Yang Hong-Zhi Wang Jian-Zhong Li School of Computer Science and Technology Harbin Institute of Technology Harbin 150001 China Guangdong Key Laboratory of Popular High Performance Computers Key Laboratory of Service Computing and Application Shenzhen 518000 China
Time intervals are often associated with tuples to represent their valid time in temporal relations, where overlap join is crucial for various kinds of queries. Many existing overlap join algorithms use indices based ... 详细信息
来源: 评论
Anomaly Detection of Vehicle CAN Network Based on Message Content  2nd
Anomaly Detection of Vehicle CAN Network Based on Message Co...
收藏 引用
2nd EAI International Conference on Security and Privacy in New computing Environments, SPNCE 2019
作者: Mo, Xiuliang Chen, Pengyuan Wang, Jianing Wang, Chundong Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Ministry of Education Tianjin University of Technology Tianjin300384 China Sichuan University ChengduSichuan610207 China
With the rapid advance of intelligent vehicles, auxiliary driving and automatic driving have been paid more attention to. While vehicle security has become increasingly prominent, which is seriously related to the pro... 详细信息
来源: 评论
SAMamba: Adaptive state space modeling with hierarchical vision for infrared small target detection
收藏 引用
Information Fusion 2025年 124卷
作者: Wenhao Xu Shuchen Zheng Changwei Wang Zherui Zhang Chuan Ren Rongtao Xu Shibiao Xu School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan 250014 China The State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Chinese Academy of Sciences Beijing 100190 China School of Artificial Intelligence University of Chinese Academy of Sciences Beijing 100190 China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan 250014 China School of Software Microelectronics Peking University Beijing 100084 China
Infrared small target detection (ISTD) is vital for long-range surveillance systems, particularly in military defense, maritime monitoring, and early warning applications. Despite its strategic importance, ISTD remain... 详细信息
来源: 评论
Mining Robust Frequent Items in Data Streams
Mining Robust Frequent Items in Data Streams
收藏 引用
IEEE International Conference on Joint Cloud computing (JCC)
作者: Rui Xia Haipeng Dai Zhanchao Du Meng Li Alex X. Liu Guihai Chen State Key Laboratory for Novel Software Technology Nanjing University Nanjing CHINA Institute of Manned Space System Engineering China Academy of Space Technology Beijing CHINA Shanghai key Laboratory of Scalable Computing and Systems Shanghai Jiao Tong University Shanghai CHINA
This paper studies the problem of robust frequent items mining in data streams that generalizes the traditional frequent items mining by considering the noise of datasets. That is, different items may correspond to th... 详细信息
来源: 评论
Human Motion Recognition by Three-view Kinect Sensors in Virtual Basketball Training
Human Motion Recognition by Three-view Kinect Sensors in Vir...
收藏 引用
IEEE Region 10 International Conference TENCON
作者: Baoqi Yao Hui Gao Xin Su Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing National Research Center for Information Science and Technology Tsinghua University Beijing China
In recent years, human action recognition has received a considerable amount of research attention because of it's potential in a variety of applications, such as video surveillance, human-computer interaction, an... 详细信息
来源: 评论
EDOA: an efficient delay optimization approach for mixed-polarity Reed-Muller logic circuits under the unit delay model
收藏 引用
Frontiers of Computer Science 2019年 第5期13卷 1102-1115页
作者: Zhenxue HE Limin XIAO Fei GU Li RUAN Zhisheng HUO Mingzhe LI Mingfa ZHU Longbing ZHANG Rui LIU Xiang WANG College of Information Science and Technology Hebei Agricultural University Baoding 071001 China State Key Laboratory of Software Development Environment Beihang University Beijing 100083 China School of Computer Science and Engineering Beihang University Beijing 100083 China School of Electronic and Information Engineering Beihang University Beijing 100083 China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China National Engineering Research Center for Science & Technology Resources Sharing Service Beijing 100083 China
Delay optimization has recently attracted signif-icant attention. However, few studies have focused on the delay optimization of mixed-polarity Reed-Muller (MPRM) logic circuits. In this paper, we propose an efficient... 详细信息
来源: 评论
RNC: Reliable network property classifier based on graph embedding  20
RNC: Reliable network property classifier based on graph emb...
收藏 引用
20th International Conference on Parallel and Distributed computing, Applications and Technologies, PDCAT 2019
作者: Liao, Hao Liu, Qixin Vidmer, Alexandre Zhou, Mingyang Mao, Rui National Engineering Laboratory for Big Data System Computing Technology Guangdong Province Key Laboratory of Popular High Performance Computers College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China
In the past two decades, analyzing the information network has been intensively studied from various disciplines. Small world property and scale-free property prevail in network science research. The comparison and cl... 详细信息
来源: 评论
BTI Aging Monitoring based on SRAM Start-up Behavior
BTI Aging Monitoring based on SRAM Start-up Behavior
收藏 引用
Asian Test Symposium (ATS)
作者: Shengyu Duan Peng Wang Gaole Sai School of Computer Engineering and Science Shanghai University Shanghai China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi China Guangdong Provincial Key Lab of Robotics and Intelligent System Shenzhen Institutes of Advanced Technology Chinese Academy of Sciences China CAS Key Laboratory of Human-Machine Intelligence-Synergy Systems Shenzhen Institutes of Advanced Technology China
Bias Temperature Instability (BTI) is one of the dominant CMOS aging mechanisms. It causes time-dependent variation, threatening circuit lifetime reliability. BTI-induced circuit errors are not detectable at the fabri... 详细信息
来源: 评论
A Framework Analysis of the 6G Vertical Ecosystem Based on Stakeholder Theory  24
A Framework Analysis of the 6G Vertical Ecosystem Based on S...
收藏 引用
Proceedings of the 2024 10th International Conference on Communication and Information Processing
作者: Fengshuai Du Jiao Zhang Xinyue Yan Tianjian Yang Haiyan Yan Jiayin Qi Enzo Bivona Suya Xiao Xing Shi Department of Political Sciences and International Relations (DEMS) University of Palermo Palermo Sicily Italy and Huangpu Research School of Guangzhou University Guangzhou University Guanghzou Guangdong China School of Economics and Management Beijing University of Posts and Telecommunications Beijing China Fudan University Shanghai China Beijing University of Posts and Telecommunications Beijing China Shanghai University of International Business and Economics Shanghai China Cyberspace Institute of Advanced Technology Guangzhou Guangdong China and Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China Department of Political Sciences and International Relations (DEMS) University of Palermo Palermo Sicily Italy International Business School Shandong Jiaotong University Weihai Shandong China
This research provides a framework analysis of the 6G vertical ecosystem's development through stakeholder theory, identifying three phases: introduction, development, and maturity, and discussing the evolution fr... 详细信息
来源: 评论