咨询与建议

限定检索结果

文献类型

  • 1,424 篇 会议
  • 975 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,401 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,562 篇 工学
    • 1,008 篇 计算机科学与技术...
    • 772 篇 软件工程
    • 319 篇 信息与通信工程
    • 215 篇 控制科学与工程
    • 171 篇 电气工程
    • 170 篇 电子科学与技术(可...
    • 145 篇 机械工程
    • 128 篇 生物工程
    • 79 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 67 篇 化学工程与技术
    • 65 篇 生物医学工程(可授...
    • 64 篇 材料科学与工程(可...
    • 63 篇 动力工程及工程热...
    • 51 篇 网络空间安全
    • 47 篇 安全科学与工程
  • 783 篇 理学
    • 433 篇 数学
    • 152 篇 生物学
    • 146 篇 物理学
    • 130 篇 统计学(可授理学、...
    • 107 篇 系统科学
    • 64 篇 化学
    • 33 篇 大气科学
  • 421 篇 管理学
    • 268 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 85 篇 工商管理
  • 62 篇 医学
    • 48 篇 临床医学
    • 41 篇 基础医学(可授医学...
  • 56 篇 法学
    • 48 篇 社会学
  • 32 篇 经济学
  • 22 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 67 篇 computer archite...
  • 62 篇 training
  • 56 篇 laboratories
  • 48 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 38 篇 optimization
  • 37 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 32 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 27 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 26 篇 protocols

机构

  • 115 篇 key laboratory o...
  • 100 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 88 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 53 篇 key laboratory o...
  • 40 篇 national enginee...
  • 40 篇 key laboratory o...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 35 篇 school of cyber ...
  • 34 篇 university of ch...
  • 32 篇 shandong provinc...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 37 篇 jin hai
  • 36 篇 hai jin
  • 33 篇 changjun jiang
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 22 篇 mengchu zhou
  • 22 篇 wang chundong
  • 22 篇 li xiaowei
  • 21 篇 cheng wang
  • 21 篇 yu hu
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,218 篇 英文
  • 100 篇 中文
  • 89 篇 其他
  • 2 篇 法文
  • 1 篇 德文
检索条件"机构=Service Computing Technology and System Key Laboratory"
2401 条 记 录,以下是101-110 订阅
排序:
Multimodal Dialogue Emotion Recognition Based on Label Optimization and Coarse-Grained Assisted Fine-Grained
Multimodal Dialogue Emotion Recognition Based on Label Optim...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhibo Zhang Zhenyu Yang Yan Huang Baojie Xu Wenyue Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China
Multimodal dialogue emotion recognition integrates data from multiple modalities to accurately identify emotional states in conversations. However, differences in expression and information density across modalities c... 详细信息
来源: 评论
HiCoCS: High Concurrency Cross-Sharding on Permissioned Blockchains
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Lingxiao Dong, Xuewen Wan, Zhiguo Lu, Di Zhang, Yushu Shen, Yulong School of Computer Science and Technology Xidian University The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education China Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China Zhejiang Lab Zhejiang Hangzhou311121 China School of Computer Science and Technology Xidian University China Shaanxi Key Laboratory of Network and System Security Xi’an710071 China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Jiangsu Nanjing210016 China
As the foundation of the Web3 trust system, blockchain technology faces increasing demands for scalability. Sharding emerges as a promising solution, but it struggles to handle highly concurrent cross-shard transactio... 详细信息
来源: 评论
CacheAlarm: Monitoring Sensitive Behaviors of Android Apps Using Cache Side Channel
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Tian, Jianwen Ma, Haoyu Gao, Debin Kuang, Xiaohui Academy of Military Sciences Institute of System Engineering China Beijing Jiaotong University School of Cyberspace Science and Technology Beijing100044 China Beijing Jiaotong University Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100045 China Singapore Management University School of Computing and Information Systems Singapore
Malware attack has been a serious threat to the security and privacy of both individual and corporation users of the Android platform. Business entities seek to protect themselves by means of monitoring privacy-relate... 详细信息
来源: 评论
DFMC:Feature-Driven Data-Free Knowledge Distillation
收藏 引用
IEEE Transactions on Circuits and systems for Video technology 2025年
作者: Zhang, Zherui Xu, Rongtao Wang, Changwei Xu, Wenhao Chen, Shunpeng Xu, Shibiao Xu, Guangyuan Guo, Li Beijing University of Posts and Telecommunications School of Artificial Intelligence Beijing100876 China Chinese Academy of Sciences State Key Laboratory of Multimodal Artificial Intelligence Systems Institute of Automation Beijing100190 China Qilu University of Technology Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250316 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan250014 China
Data-Free Knowledge Distillation (DFKD) enables knowledge transfer from teacher networks without access to the real dataset. However, generator-based DFKD methods often suffer from insufficient diversity or low-confid... 详细信息
来源: 评论
NavG: Risk-Aware Navigation in Crowded Environments Based on Reinforcement Learning with Guidance Points
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Qianyi Luo, Wentao Liu, Boyi Zhang, Ziyang Wang, Yaoyuan Liu, Jingtai Institute of Robotics and Automatic Information System Nankai University Tianjin Key Laboratory of Intelligent Robotics Tianjin China Advanced Computing and Storage Lab Huawei 2012 Lab China Department of Electronic and Computer Engineering The Kong Kong University of Science and Technology Hong Kong
Motion planning in navigation systems is highly susceptible to upstream perceptual errors, particularly in human detection and tracking. To mitigate this issue, the concept of guidance points—a novel directional cue ... 详细信息
来源: 评论
Efficient Module-Lattice-based Certificateless Online/Offline Signcryption Scheme for Internet of Medical Things
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Bai, Ye He, Debiao Yang, Zhichao Luo, Min Peng, Cong Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University School of Cyber Science and Engineering Wuhan430072 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China Naval University of Engineering Department of Information Security Wuhan430000 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250014 China
The Internet of Medical Things (IoMT) has achieved remote diagnosis and real-time health monitoring through intelligent sensor devices and Internet of Things (IoT) technology, providing great convenience for analyzing... 详细信息
来源: 评论
Revisiting Multiple Pattern Matching Algorithms for Multi-Core Architecture
收藏 引用
Journal of Computer Science & technology 2011年 第5期26卷 866-874页
作者: 谭光明 刘萍 卜东波 刘燕兵 Key Laboratory of Computer System and Architecture Institute of Computing TechnologyChinese Academy of Sciences Key Laboratory of Network Technology Institute of Computing TechnologyChinese Academy of Sciences
Due to the huge size of patterns to be searched,multiple pattern searching remains a challenge to several newly-arising applications like network intrusion *** this paper,we present an attempt to design efficient mult... 详细信息
来源: 评论
Non-IID Free Federated Learning with Fuzzy Optimization for Consumer Electronics systems
收藏 引用
IEEE Transactions on Consumer Electronics 2025年
作者: Bai, Jun Wu, Di Zeng, Shan Zhao, Yao Qu, Youyang Yu, Shui School of Information Technology Deakin University MelbourneVIC3125 Australia School of Mathematics Physics and Computing University of Southern Queensland ToowoombaQLD4350 Australia School of Mathematics and Computer Science Wuhan Polytechnic University Wuhan430023 China School of Computing Technologies RMIT University MelbourneVIC3000 Australia Qilu University of Technology Shandong Academy of Sciences Jinan250101 China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan250102 China School of Computer Science University of Technology Sydney SydneyNSW2007 Australia
—Consumer electronics suffer from data surges which lead to data privacy and integrity issues. Federated Learning (FL) keeps data with local devices which enhances privacy, and efficient device collaboration by proce... 详细信息
来源: 评论
Few-Shot Source Separation for IoT Anti-Jamming via Multi-Task Learning and Meta-Learning
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Guo, Pengcheng Yu, Miao Li, Cheng An, Kang Sun, Yifu Chatzinotas, Symeon Niyato, Dusit National University of Defense Technology Sixty-Third Research Institute China State Key Laboratory of Complex Electromagnetic Environment Effects on Electronics and Information System China Kyung Hee University College of Electronics and Information Yongin-si17104 Korea Republic of Nanyang Technological University College of Computing and Data Science Singapore639798 Singapore
Malicious jamming attacks pose a significant threat to the integrity and performance of Internet of Things (IoT) networks. However, many jamming patterns are rare or infrequent, which makes them difficult to counter e... 详细信息
来源: 评论
Satisfaction-Aware Incentive Scheme for Federated Learning in Industrial Metaverse: DRL-Based Stackbelberg Game Approach
arXiv
收藏 引用
arXiv 2025年
作者: Li, Xiaohuan Qin, Shaowen Tang, Xin Kang, Jiawen Ye, Jin Zhao, Zhonghua Niyato, Dusit Guangxi University Key Laboratory of Intelligent Networking and Scenario System School of Information and Communication Guilin University of Electronic Technology Guilin541004 China Nanning530001 China School of Automation Guangdong University of Technology Guangzhou510006 China Guangxi Key Laboratory of Multimedia Communications and Network Technology Nanning530000 China School of Computer and Electronic Information Guangxi University Nanning530000 China College of Computing and Data Science Nanyang Technological University Singapore
Industrial Metaverse leverages the Industrial Internet of Things (IIoT) to integrate data from diverse devices, employing federated learning and meta-computing to train models in a distributed manner while ensuring da... 详细信息
来源: 评论