咨询与建议

限定检索结果

文献类型

  • 1,424 篇 会议
  • 975 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,401 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,562 篇 工学
    • 1,008 篇 计算机科学与技术...
    • 772 篇 软件工程
    • 319 篇 信息与通信工程
    • 215 篇 控制科学与工程
    • 171 篇 电气工程
    • 170 篇 电子科学与技术(可...
    • 145 篇 机械工程
    • 128 篇 生物工程
    • 79 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 67 篇 化学工程与技术
    • 65 篇 生物医学工程(可授...
    • 64 篇 材料科学与工程(可...
    • 63 篇 动力工程及工程热...
    • 51 篇 网络空间安全
    • 47 篇 安全科学与工程
  • 783 篇 理学
    • 433 篇 数学
    • 152 篇 生物学
    • 146 篇 物理学
    • 130 篇 统计学(可授理学、...
    • 107 篇 系统科学
    • 64 篇 化学
    • 33 篇 大气科学
  • 421 篇 管理学
    • 268 篇 管理科学与工程(可...
    • 173 篇 图书情报与档案管...
    • 85 篇 工商管理
  • 62 篇 医学
    • 48 篇 临床医学
    • 41 篇 基础医学(可授医学...
  • 56 篇 法学
    • 48 篇 社会学
  • 32 篇 经济学
  • 22 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 67 篇 computer archite...
  • 62 篇 training
  • 56 篇 laboratories
  • 48 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 38 篇 optimization
  • 37 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 32 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 27 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 26 篇 protocols

机构

  • 115 篇 key laboratory o...
  • 100 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 88 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 53 篇 key laboratory o...
  • 40 篇 national enginee...
  • 40 篇 key laboratory o...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 35 篇 school of cyber ...
  • 34 篇 university of ch...
  • 32 篇 shandong provinc...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 37 篇 jin hai
  • 36 篇 hai jin
  • 33 篇 changjun jiang
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 22 篇 mengchu zhou
  • 22 篇 wang chundong
  • 22 篇 li xiaowei
  • 21 篇 cheng wang
  • 21 篇 yu hu
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,218 篇 英文
  • 100 篇 中文
  • 89 篇 其他
  • 2 篇 法文
  • 1 篇 德文
检索条件"机构=Service Computing Technology and System Key Laboratory"
2401 条 记 录,以下是181-190 订阅
排序:
FaceBench: A Multi-View Multi-Level Facial Attribute VQA Dataset for Benchmarking Face Perception MLLMs
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Xiaoqin Ma, Xusen Hou, Xianxu Ding, Meidan Li, Yudong Chen, Junliang Chen, Wenting Peng, Xiaoyang Shen, Linlin Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China AIAC Xi’an Jiaotong-Liverpool University China Tsinghua University China The Hong Kong Polytechnic University Hong Kong City University of Hong Kong Hong Kong Sun Yat-sen University China
Multimodal large language models (MLLMs) have demonstrated remarkable capabilities in various tasks. However, effectively evaluating these MLLMs on face perception remains largely unexplored. To address this gap, we i...
来源: 评论
A Robust key Exchange and Tamper-Resistant Protocol for HAN and NAN Networks in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Shamshad, Salman Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu611731 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan The University of Lahore Department of Software Engineering Lahore54590 Pakistan International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan250353 China
Smart Grids (SG) rely on Home Area Networks (HAN) and Neighborhood Area Networks (NAN) to ensure efficient power distribution, real-time monitoring, and seamless communication between smart devices. Despite these adva... 详细信息
来源: 评论
Provably Secure Efficient key-Exchange Protocol for Intelligent Supply Line Surveillance in Smart Grids
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Ayub, Muhammad Faizan Li, Xiong Mahmood, Khalid Alenazi, Mohammed J.F. Das, Ashok Kumar Wang, Guijuan University of Electronic Science and Technology of China School of Computer Science and Engineering Sichuan Chengdu12599 China National Yunlin University of Science and Technology Graduate School of Intelligent Data Science Yunlin Douliu64002 Taiwan Department of Computer Engineering Riyadh11451 Saudi Arabia International Institute of Information Technology Center for Security Theory and Algorithmic Research Hyderabad500 032 India Korea University College of Informatics Department of Computer Science and Engineering Anam-ro Seoul145 Korea Republic of Ministry of Education Shandong Computer Science Center Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security China Shandong Fundamental Research Center for Computer Science Jinan 250353 China
Intelligent supply line surveillance is critical for modern smart grids. Smart sensors and gateway nodes are strategically deployed along supply lines to achieve intelligent surveillance. They collect data continuousl... 详细信息
来源: 评论
Design for Testability Features of Godson-3 Multicore Microprocessor
收藏 引用
Journal of Computer Science & technology 2011年 第2期26卷 302-313页
作者: 齐子初 刘慧 李向库 胡伟武 Key Laboratory of Computer System and Architecture Chinese Academy of Sciences Institute of Computing Technology Chinese Academy of Sciences Loongson Technologies Corporation Limited
This paper describes the design for testability (DFT) challenges and techniques of Godson-3 microprocessor, which is a scalable multicore processor based on the scalable mesh of crossbar (SMOC) on-chip network and... 详细信息
来源: 评论
Hyper-IIoT: A Smart Contract-inspired Access Control Scheme for Resource-constrained Industrial Internet of Things
IEEE Transactions on Sustainable Computing
收藏 引用
IEEE Transactions on Sustainable computing 2025年
作者: Li, Dun Li, Hongzhi Crespi, Noel Minerva, Roberto Li, Ming Liang, Wei Li, Kuan-Ching Tsinghua University Department of Industrial Engineering China Institut Polytechnique de Paris Samovar Telecom SudParis Palaiseau91120 France Chizhou University College of Big Data and Artificial Intelligence Chizhou247100 China The Hong Kong Polytechnic University Research Institute for Advanced Manufacturing Hung Hom Hong Kong Hunan University of Science and Technology School of Computer Science and Engineering Hunan University of Science and Technology Sanya Research Institute Hunan Key Laboratory for Service Computing and Novel Software Technology China Providence University Dept. of Computer Science and Information Engineering Taiwan
In recent years, the refinements in industrial processes and the increasing complexity of managing privacy-sensitive data in Industrial Internet of Things (IIoT) devices have highlighted the need for secure, robust, a... 详细信息
来源: 评论
Time-varying networks based on activation and deactivation mechanisms
收藏 引用
Chinese Physics B 2017年 第10期26卷 527-532页
作者: 王学文 罗月娥 张丽杰 许新建 School of Physics and Electronic Sciences Guizhou Education University College of Sciences Shanghai University Key Laboratory of Embedded System and Service Computing (Tongji University) Ministry of Education
A class of models for activity-driven networks is proposed in which nodes vary in two states: active and inactive. Only active nodes can receive links from others which represent instantaneous dynamical interactions.... 详细信息
来源: 评论
Leakage Current Optimization Techniques During Test Based on Don't Care Bits Assignment
收藏 引用
Journal of Computer Science & technology 2007年 第5期22卷 673-680页
作者: 王伟 胡瑜 韩银和 李晓维 张佑生 School of Computer and Information Hefei University of Technology Hefei 230009China Key Laboratory of Computer System and ArchitectureInstitute of Computing TechnologyChinese Academy of Sciences Beijing 100080China Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100080China School of Computer and Information Hefei University of Technology Hefei 230009China
It is a well-known fact that test power consumption may exceed that during functional operation. Leakage power dissipation caused by leakage current in Complementary Metal-Oxide-Semiconductor (CMOS) circuits during ... 详细信息
来源: 评论
Constructing prioritized interaction test suite with interaction relationship
Constructing prioritized interaction test suite with interac...
收藏 引用
2nd International Workshop on Education technology and Computer Science, ETCS 2010
作者: Yuan, Jianjun Jiang, Zuowen Key Laboratory of Embedded System and Service Computing Ministry of Education of China Tongji University Shanghai China Department of Computer Science and Technology Key Laboratory of Embedded System and Service Computing Tongji University Shanghai China
Interaction testing has addressed some issues on how to select a small subset of test cases. In many systems where interaction testing is needed, the entire test suite is not executed because of time or budget constra... 详细信息
来源: 评论
Combining feature selection and resample to improve classification accuracy
收藏 引用
Journal of Computational Information systems 2012年 第22期8卷 9539-9544页
作者: Liu, Jiaming Wang, Xiao Zhao, Qingce You, Mingyu Li, Guozheng The Key Laboratory of Embedded System and Service Computing Department of Control Science and Engineering Tongji University Shanghai Shanghai 201804 China
The paper provides the solution of the campion for CDMC2011, a data mining contest. The task for the data mining contest organized in conjunction with the ICONIP20II conference was to learn three predictive models (i.... 详细信息
来源: 评论
Evolution of Cooperation in Public Goods Games
收藏 引用
Communications in Theoretical Physics 2011年 第10期56卷 638-644页
作者: 夏承遗 张娟娟 王祎玲 王劲松 Key Laboratory of Computer Vision and System(Tianjin University of Technology) Ministry of Education Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology College of Life Science Shanxi Normal University
We investigate the evolution of cooperation with evolutionary public goods games based on finite populations, where four pure strategies: cooperators, defectors, punishers and loners who are unwilling to participate ... 详细信息
来源: 评论