咨询与建议

限定检索结果

文献类型

  • 1,432 篇 会议
  • 997 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,431 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,589 篇 工学
    • 1,028 篇 计算机科学与技术...
    • 783 篇 软件工程
    • 332 篇 信息与通信工程
    • 226 篇 控制科学与工程
    • 189 篇 电气工程
    • 179 篇 电子科学与技术(可...
    • 150 篇 机械工程
    • 127 篇 生物工程
    • 82 篇 交通运输工程
    • 75 篇 仪器科学与技术
    • 69 篇 光学工程
    • 68 篇 化学工程与技术
    • 66 篇 材料科学与工程(可...
    • 64 篇 动力工程及工程热...
    • 64 篇 生物医学工程(可授...
    • 56 篇 网络空间安全
    • 48 篇 安全科学与工程
  • 792 篇 理学
    • 441 篇 数学
    • 153 篇 生物学
    • 146 篇 物理学
    • 133 篇 统计学(可授理学、...
    • 107 篇 系统科学
    • 67 篇 化学
    • 33 篇 大气科学
  • 430 篇 管理学
    • 272 篇 管理科学与工程(可...
    • 178 篇 图书情报与档案管...
    • 86 篇 工商管理
  • 63 篇 医学
    • 48 篇 临床医学
    • 43 篇 基础医学(可授医学...
  • 59 篇 法学
    • 48 篇 社会学
  • 31 篇 经济学
  • 22 篇 农学
  • 14 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 28 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 35 篇 university of ch...
  • 35 篇 shandong provinc...
  • 35 篇 school of cyber ...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 37 篇 jin hai
  • 36 篇 hai jin
  • 33 篇 zhou mengchu
  • 33 篇 changjun jiang
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 22 篇 mengchu zhou
  • 22 篇 wang chundong
  • 22 篇 li xiaowei
  • 21 篇 cheng wang
  • 21 篇 yu hu
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,238 篇 英文
  • 100 篇 中文
  • 99 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2431 条 记 录,以下是2181-2190 订阅
排序:
Innovative architecture-level power estimation methodology for godson processor
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2007年 第5期44卷 782-789页
作者: Huang, Kun Zhang, Longbing Hu, Weiwu Zhang, Ge Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China Graduate University Chinese Academy of Sciences Beijing 100049 China
Now the research of computer architecture focuses on how to utilize the energy of CPU to attain high performance as much as possible. Obviously the architecture-level power estimation tool is important. Existing archi... 详细信息
来源: 评论
Address register promotion method based on feedbacks
收藏 引用
Jisuanji Yanjiu yu Fazhan/Computer Research and Development 2009年 第4期46卷 698-704页
作者: Zhang, Chao Lü, Fang Wang, Lei Feng, Xiaobing Key Laboratory of Computer System and Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Graduate University Chinese Academy of Sciences Beijing 100049 China
In processor architectures such as MIPS, ALPHA, SPARC and PowerPC, indirect addressing mode is always adopted to access global variables and static ones. Since the addresses of these variables and the corresponding va... 详细信息
来源: 评论
Temporal similarity metrics for latent network reconstruction: The role of time-lag decay
arXiv
收藏 引用
arXiv 2019年
作者: Liao, Hao Liu, Ming-Kai Mariani, Manuel Sebastian Zhou, Mingyang Wu, Xingtong National Engineering Laboratory for Big Data System Computing Technology Guangdong Province Key Laboratory of Popular High Performance Computers College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Institute of Fundamental and Frontier Sciences University of Electronic Science and Technology of China Chengdu610051 China URPP Social Networks Universität Zürich CH-8050 Switzerland
When investigating the spreading of a piece of information or the diffusion of an innovation, we often lack information on the underlying propagation network. Reconstructing the hidden propagation paths based on the o... 详细信息
来源: 评论
Under-determined Blind Speech Separation via the Convolutive Transfer Function and lp Regularization
Under-determined Blind Speech Separation via the Convolutive...
收藏 引用
International Conference on Mobile Ad-hoc and Sensor Networks, MSN
作者: Liu Yang Junjie Yang Yi Guo School of Computer Science and Cyber Engineering Guangzhou University Guangzhou China School of Automation Guangdong University of Technology Key Laboratory of Intelligent Information Processing and System Integration of IoT (GDUT) Guangzhou China Centre for Research in Mathematics School of Computing Engineering and Mathematics Western Sydney University Parramatta Australia
Convolutive blind speech separation (CBSS) attempts to recover speech sources from recorded mixtures transmitted by room impulse response filters (RIRs). The existing BSS methods are mainly based on a multiplicative n... 详细信息
来源: 评论
A 128kb Stochastic computing Chip based on RRAM Flicker Noise with High Noise Density and Nearly Zero Autocorrelation on 28-nm CMOS Platform
A 128kb Stochastic Computing Chip based on RRAM Flicker Nois...
收藏 引用
International Electron Devices Meeting (IEDM)
作者: Tiancheng Gong Qiao Hu Danian Dong Haijun Jiang Jianguo Yang Xiaoxin Xu Xiaoming Chen Qing Luo Qi Liu Steve S. Chung Hangbing Lyu Ming Liu Key Laboratory of Microelectronics Devices and Integrated Technology Institute of Microelectronics of Chinese Academy of Sciences Beijing China Zhejiang Lab HangzhouChina Zhejiang Lab Hangzhou China Institute of Computing Technology of Chinese Academy of Sciences Beijing China Frontier Institute of Chip and System Fudan University China National Yang Ming Chiao Tung University Taiwan
In this work, a 128kb RRAM flicker noise based Stochastic computing (SC) chip is demonstrated on 28-nm HKMG CMOS platform for the first time. Flicker noise in RRAM is selected as the entropy source owing to the higher... 详细信息
来源: 评论
STAR-RIS Enabled ISAC systems: Joint Rate Splitting and Beamforming Optimization
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Yuan Zhang, Ruichen Jiang, Ruihong Zhu, Yongdong Hu, Huimin Ni, Qiang Fei, Zesong Niyato, Dusit The Research Center for Space Computing System Zhejiang Laboratory Hangzhou311100 China The College of Computing and Data Science Nanyang Technological University 639798 Singapore The State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China The School of Communications and Information Engineering The School of Artificial Intelligence Xi’an University of Posts and Telecommunications Xi’an710121 China The School of Computing and Communications Lancaster University LancasterLA1 4WA United Kingdom The School of Information and Electronics Beijing Institute of Technology Beijing100081 China
This paper delves into an integrated sensing and communication (ISAC) system bolstered by a simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS). Within this system, a base station ... 详细信息
来源: 评论
Abuse-Resistant Deniable Encryption
SSRN
收藏 引用
SSRN 2023年
作者: Cao, Yanmei Wei, Jianghong Xiang, Yang Susilo, Willy Chen, Xiaofeng State Key Laboratory of Integrated Service Networks Xidian University Xi’an710071 China State Key Laboratory of Mathematical Engineering and Advanced Computing PLA Strategic Support Force Information Engineering University Zhengzhou450001 China School of Software and Electrical Engineering Swinburne University of Technology MelbourneVIC3122 Australia Institute of Cybersecurity and Cryptology University of Wollongong WollongongNSW2522 Australia
Deniable encryption (DE) allows private communication over an insecure channel even under the coercion. That is, after an adversary forces communication participants to reveal their secret keys and randomness used dur... 详细信息
来源: 评论
Learning converged propagations with deep prior ensemble for image enhancement
arXiv
收藏 引用
arXiv 2018年
作者: Liu, Risheng Ma, Long Wang, Yiyang Zhang, Lei DUT-RU International School of Information Science & Engineering Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Dalian University of Technology Dalian China State Key Laboratory of Integrated Services Networks Xidian University Xi'an China Institute of Atmospheric Sciences Fudan University Shanghai Institute of Meteorological Science Shanghai China Department of Computing Hong Kong Polytechnic University Hong Kong
Enhancing visual qualities of images plays very important roles in various vision and learning applications. In the past few years, both knowledge-driven maximum a posterior (MAP) with prior modelings and fully data-d... 详细信息
来源: 评论
RASTE: A Relation-Guided Joint Method for Aspect Sentiment Triplet Extraction
RASTE: A Relation-Guided Joint Method for Aspect Sentiment T...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted computing, UIC-ATC
作者: Linyang Zhong Jiaxing Shang Linjiang Zheng Fei Hao Weiwei Cao Hong Sun Key Laboratory of Dependable Service Computing in Cyber Physical Society College of Computer Science Chongqing University Chongqing China School of Computer Science Shaanxi Normal University Xian China Key Laboratory of Flight Techniques and Flight Safety Civil Aviation Flight University of China Guanghan China Flight Technology and Flight Safety Research Base Civil Aviation Flight University of China Guanghan China
Aspect Sentiment Triplet Extraction (ASTE) is an important subtask of aspect-based sentiment analysis. It aims to extract aspect terms, corresponding sentiment polarities and related opinion terms from a sentence. The...
来源: 评论
Camera-Invariant Meta-Learning Network for Single-Camera-Training Person Re-identification
arXiv
收藏 引用
arXiv 2024年
作者: Pei, Jiangbo Jiang, Zhuqing Men, Aidong Wang, Haiying Luo, Haiyong Wen, Shiping The School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing100876 China Beijing Key Laboratory of Network System and Network Culture Beijing University of Posts and Telecommunications Beijing100876 China Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China Australian AI Institute Faculty of Engineering and Information Technology University of Technology SydneyNSW2007 Australia
Single-camera-training person re-identification (SCT re-ID) aims to train a re-ID model using SCT datasets where each person appears in only one camera. The main challenge of SCT re-ID is to learn camera-invariant fea... 详细信息
来源: 评论