咨询与建议

限定检索结果

文献类型

  • 1,432 篇 会议
  • 961 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 2,394 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,557 篇 工学
    • 1,006 篇 计算机科学与技术...
    • 773 篇 软件工程
    • 318 篇 信息与通信工程
    • 220 篇 控制科学与工程
    • 174 篇 电子科学与技术(可...
    • 169 篇 电气工程
    • 145 篇 机械工程
    • 126 篇 生物工程
    • 77 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 67 篇 化学工程与技术
    • 65 篇 材料科学与工程(可...
    • 63 篇 动力工程及工程热...
    • 63 篇 生物医学工程(可授...
    • 53 篇 网络空间安全
    • 44 篇 安全科学与工程
  • 779 篇 理学
    • 436 篇 数学
    • 150 篇 生物学
    • 143 篇 物理学
    • 130 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 64 篇 化学
    • 31 篇 大气科学
  • 418 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 81 篇 工商管理
  • 59 篇 医学
    • 45 篇 临床医学
    • 39 篇 基础医学(可授医学...
  • 57 篇 法学
    • 47 篇 社会学
  • 29 篇 经济学
  • 22 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 30 篇 hardware
  • 30 篇 federated learni...
  • 29 篇 bandwidth
  • 27 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 42 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 36 篇 key laboratory o...
  • 35 篇 school of cyber ...
  • 34 篇 shandong provinc...
  • 32 篇 university of ch...
  • 30 篇 key laboratory o...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 36 篇 jin hai
  • 33 篇 changjun jiang
  • 33 篇 hai jin
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 23 篇 li xiaowei
  • 22 篇 mengchu zhou
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 21 篇 cheng wang
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,208 篇 英文
  • 101 篇 中文
  • 92 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2394 条 记 录,以下是531-540 订阅
排序:
MVC-VPR: Mutual Learning of Viewpoint Classification and Visual Place Recognition
arXiv
收藏 引用
arXiv 2024年
作者: Gu, Qiwen Wang, Xufei Zhang, Fenglin Zhao, Junqiao Tao, Siyue Ye, Chen Feng, Tiantian Jiang, Changjun Department of Computer Science and Technology School of Electronics and Information Engineering Tongji University Shanghai China The Shanghai Research Institute for Intelligent Autonomous System Tongji University Shanghai China The MOE Key Lab of Embedded System and Service Computing Tongji University Shanghai China School of Surveying and Geo-Informatics Tongji University Shanghai China
Visual Place Recognition (VPR) aims to robustly identify locations by leveraging image retrieval based on descriptors encoded from environmental images. However, drastic appearance changes of images captured from diff... 详细信息
来源: 评论
Achieving High Open-Circuit Voltage in Efficient Kesterite Solar Cells Via Lanthanide Europium Ion Induced Carrier Lifetime Enhancement
SSRN
收藏 引用
SSRN 2024年
作者: Chen, Xingye Zhao, Yunhai Ahmad, Nafees Zhao, Jun Zheng, Zhuanghao Su, Zhenghua Peng, Xiaogang Li, Xuejin Zhang, Xianghua Fan, Ping Liang, Guangxing Chen, Shuo Shenzhen Key Laboratory of Advanced Thin Films and Applications Key Laboratory of Optoelectronic Devices and Systems Ministry of Education and Guangdong Province College of Physics and Optoelectronic Engineering National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China UMR 6226 Université de Rennes Rennes F-35000 France Shenzhen518060 China
Short carrier lifetimes is a key challenge limiting the open-circuit voltage (VOC) and power conversion efficiency (PCE) of kesterite Cu2ZnSn(S,Se)4 (CZTSSe) solar cells. In this work, for the first time, lanthanide e... 详细信息
来源: 评论
An Investigation of Blockchain-Based Sharding  7th
An Investigation of Blockchain-Based Sharding
收藏 引用
7th International Conference on Smart computing and Communication, SmartCom 2022
作者: Xiao, Jiahong Liang, Wei Cai, Jiahong Zhu, Hangyu Li, Xiong Xie, Songyou School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan411201 China Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan411201 China Guangdong Financial High-Tech Zone "Blockchain +" Fintech Research Institute Foshan528253 China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu611731 China College of Computer Science and Electronic Engineering Hunan University Changsha410082 China
Nowadays, blockchain distributed ledger technology is becoming more and more prominent, and its decentralization, anonymization, and tampering obvious features have been widely recognized. These excellent technical fe... 详细信息
来源: 评论
Vision Transformer (ViT)-based Applications in Image Classification
Vision Transformer (ViT)-based Applications in Image Classif...
收藏 引用
IEEE International Conference on Big Data Security on Cloud (BigDataSecurity), High Performance and Smart computing (HPSC) and Intelligent Data and Security (IDS)
作者: Yingzi Huo Kai Jin Jiahong Cai Huixuan Xiong Jiacheng Pang School of Computer Science and Engineering Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan China the College of Computer Science and Electronics Engineering Hunan University Changsha China
In recent years, the ViT model has been widely used in the field of computer vision, especially for image classification tasks. This paper summarizes the application of ViT in image classification tasks, first introdu... 详细信息
来源: 评论
RKSeg+: make full use of Runge–Kutta methods in medical image segmentation
收藏 引用
Multimedia systems 2024年 第2期30卷 65-65页
作者: Zhu, Mai Fu, Chong Wang, Xingwei School of Computer Science and Engineering Northeastern University Shenyang110819 China Engineering Research Center of Security Technology of Complex Network System Ministry of Education Shenyang110819 China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Shenyang110819 China
The dynamical system perspective has been used to build efficient image classification networks and semantic segmentation networks. Furthermore, the Runge–Kutta (RK) methods are powerful tools for building networks f... 详细信息
来源: 评论
ATHENA: An In-vehicle CAN Intrusion Detection Framework Based on Physical Characteristics of Vehicle systems
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Kai Sun, Zhen Wang, Bailing Fan, Qilin Li, Ming Zhang, Hongke School of Computer Science and Technology Harbin Institute of Technology Weihai China Shandong Key Laboratory of Industrial Network Security China School of Big Data and Software Engineering Chongqing University Chongqing China Key Laboratory of Dependable Service Computing in Cyber Physical Society of Ministry of Education Chongqing University Chongqing China Jinan Key Laboratory of Distributed Databases Shandong Inspur Database Technology Co. Ltd Jinan China School of Electronic and Information Engineering Beijing Jiaotong University Beijing China
With the growing interconnection between In-Vehicle Networks (IVNs) and external environments, intelligent vehicles are increasingly vulnerable to sophisticated external network attacks. This paper proposes ATHENA, th... 详细信息
来源: 评论
SemHARQ: Semantic-Aware HARQ for Multi-task Semantic Communications
arXiv
收藏 引用
arXiv 2024年
作者: Hu, Jiangjing Wang, Fengyu Xu, Wenjun Gao, Hui Zhang, Ping The State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China The School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing100876 China The State Key Laboratory of Network and Switching Technology Beijing University of Posts and Telecommunications Beijing100876 China The Peng Cheng Laboratory Shenzhen518066 China The Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing100876 China
Intelligent task-oriented semantic communications (SemComs) have witnessed great progress with the development of deep learning (DL). In this paper, we propose a semantic-aware hybrid automatic repeat request (SemHARQ... 详细信息
来源: 评论
A Scheme of Digital Twin Air Combat Battlefield and Digital Twin Model Design
A Scheme of Digital Twin Air Combat Battlefield and Digital ...
收藏 引用
Chinese Control and Decision Conference, CCDC
作者: Yi Hu Fangqi Zhang Yuanjing Ma Chinese Academy Sciences Shenyang Institute of Computing Technology University of Chinese Academy Sciences Shenyang China Chinese Academy Sciences Shenyang Institute of Computing Technology University of Chinese Academy Sciences Aviation Key Laboratory of Science and Technology on Air Combat System AVIC Shenyang Aircraft Design and Research Institute Shenyang China School of Science Shenyang Ligong University Shenyang China
This paper provides a solution concept using digital twin technology for the battlefield environment for the air combat training. The scheme is divided into two aspects: digital twin battlefield and digital twin aircr... 详细信息
来源: 评论
Dfier: A Directed Vulnerability Verifier for Ethereum Smart Contracts
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zeli Dai, Weiqi Li, Ming Choo, Kim-Kwang Raymond Zou, Deqing Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing40065 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio United States
Existing smart contract vulnerability identification approaches mainly focus on complete program detection. Consequently, lots of known potentially vulnerable locations need manual verification, which is energy-exhaus... 详细信息
来源: 评论
A Hybrid Routing Mutation Mechanism based on Mutation Cost and Resource Trustworthiness in Network Moving Target Defense  7
A Hybrid Routing Mutation Mechanism based on Mutation Cost a...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Guo, Kun Gao, Yibo Wang, Dongbin Zhi, Hui Zhang, Tao Lu, Yueming Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Cyberspace Security Research Center Peng Cheng Laboratory Beijing China Beijing University of Posts and Telecommunications National Engineering Laboratory for Mobile Network Beijing China TravelSky Technology Limited Beijing China China Academy of Launch Vehicle Technology Beijing China
Network moving target defense technology can effectively defend against attacker monitoring of the service. The technology makes it more difficult for attackers to attack and can ensure secure communication for servic... 详细信息
来源: 评论