咨询与建议

限定检索结果

文献类型

  • 1,441 篇 会议
  • 972 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,415 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,564 篇 工学
    • 1,013 篇 计算机科学与技术...
    • 773 篇 软件工程
    • 318 篇 信息与通信工程
    • 220 篇 控制科学与工程
    • 174 篇 电子科学与技术(可...
    • 170 篇 电气工程
    • 145 篇 机械工程
    • 126 篇 生物工程
    • 77 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 67 篇 化学工程与技术
    • 65 篇 材料科学与工程(可...
    • 63 篇 动力工程及工程热...
    • 63 篇 生物医学工程(可授...
    • 53 篇 网络空间安全
    • 44 篇 安全科学与工程
  • 782 篇 理学
    • 436 篇 数学
    • 152 篇 生物学
    • 143 篇 物理学
    • 130 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 64 篇 化学
    • 31 篇 大气科学
  • 418 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 81 篇 工商管理
  • 60 篇 医学
    • 45 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 57 篇 法学
    • 47 篇 社会学
  • 29 篇 经济学
  • 24 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 61 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 27 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 37 篇 school of cyber ...
  • 36 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 32 篇 university of ch...
  • 30 篇 key laboratory o...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 36 篇 jin hai
  • 34 篇 hai jin
  • 33 篇 changjun jiang
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 23 篇 li xiaowei
  • 22 篇 mengchu zhou
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 21 篇 cheng wang
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,229 篇 英文
  • 101 篇 中文
  • 92 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2415 条 记 录,以下是671-680 订阅
排序:
The Relationship between Information Dissemination Channels, Health Belief, and COVID-19 Vaccination Intention: Evidence from China
收藏 引用
Journal of environmental and public health 2023年 第1期2023卷 6915125-6915125页
作者: Huang, Chuanwu Yan, Dongqi Liang, Shuang School of Digital Media and Design Arts Beijing University of Post and Telecommunication 100088 Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Ministry of Education 100088 Beijing China Beijing Key Laboratory of Network System and Network Culture 100876 Beijing China
In the context of the ongoing global epidemic of COVID-19 and frequent virus mutations, the implementation of vaccine is the key to the prevention and control of the epidemic at this stage. In order to provide recomme...
来源: 评论
Weapon target assignment strategy for multi-missile cooperative guidance with auction algorithm  40
Weapon target assignment strategy for multi-missile cooperat...
收藏 引用
40th Chinese Control Conference, CCC 2021
作者: Li, Qingze Dong, Xiwang Li, Qingdong Yu, Jianglong Ren, Zhang Beihang University School of Automation Science and Electrical Engineering Science and Technology on Aircraft Control Laboratory Beijing100191 China Key Laboratory of Dependable Service Computing in Cyber Physical Society Ministry of Education of China Chongqing University Chongqing400044 China
This paper presents a weapon target assignment method to reduce maneuverability overload through redistribution for multi-missile cooperative attack. Firstly, a dynamic constrained model of multi-missile cooperative a... 详细信息
来源: 评论
An Uncovered Neurons Information-Based Fuzzing Method for DNN
An Uncovered Neurons Information-Based Fuzzing Method for DN...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Kecheng Tang Jian-Tao Zhou Xu Guo College of Computer Science Inner Mongolia University Hohhot China National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Hohhot China Engineering Research Center of Ecological Big Data Ministry of Education Hohhot China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Hohhot China Inner Mongolia Key Laboratory of Social Computing and Data Processing Hohhot China Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Hohhot China Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
Fuzzing is increasingly being utilized as a method to test the reliability of Deep Learning (DL) systems. In order to detect more errors in DL systems, exploring the internal logic of more DNNs has become the main obj... 详细信息
来源: 评论
Compromising Rechargeable Sensor Networks in Marine Environment
收藏 引用
IEEE Transactions on Mobile computing 2025年
作者: Wang, Qiwei Lin, Chi Dai, Haipeng Obaidat, Mohammad S. Hsiao, Kuei-Fang Fan, Xin Dalian University of Technology School of Software Technology & DUT-RU International School of Information Science and Engineering China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Dalian116620 China Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China University of Science and Technology Beijing School of Computer and Communication Engineering Beijing100083 China SRM University Department of Computational Intelligence School of Computing SRM Nagar TN Kattankulathur603203 India The Amity University School of Engineering UP Noida201301 India The King Abdullah II School of Information Technology The University of Jordan Amman11942 Jordan
Marine Wireless Rechargeable Sensor Networks (MWRSNs), enhanced by recent Wireless Power Transfer (WPT) technology, present a significant advancement in extending network life. Traditional methods improve network perf... 详细信息
来源: 评论
Decode the Dark Side of the Language: Applications of LLMs in the Dark Web
Decode the Dark Side of the Language: Applications of LLMs i...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Hongfan Chen Yigang Diao Hui Xiang Yixuan Huo Xiaqing Xie Jiapeng Zhao Xuebin Wang Yanwei Sun Jinqiao Shi School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China Cyberspace Administration of China Data and Technology Support Center Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China
Previous studies have discovered that Transformers pre-trained on large scale datasets have a great advantage over traditional methods and can achieve human-level performance in many NLP tasks. Various encoder-only mo... 详细信息
来源: 评论
STAR-RIS Enabled ISAC systems With RSMA: Joint Rate Splitting and Beamforming Optimization
收藏 引用
IEEE Transactions on Cognitive Communications and Networking 2025年
作者: Liu, Yuan Zhang, Ruichen Jiang, Ruihong Zhu, Yongdong Hu, Huimin Ni, Qiang Fei, Zesong Niyato, Dusit Zhejiang Laboratory Research Center for Space Computing System Hangzhou311100 China Nanyang Technological University College of Computing and Data Science Singapore 639798 Singapore Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China Cambridge Mechatronics Ltd CambridgeCB1 2PH United Kingdom Xi’an University of Posts and Telecommunications School of Communications and Information Engineering School of Artificial Intelligence Xi’an710121 China Lancaster University School of Computing and Communications LancasterLA1 4WA United Kingdom Beijing Institute of Technology School of Information and Electronics Beijing100081 China
This paper delves into an integrated sensing and communication (ISAC) system bolstered by a simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS). Within this system, a base station ... 详细信息
来源: 评论
Energy and Latency-Aware Resource Management for UAV-Assisted Mobile Edge computing Against Jamming
Energy and Latency-Aware Resource Management for UAV-Assiste...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Ziling Shao Helin Yang Liang Xiao Wei Su Zehui Xiong Institute of Artificial Intelligence Xiamen University Xiamen China School of Informatics Xiamen University Xiamen China Key Laboratory of Multimedia Trusted Perception and Efficient Computing Xiamen University Xiamen China Pillar of Information System Technology & Design Singapore University of Technology and Design Singapore
Unmanned aerial vehicles (UAVs) have been increasingly employed as aerial servers in mobile edge computing (MEC) systems, providing essential computing, communication, and storage services for edge users. This UAV-ass...
来源: 评论
Distributed Online Generalized Nash Equilibrium Tracking for Prosumer Energy Trading Games
Distributed Online Generalized Nash Equilibrium Tracking for...
收藏 引用
American Control Conference (ACC)
作者: Yongkai Xie Zhaojian Wang John Z.F. Pang Bo Yang Xinping Guan Department of Automation Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai Jiao Tong University Shanghai China Agency for Science Technology and Research (A*STAR) Institute of High Performance Computing (IHPC) Singapore Republic of Singapore
With the proliferation of distributed generations, traditional passive consumers in distribution networks are evolving into "prosumers", which can both produce and consume energy. Energy trading with the mai...
来源: 评论
Auto-MatRegressor材料性能自动预测器:解放材料机器学习"调参师"
收藏 引用
Science Bulletin 2023年 第12期68卷 1259-1270,M0004页
作者: 刘悦 王双燕 杨正伟 Maxim Avdeev 施思齐 School of Computer Engineering and Science Shanghai UniversityShanghai 200444China Shanghai Engineering Research Center of Intelligent Computing System Shanghai 200444China State Key Laboratory of Advanced Special Steel School of Materials Science and EngineeringShanghai UniversityShanghai 200444China Materials Genome Institute Shanghai UniversityShanghai 200444China Zhejiang Laboratory Hangzhou 311100China Australian Nuclear Science and Technology Organisation Sydney 2232Australia School of Chemistry The University of SydneySydney 2006Australia
机器学习因其能够快速、精准拟合数据的潜在模式而被广泛应用于材料构效关系研究。然而,材料科学家往往需要进行繁琐的模型选择及参数寻优才能构建出高精度预测模型,为了解放材料机器学习"调参师",本文研发了基于元学习的材... 详细信息
来源: 评论
Meet-in-the-Middle Statistical Fault Analysis of the PRESENT lightweight Cryptosystem
Meet-in-the-Middle Statistical Fault Analysis of the PRESENT...
收藏 引用
作者: Li, Wei Zhu, Xiao-Ming Gu, Da-Wu Li, Jia-Yao Cai, Tian-Pei School of Computer Science and Technology Donghua University Shanghai201620 China Department of Computer and Science and Engineering Shanghai Jiao Tong University Shanghai200240 China Shanghai Key Laboratory of Scalable Computing and System Shanghai200240 China Shanghai Key Laboratory of Integrate Administration Technologies for Information Security Shanghai200240 China
The lightweight block cipher PRESENT was presented at the International Conference on Cryptographic Hardware and Embedded systems (CHES) in 2007, and it has become a standard of ISO/IEC-29192-2 for lightweight cryptos... 详细信息
来源: 评论