咨询与建议

限定检索结果

文献类型

  • 1,441 篇 会议
  • 971 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,414 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,561 篇 工学
    • 1,010 篇 计算机科学与技术...
    • 772 篇 软件工程
    • 318 篇 信息与通信工程
    • 220 篇 控制科学与工程
    • 174 篇 电子科学与技术(可...
    • 168 篇 电气工程
    • 145 篇 机械工程
    • 126 篇 生物工程
    • 77 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 67 篇 化学工程与技术
    • 65 篇 材料科学与工程(可...
    • 63 篇 动力工程及工程热...
    • 63 篇 生物医学工程(可授...
    • 53 篇 网络空间安全
    • 44 篇 安全科学与工程
  • 782 篇 理学
    • 434 篇 数学
    • 152 篇 生物学
    • 143 篇 物理学
    • 128 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 64 篇 化学
    • 32 篇 大气科学
  • 418 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 81 篇 工商管理
  • 60 篇 医学
    • 45 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 56 篇 法学
    • 47 篇 社会学
  • 29 篇 经济学
  • 24 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 27 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 37 篇 school of cyber ...
  • 36 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 32 篇 university of ch...
  • 30 篇 key laboratory o...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 35 篇 jin hai
  • 34 篇 hai jin
  • 33 篇 changjun jiang
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 23 篇 li xiaowei
  • 22 篇 mengchu zhou
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 21 篇 cheng wang
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,228 篇 英文
  • 101 篇 中文
  • 92 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2414 条 记 录,以下是891-900 订阅
排序:
Multi-objective Optimization of Space-Air-Ground Integrated Network Slicing Relying on a Pair of Central and Distributed Learning Algorithms
arXiv
收藏 引用
arXiv 2023年
作者: Zhou, Guorong Zhao, Liqiang Zheng, Gan Song, Shenghui Zhang, Jiankang Hanzo, Lajos Key Laboratory of Integrated Service Networks Xidian University Xi’an710071 China Key Laboratory of Integrated Service Networks Xidian University Xi’an710071 China School of Engineering University of Warwick CoventryCV4 7AL United Kingdom Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology Hong Kong Department of Computing & Informatics Bournemouth University BH12 5BB United Kingdom School of Electronics and Computer Science University of Southampton SouthamptonSO17 1BJ United Kingdom
As an attractive enabling technology for next-generation wireless communications, network slicing supports diverse customized services in the global space-air-ground integrated network (SAGIN) with diverse resource co... 详细信息
来源: 评论
Domain generalization for document authentication against practical recapturing attacks
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Changsheng Zhang, Shuzheng Lan, Fengbo Huang, Jiwu The Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security National Engineering Laboratory for Big Data System Computing Technology College of Electronics and Information Engineering Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society China
Recapturing attack can be employed as a simple but effective anti-forensic tool for digital document images. Inspired by the document inspection process that compares a questioned document against a reference sample, ... 详细信息
来源: 评论
A VLIW Architecture Stream Cryptographic Processor for Information Security
收藏 引用
China Communications 2019年 第6期16卷 185-199页
作者: Longmei Nan Xuan Yang Xiaoyang Zeng Wei Li Yiran Du Zibin Dai Lin Chen ASIC&System State Key Laboratory of Fudan University Shanghai 201203China Institute of Information Science and Technology Zhengzhou 450001China Jiangnan Institute of Computing Technology WuXi 214083China
As an important branch of information security algorithms,the efficient and flexible implementation of stream ciphers is *** implementation methods,such as FPGA,GPP and ASIC,provide a good support,but they could not a... 详细信息
来源: 评论
Cache Design Effect on Microarchitecture Security: A Contrast between Xuantie-910 and BOOM
Cache Design Effect on Microarchitecture Security: A Contras...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Zhe Zhou Xiaoyu Cheng Yang Sun Fang Jiang Fei Tong Yuxing Mao Ruilin Wang Southeast University Nanjing China Purple Mountain Laboratories Nanjing China School of Electrical Engineering Chongqing University Chongqin China State Key Laboratory of Power Transmission Equipment & System Security and New Technology Chongqing University Chongqing China School of Computing Newcastle University United Kingdom
Modern processors make use of optimization techniques such as cache and speculation mechanisms to greatly improve performance. But recent research has found that these techniques can also be exploited by attackers to ... 详细信息
来源: 评论
SFedXL: Semi-Synchronous Federated Learning With Cross-Sharpness and Layer-Freezing
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Zhao, Mingxiong Zhao, Shihao Feng, Chenyuan Yang, Howard H. Niyato, Dusit Quek, Tony Q. S. Yunnan University National Pilot School of Software Kunming650500 China Ministry of Education Engineering Research Center of Integration and Application of Digital Learning Technology Beijing100039 China Ministry of Education Engineering Research Center of Cyberspace Kunming650504 China Yunnan University of Finance and Economics Yunnan Key Laboratory of Service Computing Kunming650221 China EURECOM Sophia Antipolis06410 France Zhejiang University University of Illinois Urbana-Champaign Institute Zhejiang University Haining314400 China Nanyang Technological University School of Computer Science and Engineering 639798 Singapore Singapore University of Technology and Design Information Systems Technology and Design Pillar 487372 Singapore
Federated learning (FL) emerges as a potential solution for enabling multiple terminal devices to collaboratively accomplish computational tasks within an Unmanned Aerial Vehicle (UAV) swarm. However, traditional FL a... 详细信息
来源: 评论
智能隐蔽通信——最新进展与未来研究趋势(英文)
收藏 引用
Engineering 2025年 第1期 101-111页
作者: 李赞 石嘉 司江勃 吕璐 关磊 郝本建 铁壮壮 王丹洋 邢成文 Tony Q.S.Quek State Key Laboratory of Integrated Service Networks School of Telecommunications Engineering Xidian University School of Information and Electronics Beijing Institute of Technology Information System Technology and Design Pillar Singapore University of Technology and Design
With the future substantial increase in coverage and network heterogeneity, emerging networks will encounter unprecedented security threats. Covert communication is considered a potential enhanced security and privacy...
来源: 评论
Location-Aware Feature Interaction Learning for Web service Recommendation
Location-Aware Feature Interaction Learning for Web Service ...
收藏 引用
IEEE International Conference on Web services (ICWS)
作者: Zhixin Wang Yingyuan Xiao Chenchen Sun Wenguang Zheng Xu Jiao Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Key Laboratory of Computer Vision and System Tianjin University of Technology Tianjin China
With the increasing prevalence of web services on the World Wide Web, a large number of functionally equivalent web services are provided by different providers. Quality-of-service (QoS), representing the nonfunctiona... 详细信息
来源: 评论
Multi-agent SAC approach aided joint trajectory and power optimization for multi-UAV assisted wireless networks with safety constraints
收藏 引用
Chinese Journal of Aeronautics 2025年
作者: Jia SHI Zan LI Wentao SUN Zixuan BAI Feng WANG Tony Q. S. QUEK The State Key Laboratory of Integrated Service Networks School of Telecommunications Engineering Xidian University Xi’an 710071 China The Information System Technology and Design Pillar Singapore University of Technology and Design Singapore 487372 Singapore
Unmanned Aerial Vehicles (UAVs) have demonstrated significant potential as Aerial Base Stations (A-BSs) for providing data services to Ground Users (GUs), attributed to their flexibility, cost-effectiveness, and high ... 详细信息
来源: 评论
An Improved CTU-level Rate Control Algorithm Based on Temporal Domain Motion Intensity
An Improved CTU-level Rate Control Algorithm Based on Tempor...
收藏 引用
International Symposium on Communications and Information Technologies (ISCIT)
作者: Shaokang Wang Songlin Sun Jiaqi Zou Ruotong Wu Zhilei Ling Xingtong Liu School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education China Engineering Research Center of Blockchain and Network Convergence Technology Ministry of Education China Department of Electronics and Electrical Engineering University College London London UK Business School Beijing Normal University Beijing China
Rate control (RC) plays a vital role in Versatile Video Coding (VVC) and video transmission. However, the RC algorithm in VVC remains the problem that the process of updating model parameters only considers the impact...
来源: 评论
Improving Chinese Spelling Check by Character Pronunciation Prediction: The Effects of Adaptivity and Granularity
arXiv
收藏 引用
arXiv 2022年
作者: Li, Jiahao Wang, Quan Mao, Zhendong Guo, Junbo Yang, Yanyan Zhang, Yongdong University of Science and Technology of China Hefei China MOE Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China People's Daily Online Co. Beijing China People's Public Security University of China Beijing China
Chinese spelling check (CSC) is a fundamental NLP task that detects and corrects spelling errors in Chinese texts. As most of these spelling errors are caused by phonetic similarity, effectively modeling the pronuncia...
来源: 评论