咨询与建议

限定检索结果

文献类型

  • 1,441 篇 会议
  • 971 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,414 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,561 篇 工学
    • 1,010 篇 计算机科学与技术...
    • 772 篇 软件工程
    • 318 篇 信息与通信工程
    • 220 篇 控制科学与工程
    • 174 篇 电子科学与技术(可...
    • 168 篇 电气工程
    • 145 篇 机械工程
    • 126 篇 生物工程
    • 77 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 67 篇 化学工程与技术
    • 65 篇 材料科学与工程(可...
    • 63 篇 动力工程及工程热...
    • 63 篇 生物医学工程(可授...
    • 53 篇 网络空间安全
    • 44 篇 安全科学与工程
  • 782 篇 理学
    • 434 篇 数学
    • 152 篇 生物学
    • 143 篇 物理学
    • 128 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 64 篇 化学
    • 32 篇 大气科学
  • 418 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 81 篇 工商管理
  • 60 篇 医学
    • 45 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 56 篇 法学
    • 47 篇 社会学
  • 29 篇 经济学
  • 24 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 60 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 27 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 37 篇 school of cyber ...
  • 36 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 32 篇 university of ch...
  • 30 篇 key laboratory o...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 35 篇 jin hai
  • 34 篇 hai jin
  • 33 篇 changjun jiang
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 23 篇 li xiaowei
  • 22 篇 mengchu zhou
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 21 篇 cheng wang
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,228 篇 英文
  • 101 篇 中文
  • 92 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2414 条 记 录,以下是961-970 订阅
排序:
IGTP: A next point-of-interest recommendation method that integrates geospatial and temporal preferences
Research Square
收藏 引用
Research Square 2021年
作者: Jiao, Xu Xiao, Yingyuan Zheng, Wenguang Zhu, Ke School of General Education Tianjin Foreign Studies University Tianjin China Engineering Research Center of Learning-Based Intelligent System Ministry of Education Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China
With the rapid development of location-based social networks(LBSNs), point-of-interest(POI) recommendation has become an important way to meet the personalized needs of users. The purpose of POI recommendation is to p... 详细信息
来源: 评论
Long-term Dependency for 3D Reconstruction of Freehand Ultrasound Without External Tracker
arXiv
收藏 引用
arXiv 2023年
作者: Li, Qi Shen, Ziyi Li, Qian Barratt, Dean C. Dowrick, Thomas Clarkson, Matthew J. Vercauteren, Tom Hu, Yipeng The UCL Centre for Medical Image Computing The Wellcome/EPSRC Centre for Interventional and Surgical Sciences Department of Medical Physics and Biomedical Engineering University College London LondonWC1E 6BT United Kingdom State Key Laboratory of Robotics and System Harbin Institute of Technology Harbin China School of Biomedical Engineering & Imaging Sciences King’s College London LondonWC2R 2LS United Kingdom
Objective: Reconstructing freehand ultrasound in 3D without any external tracker has been a longstanding challenge in ultrasound-assisted procedures. We aim to define new ways of parameterising long-term dependencies,... 详细信息
来源: 评论
Noncontact Doppler Radar-based Heart Rate Detection on the SVD and ANC
Noncontact Doppler Radar-based Heart Rate Detection on the S...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Qiuxia Shi Bin Hu Fuze Tian Qinglin Zhao Gansu Provincial Key Laboratory of Wearable Computing School of Information Science and Engineering Lanzhou University School of Computer and Communication Lanzhou University of Technology Ministry of Education Key Laboratory of Special Functional Materials and Structural Design (Lanzhou University) Lanzhou China CAS Center for Excellence in Brain Science and Intelligence Technology Shanghai Institutes for Biological Sciences Chinese Academy of Sciences Joint Research Center for Cognitive Neurosensor Technology of Lanzhou University & Institute of Semiconductors Chinese Academy of Sciences Engineering Research Center of Open Source Software and Real-Time System(Lanzhou University) Ministry of Education Key Laboratory of Special Functional Materials and Structural Design Ministry of Education Lanzhou University Lanzhou China
In the Doppler biological radar-based applications of noncontact measurement of vital signs, effectively extracting heartbeat information from weak thoracic mechanical motion is an important problem to be solved. This... 详细信息
来源: 评论
Multi-level Directed Fuzzing for Detecting Use-after-Free Vulnerabilities
Multi-level Directed Fuzzing for Detecting Use-after-Free Vu...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Yuntao Zhang Zhongru Wang Weiqiang Yu Binxing Fang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China Chinese Academy of Cyberspace Studies Beijing China Beijing DigApis Technology Co. Ltd Beijing China
Greybox fuzzing has been widely used in vulnerabilities detection. Most greybox fuzzing tools are coverage-based, which usually use basic block transition to gain code coverage and focus on improving it to trigger mor... 详细信息
来源: 评论
Finedge: A Dynamic Cost-Efficient Edge Resource Management Platform for NFV Network
Finedge: A Dynamic Cost-Efficient Edge Resource Management P...
收藏 引用
International Workshop on Quality of service
作者: Miao Li Qixia Zhang Fangming Liu National Engineering Research Center for Big Data Technology and System Key Laboratory of Services Computing Technology and System Ministry of Education School of Computer Science and Technology Huazhong University of Science and Technology China
With the evolution of network function virtualization (NFV) and edge computing, software-based network functions (NFs) can be deployed on closer-to-end-user edge servers to support a broad range of new services with h... 详细信息
来源: 评论
Chinese named entity recognition method for the field of network security based on RoBERTa
Chinese named entity recognition method for the field of net...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Xiaoyan Zhu Yu Zhang Lei Zhu Xinhong Hei Yichuan Wang Feixiong Hu Yanni Yao School of Computer Science and Engineering Xi’an Jiaotong University Xi’an China Shaanxi Key Laboratory for Network Computing and Security Technology Xi’an China School of Computer Science and Technology Xi’an University of technology Xi’an China Shenzhen Tencent Computer System Co. Ltd Shenzhen China
As the mobile Internet is developing rapidly, people who use cell phones to access the Internet dominate, and the mobile Internet has changed the development environment of online public opinion and made online public... 详细信息
来源: 评论
Reinforcement Learning Based Antenna Selection in User-Centric Massive MIMO  91
Reinforcement Learning Based Antenna Selection in User-Centr...
收藏 引用
91st IEEE Vehicular technology Conference, VTC Spring 2020
作者: Chai, Xinxin Gao, Hui Sun, Ji Su, Xin Lv, Tiejun Zeng, Jie Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing100876 China Institute of Telecommunications Ministry of Industry and Information Technology Beijing100804 China Tsinghua University Beijing National Research Center for Information Science and Technology Beijing100091 China
In this paper, we consider a user-centric massive multiple-input multiple-output (UC-MMIMO) system, wherein the optimal antenna selection (AS) is very complicated, because of the huge number of deployed antennas. Trad... 详细信息
来源: 评论
New public auditing protocol based on homomorphic tags for secure cloud storage
New public auditing protocol based on homomorphic tags for s...
收藏 引用
作者: Zhang, Jindan Wang, Baocang Ogiela, Marek R. Wang, Xu An Sangaiah, Arun Kumar Xianyang Vocational Technical College Xianyang China State Key Laboratory of Integrated Service Networks Xidian University Xi'an China AGH University of Science and Technology Krakow Poland Engineering University of CAPF Xi'an China School of Computing Science and Engineering Vellore Institute of Technology Vellore India
Outsourcing datum to the cloud servers is more and more popular for most data owners and enterprises. However, how to ensure the outsourced datum to be kept secure is very important. Especially, how to check the outso... 详细信息
来源: 评论
Heat to Power: Thermal Energy Harvesting and Recycling for Warm Water-Cooled Datacenters
Heat to Power: Thermal Energy Harvesting and Recycling for W...
收藏 引用
Annual International Symposium on Computer Architecture, ISCA
作者: Xinhui Zhu Weixiang Jiang Fangming Liu Qixia Zhang Li Pan Qiong Chen Ziyang Jia National Engineering Research Center for Big Data Technology and System Key Laboratory of Services Computing Technology and System Ministry of Education School of Computer Science and Technology Huazhong University of Science and Technology China
Warm water cooling has been regarded as a promising method to improve the energy efficiency of water-cooled datacenters. In warm water-cooling systems, hot spots occur as a common problem where the hybrid cooling arch...
来源: 评论
Group-wise Inhibition based Feature Regularization for Robust Classification
Group-wise Inhibition based Feature Regularization for Robus...
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Haozhe Liu Haoqian Wu Weicheng Xie Feng Liu Linlin Shen Computer Vision Institute College of Computer Science and Software Engineering SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society National Engineering Laboratory for Big Data System Computing Technology Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen China
The convolutional neural network (CNN) is vulnerable to degraded images with even very small variations (e.g. corrupted and adversarial samples). One of the possible reasons is that CNN pays more attention to the most... 详细信息
来源: 评论