咨询与建议

限定检索结果

文献类型

  • 2,399 篇 会议
  • 1,989 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 4,404 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,880 篇 工学
    • 1,964 篇 计算机科学与技术...
    • 1,527 篇 软件工程
    • 601 篇 信息与通信工程
    • 386 篇 电气工程
    • 369 篇 控制科学与工程
    • 327 篇 电子科学与技术(可...
    • 258 篇 生物工程
    • 222 篇 机械工程
    • 206 篇 光学工程
    • 166 篇 生物医学工程(可授...
    • 155 篇 仪器科学与技术
    • 145 篇 动力工程及工程热...
    • 141 篇 化学工程与技术
    • 103 篇 交通运输工程
    • 101 篇 网络空间安全
    • 90 篇 材料科学与工程(可...
    • 84 篇 土木工程
    • 84 篇 安全科学与工程
    • 80 篇 建筑学
  • 1,447 篇 理学
    • 708 篇 数学
    • 395 篇 物理学
    • 310 篇 生物学
    • 210 篇 统计学(可授理学、...
    • 156 篇 化学
    • 144 篇 系统科学
  • 764 篇 管理学
    • 510 篇 管理科学与工程(可...
    • 284 篇 图书情报与档案管...
    • 200 篇 工商管理
  • 179 篇 医学
    • 148 篇 临床医学
    • 115 篇 基础医学(可授医学...
  • 117 篇 法学
  • 73 篇 经济学
  • 53 篇 农学
  • 25 篇 教育学
  • 20 篇 军事学
  • 10 篇 艺术学
  • 9 篇 文学

主题

  • 104 篇 feature extracti...
  • 92 篇 semantics
  • 80 篇 computational mo...
  • 78 篇 deep learning
  • 72 篇 computer science
  • 67 篇 training
  • 65 篇 computer archite...
  • 59 篇 optimization
  • 59 篇 cloud computing
  • 57 篇 servers
  • 56 篇 laboratories
  • 55 篇 accuracy
  • 53 篇 scalability
  • 52 篇 grid computing
  • 50 篇 protocols
  • 49 篇 predictive model...
  • 48 篇 bandwidth
  • 48 篇 machine learning
  • 45 篇 data models
  • 43 篇 resource managem...

机构

  • 131 篇 school of comput...
  • 101 篇 national enginee...
  • 95 篇 hubei province k...
  • 90 篇 school of comput...
  • 79 篇 department of co...
  • 53 篇 services computi...
  • 49 篇 services computi...
  • 48 篇 school of softwa...
  • 47 篇 national enginee...
  • 46 篇 hubei province k...
  • 45 篇 services computi...
  • 44 篇 state key labora...
  • 42 篇 school of cyber ...
  • 39 篇 huazhong univers...
  • 38 篇 tsinghua nationa...
  • 38 篇 university of ch...
  • 36 篇 school of inform...
  • 35 篇 school of comput...
  • 35 篇 national enginee...
  • 33 篇 key laboratory o...

作者

  • 234 篇 hai jin
  • 188 篇 jin hai
  • 53 篇 xiaofei liao
  • 37 篇 liao xiaofei
  • 34 篇 niyato dusit
  • 33 篇 deqing zou
  • 31 篇 dan feng
  • 30 篇 shi xuanhua
  • 29 篇 zou deqing
  • 27 篇 shen linlin
  • 27 篇 song wu
  • 25 篇 hu shengshan
  • 24 篇 wang wei
  • 21 篇 li peng
  • 19 篇 liu yang
  • 19 篇 jiang wenbin
  • 18 篇 xiaolong zhang
  • 18 篇 zhang xiaolong
  • 18 篇 liu jun
  • 18 篇 li bo

语言

  • 3,641 篇 英文
  • 629 篇 其他
  • 149 篇 中文
  • 2 篇 德文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Services Computing Technology and System Laboratory School of Computer Science & Technology"
4404 条 记 录,以下是1211-1220 订阅
排序:
YOLOv5s-SLAM: A Monocular Visual SLAM method in Dynamic Environments
YOLOv5s-SLAM: A Monocular Visual SLAM method in Dynamic Envi...
收藏 引用
International Conference on computer and Communications (ICCC)
作者: Zhenyu Yin Dan Feng Chao Fan Xiaohui Wang Chinese Academy of Sciences Shenyang Institute of Computing Technology Liaoning Key Laboratory of Domestic Industrial Control Platform Technology on Basic Hardware & Software Shenyang China School of Computer Science and Technology University of Chinese Academy of Sciences
To deal with the problem that traditional visual SLAM methods in dynamic environments are susceptible to the influence of moving targets, which leads to a decrease in the system's localization accuracy. This paper...
来源: 评论
Uncertainty-Guided Pixel-Level Contrastive Learning for Biomarker Segmentation in OCT Images  17th
Uncertainty-Guided Pixel-Level Contrastive Learning for Biom...
收藏 引用
17th International Conference on Intelligent computing, ICIC 2021
作者: Bai, Yingjie Liu, Xiaoming Li, Bo Zhou, Kejie School of Computer Science and Technology Wuhan University of Science and Technology Wuhan430065 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan430065 China
Optical coherence tomography (OCT) has been widely leveraged to assist doctors in clinical ophthalmic diagnosis, since it can show the hierarchical structure of the retina. The type and size of biomarkers are crucial ... 详细信息
来源: 评论
A Continuous Verification Mechanism for Clients in Federated Unlearning to Defend the Right to be Forgotten
A Continuous Verification Mechanism for Clients in Federated...
收藏 引用
International Symposium on Parallel and Distributed Processing with Applications, ISPA
作者: Shanshan Chen Jun Liu Yuying Li Yamin Li Yang Yang Gaoyang Liu Chen Wang Key Laboratory of Intelligent Sensing System and Security (Ministry of Education) School of Artificial Intelligence Hubei University Wuhan China School of Computer Science and Information Engineering Hubei University Wuhan China Huazhong University of Science and Technology Wuhan China
In Federated Learning (FL), the regulatory need for the "right to be forgotten" requires efficient Federated Unlearning (FU) methods, which enable FL models to unlearn appointed training data. Associating wi... 详细信息
来源: 评论
Prediction model of sleep membership in drugstores based on immune danger theory
Prediction model of sleep membership in drugstores based on ...
收藏 引用
2021 IEEE International Conference on Power Electronics, computer Applications, ICPECA 2021
作者: Yan, Song Li, Tao Zheng, Haotian Wuhan University of Science and Technology School of Computer Science and Technology Wuhan430065 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan430065 China
The artificial immune danger theory is introduced into the analysis of user behavior characteristics to effectively identify the dormant member users of pharmacies. Take pharmacy members as an example, analyze the beh... 详细信息
来源: 评论
Design and implementation of intelligent question and answer electronic dictionary in the context of big data
Design and implementation of intelligent question and answer...
收藏 引用
Communications technology and computer science (ACCTCS), Asia-Pacific Conference on
作者: Rui Qiao Xiaolei Zhong School of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan University of Science and Technology Wuhan China Yunnan University Dianchi College Kunming China
In the current era of the Internet, social life is inseparable from data, and people also live in a network. For people, network technology and smartphones are like swimming fish without water. The swimming fish, a po...
来源: 评论
3DHacker: Spectrum-based Decision Boundary Generation for Hard-label 3D Point Cloud Attack
3DHacker: Spectrum-based Decision Boundary Generation for Ha...
收藏 引用
International Conference on computer Vision (ICCV)
作者: Yunbo Tao Daizong Liu Pan Zhou Yulai Xie Wei Du Wei Hu Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wangxuan Institute of Computer Technology Peking University
With the maturity of depth sensors, the vulnerability of 3D point cloud models has received increasing attention in various applications such as autonomous driving and robot navigation. Previous 3D adversarial attacke...
来源: 评论
A Novel Relocating Recognition Algorithm in Overlapping Region for Multi-UAVs Cluster
A Novel Relocating Recognition Algorithm in Overlapping Regi...
收藏 引用
2022 IEEE International Conference on Unmanned systems, ICUS 2022
作者: Li, Chen Qi, Xuelei Zhao, Juntao Liao, Xuanhong Lin, Zitian Ma, Hongjun Liang, Xinkai College of Information Science and Engineering Northeastern University Shenyang China Hong Kong University of Science and Technology Department of Electronic and Computer Engineering Hong Kong Hong Kong High School Attached to Northeast Normal University International Curriculum Center Changchun China School of Automation Science and Engineering South China University of Technology Guangzhou China Beijing Electro-Mechanical Engineering Institute Science and Technology on Complex System Control and Intelligent Agent Cooperation Laboratory Beijing China
How improve the mapping efficiency and location accuracy of the multi-UAV cluster based on the distributed SLAM technology is a significant problem in overlapping regions. Therefore, this paper mainly proposes a novel... 详细信息
来源: 评论
Few-Shot Camouflaged Object Segmentation
Few-Shot Camouflaged Object Segmentation
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Ziqiu Wang Yuying Li Yang Yang Yamin Li Gaoyang Liu Key Laboratory of Intelligent Sensing System and Security (Ministry of Education) School of Artificial Intelligence Hubei University Wuhan China School of Computer Science and Information Engineering Hubei University Wuhan China Huazhong University of Science and Technology Wuhan China
In the domain of computer vision, Camouflaged Object Segmentation (COS) is a crucial task aimed at identifying objects that blend into their surroundings, with applications spanning diverse sectors such as military, m... 详细信息
来源: 评论
Physically Based Bidirectional Path Tacing Algorithm on the Tianhe-2 Supercomputer
Physically Based Bidirectional Path Tacing Algorithm on the ...
收藏 引用
IEEE International Conference on High Performance computing and Communications (HPCC)
作者: Yijia Wu Congpin Zhang Zhengwei Xu Ligang Li National Space Science Center Key Laboratory of Electronics and Information Technology for Space System Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences School of Computer & Information Engineering Henan Normal University Xinxiang Henan China
Physically based ray tracing is a technique that involves creating a photo-realistic image from a 3D scene description by utilizing the laws of physics to simulate the behavior of light and matter. However, due to the...
来源: 评论
SFDE-net: A Spatial-Frequency Domain Feature Enhancement Network for Cloud Detection
SFDE-net: A Spatial-Frequency Domain Feature Enhancement Net...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Baotong Su Siyan Li Wenguang Zheng Yao Chen The School of Computer Science and Engineering Tianjin University of Technology Tianjin China Key Laboratory of Technology in Geo-Spatial Information Processing and Application System Chinese Academy of Sciences and Aerospace Information Research Institute Chinese Academy of Sciences Beijing China
Cloud detection is a crucial step in the preprocessing of satellite remote sensing images. Existing methods tend to have misjudgments when dealing with specific scenarios, such as challenges in distinguishing thin clo... 详细信息
来源: 评论