咨询与建议

限定检索结果

文献类型

  • 68 篇 期刊文献
  • 56 篇 会议

馆藏范围

  • 124 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 86 篇 工学
    • 52 篇 计算机科学与技术...
    • 42 篇 软件工程
    • 25 篇 信息与通信工程
    • 12 篇 电子科学与技术(可...
    • 11 篇 电气工程
    • 9 篇 化学工程与技术
    • 8 篇 光学工程
    • 5 篇 机械工程
    • 5 篇 仪器科学与技术
    • 5 篇 控制科学与工程
    • 4 篇 材料科学与工程(可...
    • 4 篇 动力工程及工程热...
    • 4 篇 生物医学工程(可授...
    • 3 篇 冶金工程
    • 3 篇 生物工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 土木工程
    • 2 篇 安全科学与工程
  • 37 篇 理学
    • 16 篇 数学
    • 16 篇 物理学
    • 7 篇 化学
    • 6 篇 生物学
    • 6 篇 统计学(可授理学、...
    • 3 篇 系统科学
  • 22 篇 管理学
    • 15 篇 图书情报与档案管...
    • 10 篇 管理科学与工程(可...
  • 3 篇 医学
    • 2 篇 基础医学(可授医学...
    • 2 篇 临床医学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 2 篇 农学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 9 篇 semantics
  • 8 篇 network coding
  • 5 篇 geography
  • 5 篇 signal processin...
  • 5 篇 computational mo...
  • 5 篇 speech recogniti...
  • 5 篇 data models
  • 5 篇 adaptation model...
  • 5 篇 engines
  • 4 篇 speech enhanceme...
  • 4 篇 acoustics
  • 4 篇 data mining
  • 4 篇 contracts
  • 4 篇 feature extracti...
  • 4 篇 training
  • 3 篇 zinc
  • 3 篇 raman spectrosco...
  • 3 篇 indexes
  • 3 篇 speech processin...
  • 3 篇 vectors

机构

  • 12 篇 shenzhen institu...
  • 12 篇 tianjin key labo...
  • 11 篇 peng cheng labor...
  • 9 篇 university of ch...
  • 6 篇 the shenzhen key...
  • 5 篇 key laboratory o...
  • 5 篇 oppo research in...
  • 5 篇 co. ltd.
  • 4 篇 huiyan technolog...
  • 4 篇 china-america ca...
  • 4 篇 shanghai key lab...
  • 4 篇 the school of co...
  • 4 篇 the key laborato...
  • 4 篇 huawei cloud com...
  • 4 篇 moe engineering ...
  • 3 篇 faculty of envir...
  • 3 篇 peking universit...
  • 3 篇 高可信软件技术教...
  • 3 篇 guangdong labora...
  • 3 篇 moe key lab of a...

作者

  • 13 篇 li hui
  • 11 篇 hui li
  • 9 篇 wang longbiao
  • 8 篇 dang jianwu
  • 8 篇 longbiao wang
  • 7 篇 jianwu dang
  • 6 篇 wang xiaobao
  • 6 篇 chen chen
  • 6 篇 xiaolin wang
  • 6 篇 chen fuxing
  • 6 篇 yingwei luo
  • 5 篇 tian qi
  • 5 篇 ge meng
  • 5 篇 huang qingming
  • 5 篇 meng ge
  • 5 篇 wang shuhui
  • 5 篇 tianrui wang
  • 4 篇 xiaobao wang
  • 4 篇 lv xiaoyi
  • 4 篇 chen cheng

语言

  • 110 篇 英文
  • 10 篇 中文
  • 4 篇 其他
检索条件"机构=Shenzhen Key Laboratory of Cloud Computing Technology & Application"
124 条 记 录,以下是81-90 订阅
排序:
Stacked Denoising Autoencoder based Fault Diagnosis for Rotating Motor
Stacked Denoising Autoencoder based Fault Diagnosis for Rota...
收藏 引用
第37届中国控制会议
作者: Haichuan Tang Kunting Zhang Dingfei Guo Lihao Jia Hong Qiao Yin Tian Cloud Computing Center Chinese Academy of Sciences Beijing Key Laboratory of Research and Application for Robotic Intelligence of “Hand-Eye-Brain” Interaction Center for Excellence in Brain Science and Intelligence Technology Chinese Academy of Sciences University of Chinese Academy of Sciences
Fault diagnosis is vital for normal operation of the rotating *** effective and reliable deep learning method known as stacked denoising autoencoder(SDAE) is investigated in this paper,which can extract the features f... 详细信息
来源: 评论
A Review of Fault Diagnosis for Traction Induction Motor
A Review of Fault Diagnosis for Traction Induction Motor
收藏 引用
第37届中国控制会议
作者: Yin Tian Dingfei Guo Kunting Zhang Lihao Jia Hong Qiao Haichuan Tang Cloud Computing Center Chinese Academy of Sciences Beijing Key Laboratory of Research and Application for Robotic Intelligence of Hand-Eye-Brain Interaction Center for Excellence in Brain Science and Intelligence Technology Chinese Academy of Sciences University of Chinese Academy of Sciences
With the rapid development of traction motor, the mechanical health monitoring and fault diagnosis field have entered the era of big data. Definite harmonic signals of the line current are located by a popular method ... 详细信息
来源: 评论
BASIC regenerating code: Binary addition and shift for exact repair
BASIC regenerating code: Binary addition and shift for exact...
收藏 引用
IEEE International Symposium on Information Theory
作者: Hanxu Hou Kenneth W. Shum Minghua Chen Hui Li Peking University Beijing Beijing CN Institute of Network Coding Chinese University of Hong Kong Hong Kong China Department of Information Engineering Chinese University of Hong Kong Hong Kong China Shenzhen Engineering Laboratory of Converged Networks Technology Shenzhen Key Laboratory of Cloud Computing Technology and App. Shenzhen Graduate School Peking University Shenzhen China
Regenerating code is a class of storage codes that achieve the optimal trade-off between storage capacity and repair bandwidth, which are two important performance metrics in data storage systems. However, existing co... 详细信息
来源: 评论
General Greedy De-bias Learning
arXiv
收藏 引用
arXiv 2021年
作者: Han, Xinzhe Wang, Shuhui Su, Chi Huang, Qingming Tian, Qi The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing101408 China The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China Peng Cheng Laboratory Shenzhen518066 China SmartMore Beijing100085 China Huawei Cloud & AI Shenzhen518129 China
Neural networks often make predictions relying on the spurious correlations from the datasets rather than the intrinsic properties of the task of interest, facing with sharp degradation on out-of-distribution (OOD) te... 详细信息
来源: 评论
Stream Attention Based U-Net for L3DAS23 Challenge
Stream Attention Based U-Net for L3DAS23 Challenge
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Honglong Wang Yanjie Fu Junjie Li Meng Ge Longbiao Wang Xinyuan Qian Tianjin Key Laboratory of Cognitive Computing and Application College of Intelligence and Computing Tianjin University Tianjin China The Chinese University of Hong Kong Shenzhen China Huiyan Technology (Tianjin) Co. Ltd Tianjin China School of Computer and Communication Engineering University of Science and Technology Beijing Beijing China
Machine learning applications of 3D audio are gaining increasing interest in recent years. In this paper, we propose a stream attention based U-Net to remove background noise and reverberation based on ICASSP Signal P... 详细信息
来源: 评论
An end-to-end foreground-aware network for person re-identification
arXiv
收藏 引用
arXiv 2019年
作者: Liu, Yiheng Zhou, Wengang Liu, Jianzhuang Qi, Guojun Tian, Qi Li, Houqiang CAS Key Laboratory of Technology in Geo-spatial Information Processing and Application System Department of Electronic Engineering and Information Science University of Science and Technology of China Hefei230027 China Noah’s Ark Lab Huawei Technologies Company Limited Shenzhen518129 China Huawei Cloud EI Product Department Cloud & AI Huawei Technologies
Person re-identification is a crucial task of identifying pedestrians of interest across multiple surveillance camera views. For person re-identification, a pedestrian is usually represented with features extracted fr... 详细信息
来源: 评论
Noncollinearity-modulated Electronic Properties of Monolayer CrI3
收藏 引用
Physical Review Applied 2019年 第5期11卷 054042-054042页
作者: Lingling Ren Qian Liu Pengxiang Xu Zhicheng Zhong Li Yang Zhe Yuan Ke Xia Center for Advanced Quantum Studies and Department of Physics Beijing Normal University Beijing 100875 China Center for Quantum Computing Peng Cheng Laboratory Shenzhen 518005 China Key Laboratory of Magnetic Materials and Devices & Zhejiang Province Key Laboratory of Magnetic Materials and Application Technology Ningbo Institute of Materials Technology and Engineering Chinese Academy of Sciences Ningbo 315201 China Department of Physics and Institute of Materials Science and Engineering Washington University in St. Louis St. Louis Missouri 63130 USA Shenzhen Institute for Quantum Science and Engineering and Department of Physics Southern University of Science and Technology Shenzhen 518055 China
Introducing noncollinear magnetization into a monolayer CrI3 is proposed to be an effective approach to modulate the local electronic properties of the two-dimensional (2D) magnetic material. Using first-principles ca... 详细信息
来源: 评论
HL-LSM: A LSM-Tree Combined with Read Hotness and Learned Index
HL-LSM: A LSM-Tree Combined with Read Hotness and Learned In...
收藏 引用
2024 IEEE International Conference on Big Data, BigData 2024
作者: Tan, Hong Li, Hui Wang, Xiaopeng Huang, Weixiang Huang, Runhuai Deng, Shaowen Wu, Jianping Peking University Shenzhen Graduate School Shenzhen China Guangdong Provincial Key Laboratory of Ultra High Definition Immersive Media Technology China FuYao Univ. of Sci. &tech School of Computer & Ai Fuzhou China China Mobile Internet Co. Ltd Capability & Platform Business Dept Guangzhou China China Telecom Co. Ltd China Telecom Cloud Computing Beijing China China Unicom Global Limited Hong Kong China Communications Services Construction Co. Ltd GuangZhou China
Log-Structured Merge Tree (LSM-Tree) is widely employed in key-value (kv) store owing to its exceptional performance in write-intensive workloads. LSMTree appends kv pairs to memory initially, and only when the memory... 详细信息
来源: 评论
Stable Attribute Group Editing for Reliable Few-shot Image Generation
arXiv
收藏 引用
arXiv 2023年
作者: Ding, Guanqi Han, Xinzhe Wang, Shuhui Wu, Shuzhe Jin, Xin Tu, Dandan Huang, Qingming The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing101408 China The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China Peng Cheng Laboratory Shenzhen518066 China Huawei Cloud EI Innovation Lab China
Few-shot image generation aims to generate data of an unseen category based on only a few samples. Apart from basic content generation, a bunch of downstream applications hopefully benefit from this task, such as low-... 详细信息
来源: 评论
Selective-Opening Security for Public-key Encryption in the Presence of Parameter Subversion
收藏 引用
Security and Communication Networks 2021年 第1期2021卷
作者: Kang, Burong Huang, Zhengan Zhang, Lei Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai200062 China Guangxi Key Laboratory of Cryptography and Information Security Guangxi Guilin541000 China Engineering Research Center of Software/Hardware Co-Design Technology and Application Ministry of Education East China Normal University Shanghai200062 China Peng Cheng Laboratory Shenzhen518000 China
In public-key encryption (PKE), ciphertexts received by a receiver may be possibly correlated and the security of a PKE relies on honestly generated system parameters. Security against selective opening attacks (SOA) ... 详细信息
来源: 评论