咨询与建议

限定检索结果

文献类型

  • 96 篇 会议
  • 72 篇 期刊文献

馆藏范围

  • 168 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 118 篇 工学
    • 79 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 45 篇 信息与通信工程
    • 21 篇 电子科学与技术(可...
    • 20 篇 控制科学与工程
    • 18 篇 电气工程
    • 13 篇 生物工程
    • 10 篇 网络空间安全
    • 8 篇 光学工程
    • 8 篇 生物医学工程(可授...
    • 7 篇 机械工程
    • 6 篇 仪器科学与技术
    • 6 篇 土木工程
    • 5 篇 建筑学
    • 5 篇 航空宇航科学与技...
    • 4 篇 动力工程及工程热...
    • 4 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
  • 52 篇 理学
    • 32 篇 数学
    • 14 篇 生物学
    • 10 篇 物理学
    • 8 篇 统计学(可授理学、...
    • 5 篇 系统科学
  • 32 篇 管理学
    • 25 篇 管理科学与工程(可...
    • 11 篇 工商管理
    • 9 篇 图书情报与档案管...
  • 7 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
    • 4 篇 药学(可授医学、理...
  • 3 篇 法学
    • 2 篇 社会学
  • 2 篇 军事学
  • 1 篇 经济学
  • 1 篇 农学

主题

  • 6 篇 wireless sensor ...
  • 4 篇 computer archite...
  • 4 篇 gyroscopes
  • 4 篇 wireless communi...
  • 4 篇 interference
  • 4 篇 computational mo...
  • 4 篇 mathematical mod...
  • 4 篇 sensors
  • 3 篇 support vector m...
  • 3 篇 deep learning
  • 3 篇 resource managem...
  • 3 篇 convolution
  • 3 篇 quality of servi...
  • 3 篇 processor schedu...
  • 3 篇 servers
  • 3 篇 switches
  • 3 篇 middleware
  • 3 篇 virtualization
  • 3 篇 accuracy
  • 3 篇 energy efficienc...

机构

  • 9 篇 state key labora...
  • 7 篇 computer enginee...
  • 7 篇 school of comput...
  • 6 篇 complex networks...
  • 6 篇 state key labora...
  • 6 篇 xidian universit...
  • 6 篇 department of co...
  • 5 篇 school of softwa...
  • 5 篇 school of softwa...
  • 5 篇 school of softwa...
  • 5 篇 state key labora...
  • 4 篇 college of compu...
  • 4 篇 department of ra...
  • 4 篇 school of softwa...
  • 4 篇 zhibian technolo...
  • 4 篇 shenzhen univers...
  • 4 篇 jiangsu high tec...
  • 3 篇 beijing laborato...
  • 3 篇 the ministry of ...
  • 3 篇 state key labora...

作者

  • 9 篇 qian xueming
  • 6 篇 zhu li
  • 5 篇 ilya grishin
  • 5 篇 rongqing zhang
  • 5 篇 grigoriy fokin
  • 4 篇 yang yi
  • 4 篇 vladimir sevidov
  • 4 篇 haqiq abdelkrim
  • 4 篇 wei yunchao
  • 4 篇 wang yaxiong
  • 4 篇 xiang cheng
  • 4 篇 leung victor c.m...
  • 4 篇 kim dong seong
  • 4 篇 zhang haijun
  • 4 篇 grishin ilya
  • 4 篇 fokin grigoriy
  • 3 篇 liu bo
  • 3 篇 gu rentao
  • 3 篇 wuxia jin
  • 3 篇 peng chunlei

语言

  • 156 篇 英文
  • 9 篇 其他
  • 3 篇 中文
检索条件"机构=Software Engineering and Networks Laboratory"
168 条 记 录,以下是11-20 订阅
排序:
SJA: Server-driven Joint Adaptation of Loss and Bitrate for Multi-Party Realtime Video Streaming  42
SJA: Server-driven Joint Adaptation of Loss and Bitrate for ...
收藏 引用
42nd IEEE International Conference on Computer Communications, INFOCOM 2023
作者: Shen, Kai Zhang, Dayou Zhu, Zi Zhang, Lei Wang, Fangxin Wang, Dan The Chinese University of HongKong The Future Network of Intelligence Institute Shenzhen China The Chinese University of HongKong School of Science and Engineering Shenzhen China Shenzhen University College of Computer Science and Software Engineering China Peng Cheng Laboratory China The Guangdong Provincial Key Laboratory of Future Networks of Intelligence China The Hong Kong Polytechnic University Department of Computing Hong Kong
The outbreak of COVID-19 has dramatically promoted the explosive proliferation of multi-party realtime video streaming (MRVS) services, represented by Zoom and Microsoft Teams. Different from Video-on-Demand (VoD) or ... 详细信息
来源: 评论
Defining and Detecting the Defects of the Large Language Model-based Autonomous Agents
arXiv
收藏 引用
arXiv 2024年
作者: Ning, Kaiwen Chen, Jiachi Zhang, Jingwen Li, Wei Wang, Zexu Feng, Yuming Zhang, Weizhe Zheng, Zibin The School of Software Engineering Sun Yat-Sen University Peng Cheng Laboratory China The School of Software Engineering Sun Yat-Sen University China The School of Computer Science and Technology Harbin Institute of Technology China Peng Cheng Laboratory China The Department of New Networks Peng Cheng Laboratory China
Artificial intelligence (AI) agents are systems capable of perceiving their environment, autonomously planning and executing tasks. Recent advancements in Large Language Models (LLMs) have introduced a transformative ... 详细信息
来源: 评论
Downlink Transmit-End Beam Refinement for mmWave Communications Under Mobility
Downlink Transmit-End Beam Refinement for mmWave Communicati...
收藏 引用
2023 International Conference on Electrical engineering and Photonics, EExPolytech 2023
作者: Fokin, Grigoriy Grishin, Ilya Okuneva, Darina The Bonch-Bruevich Saint Petersburg State University of Telecommunications Laboratory of Software Defined Radio Saint Petersburg Russia The Bonch-Bruevich Saint Petersburg State University of Telecommunications Department of Communication Networks and Data Transmission Saint Petersburg Russia The Bonch-Bruevich Saint Petersburg State University of Telecommunications Department of Software Engineering and Computer Facilities Saint Petersburg Russia
This article discusses a method for adjusting the radiation pattern of a base station antenna array when conducting radio communications in the millimeter wavelength range for mobile user devices. The article describe... 详细信息
来源: 评论
Realization and Performance Tests of a Dual-Polarization Fiber Optic Gyroscope  8
Realization and Performance Tests of a Dual-Polarization Fib...
收藏 引用
8th Symposium on Novel Photoelectronic Detection Technology and Applications
作者: Zhou, Tong Zhu, Lanxin Cao, Yuwen Chen, Yanjun Huang, Huimin Li, Zhengbin School of Software and Microelectronics Peking University Beijing102600 China State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Engineering and Computer Science Peking University Beijing100871 China
Interferometric fiber optical gyroscopes (IFOGs) have become one of the widely used sensors of inertial technology and rotational seismology, owing to their high precision and stability. In recent years, the dual-pola... 详细信息
来源: 评论
FedIERF: Federated Incremental Extremely Random Forest for Wearable Health Monitoring
收藏 引用
Journal of Computer Science & Technology 2023年 第5期38卷 970-984页
作者: 胡春雨 忽丽莎 袁林 陆佃杰 吕蕾 陈益强 Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science Center(National Supercomputer Center in Jinan)Qilu University of Technology(Shandong Academy of Sciences)Jinan 250353China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer ScienceJinan 250000China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan 25000China Institute of Information Technology Hebei University of Economics and BusinessShijiazhuang 050061China School of Information Science and Engineering Shandong Normal UniversityJinan 250358China Institute of Computing Technology Chinese Academy of SciencesBeijing 100190China
Wearable health monitoring is a crucial technical tool that offers early warning for chronic diseases due to its superior portability and low power ***,most wearable health data is distributed across dfferent organiza... 详细信息
来源: 评论
Small object detection algorithm for UAV images based on YOLOv5
Small object detection algorithm for UAV images based on YOL...
收藏 引用
2024 International Conference on Image Processing and Artificial Intelligence, ICIPAl 2024
作者: Song, Nan Wang, Ying Liu, Tianxu Henan International Joint Laboratory of Theories and Key Technologies on Intelligence Networks Henan University Kaifeng475004 China Software Engineering Intelligent Information Processing Innovation Base-Subject Innovation Base of Henan Higher Universities Henan University Kaifeng475004 China Henan Provincial Communications and Transportation Dispatch and Command Center Zhengzhou450000 China
In the field of deep learning-based object detection algorithms, the YOLO algorithm has attracted a lot of attention due to its advantages in speed and accuracy. However, there are problems such as low detection speed... 详细信息
来源: 评论
Towards Evidence-Based Cybersecurity Assessment of Programmable Systems to Ensure the Protection of Critical IT Infrastructure  12
Towards Evidence-Based Cybersecurity Assessment of Programma...
收藏 引用
12th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, IDAACS 2023
作者: Illiashenko, Oleg Kharchenko, Vyacheslav Odarushchenko, Oleg National Aerospace University 'KhAI' Department of Computer Systems and Networks Kharkiv61070 Ukraine Institute of Information Science and Technologies 'Alessandro Faedo' - Isti Cnr Software Engineering & Dependable Computing Laboratory Pisa56124 Italy Research and Production Enterprise Rpc Radics Llc Kropyvnytskyi25009 Ukraine
The paper is devoted to developing scientific principles, methods, means, and information technology of model-oriented verification and evidence-based assessment using functional safety and cybersecurity cases for pro... 详细信息
来源: 评论
Identifying Code Changes for Architecture Decay via a Metric Forest Structure
Identifying Code Changes for Architecture Decay via a Metric...
收藏 引用
IEEE/ACM International Conference on Technical Debt (TechDebt)
作者: Wuxia Jin Yuyun Zhang Jiaowei Shang Yi Hou Ming Fan Ting Liu School of Software Engineering Xi’an Jiaotong University Xi’an China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University
During long-term software evolution, it is inevitable that an accumulation of changes leads to architectural erosion and debt. Diverse metric-based methods have been developed to identify architectural problems that v...
来源: 评论
Imperceptible Face Forgery Attack via Adversarial Semantic Mask
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Decheng Su, Qixuan Peng, Chunlei Wang, Nannan Gao, Xinbo State Key Laboratory of Integrated Services Networks School of Cyber Engineering Xidian University Shaanxi Xi’an710071 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai201112 China State Key Laboratory of Integrated Services Networks School of Telecommunications Engineering Xidian University Shaanxi Xi’an710071 China Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing400065 China
With the great development of generative model techniques, face forgery detection draws more and more attention in the related field. Researchers find that existing face forgery models are still vulnerable to adversar... 详细信息
来源: 评论
Predictive Hiring System: Information Technology Consultants Soft Skills
Predictive Hiring System: Information Technology Consultants...
收藏 引用
International Conference on Advanced Intelligent Systems for Sustainable Development, AI2SD 2022
作者: Lamjid, Asmaa El Bouchti, Karim Ziti, Soumia Mohamed, Reda Oussama Labrim, Hicham Riadsolh, Anouar Belkacemi, Mourad Intelligence Processing System and Security Mohammed V University in Rabat Rabat Morocco Algorithms Networks Intelligent Systems and Software Engineering Research Faculty of Sciences Mohammed V University in Rabat Rabat Morocco Advanced Systems Engineering Laboratory National School of Applied Sciences Ibn Tofail University Kenitra Morocco Faculty of Sciences Mohammed V University in Rabat Rabat Morocco
Recruiting candidates who will perform well within any organization has become a challenge in the Human Resources sector. Generally, poor recruitment can negatively reflect the progression and evolution of the organis... 详细信息
来源: 评论