咨询与建议

限定检索结果

文献类型

  • 1,470 篇 会议
  • 1,368 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 2,852 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,044 篇 工学
    • 1,478 篇 计算机科学与技术...
    • 1,248 篇 软件工程
    • 399 篇 信息与通信工程
    • 262 篇 控制科学与工程
    • 202 篇 生物工程
    • 190 篇 电子科学与技术(可...
    • 170 篇 光学工程
    • 153 篇 电气工程
    • 141 篇 机械工程
    • 103 篇 生物医学工程(可授...
    • 101 篇 化学工程与技术
    • 83 篇 仪器科学与技术
    • 78 篇 动力工程及工程热...
    • 72 篇 材料科学与工程(可...
    • 52 篇 土木工程
    • 51 篇 建筑学
    • 48 篇 网络空间安全
    • 46 篇 交通运输工程
  • 1,120 篇 理学
    • 654 篇 数学
    • 273 篇 物理学
    • 227 篇 生物学
    • 170 篇 统计学(可授理学、...
    • 117 篇 系统科学
    • 104 篇 化学
  • 495 篇 管理学
    • 281 篇 管理科学与工程(可...
    • 237 篇 图书情报与档案管...
    • 104 篇 工商管理
  • 80 篇 医学
    • 72 篇 临床医学
    • 56 篇 基础医学(可授医学...
  • 63 篇 法学
    • 53 篇 社会学
  • 44 篇 经济学
  • 25 篇 农学
  • 10 篇 艺术学
  • 9 篇 军事学
  • 8 篇 教育学
  • 6 篇 文学
  • 3 篇 哲学

主题

  • 74 篇 semantics
  • 48 篇 computational mo...
  • 45 篇 machine learning
  • 39 篇 computer science
  • 39 篇 training
  • 38 篇 visualization
  • 31 篇 deep learning
  • 27 篇 optimization
  • 26 篇 feature extracti...
  • 24 篇 neural networks
  • 23 篇 data mining
  • 23 篇 forecasting
  • 22 篇 object detection
  • 21 篇 computer archite...
  • 21 篇 data models
  • 20 篇 conferences
  • 20 篇 servers
  • 20 篇 costs
  • 20 篇 clustering algor...
  • 19 篇 reinforcement le...

机构

  • 93 篇 state key lab of...
  • 89 篇 university of ch...
  • 77 篇 college of compu...
  • 63 篇 state key lab. f...
  • 52 篇 state key lab of...
  • 47 篇 state key lab fo...
  • 45 篇 department of co...
  • 44 篇 state key lab of...
  • 40 篇 state key labora...
  • 39 篇 state key lab. o...
  • 37 篇 school of comput...
  • 36 篇 the state key la...
  • 32 篇 state key lab of...
  • 32 篇 state key lab. o...
  • 31 篇 college of compu...
  • 30 篇 state key lab on...
  • 30 篇 department of co...
  • 30 篇 school of comput...
  • 28 篇 state key lab. o...
  • 28 篇 department of co...

作者

  • 59 篇 sun maosong
  • 56 篇 cai deng
  • 46 篇 liu zhiyuan
  • 43 篇 sun fuchun
  • 40 篇 huang minlie
  • 39 篇 he xiaofei
  • 30 篇 wu enhua
  • 26 篇 pan gang
  • 26 篇 wei chen
  • 25 篇 xia gui-song
  • 25 篇 chen wei
  • 23 篇 fuchun sun
  • 22 篇 zhan naijun
  • 22 篇 zhu xiaoyan
  • 20 篇 zhu jun
  • 20 篇 barmpalias georg...
  • 19 篇 huang wenbing
  • 19 篇 xue bai
  • 19 篇 enhua wu
  • 17 篇 wang yikai

语言

  • 2,705 篇 英文
  • 96 篇 其他
  • 53 篇 中文
检索条件"机构=State Key Lab of Computer Science at ISCAS"
2852 条 记 录,以下是151-160 订阅
排序:
A Fast Test Compaction Method for Commercial DFT Flow Using Dedicated Pure-MaxSAT Solver
A Fast Test Compaction Method for Commercial DFT Flow Using ...
收藏 引用
Asia and South Pacific Design Automation Conference
作者: Zhiteng Chao Xindi Zhang Junying Huang Jing Ye Shaowei Cai Huawei Li Xiaowei Li State Key Lab of Processors Institute of Computing Technology Chinese Academy of Sciences School of Computer Science and Technology University of Chinese Academy of Sciences CASTEST Co. Ltd State Key Lab of Computer Science Institute of Software Chinese Academy of Sciences
Minimizing the testing cost is crucial in the context of the design for test (DFT) flow. In our observation, the test patterns generated by commercial ATPG tools in test compression mode still contain redundancy. To t...
来源: 评论
Can We Half the Work with Double Results: Rethinking Machine Learning Algorithms for Network Intrusion Detection System  9
Can We Half the Work with Double Results: Rethinking Machine...
收藏 引用
9th International Conference on Advanced Cloud and Big Data, CBD 2021
作者: Li, Shuren Lu, Yifei Li, Jingqi Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210096 China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi214215 China
Machine Learning algorithms have been wildly applied in the intrusion detection system(IDS). However, in the IoT environment where the resources are limited and the flow data is of huge amount, we need more efficient ... 详细信息
来源: 评论
AdPO: Enhancing the Adversarial Robustness of Large Vision-Language Models with Preference Optimization
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Chaohu Gui, Tianyi Liu, Yu Xu, Linli School of Computer Science and Technology University of Science and Technology of China China State Key Laboratory of Cognitive Intelligence China Tongyi Lab China
Large Vision-Language Models (LVLMs), such as GPT-4o and LLaVA, have recently witnessed remarkable advancements and are increasingly being deployed in real-world applications. However, inheriting the sensitivity of vi...
来源: 评论
CoCGAN: Contrastive Learning for Adversarial Category Text Generation  29
CoCGAN: Contrastive Learning for Adversarial Category Text G...
收藏 引用
29th International Conference on Computational Linguistics, COLING 2022
作者: Sheng, Xin Xu, Linli Xu, Yinlong Bao, Changcun Chen, Huang Ren, Bo Anhui Province Key Laboratory of Big Data Analysis and Application School of Computer Science and Technology University of Science and Technology of China China School of Computer Science and Technology University of Science and Technology of China China State Key Laboratory of Cognitive Intelligence China Tencent Youtu Lab China
The task of generating texts of different categories has attracted more and more attention in the area of natural language generation recently. Meanwhile, generative adversarial net (GAN) has demonstrated its effectiv... 详细信息
来源: 评论
BOBBLE: A Mixed Routing-Granularity Distributed Load Balancing for Data Center Networks  23
BOBBLE: A Mixed Routing-Granularity Distributed Load Balanci...
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on Data science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Xu, Zhengzhi Lu, Yifei Ma, Xu School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210096 China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi214215 China
In current Datacenter Networks (DCNs), Equal-Cost Multipath (ECMP) is a default load balancing scheme. However, using ECMP may result in rapid growth of Flow Completion Time (FCT) due to its well-known drawbacks. In o... 详细信息
来源: 评论
GTN-Cell: Efficient Standard Cell Characterization Using Graph Transformer Network
GTN-Cell: Efficient Standard Cell Characterization Using Gra...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Lihao Liu Yunhui Li Beisi Lu Li Shang Fan Yang State Key Lab of Integrated Chips and Systems School of Microelectronics Fudan University Shanghai China State Key Lab of Integrated Chips and Systems School of Computer Science Fudan University Shanghai China
Lookup table (LUT)-based libraries of standard cell characterization is crucial to accurate static timing analysis (STA). However, with the continuous scaling of technology nodes and the increasing complexity of circu... 详细信息
来源: 评论
Tailor : Datacenter Load Balancing for Accelerating Distributed Deep Learning  9
Tailor : Datacenter Load Balancing for Accelerating Distribu...
收藏 引用
9th International Conference on Advanced Cloud and Big Data, CBD 2021
作者: Xu, Zhengzhi Lu, Yifei Li, Jingqi Ma, Xu Qian, Lei Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210096 China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi214215 China
Accelerating Distributed Deep Learning draws increasing attention recently. Existing solutions like gradient compression, pipelining computation/communication, flow scheduling based on gradient disparities, neglect lo... 详细信息
来源: 评论
GhostNets on Heterogeneous Devices via Cheap Operations
arXiv
收藏 引用
arXiv 2022年
作者: Han, Kai Wang, Yunhe Xu, Chang Guo, Jianyuan Xu, Chunjing Wu, Enhua Tian, Qi State Key Lab. of Computer Science ISCAS University of Chinese Academy of Sciences China Huawei Noah’s Ark Lab The University of Sydney Australia University of Macau China
Deploying convolutional neural networks (CNNs) on mobile devices is difficult due to the limited memory and computation resources. We aim to design efficient neural networks for heterogeneous devices including CPU and... 详细信息
来源: 评论
CAD-IDS: A Cooperative Adaptive Distributed Intrusion Detection System with Fog Computing  25
CAD-IDS: A Cooperative Adaptive Distributed Intrusion Detect...
收藏 引用
25th IEEE International Conference on computer Supported Cooperative Work in Design, CSCWD 2022
作者: Li, Shuren Lu, Yifei Li, Jingqi Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210096 China State Key Lab of Mathematical Engineering and Advanced Computing Wuxi214215 China
Nowadays, the IoT (internet of things) botnet has become a huge threat to network security. In response to this threat, we present a cooperative adaptive network intrusion detection system (IDS) framework with fog com... 详细信息
来源: 评论
An LLM-Empowered Adaptive Evolutionary Algorithm For Multi-Component Deep Learning Systems
arXiv
收藏 引用
arXiv 2025年
作者: Tian, Haoxiang Han, Xingshuo Wu, Guoquan Guo, An Zhou, Yuan Zhang, Jie Li, Shuo Wei, Jun Zhang, Tianwei Key Lab of System Software CAS State Key Lab of Computer Science ISCAS Beijing China University of CAS Beijing China Nanyang Technological University Singapore Continental-NTU Corporate Lab Singapore Nanjing Institute of Software Technology University of CAS Nanjing China Nanjing University Nanjing China Zhejiang Sci-Tech University Hangzhou China CFAR IHPC A*STAR Singapore
Multi-objective evolutionary algorithms (MOEAs) are widely used for searching optimal solutions in complex multi-component applications. Traditional MOEAs for multi-component deep learning (MCDL) systems face challeng... 详细信息
来源: 评论