咨询与建议

限定检索结果

文献类型

  • 1,491 篇 会议
  • 1,233 篇 期刊文献
  • 8 册 图书

馆藏范围

  • 2,732 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,925 篇 工学
    • 1,489 篇 计算机科学与技术...
    • 1,186 篇 软件工程
    • 325 篇 信息与通信工程
    • 291 篇 控制科学与工程
    • 154 篇 生物工程
    • 137 篇 电气工程
    • 135 篇 机械工程
    • 123 篇 电子科学与技术(可...
    • 93 篇 光学工程
    • 87 篇 生物医学工程(可授...
    • 72 篇 仪器科学与技术
    • 69 篇 动力工程及工程热...
    • 58 篇 化学工程与技术
    • 40 篇 建筑学
    • 40 篇 网络空间安全
    • 39 篇 安全科学与工程
    • 38 篇 交通运输工程
  • 895 篇 理学
    • 554 篇 数学
    • 183 篇 物理学
    • 173 篇 生物学
    • 151 篇 统计学(可授理学、...
    • 138 篇 系统科学
    • 69 篇 化学
  • 548 篇 管理学
    • 339 篇 管理科学与工程(可...
    • 223 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 76 篇 医学
    • 66 篇 临床医学
    • 56 篇 基础医学(可授医学...
    • 40 篇 药学(可授医学、理...
  • 62 篇 法学
    • 42 篇 社会学
  • 37 篇 经济学
  • 17 篇 农学
  • 16 篇 教育学
  • 10 篇 文学
  • 9 篇 艺术学
  • 6 篇 军事学

主题

  • 132 篇 computer science
  • 101 篇 laboratories
  • 62 篇 semantics
  • 60 篇 wireless sensor ...
  • 51 篇 software enginee...
  • 46 篇 application soft...
  • 43 篇 software testing
  • 41 篇 optimization
  • 41 篇 software
  • 40 篇 algorithm design...
  • 40 篇 feature extracti...
  • 39 篇 testing
  • 38 篇 computational mo...
  • 36 篇 data mining
  • 34 篇 web services
  • 33 篇 educational inst...
  • 33 篇 monitoring
  • 32 篇 protocols
  • 31 篇 deep learning
  • 31 篇 cloud computing

机构

  • 509 篇 state key labora...
  • 201 篇 department of co...
  • 154 篇 department of co...
  • 119 篇 national key lab...
  • 108 篇 state key labora...
  • 84 篇 state key labora...
  • 65 篇 department of co...
  • 62 篇 shanghai key lab...
  • 61 篇 school of softwa...
  • 57 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 university of ch...
  • 47 篇 national key lab...
  • 39 篇 tsinghua nationa...
  • 36 篇 school of artifi...
  • 33 篇 beijing key labo...
  • 30 篇 college of compu...
  • 30 篇 state key labora...
  • 30 篇 department of co...
  • 28 篇 department of co...

作者

  • 35 篇 junping du
  • 34 篇 yu huiqun
  • 34 篇 li wu-jun
  • 33 篇 guihai chen
  • 32 篇 dou wanchun
  • 31 篇 fan guisheng
  • 31 篇 zhang lijun
  • 31 篇 yingmin jia
  • 30 篇 shen furao
  • 29 篇 zhao jian
  • 29 篇 ying mingsheng
  • 25 篇 yang tianbao
  • 24 篇 xu baowen
  • 23 篇 xiang-yang li
  • 23 篇 sanglu lu
  • 23 篇 chen liqiong
  • 23 篇 fashan yu
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 21 篇 gao yang

语言

  • 2,496 篇 英文
  • 149 篇 其他
  • 86 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novell Software Technology Department of Computer Science and Technology"
2732 条 记 录,以下是561-570 订阅
排序:
Multi-Modal Medical Vision-and-Language Learning for Retinal Vein Occlusion Classification
健康数据科学(英文)
收藏 引用
健康数据科学(英文) 2023年 第4期 42-43页
作者: Weibin Liao Yanfeng Liao Zhimin Fan Jiexuan Zhang Shuochen Li Jiarui Yang Liantao Ma National Engineering Research Center for Software Engineering Peking UniversityBeijingChina Computer Science and Technology Beijing Institute of TechnologyBeijingChina Department of Ophthalmology Peking University Third HospitalBeijing Key Laboratory of Restoration of Damaged Ocular NervePeking University Third HospitalBeijingChina National Engineering Research Center for Software Engineering Peking UniversityBeijingChina
Background:Retinal vein occlusion(RVO)is one of the most common retinal vascular diseases leading to vision loss if not diagnosed and treated in *** diagnosis of central and branch RVO(CRVO and BRVO)can alleviate the ... 详细信息
来源: 评论
Quantum reversible circuits for multiplicative inverse
收藏 引用
EPJ Quantum technology 2022年 第1期9卷 1-17页
作者: Luo, Qing-bin Yang, Guo-wu Li, Xiao-yu Li, Qiang Department of Computer Science and Technology School of Information Engineering Hubei Minzu University Enshi China School of Information and Software Engineering University of Electronic Science and Technology of China Chengdu China Big data research Center & School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu University of Information Technology Chengdu China
The synthesis of quantum circuits for multiplicative inverse over $\operatorname{GF}(2^{8})$ are discussed in this paper. We first convert the multiplicative inverse operation in $\operatorname{GF}(2^{8})$ to arithmet...
来源: 评论
Secure and Efficient Data Storage and Sharing Scheme Based on Double Blockchain
收藏 引用
computers, Materials & Continua 2021年 第1期66卷 499-515页
作者: Lejun Zhang Minghui Peng Weizheng Wang Yansen Su Shuna Cui Seokhoon Kim College of Information Engineering Yangzhou UniversityYangzhou225127China School Math&Computer Science Quanzhou Normal UniversityQuanzhou362000China Division of Computer Science University of AizuAizu–Wakamatsu9658580Japan Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and TechnologyAnhui UniversityHefei230601China Medical College of Yangzhou University Yangzhou225001China Department of Gynecology and Obstetrics Affiliated Hospital of Yangzhou UniversityYangzhouChina Department of Computer Software Engineering Soonchunhyang UniversityAsanKorea
In the digital era,electronic medical record(EMR)has been a major way for hospitals to store patients’medical *** traditional centralized medical system and semi-trusted cloud storage are difficult to achieve dynamic... 详细信息
来源: 评论
Dual-View Pyramid Pooling in Deep Neural Networks for Improved Medical Image Classification and Confidence Calibration
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Xiaoqing Nie, Qiushi Xiao, Zunjie Zhao, Jilu Wu, Xiao Guo, Pengxin Li, Runzhi Liu, Jin Wei, Yanjie Pan, Yi Center for High Performance Computing Shenzhen Key Laboratory of Intelligent Bioinformatics Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Guangdong Shenzhen518055 China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen518055 China Department of Statistics and Actuarial Science The University of Hong Kong 999077 Hong Kong Cooperative Innovation Center of Internet Healthcare Zhengzhou University Zhengzhou450001 China Hunan Provincial Key Lab on Bioinformatics School of Computer Science and Engineering Central South University Changsha410083 China Xinjiang Engineering Research Center of Big Data and Intelligent Software School of software Xinjiang University Wulumuqi830046 China Faculty of Computer Science and Control Engineering Shenzhen University of Advanced Technology Shenzhen China
Spatial pooling (SP) and cross-channel pooling (CCP) operators have been applied to aggregate spatial features and pixel-wise features from feature maps in deep neural networks (DNNs), respectively. Their main goal is... 详细信息
来源: 评论
Explainable Semantic Federated Learning Enabled Industrial Edge Network for Fire Surveillance
arXiv
收藏 引用
arXiv 2024年
作者: Dong, Li Peng, Yubo Jiang, Feibo Wang, Kezhi Yang, Kun School of Computer Science Hunan University of Technology and Business Changsha410205 China Xiangjiang Laboratory Changsha410205 China School of Intelligent Software and Engineering Nanjing University Suzhou China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha410081 China Department of Computer Science Brunel University London United Kingdom
In fire surveillance, Industrial Internet of Things (IIoT) devices require transmitting large monitoring data frequently, which leads to huge consumption of spectrum resources. Hence, we propose an Industrial Edge Sem... 详细信息
来源: 评论
A New Sequential Image Prediction Method Based on LSTM and DCGAN
收藏 引用
computers, Materials & Continua 2020年 第7期64卷 217-231页
作者: Wei Fang Feihong Zhang Yewen Ding Jack Sheng School of Computer&Software Jiangsu Engineering Center of Network MonitoringNanjing University of Information Science&TechnologyNanjing210044China State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing210023China Department of Economics FinanceInsurance and Risk Management University of Central ArkansasConway72035USA
Image recognition technology is an important field of artificial *** with the development of machine learning technology in recent years,it has great researches value and commercial *** a matter of fact,a single recog... 详细信息
来源: 评论
Deep Global Distance Estimation Hashing for Image Retrieval
收藏 引用
IEEE Transactions on Big Data 2025年
作者: Xu, Mengfei Luo, Bowen Xu, Jianfeng Ding, Feng The School of Software Nanchang University Jiangxi330047 China Department of Computer Science University of Regina ReginaSKS4S 0A2 Canada Nanchang Key Laboratory for Innovative Application of Information Technology China
Hashing technology has an excellent high dimensional visual information encoding ability. It can map distance information from high dimensional to low dimensional Hamming space, which is widely used in large-scale ima... 详细信息
来源: 评论
Taking a Deep Breath: Enhancing Language Modeling of Large Language Models with Sentinel Tokens
arXiv
收藏 引用
arXiv 2024年
作者: Luo, Weiyao Zheng, Suncong Xia, Heming Wang, Weikang Lei, Yan Liu, Tianyu Chen, Shuang Sui, Zhifang State Key Laboratory of Multimedia Information Processing School of Computer Science Peking University China School of Software & Microelectronics Peking University China Tencent MLPD China Department of Computing The Hong Kong Polytechnic University Hong Kong Institute of Computing Technology Chinese Academy of Sciences China Alibaba Group China
Large language models (LLMs) have shown promising efficacy across various tasks, becoming powerful tools in numerous aspects of human life. However, Transformer-based LLMs suffer a performance degradation when modelin... 详细信息
来源: 评论
Provable Stochastic Optimization for Global Contrastive Learning: Small Batch Does Not Harm Performance
arXiv
收藏 引用
arXiv 2022年
作者: Yuan, Zhuoning Wu, Yuexin Qiu, Zi-Hao Du, Xianzhi Zhang, Lijun Zhou, Denny Yang, Tianbao Department of Computer Science The University of Iowa United States Google Research United States National Key Laboratory for Novel Software Technology Nanjing University China
In this paper, we study contrastive learning from an optimization perspective, aiming to analyze and address a fundamental issue of existing contrastive learning methods that either rely on a large batch size or a lar... 详细信息
来源: 评论
A Blockchain-Based Framework for Information Security in Intelligent Transportation Systems  2nd
A Blockchain-Based Framework for Information Security in Int...
收藏 引用
2nd International Conference on Intelligent Technologies and Applications, INTAP 2019
作者: Rafique, Wajid Khan, Maqbool Zhao, Xuan Sarwar, Nadeem Dou, Wanchun State Key Laboratory for Novel Software Technology Nanjing University Nanjing China The Department of Computer Science and Technology Nanjing University Nanjing China Department of Computer Science Bahria University Lahore Lahore Pakistan
Efficient utilization of the IoT generated data helps in the decision-making process as well as the realization of the concept of smart cities into a reality. The smart cities utilize Intelligent Transportation System... 详细信息
来源: 评论