咨询与建议

限定检索结果

文献类型

  • 3,129 篇 期刊文献
  • 2,371 篇 会议
  • 1 册 图书

馆藏范围

  • 5,501 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,636 篇 工学
    • 1,435 篇 计算机科学与技术...
    • 1,102 篇 软件工程
    • 836 篇 电子科学与技术(可...
    • 734 篇 信息与通信工程
    • 672 篇 电气工程
    • 541 篇 控制科学与工程
    • 417 篇 光学工程
    • 395 篇 机械工程
    • 390 篇 材料科学与工程(可...
    • 344 篇 化学工程与技术
    • 335 篇 仪器科学与技术
    • 237 篇 动力工程及工程热...
    • 217 篇 生物工程
    • 186 篇 生物医学工程(可授...
    • 135 篇 力学(可授工学、理...
    • 124 篇 交通运输工程
    • 109 篇 冶金工程
    • 108 篇 环境科学与工程(可...
  • 2,422 篇 理学
    • 1,123 篇 物理学
    • 796 篇 数学
    • 338 篇 化学
    • 272 篇 统计学(可授理学、...
    • 269 篇 生物学
    • 213 篇 大气科学
    • 198 篇 系统科学
  • 639 篇 管理学
    • 448 篇 管理科学与工程(可...
    • 190 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 200 篇 医学
    • 164 篇 临床医学
    • 126 篇 基础医学(可授医学...
  • 104 篇 农学
  • 98 篇 法学
  • 83 篇 经济学
  • 31 篇 军事学
  • 19 篇 教育学
  • 13 篇 文学
  • 6 篇 艺术学
  • 3 篇 历史学

主题

  • 75 篇 feature extracti...
  • 69 篇 semantics
  • 65 篇 simulation
  • 57 篇 accuracy
  • 56 篇 optimization
  • 55 篇 training
  • 51 篇 deep learning
  • 43 篇 computational mo...
  • 38 篇 signal to noise ...
  • 38 篇 wireless communi...
  • 37 篇 real-time system...
  • 37 篇 robustness
  • 36 篇 three-dimensiona...
  • 36 篇 machine learning
  • 35 篇 image segmentati...
  • 32 篇 predictive model...
  • 32 篇 estimation
  • 31 篇 monitoring
  • 31 篇 visualization
  • 30 篇 object detection

机构

  • 136 篇 university of ch...
  • 119 篇 school of comput...
  • 94 篇 hubei province k...
  • 78 篇 school of softwa...
  • 63 篇 tsinghua nationa...
  • 62 篇 department of co...
  • 53 篇 state key labora...
  • 51 篇 school of physic...
  • 51 篇 collaborative in...
  • 46 篇 center of materi...
  • 42 篇 hubei province k...
  • 40 篇 frontier science...
  • 39 篇 national key lab...
  • 36 篇 state key labora...
  • 35 篇 school of inform...
  • 35 篇 key laboratory f...
  • 34 篇 school of inform...
  • 34 篇 hefei national l...
  • 34 篇 school of comput...
  • 33 篇 university of sc...

作者

  • 61 篇 shuxiang guo
  • 43 篇 wei li
  • 33 篇 ai bo
  • 32 篇 bin wang
  • 27 篇 chen chen
  • 24 篇 niyato dusit
  • 24 篇 peng zhou
  • 24 篇 yang yang
  • 23 篇 liu yang
  • 21 篇 li peng
  • 20 篇 li xin
  • 19 篇 xiaolong zhang
  • 19 篇 wang wei
  • 19 篇 guo shuxiang
  • 18 篇 li cheng
  • 18 篇 zhang xiaolong
  • 18 篇 dan feng
  • 16 篇 fang j.
  • 16 篇 feng c.f.
  • 16 篇 lei wang

语言

  • 5,029 篇 英文
  • 263 篇 中文
  • 202 篇 其他
  • 3 篇 法文
  • 2 篇 德文
检索条件"机构=State Key Laboratory of ASIC and System School of Information Science and Technology"
5501 条 记 录,以下是4991-5000 订阅
排序:
An improved example-driven symbol recognition approach in engineering drawings
An improved example-driven symbol recognition approach in en...
收藏 引用
作者: Guo, Tiantian Zhang, Hui Wen, Yamei School of Software Tsinghua University Beijing 100084 China Key Laboratory for Information System Security Ministry of Education Beijing 100084 China Tsinghua National Laboratory for Information Science and Technology Beijing 100084 China
In this paper, an improved example-driven symbol recognition algorithm is proposed for CAD engineering drawings. First, in order to represent the structure of symbols more clearly and simply, we involve the text entit... 详细信息
来源: 评论
Rapid modeling for large scale anhui-styled architectures
Rapid modeling for large scale anhui-styled architectures
收藏 引用
2012 International Conference on systems and Informatics, ICSAI 2012
作者: Xue, Feng Wang, Xiaotao School of Computer Science and Information Hefei University of Technology Hefei 230009 China State Key Lab of Virtual Reality Technology and System Beihang University Beijing 100191 China
To construct Anhui-Styled Architecture (ASA) models rapidly and automatically, we proposed an automatic modeling method by analyzing the basic structure of ASA in-depth. Firstly, we built modules' database, compos... 详细信息
来源: 评论
Sampling-based Learning Control for Quantum systems with Hamiltonian Uncertainties
Sampling-based Learning Control for Quantum Systems with Ham...
收藏 引用
IEEE Annual Conference on Decision and Control
作者: Daoyi Dong Chunlin Chen Ruixing Long Bo Qi Ian R. Petersen School of Information Technology and Electrical Engineering University of New South Wales at the Australian Defence Force Academy Canberra ACT 2600 Australia Department of Control and System Engineering Nanjing University Nanjing 210093 China Department of Chemistry Princeton University Princeton New Jersey 08544 USA Key Laboratory of Systems and Control Academy of Mathematics and Systems Science Chinese Academy of Sciences Beijing 100190 China
Robust control design for quantum systems has been recognized as a key task in the development of practical quantum technology. In this paper, we present a systematic numerical methodology of sampling-based learning c... 详细信息
来源: 评论
An exact SOC-estimate mathematic model of open-circuit voltage and parameters estimation
An exact SOC-estimate mathematic model of open-circuit volta...
收藏 引用
2012 9th IEEE International Conference on Mechatronics and Automation, ICMA 2012
作者: Yu, Wenzheng Huang, Dagui Feng, Daiwei Guo, Ping Dai, Deng Li, Wei Key Laboratory of Ministry of Information Industry Intelligence Mechanical System Engineering School of Mechatronics Engineering University of Electronic Science and Technology of China Chengdu Sichuan Province China
This paper describes an exact SOC-estimate mathematic model, which uses the battery state-Of-Charge (SOC) as a state variable and can simulate the whole progress of discharge accurately. The model parameters can be ca... 详细信息
来源: 评论
An empirical evaluation of process mining algorithms based on structural and behavioral similarities  12
An empirical evaluation of process mining algorithms based o...
收藏 引用
27th Annual ACM Symposium on Applied Computing, SAC 2012
作者: Wang, Jianmin Tan, Shijie Wen, Lijie Wong, Raymond K. Guo, Qinlong School of Software Tsinghua University Beijing 100084 China School of Computer Science and Engineering University of New South Wales NSW 2052 Australia Key Laboratory for Information System Security Ministry of Education China Tsinghua National Laboratory for Information Science and Technology China
While many process mining algorithms have been proposed recently, there exists no widely-accepted benchmark to evaluate these process mining algorithms. As a result, it can be difficult to compare different process mi... 详细信息
来源: 评论
ACSP: A novel security protocol against counting attack for UHF RFID systems
ACSP: A novel security protocol against counting attack for ...
收藏 引用
作者: Qian, Zhuzhong Chen, Ce You, Ilsun Lu, Sanglu State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Information Science Korean Bible University Korea Republic of
Current research on UHF RFID system security mainly focus on protecting communication safety and information privacy between a pair of specific tags and its corresponding interrogation reader. However, instead of stea... 详细信息
来源: 评论
Mathematical Infinity and Medium Logic (I) --Logical-mathematical Interpretation of Leibniz's Secant and Tangent Lines Problem in Medium Logic
收藏 引用
Chinese Quarterly Journal of Mathematics 2013年 第1期28卷 41-46页
作者: ZHU Wu-jia GONG Ning-sheng DU Guo-pin School of Information Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing 210016 China State Key Laboratory of Software Development Environment Beihang University Beijing 100191 China School of Electronics and Information Engineering Nanjing Uni- Versity of Technology Nanjing 210009 China Institute of Modern Logic and Applications Nanjing University Nanjing 210093 China
From the perspective of potential infinity (poi) and actual infinity, Ref [4] has confirmed that poi and aci are in 'unmediated opposition' (P,﹁P ) whether in ZFC or not; it has further been proved that the m... 详细信息
来源: 评论
Direct multi-hop time synchronization with constructive interference
Direct multi-hop time synchronization with constructive inte...
收藏 引用
11th ACM/IEEE Conference on information Processing in Sensing Networks, IPSN'12
作者: Wang, Yin Pan, Gaofeng Huang, Zhiyu MOE Key Lab. for Information System Security School of Software TNLIST China Science and Technology on Communication Information Security Control Laboratory China Institute of Software Chinese Academy of Sciences China
Multi-hop time synchronization in wireless sensor networks (WSNs) is often time-consuming and error-prone due to random time-stamp delays for MAC layer access and unstable clocks of intermediate nodes. Constructive in... 详细信息
来源: 评论
Chasing behavior between a motile swarm and a motile food
Chasing behavior between a motile swarm and a motile food
收藏 引用
Chinese Control Conference (CCC)
作者: Hong Shi Guangming Xie Wenguang Luo Ruopeng Wang Department of Mathematics and Physics Beijing Institute of Petrochemical Technology Beijing P. R. China State Key Laboratory for Turbulence and Complex Systems Peking University Beijing P. R. China School of Electrical and Electronics Engineering East China Jiaotong University Nanchang P. R. China School of Electric and Information Engineering Guangxi University of Science and Technology Liuzhou P. R. China
A model is established to describe the chasing process between a group of agents and a quarry. In the model, the swarm is modeled based on inter-individual attraction and repulsion, that is, each individual can neithe... 详细信息
来源: 评论
A 16-pixel parallel architecture with block-level/mode-level co-reordering approach for intra prediction in 4k×2k H.264/AVC video encoder
A 16-pixel parallel architecture with block-level/mode-level...
收藏 引用
Asia and South Pacific Design Automation Conference
作者: Huailu Ren Yibo Fan Xinhua Chen Xiaoyang Zeng College of Information Science and Engineering Shandong University of Science and Technology Qingdao China State Key Laboratory of ASIC and System Fudan University Shanghai China
Intra prediction is the most important technology in H.264/AVC intra frame encoder. But there is extremely complicated data dependency and an immense amount of computation in intra prediction process. In order to meet... 详细信息
来源: 评论