咨询与建议

限定检索结果

文献类型

  • 988 篇 期刊文献
  • 794 篇 会议
  • 1 册 图书

馆藏范围

  • 1,783 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 722 篇 计算机科学与技术...
    • 492 篇 软件工程
    • 193 篇 电子科学与技术(可...
    • 166 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 94 篇 电气工程
    • 89 篇 核科学与技术
    • 86 篇 光学工程
    • 83 篇 生物工程
    • 79 篇 机械工程
    • 71 篇 动力工程及工程热...
    • 50 篇 材料科学与工程(可...
    • 43 篇 化学工程与技术
    • 38 篇 生物医学工程(可授...
    • 37 篇 仪器科学与技术
    • 33 篇 建筑学
    • 30 篇 土木工程
    • 22 篇 力学(可授工学、理...
  • 744 篇 理学
    • 427 篇 物理学
    • 247 篇 数学
    • 96 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 57 篇 系统科学
    • 52 篇 化学
  • 196 篇 管理学
    • 147 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 41 篇 医学
    • 34 篇 临床医学
    • 30 篇 基础医学(可授医学...
  • 21 篇 法学
  • 18 篇 经济学
  • 10 篇 农学
  • 6 篇 军事学
  • 4 篇 教育学
  • 3 篇 文学
  • 2 篇 哲学
  • 2 篇 艺术学

主题

  • 111 篇 hadron colliders
  • 75 篇 computer archite...
  • 41 篇 laboratories
  • 39 篇 hardware
  • 33 篇 computational mo...
  • 33 篇 delay
  • 31 篇 higgs bosons
  • 31 篇 training
  • 29 篇 w & z bosons
  • 29 篇 deep learning
  • 29 篇 circuit faults
  • 25 篇 semantics
  • 24 篇 benchmarking
  • 23 篇 bandwidth
  • 23 篇 wireless sensor ...
  • 23 篇 costs
  • 21 篇 quantum cryptogr...
  • 21 篇 energy efficienc...
  • 20 篇 neural networks
  • 20 篇 top quark

机构

  • 208 篇 state key labora...
  • 191 篇 yerevan physics ...
  • 162 篇 university of ch...
  • 151 篇 centro brasileir...
  • 150 篇 national and kap...
  • 150 篇 istanbul technic...
  • 149 篇 university of sp...
  • 148 篇 universidad iber...
  • 148 篇 indian institute...
  • 146 篇 brunel universit...
  • 146 篇 academy of scien...
  • 143 篇 charles universi...
  • 139 篇 università di to...
  • 136 篇 infn sezione di ...
  • 135 篇 imperial college...
  • 135 篇 university of de...
  • 134 篇 rwth aachen univ...
  • 134 篇 department of ph...
  • 133 篇 infn sezione di ...
  • 132 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 111 篇 a. babaev
  • 111 篇 a. steen
  • 111 篇 n. cartiglia
  • 108 篇 v. karjavine
  • 105 篇 n. colino
  • 105 篇 f. moortgat
  • 104 篇 b. clerbaux
  • 104 篇 g. sultanov
  • 103 篇 m. a. ciocci
  • 103 篇 k. lamichhane
  • 103 篇 s. maselli
  • 102 篇 e. migliore
  • 102 篇 p. avery
  • 102 篇 l. silvestris

语言

  • 1,685 篇 英文
  • 74 篇 中文
  • 28 篇 其他
检索条件"机构=State Key Laboratory of Computer Architecture~ Institute of Computing Technology"
1783 条 记 录,以下是141-150 订阅
排序:
Oxpecker: Leaking Secrets via Fetch Target Queue
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Li, Shan Xu, Zheliang Shen, Haihua Li, Huawei University of Chinese Academy of Sciences School of Computer Science and Technology Beijing101408 China Chinese Academy of Sciences State Key Laboratory of Processors Institute of Computing Technology Beijing100190 China
Modern processors integrate carefully designed micro-Architectural components within the front-end to optimize performance. These components include instruction cache, micro-operation cache, and instruction prefetcher... 详细信息
来源: 评论
DrugProtKGE: Weakly Supervised Knowledge Graph Embedding for Highly-Effective Drug-Protein Interaction Representation
DrugProtKGE: Weakly Supervised Knowledge Graph Embedding for...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Qiu, Yanlong Wang, Siqi Yang, Xi Qiu, Xinyuan Wu, Chengkun Cui, Yingbo Yang, Canqun National University of Defense Technology Institute for Quantum Information State Key Laboratory of High-Performance Computing College of Computer Science Hunan Changsha410073 China National Supercomputer Center in Tianjin Tianjin300457 China National University of Defense Technology National Key Laboratory of Parallel and Distributed Computing College of Computer Science Hunan Changsha410073 China National University of Defense Technology Department of Biology and Chemistry College of Science Hunan Changsha410073 China
With the exponential growth of biomedical knowledge in unstructured text repositories such as PubMed, it is imminent to establish a knowledge graph-style, efficient searchable and targeted database that can support th... 详细信息
来源: 评论
An Auto-Parallel Method for Deep Learning Models Based on Genetic Algorithm  29
An Auto-Parallel Method for Deep Learning Models Based on Ge...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Zeng, Yan Huang, Chengchuang Ni, Yijie Zhou, Chunbao Zhang, Jilin Wang, Jue Zhou, Mingyao Xue, Meiting Zhang, Yunquan Hangzhou Dianzi University School of Computer Science and Technology Hangzhou310018 China Ministry of Education Key Laboratory for Modeling and Simulation of Complex Systems Hangzhou310018 China Data Security Governance Zhejiang Engineering Research Center Hangzhou310018 China Hangzhou Dianzi University School of ITMO Joint Institute Hangzhou310018 China Institute of Computer Network Information Center of the Chinese Academy of Sciences Beijing100086 China HuaWei China Institute of Computing Technology of the Chinese Academy of Sciences State Key Laboratory of Computer Architecture Beijing100086 China
As the size of datasets and neural network models increases, automatic parallelization methods for models have become a research hotspot in recent years. The existing auto-parallel methods based on machine learning or... 详细信息
来源: 评论
Variant quantifiers in L_(3)-valued first-order logic
收藏 引用
Frontiers of computer Science 2021年 第5期15卷 151-159页
作者: Wei LI Yuefei SUI State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100083China Key Laboratory of Intelligent Information Processing Institute of Computing TechnologyChinese Academy of SciencesBeijing 100190China School of Computer Science and Technology University of Chinese Academy of SciencesBeijing 100049China
Traditional first-order logic has four definitions for quantifiers,which are defined by universal and existential *** L_(3)-valued(three-valued)first-order logic,there are eight kinds of definitions for quantifiers;an... 详细信息
来源: 评论
Analysis and mitigation of function interaction risks in robot apps  21
Analysis and mitigation of function interaction risks in rob...
收藏 引用
24th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2021
作者: Xu, Yuan Zhang, Tianwei Bao, Yungang State Key Laboratory of Computer Architecture Institute of Computing Technology University of Chinese Academy of Sciences Peng Cheng Laboratory China Nanyang Technological University China
Robot apps are becoming more automated, complex and diverse. An app usually consists of many functions, interacting with each other and the environment. This allows robots to conduct various tasks. However, it also op... 详细信息
来源: 评论
Prototype Guided Personalized Federated Intrusion Detection System  10
Prototype Guided Personalized Federated Intrusion Detection ...
收藏 引用
10th IEEE Smart World Congress, SWC 2024
作者: Cheng, Long Yan, Huiru Zhou, Hanlin Wang, Ying Tang, Haichuan Fang, Fang North China Electric Power University State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources School of Control and Computer Engineering Beijing China Institute of Computing Technology Chinese Academy of Sciences Beijing China Ai Lab of Crrc Academy Beijing China
Preventing network attacks and protecting user privacy are consistently hot research topics in the Internet of Things (IoT) and edge computing fields. Recent advancements in Federated Learning (FL) have shown promise ... 详细信息
来源: 评论
Task2Morph: Differentiable Task-inspired Framework for Contact-Aware Robot Design
arXiv
收藏 引用
arXiv 2024年
作者: Cai, Yishuai Yang, Shaowu Li, Minglong Chen, Xinglin Mao, Yunxin Yi, Xiaodong Yang, Wenjing The Institute for Quantum Information State Key Laboratory of High Performance Computing College of Computer Science and Technology National University of Defense Technology Changsha China
Optimizing the morphologies and the controllers that adapt to various tasks is a critical issue in the field of robot design, aka. embodied intelligence. Previous works typically model it as a joint optimization probl... 详细信息
来源: 评论
Thermally tunable high Q-factor and low-power silicon resonators using Graphene transparent electrodes
Thermally tunable high Q-factor and low-power silicon resona...
收藏 引用
2023 Applied Optics and Photonics China: Laser technology and Applications;and Optoelectronic Devices and Integration, AOPC 2023
作者: Hong, Qilin Xu, Ping Xu, Wei Zhu, Zhihong College of Advanced Interdisciplinary Studies Hunan Provincial Key Laboratory of Novel Nano Optoelectronic Information Materials and Devices National University of Defense Technology Changsha410073 China Nanhu Laser Laboratory National University of Defense Technology Changsha410073 China Institute for Quantum Information State Key Laboratory of High-Performance Computing College of Computer Science and Technology National University of Defense Technology Changsha410073 China
Tunable and low-power microcavities play a vital role in facilitating the development of large-scale photonic integrated circuits. Among various tuning methods, thermal tuning has gained significant popularity due to ... 详细信息
来源: 评论
Disentangled latent factors for muti-cause treatment effect estimation  6
Disentangled latent factors for muti-cause treatment effect ...
收藏 引用
2024 6th International Conference on Artificial Intelligence Technologies and Applications, ICAITA 2024
作者: Zhao, Zhuoyue Wang, Haotian Xu, Liyang Wang, Qian Tang, Yuhua Department of Intelligent Data Science National University of Defense Technology Changsha410073 China Intelligent Game and Decision Lab. Academy of Military Science Beijing100071 China Institute for Quantum Information State Key Laboratory of High-Performance Computing College of Computer Science and Technology National University of Defense Technology Changsha410073 China
Existing methods estimate treatment effects from observational data and assume that covariates are all confounders. However, observed covariates may not directly represent confounding variables that influence both tre...
来源: 评论
Verify All Traffic: Towards Zero-Trust In-Network Intrusion Detection against Multipath Routing
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2155-2171页
作者: Zhao, Ziming Li, Zhaoxuan Xie, Xiaofei Liu, Zhipeng Li, Tingting Yu, Jiongchi Zhang, Fan Chen, Binbin School of Software Technology Zhejiang University Ningbo315100 China College of Computer Science and Technology Zhejiang University Hangzhou310027 China ZJU-Hangzhou Global Scientific and Technological Innovation Center 311200 China Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province 310027 China Jiaxing Research Institute Zhejiang University 314000 China Zhengzhou Xinda Institute of Advanced Technology Zhengzhou450001 China Singapore State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Cyber Security UCAS Beijing100049 China School of Computing and Information Systems Singapore Management University Singapore188065 Singapore Advanced Digital Sciences Center Singapore138632 Singapore Singapore University of Technology and Design SingaporeB96049 Singapore
With the popularity of encryption protocols, machine learning (ML)-based traffic analysis technologies have attracted widespread attention. To adapt to modern high-speed bandwidth, recent research is dedicated to adva... 详细信息
来源: 评论