咨询与建议

限定检索结果

文献类型

  • 1,003 篇 期刊文献
  • 803 篇 会议
  • 1 册 图书

馆藏范围

  • 1,807 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,163 篇 工学
    • 732 篇 计算机科学与技术...
    • 497 篇 软件工程
    • 194 篇 电子科学与技术(可...
    • 168 篇 信息与通信工程
    • 110 篇 控制科学与工程
    • 101 篇 电气工程
    • 90 篇 光学工程
    • 88 篇 核科学与技术
    • 83 篇 生物工程
    • 79 篇 机械工程
    • 71 篇 动力工程及工程热...
    • 51 篇 材料科学与工程(可...
    • 44 篇 化学工程与技术
    • 38 篇 生物医学工程(可授...
    • 37 篇 仪器科学与技术
    • 35 篇 建筑学
    • 31 篇 土木工程
    • 23 篇 力学(可授工学、理...
  • 751 篇 理学
    • 430 篇 物理学
    • 249 篇 数学
    • 97 篇 生物学
    • 60 篇 统计学(可授理学、...
    • 56 篇 系统科学
    • 52 篇 化学
  • 200 篇 管理学
    • 149 篇 管理科学与工程(可...
    • 61 篇 图书情报与档案管...
    • 43 篇 工商管理
  • 42 篇 医学
    • 35 篇 临床医学
    • 30 篇 基础医学(可授医学...
  • 21 篇 法学
  • 18 篇 经济学
  • 11 篇 农学
  • 6 篇 军事学
  • 5 篇 教育学
  • 3 篇 文学
  • 2 篇 哲学
  • 2 篇 艺术学

主题

  • 111 篇 hadron colliders
  • 75 篇 computer archite...
  • 41 篇 laboratories
  • 39 篇 hardware
  • 34 篇 training
  • 33 篇 computational mo...
  • 33 篇 delay
  • 31 篇 higgs bosons
  • 29 篇 w & z bosons
  • 29 篇 deep learning
  • 29 篇 circuit faults
  • 25 篇 semantics
  • 24 篇 benchmarking
  • 23 篇 bandwidth
  • 23 篇 wireless sensor ...
  • 23 篇 costs
  • 21 篇 quantum cryptogr...
  • 20 篇 neural networks
  • 20 篇 top quark
  • 20 篇 energy efficienc...

机构

  • 209 篇 state key labora...
  • 190 篇 yerevan physics ...
  • 163 篇 university of ch...
  • 150 篇 centro brasileir...
  • 149 篇 national and kap...
  • 149 篇 istanbul technic...
  • 148 篇 university of sp...
  • 147 篇 universidad iber...
  • 147 篇 indian institute...
  • 145 篇 brunel universit...
  • 145 篇 academy of scien...
  • 142 篇 charles universi...
  • 138 篇 università di to...
  • 135 篇 infn sezione di ...
  • 134 篇 imperial college...
  • 134 篇 university of de...
  • 133 篇 rwth aachen univ...
  • 133 篇 department of ph...
  • 132 篇 infn sezione di ...
  • 131 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 111 篇 a. babaev
  • 111 篇 a. steen
  • 111 篇 n. cartiglia
  • 108 篇 v. karjavine
  • 105 篇 n. colino
  • 105 篇 f. moortgat
  • 104 篇 b. clerbaux
  • 104 篇 g. sultanov
  • 103 篇 m. a. ciocci
  • 103 篇 k. lamichhane
  • 103 篇 s. maselli
  • 102 篇 e. migliore
  • 102 篇 p. avery
  • 102 篇 l. silvestris

语言

  • 1,695 篇 英文
  • 75 篇 中文
  • 41 篇 其他
检索条件"机构=State Key Laboratory of Computer Architecture~ Institute of Computing Technology"
1807 条 记 录,以下是241-250 订阅
Safe Probabilistic Invariance Verification for Stochastic Discrete-Time Dynamical Systems
Safe Probabilistic Invariance Verification for Stochastic Di...
收藏 引用
IEEE Conference on Decision and Control
作者: Yiqing Yu Taoran Wu Bican Xia Ji Wang Bai Xue Department of Information Science School of Mathematical Sciences Peking University China State Key Laboratory of Computer Science Institute of Software CAS China State Key Laboratory of High Performance Computing and College of Computer Science and Technology National University of Defense Technology China
Ensuring safety through set invariance has proven a useful method in a variety of applications in robotics and control. In this paper, we focus on the safe probabilistic invariance verification problem for discrete-ti...
来源: 评论
Boosting Meaningful Dependency Mining with Clustering and Covariance Analysis
Boosting Meaningful Dependency Mining with Clustering and Co...
收藏 引用
International Conference on Data Engineering
作者: Xi Wang Ruochun Jin Wanrong Huang Yuhua Tang Institute for Quantum Information & State Key Laboratory of High Performance Computing College of Computer Science and Technology National University of Defense Technology Changsha China Department of Intelligent Data Science College of Computer Science and Technology National University of Defense Technology Changsha China
Functional dependencies (FDs) form a valuable ingredient for various data management tasks. However, existing methods can hardly discover practical and interpretable FDs, especially in large noisy real-life datasets. ... 详细信息
来源: 评论
A novel vision-based multi-task robotic grasp detection method for multi-object scenes
收藏 引用
Science China(Information Sciences) 2022年 第12期65卷 157-169页
作者: Yanan SONG Liang GAO Xinyu LI Weiming SHEN Kunkun PENG College of Computer Science and Technology Zhejiang University Institute of Computing Innovation Zhejiang University State Key Laboratory of Digital Manufacturing Equipment and Technology Huazhong University of Science and Technology School of Management Wuhan University of Science and Technology
Grasping a specified object from multi-object scenes is an essential ability for intelligent *** ability depends on the affiliation between the grasp position and the object category. Most existing multi-object grasp ... 详细信息
来源: 评论
Mechanistic investigation of highly bendable magnesium alloy sheet fabricated by short-process manufacturing
收藏 引用
Journal of Magnesium and Alloys 2024年 第10期12卷 4289-4310页
作者: Shiwei Xu Peijie Xiao Xiaofan Wu John Holmes Frédéric Mompiou Zhenyu Xiao Chen Jin Tianjiao Li Kuaishe Wang Zhuoran Zeng College of Mechanical and Vehicle Engineering Hunan UniversityChangsha 410082China State Key Laboratory of Advanced Design and Manufacturing Technology for Vehicle Hunan UniversityChangsha 410082China Suzhou Research Institute of Hunan University Suzhou 215131China College of Engineering Computing and CyberneticAustralian National UniversityACT 2601Australia CEMES-CNRS Universitéde Toulouse29 rue J.MarvigToulouse 31055France Qinghai Salt Lake Teli Magnesium Co. Ltd.Xining 810000China International Joint Laboratory for Light Alloys(Ministry of Education) College of Materials Science and EngineeringChongqing UniversityChongqing 400044China School of Metallurgical Engineering Xi’an University of Architecture&TechnologyXi’an 710055China College of Materials Science and Engineering Hunan UniversityChangsha 410082China
In this study,a commercial magnesium alloy AZ31(Mg-3Al-1Zn-0.3Mn)sheet through a short manufacturing process was found to be ductile and highly formable in *** possessing a strong basal texture,the short-processed she... 详细信息
来源: 评论
A Bayesian validation approach to practical boson sampling
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2020年 第5期63卷 39-46页
作者: Zhe Dai Yong Liu Ping Xu WeiXia Xu XueJun Yang JunJie Wu Institute for Quantum Information&State Key Laboratory of High Performance Computing College of Computer National University of Defense TechnologyChangsha 410073China
Boson sampling is a promising candidate for demonstrating quantum supremacy. The validation that involves judging whether a quantum setup outputs photons following the boson sampling model is an essential task in the ... 详细信息
来源: 评论
PancakeFS: A Write Efficiently and Read Optimized Filesystem
PancakeFS: A Write Efficiently and Read Optimized Filesystem
收藏 引用
Consumer Electronics and computer Engineering (ICCECE), 2021 IEEE International Conference on
作者: Yongkang Wang Yang Liu Zhiguang Chen School of Computer Science and Engineering Sun Yat-sen University Guangzhou China State Key Laboratory of High-Performance Computing Institute for Quantum Information College of Computer National University of Defense Technology Changsha China
With the development of emerging technologies such as cloud computing and large AI models (such as LLM), many applications have placed higher demands on the intensive read and write processing of massive data. Address...
来源: 评论
RDGFuzz: A directed greybox fuzzing optimization method based on Rich-Branch nodes  22
RDGFuzz: A directed greybox fuzzing optimization method base...
收藏 引用
Proceedings of the 2022 6th International Conference on Electronic Information technology and computer Engineering
作者: Zejun Wu Li Lu Qiong Jia Zhihao Chen State Key Laboratory of Mathematical Engineering and advanced Computing China National Local Joint Engineering Laboratory of Network Space Security Technology China Beijing Institute of Computer Technology and Application China
Directed fuzzing technology is one of the key technologies to quickly reach a specific location of software, and to conduct targeted testing or bug recurrence. However, directed fuzzing technology has some problems, s... 详细信息
来源: 评论
Latency-aware Partial Task Offloading in Collaborative Edge computing
Latency-aware Partial Task Offloading in Collaborative Edge ...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Yingmeng Gao Jie Zhu Haiping Huang Chen Chen Nanjing University of Posts & Telecommunications Nanjing China State Key Laboratory Chinese of Computer Architecture Institute of Computing Technology Academy of Sciences Beijing China Jiangsu High Technology Reasearch Key Laboratory of Wireless Sensor Networks Nanjing China Nanjing University of Aeronautics and Astronautics Nanjing China
When it comes to the fifth generation, collaborative edge computing is preferred for offloading computation-intensive tasks of low-latency applications in Internet of Things. In this paper, we consider the partial tas...
来源: 评论
Precise and scalable evaluation on the robustness metric of neural networks as classifiers  2
Precise and scalable evaluation on the robustness metric of ...
收藏 引用
2nd International Conference on Electronics, Communications and Information technology, CECIT 2021
作者: Hu, Yangyi Institute for Quantum Information State Key Laboratory of High Performance Computing National University of Defense Technology College of Computer Science and Technology Changsha410073 China
It is well known that the minimum adversarial distortion associated with a specific sample x0 reflects the local robustness of neural networks. However, it is intractable to solve the optimization problem related to t... 详细信息
来源: 评论
Explicitly represent the boundary of ReLU NN as a classifier and measure its robustness  2
Explicitly represent the boundary of ReLU NN as a classifier...
收藏 引用
2nd International Conference on Electronics, Communications and Information technology, CECIT 2021
作者: Hu, Yangyi Institute for Quantum Information State Key Laboratory of High Performance Computing National University of Defense Technology College of Computer Science and Technology Changsha410073 China
Adversarial examples pose a great threat to the application of neural network as a classifier in areas with high security requirements. Intuitively, the adversarial property of neural network is closely related to the... 详细信息
来源: 评论