咨询与建议

限定检索结果

文献类型

  • 988 篇 期刊文献
  • 794 篇 会议
  • 1 册 图书

馆藏范围

  • 1,783 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 722 篇 计算机科学与技术...
    • 492 篇 软件工程
    • 193 篇 电子科学与技术(可...
    • 166 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 94 篇 电气工程
    • 89 篇 核科学与技术
    • 86 篇 光学工程
    • 83 篇 生物工程
    • 79 篇 机械工程
    • 71 篇 动力工程及工程热...
    • 50 篇 材料科学与工程(可...
    • 43 篇 化学工程与技术
    • 38 篇 生物医学工程(可授...
    • 37 篇 仪器科学与技术
    • 33 篇 建筑学
    • 30 篇 土木工程
    • 22 篇 力学(可授工学、理...
  • 744 篇 理学
    • 427 篇 物理学
    • 247 篇 数学
    • 96 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 57 篇 系统科学
    • 52 篇 化学
  • 196 篇 管理学
    • 147 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 41 篇 医学
    • 34 篇 临床医学
    • 30 篇 基础医学(可授医学...
  • 21 篇 法学
  • 18 篇 经济学
  • 10 篇 农学
  • 6 篇 军事学
  • 4 篇 教育学
  • 3 篇 文学
  • 2 篇 哲学
  • 2 篇 艺术学

主题

  • 111 篇 hadron colliders
  • 75 篇 computer archite...
  • 41 篇 laboratories
  • 39 篇 hardware
  • 33 篇 computational mo...
  • 33 篇 delay
  • 31 篇 higgs bosons
  • 31 篇 training
  • 29 篇 w & z bosons
  • 29 篇 deep learning
  • 29 篇 circuit faults
  • 25 篇 semantics
  • 24 篇 benchmarking
  • 23 篇 bandwidth
  • 23 篇 wireless sensor ...
  • 23 篇 costs
  • 21 篇 quantum cryptogr...
  • 21 篇 energy efficienc...
  • 20 篇 neural networks
  • 20 篇 top quark

机构

  • 208 篇 state key labora...
  • 191 篇 yerevan physics ...
  • 162 篇 university of ch...
  • 151 篇 centro brasileir...
  • 150 篇 national and kap...
  • 150 篇 istanbul technic...
  • 149 篇 university of sp...
  • 148 篇 universidad iber...
  • 148 篇 indian institute...
  • 146 篇 brunel universit...
  • 146 篇 academy of scien...
  • 143 篇 charles universi...
  • 139 篇 università di to...
  • 136 篇 infn sezione di ...
  • 135 篇 imperial college...
  • 135 篇 university of de...
  • 134 篇 rwth aachen univ...
  • 134 篇 department of ph...
  • 133 篇 infn sezione di ...
  • 132 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 111 篇 a. babaev
  • 111 篇 a. steen
  • 111 篇 n. cartiglia
  • 108 篇 v. karjavine
  • 105 篇 n. colino
  • 105 篇 f. moortgat
  • 104 篇 b. clerbaux
  • 104 篇 g. sultanov
  • 103 篇 m. a. ciocci
  • 103 篇 k. lamichhane
  • 103 篇 s. maselli
  • 102 篇 e. migliore
  • 102 篇 p. avery
  • 102 篇 l. silvestris

语言

  • 1,685 篇 英文
  • 74 篇 中文
  • 28 篇 其他
检索条件"机构=State Key Laboratory of Computer Architecture~ Institute of Computing Technology"
1783 条 记 录,以下是331-340 订阅
排序:
Preparing a commercial quantum key distribution system for certification against implementation loopholes
收藏 引用
Physical Review Applied 2024年 第4期22卷 044076页
作者: Vadim Makarov Alexey Abrikosov Poompong Chaiwongkhot Aleksey K. Fedorov Anqi Huang Evgeny Kiktenko Mikhail Petrov Anastasiya Ponosova Daria Ruzhitskaya Andrey Tayduganov Daniil Trefilov Konstantin Zaitsev Skolkovo Moscow 121205 Russia Vigo Quantum Communication Center NTI Center for Quantum Communications Department of Physics Faculty of Science Institute for Quantum Computing Department of Physics and Astronomy Quantum technology foundation (Thailand) Bangkok 10110 Thailand QRate Skolkovo Moscow 143026 Russia Institute for Quantum Information & State Key Laboratory of High Performance Computing College of Computer Science and Technology Moscow 119991 Russia atlanTTic Research Center School of Telecommunication Engineering Department of Signal Theory and Communications Moscow 101000 Russia
A commercial quantum key distribution (QKD) system needs to be formally certified to enable its wide deployment. The certification should include the system’s robustness against known implementation loopholes and att... 详细信息
来源: 评论
Modeling Neural Networks Training Process with Markov Decision Process  2
Modeling Neural Networks Training Process with Markov Decisi...
收藏 引用
2nd International Conference on Artificial Intelligence and computer Engineering, ICAICE 2021
作者: Bai, Yantao Liu, Wanwei Mao, Xinjun Liang, Zhen National University of Defense Technology Key Laboratory of Software Engineering for Complex Systems Changsha China College of Computer Science National University of Defense Technology Changsha China Institute for Quantum Information National University of Defense Technology State Key Laboratory of High Performance Computing Changsha China
With the development of computer technology, statistics-based machine learning method has made great break-throughs, and also improved the development of artificial intelligence. Nevertheless, as a very influential mo... 详细信息
来源: 评论
Task-Aware Dynamic Transformer for Efficient Arbitrary-Scale Image Super-Resolution  27
Task-Aware Dynamic Transformer for Efficient Arbitrary-Scale...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Xu, Tianyi Zhou, Yijie Hu, Xiaotao Zhang, Kai Zhang, Anran Qiu, Xingye Xu, Jun School of Statistics and Data Science Nankai University Tianjin China College of Computer Science Nankai University Tianjin China School of Intelligence Science and Technology Nanjing University Suzhou China Tencent Data Platform Beijing China Zhejiang University Hangzhou China Systems Engineering Research Institute China State Shipbuilding Corporation Limited Beijing China Guangdong Provincial Key Laboratory of Big Data Computing The Chinese University of Hong Kong Shenzhen China
Arbitrary-scale super-resolution (ASSR) aims to learn a single model for image super-resolution at arbitrary magnifying scales. Existing ASSR networks typically comprise an off-the-shelf scale-agnostic feature extract...
来源: 评论
Using Mobile Sinks in WSN: Computational Complexity and a Theoretical Bound
收藏 引用
Chinese Journal of Electronics 2023年 第1期20卷 147-150页
作者: Yu Gu Yusheng Ji Hongyang Chen Baohua Zhao Department of Computer Science University of Science and Technology of China Hefei China State Key Laboratory of Networking and Switching Technology Beijing China Information Systems Architecture Science Research Division NII Tokyo Japan Institute of Industrial Science University of Tokyo Tokyo Japan
In this paper, we study the lifetime optimization problem in wireless sensor networks using mobile sink nodes. This problem is inherently difficult since we need to consider both sink scheduling and data routing. Thro... 详细信息
来源: 评论
Meta Actor-Critic Framework for Multi-Agent Reinforcement Learning  4
Meta Actor-Critic Framework for Multi-Agent Reinforcement Le...
收藏 引用
4th International Conference on Artificial Intelligence and Pattern Recognition, AIPR 2021
作者: Huang, Jiateng Huang, Wanrong Wu, Dan Lan, Long Institute for Quantum Information State Key Laboratory of High Performance Computing College of Computer National University of Defense Technology China Artifcial Intelligence Research Center National Innovation Institute of Defense Technology China College of Computer and Hefei Interdisciplinary Center National University of Defense Technology China
In recent years, multi-agent reinforcement learning has received sustained attention in the last few years. The typical Actor-Critic methods learn mappings directly from observation to action without understanding the... 详细信息
来源: 评论
Interpersonal Relationship Analysis with Dyadic EEG Signals via Learning Spatial-Temporal Patterns  4th
Interpersonal Relationship Analysis with Dyadic EEG Signals...
收藏 引用
4th International Workshop on Human Brain and Artificial Intelligence, HBAI 2024
作者: Ji, Wenqi Liu, Fang Du, Xinxin Liu, Niqi Zhou, Chao Yu, Minjing Guo, Xinyue Zhao, Guozhen Liu, Yong-Jin Department of Computer Science and Technology Tsinghua University Beijing100084 China State Key Laboratory of Media Convergence and Communication Communication University of China Beijing100024 China Institute of Software Chinese Academy of Sciences Beijing100190 China College of Intelligence and Computing Tianjin University Tianjin300072 China CAS Key Laboratory of Behavioral Science Institute of Psychology Beijing100049 China
Interpersonal relationship quality is pivotal in social and occupational contexts. Existing analysis of interpersonal relationships mostly rely on subjective self-reports, whereas objective quantification remains chal... 详细信息
来源: 评论
Exploiting Completeness and Uncertainty of Pseudo Labels for Weakly Supervised Video Anomaly Detection
Exploiting Completeness and Uncertainty of Pseudo Labels for...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Chen Zhang Guorong Li Yuankai Qi Shuhui Wang Laiyun Qing Qingming Huang Ming-Hsuan Yang State Key Laboratory of Information Security Institute of Information Engineering CAS School of Cyber Security University of Chinese Academy of Sciences School of Computer Science and Technology University of Chinese Academy of Sciences Australian Institute for Machine Learning The University of Adelaide Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS University of California Merced
Weakly supervised video anomaly detection aims to identify abnormal events in videos using only video-level labels. Recently, two-stage self-training methods have achieved significant improvements by self-generating p...
来源: 评论
Alleviating Datapath Conflicts and Design Centralization in Graph Analytics Acceleration
arXiv
收藏 引用
arXiv 2022年
作者: Lin, Haiyang Yan, Mingyu Wang, Duo Zou, Mo Tu, Fengbin Ye, Xiaochun Fan, Dongrui Xie, Yuan State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China University of California at Santa Barbara CA United States
Previous graph analytics accelerators have achieved great improvement on throughput by alleviating irregular off-chip memory accesses. However, on-chip side datapath conflicts and design centralization have become the... 详细信息
来源: 评论
ID-Guard: A Universal Framework for Combating Facial Manipulation via Breaking Identification
arXiv
收藏 引用
arXiv 2024年
作者: Qu, Zuomin Lu, Wei Luo, Xiangyang Wang, Qian Cao, Xiaochun The School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Institute of Artificial Intelligence Sun Yat-sen University Guangzhou510006 China The State Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou450002 China The School of Cyber Science and Engineering Wuhan University Wuhan430072 China The School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University Shenzhen518107 China
—The misuse of deep learning-based facial manipulation poses a potential threat to civil rights. To prevent this fraud at its source, proactive defense technology was proposed to disrupt the manipulation process by a... 详细信息
来源: 评论
Characterizing the spatial potential of a surface electrode ion trap
arXiv
收藏 引用
arXiv 2023年
作者: Qin, Qingqing Chen, Ting Zhang, Xinfang Ou, Baoquan Zhang, Jie Wu, Chunwang Xie, Yi Wu, Wei Chen, Pingxing College of Science National University of Defense Technology Changsha410073 China Hunan Key Laboratory of Mechanism and Technology of Quantum Information Hunan Changsha410073 China Institute for Quantum Information State Key Laboratory of High Performance Computing College of Computer Science National University of Defense Technology Changsha410073 China
The accurate characterization of the spatial potential generated by a planar electrode in a surface-type Paul trap is of great interest. To achieve this, we employ a simple yet highly precise parametric expression to ... 详细信息
来源: 评论