咨询与建议

限定检索结果

文献类型

  • 988 篇 期刊文献
  • 794 篇 会议
  • 1 册 图书

馆藏范围

  • 1,783 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 722 篇 计算机科学与技术...
    • 492 篇 软件工程
    • 193 篇 电子科学与技术(可...
    • 166 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 94 篇 电气工程
    • 89 篇 核科学与技术
    • 86 篇 光学工程
    • 83 篇 生物工程
    • 79 篇 机械工程
    • 71 篇 动力工程及工程热...
    • 50 篇 材料科学与工程(可...
    • 43 篇 化学工程与技术
    • 38 篇 生物医学工程(可授...
    • 37 篇 仪器科学与技术
    • 33 篇 建筑学
    • 30 篇 土木工程
    • 22 篇 力学(可授工学、理...
  • 744 篇 理学
    • 427 篇 物理学
    • 247 篇 数学
    • 96 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 57 篇 系统科学
    • 52 篇 化学
  • 196 篇 管理学
    • 147 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 41 篇 医学
    • 34 篇 临床医学
    • 30 篇 基础医学(可授医学...
  • 21 篇 法学
  • 18 篇 经济学
  • 10 篇 农学
  • 6 篇 军事学
  • 4 篇 教育学
  • 3 篇 文学
  • 2 篇 哲学
  • 2 篇 艺术学

主题

  • 111 篇 hadron colliders
  • 75 篇 computer archite...
  • 41 篇 laboratories
  • 39 篇 hardware
  • 33 篇 computational mo...
  • 33 篇 delay
  • 31 篇 higgs bosons
  • 31 篇 training
  • 29 篇 w & z bosons
  • 29 篇 deep learning
  • 29 篇 circuit faults
  • 25 篇 semantics
  • 24 篇 benchmarking
  • 23 篇 bandwidth
  • 23 篇 wireless sensor ...
  • 23 篇 costs
  • 21 篇 quantum cryptogr...
  • 21 篇 energy efficienc...
  • 20 篇 neural networks
  • 20 篇 top quark

机构

  • 208 篇 state key labora...
  • 191 篇 yerevan physics ...
  • 162 篇 university of ch...
  • 151 篇 centro brasileir...
  • 150 篇 national and kap...
  • 150 篇 istanbul technic...
  • 149 篇 university of sp...
  • 148 篇 universidad iber...
  • 148 篇 indian institute...
  • 146 篇 brunel universit...
  • 146 篇 academy of scien...
  • 143 篇 charles universi...
  • 139 篇 università di to...
  • 136 篇 infn sezione di ...
  • 135 篇 imperial college...
  • 135 篇 university of de...
  • 134 篇 rwth aachen univ...
  • 134 篇 department of ph...
  • 133 篇 infn sezione di ...
  • 132 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 111 篇 a. babaev
  • 111 篇 a. steen
  • 111 篇 n. cartiglia
  • 108 篇 v. karjavine
  • 105 篇 n. colino
  • 105 篇 f. moortgat
  • 104 篇 b. clerbaux
  • 104 篇 g. sultanov
  • 103 篇 m. a. ciocci
  • 103 篇 k. lamichhane
  • 103 篇 s. maselli
  • 102 篇 e. migliore
  • 102 篇 p. avery
  • 102 篇 l. silvestris

语言

  • 1,685 篇 英文
  • 74 篇 中文
  • 28 篇 其他
检索条件"机构=State Key Laboratory of Computer Architecture~ Institute of Computing Technology"
1783 条 记 录,以下是341-350 订阅
排序:
Contrastive Learning Based Human Activity Recognition Using Body Sensors  9
Contrastive Learning Based Human Activity Recognition Using ...
收藏 引用
9th International Conference on Big Data computing and Communications, BigCom 2023
作者: Xie, Chuanshi Zhou, Yu Yu, Dandan Sun, Shilong Zhang, Xiao Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China The First Affiliated Hospital of Dalian Medical University Information Center Dalian China Harbin Institute of Technology School of Mechanical Engineering and Automation Shenzhen518055 China South-Central Minzu University Department of Computer Science China South-Central Minzu University Key Laboratory of Cyber-Physical Fusion Intelligent Computing State Ethnic Affairs Commission Wuhan430074 China
Pervasive sensing and wearable sensor techniques have been increasingly employed to monitor and recognize human activities through body sensors in areas of smart healthcare and manufacturing. However, conventional mac... 详细信息
来源: 评论
Time Series Anomaly Detection Based on Normalized Flow and Bayesian Networks
Time Series Anomaly Detection Based on Normalized Flow and B...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Honglei Yao Donglan Liu Yingxian Chang Xin Liu Chaofan Tang State Grid Shandong Electric Power Research Institute Jinan China State Grid Shandong Electric Power Company Jinan China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
Time series anomaly detection often faces significant challenges due to the high dimensionality, interdependence, and label sparsity of the data. Traditional methods struggle to model the intricate relationships betwe... 详细信息
来源: 评论
BPVFL: A Bidirectional Privacy-Preserving Verifiable Federated Learning Framework with Homomorphic Encryption
BPVFL: A Bidirectional Privacy-Preserving Verifiable Federat...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Jingwei Liu Sijing Chen Junrong Zhu Rong Sun Xiaojiang Du Mohsen Guizani Shaanxi Key Laboratory of Blockchain and Secure Computing Xidian University Xi’an China State Key Laboratory of ISN Xidian University Xi’an China Department of Electrical and Computer Engineering Stevens Institute of Technology Hoboken USA Department of Machine Learning Mohamed Bin Zayed University of Artificial Intelligence (MBZUAI) Abu Dhabi UAE
Federated learning, while advancing data privacy, faces risks of sensitive information leakage through parameter updates, making it susceptible to inference and data reconstruction attacks. Fraudulent behaviors by cen... 详细信息
来源: 评论
Multi-Grained Feature Pruning for Video-Based Human Pose Estimation
Multi-Grained Feature Pruning for Video-Based Human Pose Est...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhigang Wang Shaojing Fan Zhenguang Liu Zheqi Wu Sifan Wu Yingying Jiao College of Computer Science and Technology Zhejiang Gongshang University Hangzhou China School of Computing National University of Singapore Singapore The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security Hangzhou China College of Computer Science and Technology Jilin University Changchun China College of Computer Science and Technology Zhejiang University of Technology Hangzhou China
Human pose estimation, with its broad applications in action recognition and motion capture, has experienced significant advancements. However, current Transformer-based methods for video pose estimation often face ch... 详细信息
来源: 评论
Quantum-based Variational Approach for Solving Graph Isomorphism Problems
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Yukun Shen, Yingtong Zhang, Zhichao Wan, Linchun Beijing Key Laboratory of Petroleum Data Mining China University of Petroleum Beijing102249 China State Key Lab of Processors Institute of Computing Technology CAS Beijing100190 China School of Mathematics and Physics University of Science and Technology Beijing Beijing100083 China School of Computer and Information Science Southwest University Chongqing400715 China
The graph isomorphism problem remains a fundamental challenge in computer science, driving the search for efficient decision algorithms. Due to its ambiguous computational complexity, heuristic approaches such as simu... 详细信息
来源: 评论
Modeling Fine-Grained Relations in Dynamic Space-Time Graphs for Video-Based Facial Expression Recognition
收藏 引用
IEEE Transactions on Affective computing 2025年
作者: Huang, Changqin Jiang, Fan Han, Zhongmei Huang, Xiaodi Wang, Shijin Zhu, Yanlai Jiang, Yunliang Hu, Bin Zhejiang Normal University Key Laboratory of Intelligent Education Technology and Application of Zhejiang Province Zhejiang Jinhua321004 China Charles Sturt University School of Computing Mathematics and Engineering AlburyNSW2640 Australia State Key Laboratory of Cognitive Intelligence Anhui Hefei230088 China Hangzhou Hikvision Digital Technology Co. Ltd Education Business Department Hangzhou310051 China Zhejiang Normal University School of Computer Science and Technology Jinhua321004 China Beijing Institute of Technology School of Medical Technology Beijing10081 China
Facial expressions in videos inherently mirror the dynamic nature of real-world facial events. Consequently, facial expression recognition (FER) should employ a dynamic graph-based representation to effectively captur... 详细信息
来源: 评论
Out-of-Distribution Detection in Long-Tailed Recognition with Calibrated Outlier Class Learning
arXiv
收藏 引用
arXiv 2023年
作者: Miao, Wenjun Pang, Guansong Li, Tianqi Bai, Xiao Zheng, Jin School of Computer Science and Engineering Beihang University China School of Computing and Information Systems Singapore Management University Singapore State Key Laboratory of Software Development Environment Jiangxi Research Institute Beihang University China State Key Laboratory of Virtual Reality Technology and Systems Beihang University China
Existing out-of-distribution (OOD) methods have shown great success on balanced datasets but become ineffective in long-tailed recognition (LTR) scenarios where 1) OOD samples are often wrongly classified into head cl... 详细信息
来源: 评论
Improving Deep Assertion Generation via Fine-Tuning Retrieval-Augmented Pre-trained Language Models
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Quanjun Fang, Chunrong Zheng, Yi Zhang, Yaxin Zhao, Yuan Huang, Rubing Zhou, Jianyi Yang, Yun Zheng, Tao Chen, Zhenyu Department of Computing Technologies Swinburne University of Technology Melbourne Australia State Key Laboratory for Novel Software Technology Nanjing University Jiangsu Nanjing China School of Computer Science and Engineering Macau University of Science and Technology Jiangsu Nanjing China Huawei Cloud Computing Technologies Co. Ltd. Beijing China Shenzhen Research Institute of Nanjing University Guangdong Shenzhen China
Unit testing validates the correctness of the units of the software system under test and serves as the cornerstone in improving software quality and reliability. To reduce manual efforts in writing unit tests, some t... 详细信息
来源: 评论
Almost Optimal Time Lower Bound for Approximating Parameterized Clique, CSP, and More, under ETH
arXiv
收藏 引用
arXiv 2024年
作者: Guruswami, Venkatesan Lin, Bingkai Ren, Xuandi Sun, Yican Wu, Kewen Simons Institute for the Theory of Computing Departments of EECS and Mathematics UC Berkeley United States State Key Laboratory for Novel Software Technology Nanjing University China Department of EECS UC Berkeley United States School of Computer Science Peking University China
The Parameterized Inapproximability Hypothesis (PIH), which is an analog of the PCP theorem in parameterized complexity, asserts that, there is a constant Ε > 0 such that for any computable function f : N → N, no... 详细信息
来源: 评论
Ability of strong-pulse illumination to hack self-differencing avalanche photodiode detectors in a high-speed quantum-key-distribution system
收藏 引用
Physical Review A 2022年 第3期106卷 033713-033713页
作者: Binwu Gao Zhihao Wu Weixu Shi Yingwen Liu Dongyang Wang Chunlin Yu Anqi Huang Junjie Wu Institute for Quantum Information & State Key Laboratory of High Performance Computing College of Computer Science and Technology National University of Defense Technology Changsha 410073 China China Greatwall Research Institute China Greatwall Technology Group Co. Ltd. Shenzhen 518057 China
Implementation of high-speed quantum key distribution (QKD) has become one of the major focuses in the field, which produces a high key-generation rate for applications. To achieve high-speed QKD, tailored techniques ... 详细信息
来源: 评论