咨询与建议

限定检索结果

文献类型

  • 993 篇 期刊文献
  • 797 篇 会议
  • 1 册 图书

馆藏范围

  • 1,791 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 721 篇 计算机科学与技术...
    • 492 篇 软件工程
    • 193 篇 电子科学与技术(可...
    • 166 篇 信息与通信工程
    • 105 篇 控制科学与工程
    • 95 篇 电气工程
    • 89 篇 核科学与技术
    • 87 篇 光学工程
    • 83 篇 生物工程
    • 79 篇 机械工程
    • 71 篇 动力工程及工程热...
    • 50 篇 材料科学与工程(可...
    • 43 篇 化学工程与技术
    • 38 篇 生物医学工程(可授...
    • 37 篇 仪器科学与技术
    • 33 篇 建筑学
    • 30 篇 土木工程
    • 22 篇 力学(可授工学、理...
  • 744 篇 理学
    • 427 篇 物理学
    • 247 篇 数学
    • 96 篇 生物学
    • 59 篇 统计学(可授理学、...
    • 57 篇 系统科学
    • 52 篇 化学
  • 196 篇 管理学
    • 147 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 42 篇 医学
    • 34 篇 临床医学
    • 30 篇 基础医学(可授医学...
  • 21 篇 法学
  • 18 篇 经济学
  • 10 篇 农学
  • 6 篇 军事学
  • 4 篇 教育学
  • 3 篇 文学
  • 2 篇 哲学
  • 2 篇 艺术学

主题

  • 111 篇 hadron colliders
  • 75 篇 computer archite...
  • 41 篇 laboratories
  • 39 篇 hardware
  • 33 篇 computational mo...
  • 33 篇 delay
  • 33 篇 training
  • 31 篇 higgs bosons
  • 29 篇 w & z bosons
  • 29 篇 deep learning
  • 29 篇 circuit faults
  • 25 篇 semantics
  • 24 篇 benchmarking
  • 23 篇 bandwidth
  • 23 篇 wireless sensor ...
  • 23 篇 costs
  • 21 篇 quantum cryptogr...
  • 21 篇 energy efficienc...
  • 20 篇 neural networks
  • 20 篇 top quark

机构

  • 208 篇 state key labora...
  • 191 篇 yerevan physics ...
  • 163 篇 university of ch...
  • 151 篇 centro brasileir...
  • 150 篇 national and kap...
  • 150 篇 istanbul technic...
  • 149 篇 university of sp...
  • 148 篇 universidad iber...
  • 148 篇 indian institute...
  • 146 篇 brunel universit...
  • 146 篇 academy of scien...
  • 143 篇 charles universi...
  • 139 篇 università di to...
  • 136 篇 infn sezione di ...
  • 135 篇 imperial college...
  • 135 篇 university of de...
  • 134 篇 rwth aachen univ...
  • 134 篇 department of ph...
  • 133 篇 infn sezione di ...
  • 132 篇 indian institute...

作者

  • 112 篇 g. tonelli
  • 112 篇 d. barney
  • 112 篇 l. valencia palo...
  • 112 篇 t. liu
  • 112 篇 c. hensel
  • 112 篇 a. garcia-bellid...
  • 111 篇 a. babaev
  • 111 篇 a. steen
  • 111 篇 n. cartiglia
  • 108 篇 v. karjavine
  • 105 篇 n. colino
  • 105 篇 f. moortgat
  • 104 篇 b. clerbaux
  • 104 篇 g. sultanov
  • 103 篇 m. a. ciocci
  • 103 篇 k. lamichhane
  • 103 篇 s. maselli
  • 102 篇 e. migliore
  • 102 篇 p. avery
  • 102 篇 l. silvestris

语言

  • 1,693 篇 英文
  • 74 篇 中文
  • 28 篇 其他
检索条件"机构=State Key Laboratory of Computer Architecture~ Institute of Computing Technology"
1791 条 记 录,以下是371-380 订阅
排序:
HSI-MFormer: Integrating Mamba and Transformer Experts for Hyperspectral Image Classification
收藏 引用
IEEE Transactions on Geoscience and Remote Sensing 2025年 63卷
作者: He, Yan Tu, Bing Liu, Bo Li, Jun Plaza, Antonio Institute of Optics and Electronics State Key Laboratory Cultivation Base of Atmospheric Optoelectronic Detection and Information Fusion Jiangsu International Joint Laboratory on Meteorological Photonics and Optoelectronic Detection Jiangsu Engineering Research Center for Intelligent Optoelectronic Sensing Technology of Atmosphere Nanjing University of Information Science and Technology Nanjing210044 China China University of Geosciences Faculty of Computer Science Wuhan430074 China University of Extremadura Hyperspectral Computing Laboratory Department of Technology of Computers and Communications Escuela Politecnica 10003 Spain
Hyperspectral image (HSI) classification is fundamental to numerous remote sensing applications, enabling detailed analysis of material properties and environmental conditions. Recent Mamba built upon selective state ... 详细信息
来源: 评论
Mortar: Morphing the Bit Level Sparsity for General Purpose Deep Learning Acceleration
Mortar: Morphing the Bit Level Sparsity for General Purpose ...
收藏 引用
Asia and South Pacific Design Automation Conference
作者: Yunhung Gao Hongyan Li Kevin Zhang Xueru Yu Hang Lu School of Electronics Engineering and Computer Science Peking University Beijing China State Key Lab of Computer Architecture Institute of Computing Technology CAS University of Chinese Academy of Sciences Beijing China Shanghai Integrated Circuits R&D Center Co. Ltd Shanghai China
Vanilla Deep Neural Networks (DNN) after training are represented with native floating-point 32 (fp32) weights. We observe that the bit-level sparsity of these weights is very abundant in the mantissa and can be direc... 详细信息
来源: 评论
Fast Maxwell Solvers Based on Exact Discrete Eigen-Decompositions I. Two-Dimensional Case
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Lixiu Jia, Lueling Cao, Zijian Li, Huiyuan Zhang, Zhimin School of Mathematics and Physics University of Science and Technology Beijing Beijing100083 China School of Mathematics and Statistics Shandong Normal University Jinan250358 China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing101408 China State Key Laboratory of Computer Science Laboratory of Parallel Computing Institute of Software Chinese Academy of Sciences Beijing100190 China Department of Mathematics Wayne State University DetroitMI48202 United States
In this paper, we propose fast solvers for Maxwell’s equations in rectangular domains. We first discretize the simplified Maxwell’s eigenvalue problems by employing the lowest-order rectangular Nédélec ele... 详细信息
来源: 评论
Optimal Bilinear Equalizer for Cell-Free Massive MIMO Systems over Correlated Rician Channels
收藏 引用
IEEE Transactions on Signal Processing 2025年
作者: Wang, Zhe Zhang, Jiayi Bjornson, Emil Niyato, Dusit Ai, Bo Beijing Jiaotong University State Key Laboratory of Advanced Rail Autonomous Operation Beijing100044 China Beijing Jiaotong University School of Electronics and Information Engineering Beijing100044 China KTH Royal Institute of Technology Department of Computer Science Stockholm114 28 Sweden Nanyang Technological University College of Computing & Data Science 639798 Singapore
In this paper, we explore the low-complexity optimal bilinear equalizer (OBE) combining scheme design for cell-free massive multiple-input multiple-output networks with spatially correlated Rician fading *** provide a... 详细信息
来源: 评论
Focus, Distinguish, and Prompt: Unleashing CLIP for Efficient and Flexible Scene Text Retrieval
arXiv
收藏 引用
arXiv 2024年
作者: Zeng, Gangyan Zhang, Yuan Wei, Jin Yang, Dongbao Zhang, Peng Gao, Yiwen Qin, Xugong Zhou, Yu School of Cyber Science and Engineering Nanjing University of Science and Technology China State Key Laboratory of Media Convergence and Communication Communication University of China China Institute of Information Engineering Chinese Academy of Sciences China Laboratory for Advanced Computing and Intelligence Engineering China TMCC College of Computer Science Nankai University China
Scene text retrieval aims to find all images containing the query text from an image gallery. Current efforts tend to adopt an Optical Character Recognition (OCR) pipeline, which requires complicated text detection an... 详细信息
来源: 评论
A method of generating random bits by using electronic bipolar memristor
收藏 引用
Chinese Physics B 2020年 第4期29卷 535-540页
作者: Bin-Bin Yang Nuo Xu Er-Rui Zhou Zhi-Wei Li Cheng Li Pin-Yun Yi Liang Fang Institute for Quantum Information&State Key Laboratory of High Performance Computing College of ComputerNational University of Defense TechnologyChangsha 410073China College of Computer National University of Defense TechnologyChangsha 410073China College of Electronic Science and Engineering National University of Defense TechnologyChangsha 410073China
The intrinsic stochasticity of resistance switching process is one of the holdblocks for using memristor as a fundamental element in the next-generation nonvolatile ***,such a weakness can be used as an asset for gene... 详细信息
来源: 评论
Streamline Ring ORAM Accesses through Spatial and Temporal Optimization
Streamline Ring ORAM Accesses through Spatial and Temporal O...
收藏 引用
IEEE Symposium on High-Performance computer architecture
作者: Dingyuan Cao Mingzhe Zhang Hang Lu Xiaochun Ye Dongrui Fan Yuezhi Che Rujia Wang Tsinghua University Beijing China State Key Laboratory of Computer Architecture ICT CAS Beijing China State Key Laboratory of Mathematical Engineering and Advanced Computing China Illinois Institute of Technology
Memory access patterns could leak temporal and spatial information in a sensitive program; therefore, obfuscated memory access patterns are desired from the security perspective. Oblivious RAM (ORAM) has been the favo... 详细信息
来源: 评论
Unsupervised Recognition of Unknown Objects for Open-World Object Detection
arXiv
收藏 引用
arXiv 2023年
作者: Fang, Ruohuan Pang, Guansong Zhou, Lei Bai, Xiao Zheng, Jin School of Computer Science and Engineering State Key Laboratory of Software Development Environment Jiangxi Research Institute Beihang University China School of Computing and Information Systems Singapore Management University Singapore School of Computer Science and Artificial Intelligence Wuhan University of Technology China
Open-World Object Detection (OWOD) extends object detection problem to a realistic and dynamic scenario, where a detection model is required to be capable of detecting both known and unknown objects and incrementally ... 详细信息
来源: 评论
VADER: Leveraging the Natural Variation of Hardware to Enhance Adversarial Attack
VADER: Leveraging the Natural Variation of Hardware to Enhan...
收藏 引用
Asia and South Pacific Design Automation Conference
作者: Hao Lv Bing Li Ying Wang Cheng Liu Lei Zhang Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences Capital Normal University State Key Laboratory of Computer Architecture
Adversarial attacks have been viewed as the primary threat to the security of neural networks. Hence, extensive adversarial defense techniques have been proposed to protect the neural networks from adversarial attacks... 详细信息
来源: 评论
CNN+LSTM Accelerated Turbulent Flow Simulation with Link-Wise Artificial Compressibility Method  21
CNN+LSTM Accelerated Turbulent Flow Simulation with Link-Wis...
收藏 引用
50th International Conference on Parallel Processing, ICPP 2021
作者: Fan, Sijiang Fei, Jiawei Guo, Xiao-Wei Yang, Canqun Revell, Alistair Institute for Quantum Information and State Key Laboratory of High Performance Computing College of Computer National University of Defense Technology Changsha China School of Mechanical Aerospace and Civil Engineering University of Manchester Manchester United Kingdom
The simulation of turbulent flow, the most common form of fluid, is indispensable in computational fluid dynamics (CFD). The synthetic eddy method (SEM) generates the turbulent inflow and is adopted as the inlet bound... 详细信息
来源: 评论