咨询与建议

限定检索结果

文献类型

  • 119 篇 会议
  • 29 篇 期刊文献

馆藏范围

  • 148 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 94 篇 工学
    • 74 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 18 篇 信息与通信工程
    • 14 篇 生物工程
    • 8 篇 机械工程
    • 8 篇 控制科学与工程
    • 7 篇 光学工程
    • 7 篇 电子科学与技术(可...
    • 6 篇 电气工程
    • 4 篇 安全科学与工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 3 篇 网络空间安全
    • 2 篇 建筑学
    • 2 篇 生物医学工程(可授...
  • 58 篇 理学
    • 35 篇 数学
    • 16 篇 物理学
    • 16 篇 生物学
    • 10 篇 统计学(可授理学、...
    • 3 篇 化学
    • 2 篇 系统科学
  • 26 篇 管理学
    • 15 篇 图书情报与档案管...
    • 12 篇 管理科学与工程(可...
  • 6 篇 法学
    • 6 篇 社会学
  • 3 篇 教育学
    • 2 篇 教育学
    • 1 篇 心理学(可授教育学...
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 2 篇 公共卫生与预防医...
  • 1 篇 农学
  • 1 篇 艺术学

主题

  • 8 篇 deep learning
  • 5 篇 contrastive lear...
  • 5 篇 feature extracti...
  • 4 篇 graph neural net...
  • 4 篇 speech recogniti...
  • 4 篇 decoding
  • 4 篇 semantics
  • 4 篇 accuracy
  • 3 篇 object detection
  • 3 篇 writing
  • 3 篇 computational mo...
  • 3 篇 natural language...
  • 3 篇 computer vision
  • 3 篇 forecasting
  • 2 篇 learning systems
  • 2 篇 deep neural netw...
  • 2 篇 trees (mathemati...
  • 2 篇 human computer i...
  • 2 篇 error correction
  • 2 篇 transformers

机构

  • 57 篇 the state key la...
  • 31 篇 school of comput...
  • 17 篇 college of compu...
  • 16 篇 the state key la...
  • 15 篇 tibetan informat...
  • 13 篇 state key labora...
  • 11 篇 academy of plate...
  • 7 篇 key laboratory o...
  • 7 篇 school of comput...
  • 7 篇 academy of plate...
  • 6 篇 qinghai normal u...
  • 5 篇 national qinghai...
  • 4 篇 school of inform...
  • 4 篇 college of compu...
  • 3 篇 qinghai normal u...
  • 3 篇 the college of c...
  • 3 篇 school of comput...
  • 3 篇 qinghai normal u...
  • 2 篇 the key laborato...
  • 2 篇 academy of plate...

作者

  • 14 篇 zhao haixing
  • 11 篇 ye zhonglin
  • 10 篇 geng shengling
  • 8 篇 haixing zhao
  • 8 篇 shengling geng
  • 7 篇 zhonglin ye
  • 7 篇 zhang dan
  • 7 篇 li lin
  • 6 篇 xiao yuzhi
  • 6 篇 ping xie
  • 6 篇 ma xiujuan
  • 5 篇 ma fuxiang
  • 5 篇 zhang huiyun
  • 5 篇 huang heming
  • 4 篇 jun yin
  • 4 篇 lei meng
  • 4 篇 hu feng
  • 4 篇 xie ping
  • 4 篇 zhou mingquan
  • 4 篇 xiujuan du

语言

  • 132 篇 英文
  • 10 篇 其他
  • 8 篇 中文
检索条件"机构=State Key Laboratory of Intelligent Information Processing and Application of Tibetan Language"
148 条 记 录,以下是91-100 订阅
排序:
Borodin-Kostochka Conjecture for Two Families of {P4∪P1}-Free Graphs
SSRN
收藏 引用
SSRN 2024年
作者: Tang, LingXiang Qin, XiaoXiao Liu, YongChao Huo, BoFeng School of Mathematics and Statists Qinghai Normal University China The State Key Laboratory of Tibetan Intelligent Information Processing and Application China Academy of Plateau Science and Sustainability Xining Qinghai810000 China
In 1941, Brooks states that for a graph $G$ with $\Delta(G)\geq 3$, $\chi(G)\leq max\{\Delta(G), \omega(G)\}$. In 1977, Borodin and Kostochka conjectured a similar result that if $\Delta(G)\geq 9$,then $\chi(G)\leq ma... 详细信息
来源: 评论
Remote Sensing Image Captioning Using Hire-MLP  4
Remote Sensing Image Captioning Using Hire-MLP
收藏 引用
4th International Conference on Computer Vision, Image and Deep Learning, CVIDL 2023
作者: Wei, Yichao Li, Lin Geng, Shengling School of Computer Science Qinghai Normal University Xining China The State Key Laboratory of Tibetan Intelligent Information Processing and Application Xining China Qinghai Normal University Academy of Plateau Science and Sustainability Xining China National Qinghai-Tibet Plateau Scientific Data Center Qinghai Sub-center Xining China
Remote sensing image captioning has been widely applied to traffic management, geographic research, etc. Although the neural network approach has been successfully improving the performance of the Remote sensing image... 详细信息
来源: 评论
PT-MVSNet: Overlapping Attention Multi-view Stereo Network with Transformers  4
PT-MVSNet: Overlapping Attention Multi-view Stereo Network w...
收藏 引用
4th International Conference on Computer Vision, Image and Deep Learning, CVIDL 2023
作者: Zhang, Song Li, Lin Qiao, Jiangxuan School of Computer Science Qinghai Normal University Xining China The State Key Laboratory of Tibetan Intelligent Information Processing and Application Xining China Qinghai Normal University Academy of Plateau Science and Sustainability Xining China National Qinghai-Tibet Plateau Scientific Data Center Qinghai Sub-center Xining China
In this paper, we propose a new multi-view stereo vision model PT -MVSNet based on multi-view stereo (MVS). Multi-view stereo is a successful reconstruction method that uses multiple images to reconstruct a 3D scene. ... 详细信息
来源: 评论
A semantic segmentation network based on CNN and Swin transformer for landslide detection  6
A semantic segmentation network based on CNN and Swin transf...
收藏 引用
2024 6th International Conference on Artificial Intelligence Technologies and applications, ICAITA 2024
作者: Dai, Xiangyan Li, Lin School of Computer Science Qinghai Normal University Qinghai Xining810008 China The State Key Laboratory of Tibetan Intelligent Information Processing and Application Qinghai Xining810016 China Academy of Plateau Science and Sustainability Qinghai Normal University Qinghai Xining810008 China Qinghai Sub-Center National Qinghai-Tibet Plateau Scientific Data Center Qinghai Xining810008 China
To address the issues of poor object localization, difficulty in object recognition, and inadequate segmentation performance of CNN-based semantic segmentation methods in landslide detection, a semantic segmentation m... 详细信息
来源: 评论
End-to-End tibetan Speech Recognition Study Based on Byte Pair Coding  23
收藏 引用
23rd Chinese National Conference on Computational Linguistics, CCL 2024
作者: Cai, Yuqing Wang, Chao Duojie, Renzeng Zhu, Yulei Zhang, Jin Tashi, Nyima Tibet University School of Information Science and Technology Lhasa850000 China State Key Laboratory of Tibetan Intelligent Information Processing and Application Lhasa850000 China Qinghai Normal University College of Computer Xining810016 China
Aiming at the problems of inconsistent modeling units and unsatisfactory recognition results in tibetan end-to-end speech recognition research, this paper proposes a BPE-Conformer-CTC/Attention end-to-end tibetan spee... 详细信息
来源: 评论
Cascading failure analysis of uniform double-layer hyper-networks based on the Couple Map Lattice model
Cascading failure analysis of uniform double-layer hyper-net...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Shujie Gao Xiujuan Ma Fuxiang Ma Bin Zhou The State Key Laboratory of Tibetan Intelligent Information Processing and Application School of Computer Qinghai Normal University Xining China
Cascading failures are a class of dynamical behaviors that are widely present in various types of complex systems. The study of cascading failures has also been a hot topic for researchers. The results have shown that... 详细信息
来源: 评论
A practical adversarial attack on Graph Neural Networks by attacking single node structure
A practical adversarial attack on Graph Neural Networks by a...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Yang Chen Zhonglin Ye Haixing Zhao Lei Meng Zhaoyang Wang Yanlin Yang The State Key Laboratory of Tibetan Intelligent Information Processing and Application School of Computer Science Qinghai Normal University Qinghai China
In recent years, Graph Neural Networks (GNNs) have performed significantly in node classification tasks. Re-search on GNNs adversarial attacks has recently attracted attention. Many works have demonstrated that single... 详细信息
来源: 评论
Long Time Series Prediction of Meteorological Data Based on Improved Autoformer Model  2
Long Time Series Prediction of Meteorological Data Based on ...
收藏 引用
2nd International Conference on Artificial Intelligence and intelligent information processing, AIIIP 2023
作者: Song, Suxin Geng, Shengling Wang, Yuxiang School of Computer Science Qinghai Normal University Hutai Qinghai Xining810008 China Academy of Plateau Science and Sustainability People's Government of Qinghai Province Beijing Normal University Qinghai Haihu Xining 810004 China Qinghai Normal University Hutai The State Key Laboratory of Tibetan Intelligent Information Processing and Application Qinghai Xining810008 China
Aiming at the problem of low prediction accuracy caused by many uncertain factors in the prediction of long-time series of meteorological data, a long-time series prediction model of meteorological data based on impro... 详细信息
来源: 评论
Three-Channel Graph Convolutional Network
Three-Channel Graph Convolutional Network
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Lei Meng Zhonglin Ye Haixing Zhao Yanlin Yang Yang Chen Zhaoyang Wang The State Key Laboratory of Tibetan Intelligent Information Processing and Application College of Computer Qinghai Normal University Tibetan Information Processing Engineering Technology and Research Center of Qinghai Province Xining China
At present, as an emerging direction of artificial intelligence, graph neural networks (GNNs) have developed rapidly and can solve many graph data problems efficiently. The real world is composed of a large number of ... 详细信息
来源: 评论
FEMD: Feature Enhancement-aided Multimodal Feature Fusion Approach for Smart Contract Vulnerability Detection  30
FEMD: Feature Enhancement-aided Multimodal Feature Fusion Ap...
收藏 引用
30th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2024
作者: Li, Juan Li, Rui Lu, Youshui Cai, Bowen Cao, Yulin Lin, Hang Li, Xingxing Li, Chan Qinghai Normal University School of Computer Science Xining China Xidian University The State Key Laboratory of Tibetan Intelligent Information Processing and Application School of Computer Science Qinghai Normal University School of Computer Science and Technology Xian China School of the Instrument Science and Technology School of Electrical Engineering Xi'an Jiaotong University Xian China School of Science and Engineering University of Minnesota - Twin City Minneapolis United States
Smart contracts, due to their immutability and transparency upon deployment, entail significant economic and systemic risks from any vulnerabilities present. Traditional vulnerability detection methods suffer from low... 详细信息
来源: 评论