咨询与建议

限定检索结果

文献类型

  • 7,334 篇 期刊文献
  • 4,934 篇 会议
  • 26 册 图书

馆藏范围

  • 12,294 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,253 篇 工学
    • 4,390 篇 计算机科学与技术...
    • 3,583 篇 软件工程
    • 1,476 篇 信息与通信工程
    • 1,228 篇 控制科学与工程
    • 1,081 篇 电气工程
    • 1,077 篇 电子科学与技术(可...
    • 762 篇 生物工程
    • 720 篇 机械工程
    • 706 篇 光学工程
    • 637 篇 化学工程与技术
    • 545 篇 材料科学与工程(可...
    • 530 篇 生物医学工程(可授...
    • 445 篇 仪器科学与技术
    • 385 篇 动力工程及工程热...
    • 356 篇 核科学与技术
    • 263 篇 交通运输工程
    • 230 篇 力学(可授工学、理...
    • 191 篇 土木工程
  • 5,355 篇 理学
    • 2,358 篇 物理学
    • 2,169 篇 数学
    • 902 篇 生物学
    • 680 篇 统计学(可授理学、...
    • 618 篇 化学
    • 480 篇 系统科学
  • 1,844 篇 管理学
    • 1,225 篇 管理科学与工程(可...
    • 658 篇 图书情报与档案管...
    • 388 篇 工商管理
  • 517 篇 医学
    • 425 篇 临床医学
    • 319 篇 基础医学(可授医学...
    • 235 篇 药学(可授医学、理...
  • 220 篇 法学
  • 160 篇 经济学
  • 140 篇 农学
  • 49 篇 教育学
  • 40 篇 文学
  • 30 篇 军事学
  • 26 篇 艺术学
  • 5 篇 哲学
  • 2 篇 历史学

主题

  • 240 篇 laboratories
  • 236 篇 computer science
  • 183 篇 deep learning
  • 175 篇 hadron colliders
  • 168 篇 semantics
  • 168 篇 feature extracti...
  • 132 篇 optimization
  • 125 篇 computational mo...
  • 121 篇 machine learning
  • 104 篇 neural networks
  • 97 篇 data mining
  • 88 篇 reinforcement le...
  • 87 篇 visualization
  • 83 篇 wireless sensor ...
  • 80 篇 control systems
  • 79 篇 support vector m...
  • 75 篇 algorithm design...
  • 74 篇 object detection
  • 71 篇 image segmentati...
  • 70 篇 deep neural netw...

机构

  • 658 篇 department of ph...
  • 642 篇 cavendish labora...
  • 530 篇 oliver lodge lab...
  • 509 篇 physikalisches i...
  • 504 篇 infn sezione di ...
  • 481 篇 infn sezione di ...
  • 479 篇 university of ch...
  • 467 篇 infn sezione di ...
  • 446 篇 infn laboratori ...
  • 409 篇 infn sezione di ...
  • 352 篇 infn sezione di ...
  • 344 篇 infn sezione di ...
  • 343 篇 infn sezione di ...
  • 338 篇 iccub universita...
  • 328 篇 infn sezione di ...
  • 326 篇 department for p...
  • 319 篇 state key labora...
  • 301 篇 universiteit maa...
  • 300 篇 fakultät physik ...
  • 290 篇 infn sezione di ...

作者

  • 188 篇 c. alexa
  • 183 篇 j. m. izen
  • 181 篇 g. bella
  • 180 篇 c. amelung
  • 179 篇 j. strandberg
  • 178 篇 d. calvet
  • 168 篇 n. orlando
  • 166 篇 y. tayalati
  • 163 篇 barter w.
  • 160 篇 g. spigo
  • 160 篇 v. chiarella
  • 159 篇 brundu d.
  • 158 篇 f. siegert
  • 156 篇 s. veneziano
  • 154 篇 a. dimitrievska
  • 150 篇 f. deliot
  • 149 篇 blake t.
  • 148 篇 m. lu
  • 148 篇 r. ströhmer
  • 148 篇 y. abulaiti

语言

  • 10,692 篇 英文
  • 1,296 篇 其他
  • 310 篇 中文
  • 3 篇 德文
  • 1 篇 法文
  • 1 篇 荷兰文
检索条件"机构=State Key Laboratory of Intelligent Technology and Systems Computer Science Department"
12294 条 记 录,以下是991-1000 订阅
排序:
Distributed Active Disturbance Rejection Control of Multiple Mobile Robots for Online Workload Partition
Distributed Active Disturbance Rejection Control of Multiple...
收藏 引用
2023 China Automation Congress, CAC 2023
作者: Li, Xin Zhai, Chao Zhang, Hehong China University of Geosciences School of Automation Wuhan Campus Wuhan China Hubei Key Laboratory of Advanced Control and Intelligent Automation for Complex Systems Wuhan China Engineering Research Center of Intelligent Technology for Geo-Exploration Ministry of Education Wuhan China School of Computer and Data Science Fuzhou University Fuzhou China
Considering the actual multi-agent coverage process, the motion trajectories are seriously affected by disturbances and noise. In this paper, a cooperative control method based on active disturbance rejection controll... 详细信息
来源: 评论
Towards Task-Free Privacy-Preserving Data Collection
收藏 引用
China Communications 2022年 第7期19卷 310-323页
作者: Zhibo Wang Wei Yuan Xiaoyi Pang Jingxin Li Huajie Shao School of Cyber Science and Engineering Wuhan University430072 China School of Cyber Science and Technology Zhejiang University310027 China State Key Laboratory of Integrated Services Networks Xidian University710071 China Department of Computer Science College of William and MaryWilliamsburgVA23186 USA
With the rapid developments of Internet of Things(IoT)and proliferation of embedded devices,large volume of personal data are collected,which however,might carry massive private information about attributes that users... 详细信息
来源: 评论
TalkCLIP: Talking Head Generation with Text-Guided Expressive Speaking Styles
arXiv
收藏 引用
arXiv 2023年
作者: Ma, Yifeng Wang, Suzhen Ding, Yu Ma, Bowen Lv, Tangjie Fan, Changjie Hu, Zhipeng Deng, Zhidong Yu, Xin Li, Lincheng Department of Computer Science and Technology BNRist THUAI State Key Laboratory of Intelligent Technology and Systems Tsinghua University China Fuxi AI Lab Netease Zhejiang Hangzhou China The School of Computer Science The University of Queensland Brisbane Australia
Audio-driven talking head generation has drawn growing attention. To produce talking head videos with desired facial expressions, previous methods rely on extra reference videos to provide expression information, whic... 详细信息
来源: 评论
Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature  1
收藏 引用
18th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2022
作者: Ma, Ziqiang Li, Shuaigang Lin, Jingqiang Cai, Quanwei Fan, Shuqin Zhang, Fan Luo, Bo School of Information Engineering Ningxia University Yinchuan China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Science and Technology of China Hefei China State Key Laboratory of Cryptology Beijing China School of Cyber Science and Technology College of Computer Science and Technology Zhejiang University Hangzhou310027 China Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province Hangzhou310027 China Department of Electrical Engineering and Computer Science University of Kansas Lawrence United States
In the resource-constrained environment such as the Internet of Things, the windowed Non-Adjacent-Form (wNAF) representation is usually used to improve the calculation speed of the scalar multiplication of ECDSA. This... 详细信息
来源: 评论
Device-to-Device Communications aided Integrated Sensing and Communication Networks: A Joint Design of Bandwidth and Power Allocations
Device-to-Device Communications aided Integrated Sensing and...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Dou, Chenglong Huang, Ning Wu, Yuan Qian, Liping Quek, Tony Q.S. University of Macau State Key Laboratory of Internet of Things for Smart City China University of Macau Department of Computer and Information Science China Zhuhai Um Science and Technology Research Institute Zhuhai519301 China Zhejiang University of Technology College of Information Engineering Hangzhou310023 China Singapore University of Technology and Design 487372 Singapore
Integrated sensing and communication (ISAC) networks constitute a crucial paradigm for facilitating numerous advanced services in future wireless networks. This paper investigates the joint bandwidth and power allocat... 详细信息
来源: 评论
A comprehensive survey on shadow removal from document images: datasets, methods, and opportunities
收藏 引用
Vicinagearth 2025年 第1期2卷 1-18页
作者: Wang, Bingshu Li, Changping Zou, Wenbin Zhang, Yongjun Chen, Xuhang Chen, C.L. Philip School of Software Northwestern Polytechnical University Xi’an China Guangdong Provincial Key Laboratory of Intelligent Information Processing & Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing College of Electronics and Information Engineering Shenzhen University Shenzhen China Yongjun Zhang is with the State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China School of Computer Science and Engineering Huizhou University Huizhou China School of Computer Science and Engineering South China University of Technology and Pazhou Lab Guangzhou China
With the rapid development of document digitization, people have become accustomed to capturing and processing documents using electronic devices such as smartphones. However, the captured document images often suffer...
来源: 评论
HRSE: Heterogeneous Reliable-Aware SFC Embedding by DRL with Greedy Rules in SAGIN
HRSE: Heterogeneous Reliable-Aware SFC Embedding by DRL with...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Kaixin Qin Songtao Guo Guiyan Liu Yue Zeng College of Computer Science Chongqing University Key Laboratory of Embedded System and Service Computing (Tongji University) Ministry of Education Shanghai Department of Computer Science and Technology The State Key Laboratory for Novel Software Technology Nanjing University
Ensuring the quality of service (QoS) in the Space-Air-Ground Integrated Network (SAGIN) requires implementing appropriate service function chain (SFC) embedding strategies to provide reliable general services and AI ... 详细信息
来源: 评论
Action recognition through fusion of sEMG and skeletal data in feature level
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2022年 第9期13卷 4125-4134页
作者: Wang, Xinming Ding, Weili Bian, Shuangshuang Liu, Honghai Department of Automation Institute of Electrical Engineering Key Laboratory of Intelligent Rehabilitation and Neuromodulation of Hebei Province Yanshan University 438 West of Hebei Avenue Haigang District Qinhuangdao066004 China School of Mechanical Engineering and Automation State Key Laboratory of Robotics and Systems Harbin Institute of Technology Shenzhen Nanshan District Shenzhen518055 China
Human action can be recognized through a unimodal way. However, the information obtained from a single mode is limited due to the fact that a single mode contains only one type of physical attribute. Therefore, it is ... 详细信息
来源: 评论
What limits limits?
收藏 引用
National science Review 2021年 第1期8卷 11-14页
作者: Yong-Chun Liu Kun Huang Yun-Feng Xiao Lan Yang Cheng-Wei Qiu State Key Laboratory of Low-Dimensional Quantum Physics Department of Physics Frontier Science Center for Quantum Information Tsinghua University Department of Optics and Optical Engineering University of Science and Technology of China State Key Laboratory for Mesoscopic Physics and Frontiers Science Center for Nano-optoelectronics School of Physics Peking University Department of Electrical and Systems Engineering Washington University Department of Electrical and Computer Engineering National University of Singapore
There are fundamental rules and principles setting the limits of physical systems. It triggers an interesting thought—can we break the limits under specific circumstances? A realistic system can only provide limited ...
来源: 评论
Stage-Zero: A Dynamic Ensemble Method for Intrusion Detection in Industrial Control systems  10th
Stage-Zero: A Dynamic Ensemble Method for Intrusion Detectio...
收藏 引用
10th International Conference of Pioneering computer Scientists, Engineers and Educators, ICPCSEE 2024
作者: Ma, Zhiming Zhou, Lin Hu, Xiaobo Li, Chao Chen, Siyuan Wang, Yong Department of Computer Science and Technology Shanghai University of Electric Power Shanghai China State Grid Key Laboratory of Power Industrial Chip Design and Analysis Technology Beijing Smart-Chip Microelectronics Technology Co. Ltd. Beijing China State Grid Digital Technology Holding Co. Ltd. Beijing China
Industrial control systems (ICS) have become increasingly vulnerable to security risks due to the proliferation of network applications. Intrusion detection systems (IDS) are employed to safeguard ICS from hostile att... 详细信息
来源: 评论