咨询与建议

限定检索结果

文献类型

  • 7,421 篇 期刊文献
  • 4,931 篇 会议
  • 27 册 图书

馆藏范围

  • 12,379 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,283 篇 工学
    • 4,469 篇 计算机科学与技术...
    • 3,618 篇 软件工程
    • 1,494 篇 信息与通信工程
    • 1,283 篇 控制科学与工程
    • 1,117 篇 电气工程
    • 1,084 篇 电子科学与技术(可...
    • 766 篇 生物工程
    • 735 篇 光学工程
    • 724 篇 机械工程
    • 641 篇 化学工程与技术
    • 544 篇 材料科学与工程(可...
    • 538 篇 生物医学工程(可授...
    • 443 篇 仪器科学与技术
    • 387 篇 动力工程及工程热...
    • 266 篇 交通运输工程
    • 260 篇 核科学与技术
    • 241 篇 力学(可授工学、理...
    • 195 篇 土木工程
  • 5,414 篇 理学
    • 2,377 篇 物理学
    • 2,181 篇 数学
    • 909 篇 生物学
    • 679 篇 统计学(可授理学、...
    • 629 篇 化学
    • 481 篇 系统科学
  • 1,855 篇 管理学
    • 1,230 篇 管理科学与工程(可...
    • 662 篇 图书情报与档案管...
    • 383 篇 工商管理
  • 524 篇 医学
    • 425 篇 临床医学
    • 322 篇 基础医学(可授医学...
    • 235 篇 药学(可授医学、理...
  • 219 篇 法学
  • 158 篇 经济学
  • 142 篇 农学
  • 47 篇 教育学
  • 40 篇 文学
  • 30 篇 军事学
  • 27 篇 艺术学
  • 5 篇 哲学
  • 2 篇 历史学

主题

  • 240 篇 laboratories
  • 238 篇 computer science
  • 185 篇 deep learning
  • 176 篇 hadron colliders
  • 168 篇 feature extracti...
  • 167 篇 semantics
  • 130 篇 optimization
  • 127 篇 computational mo...
  • 120 篇 machine learning
  • 104 篇 neural networks
  • 97 篇 data mining
  • 90 篇 reinforcement le...
  • 90 篇 visualization
  • 86 篇 wireless sensor ...
  • 80 篇 support vector m...
  • 80 篇 control systems
  • 77 篇 image segmentati...
  • 76 篇 object detection
  • 73 篇 deep neural netw...
  • 72 篇 algorithm design...

机构

  • 653 篇 department of ph...
  • 640 篇 cavendish labora...
  • 526 篇 oliver lodge lab...
  • 501 篇 infn sezione di ...
  • 499 篇 physikalisches i...
  • 478 篇 infn sezione di ...
  • 475 篇 university of ch...
  • 464 篇 infn sezione di ...
  • 442 篇 infn laboratori ...
  • 406 篇 infn sezione di ...
  • 348 篇 infn sezione di ...
  • 343 篇 infn sezione di ...
  • 342 篇 infn sezione di ...
  • 339 篇 iccub universita...
  • 335 篇 state key labora...
  • 327 篇 infn sezione di ...
  • 322 篇 department for p...
  • 300 篇 universiteit maa...
  • 293 篇 fakultät physik ...
  • 288 篇 infn sezione di ...

作者

  • 186 篇 c. alexa
  • 182 篇 j. m. izen
  • 180 篇 g. bella
  • 178 篇 c. amelung
  • 177 篇 j. strandberg
  • 176 篇 d. calvet
  • 166 篇 n. orlando
  • 164 篇 y. tayalati
  • 159 篇 g. spigo
  • 158 篇 v. chiarella
  • 158 篇 barter w.
  • 156 篇 f. siegert
  • 156 篇 brundu d.
  • 154 篇 s. veneziano
  • 152 篇 a. dimitrievska
  • 148 篇 m. lu
  • 148 篇 f. deliot
  • 146 篇 r. ströhmer
  • 146 篇 y. abulaiti
  • 145 篇 bowcock t.j.v.

语言

  • 11,331 篇 英文
  • 721 篇 其他
  • 327 篇 中文
  • 2 篇 德文
  • 1 篇 荷兰文
检索条件"机构=State Key Laboratory of Intelligent Technology and Systems Computer Science Department"
12379 条 记 录,以下是4761-4770 订阅
排序:
Linear quadratic regulator design for multi-input systems with a distributed cooperative strategy
arXiv
收藏 引用
arXiv 2021年
作者: Duan, Peihu Duan, Zhisheng He, Lidong Shi, Ling Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology Clear Water Bay Kowloon Hong Kong State Key Laboratory for Turbulence and Complex Systems Department of Mechanics and Engineering Science College of Engineering Peking University Beijing100871 China School of Automation Nanjing University of Science and Technology Nanjing210094 China
In this paper, a cooperative Linear Quadratic Regulator (LQR) problem is investigated for multi-input systems, where each input is generated by an agent in a network. The input matrices are different and locally posse... 详细信息
来源: 评论
Delayed threshold and spatial diffusion in k-core percolation induced by long-range connectivity
收藏 引用
Communications Physics 2025年 第1期8卷 1-10页
作者: Zhang, Xin-Ya Yao, Yi Han, Zhiyu Yan, Gang Center for Interdisciplinary Studies and Department of Physics School of Science Westlake University Hangzhou310030 China National Key Laboratory of Autonomous Intelligent Unmanned Systems MOE Frontiers Science Center for Intelligent Autonomous Systems and Shanghai Research Institute for Intelligent Autonomous Systems Tongji University Shanghai China School of Physical Science and Engineering Tongji University Shanghai200092 China CAS Center for Excellence in Brain Science and Intelligence Technology Chinese Academy of Sciences Shanghai China
Most real-world complex networks are spatially embedded, with nodes positioned in physical space. In such systems, distance-based connectivity shapes not only the information transmission efficiency but also the netwo... 详细信息
来源: 评论
Distributed mirror descent algorithm with bregman damping for nonsmooth constrained optimization
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Guanpu Li, Weijian Xu, Gehui Hong, Yiguang Key Laboratory of Systems and Control Academy of Mathematics and Systems Science Beijing China School of Mathematical Sciences University of Chinese Academy of Sciences Beijing China Department of Automation University of Science and Technology of China Anhui Hefei China Department of Control Science and Engineering Shanghai Research Institute for Intelligent Autonomous Systems Tongji University Shanghai China
To solve distributed optimization efficiently with various constraints and nonsmooth functions, we propose a distributed mirror descent algorithm with embedded Bregman damping, as a generalization of conventional dist... 详细信息
来源: 评论
How Long Is Enough? Exploring the Optimal Intervals of Long-Range Clinical Note Language Modeling
arXiv
收藏 引用
arXiv 2022年
作者: Cahyawijaya, Samuel Wilie, Bryan Lovenia, Holy Zhong, MingQian Zhong, Huan Ip, Nancy Y. Fung, Pascale Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology Hong Kong Hong Kong Division of Life Science State Key Laboratory of Molecular Neuroscience Molecular Neuroscience Center The Hong Kong University of Science and Technology Clear Water Bay Hong Kong Hong Kong Hong Kong Center for Neurodegenerative Diseases Hong Kong Science Park Hong Kong Hong Kong
Large pre-trained language models (LMs) have been widely adopted in biomedical and clinical domains, introducing many powerful LMs such as bio-lm and BioELECTRA. However, the applicability of these methods to real cli... 详细信息
来源: 评论
Enhanced Ticket Transparency (eTT) Framework for Single Sign-On Services with Pseudonyms
Enhanced Ticket Transparency (eTT) Framework for Single Sign...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Guangqi Liu Jingqiang Lin Dawei Chu Xiaokun Zhang Qiongxiao Wang Cunqing Ma Fengjun Li Dingfeng Ye State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Cyber Security University of Science and Technology of China Hefei China Headquarter of Chinese Academy of Sciences Beijing China Beijing Institute University of Science and Technology of China Beijing China Beijing Certificate Authority Co. Ltd. Beijing China Department of Electrical Engineering and Computer Science University of Kansas KS USA
Recently, a series of vulnerabilities occurred to divulge or forge single sign-on tickets, such as the famous SolarWinds incident Once malicious attackers obtain fraudulent tickets, they can pry into user privacy as w... 详细信息
来源: 评论
A Learning Convolutional Neural Network Approach for Network Robustness Prediction
arXiv
收藏 引用
arXiv 2022年
作者: Lou, Yang Wu, Ruizi Li, Junli Wang, Lin Li, Xiang Chen, Guanrong The Department of Computing and Decision Sciences Lingnan University Hong Kong The Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai200240 China The College of Computer Science Sichuan Normal University Chengdu610066 China The Department of Automation Shanghai Jiao Tong University Shanghai200240 China The Institute of Complex Networks and Intelligent Systems Shanghai Research Institute for Intelligent Autonomous Systems Tongji University Shanghai201210 China The Department of Control Science and Engineering Tongji University Shanghai200240 China The Department of Electrical Engineering City University of Hong Kong Hong Kong
Network robustness is critical for various societal and industrial networks again malicious attacks. In particular, connectivity robustness and controllability robustness reflect how well a networked system can mainta... 详细信息
来源: 评论
Revealing vulnerable regions through diverse adversarial examples
收藏 引用
Machine Learning 2025年 第7期114卷
作者: Zhao, Yunce Huang, Wei Liu, Wei Yao, Xin Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation Department of Computer Science and Engineering Southern University of Science and Technology Guangdong Shenzhen518055 China School of Computer Science FEIT University of Technology Sydney SydneyNSW2007 Australia Tokyo103-0027 Japan School of Data Science Lingnan University Hong Kong
Current explainable AI approaches to Deep Neural Networks (DNNs) primarily aim to understand network behavior by identifying key input features that influence predictions. However, these methods often fail to identify... 详细信息
来源: 评论
A Pose Estimation Method for Fisheye Cameras Based on the EPnP Algorithm  11th
A Pose Estimation Method for Fisheye Cameras Based on the...
收藏 引用
11th International Symposium on Computational Intelligence and Industrial Applications, ISCIIA 2024
作者: Wang, Chenxiao Wang, Biao Ding, Yulong Xiao, Dunhui Chen, Ben M. Zhang, Keping Shanghai Research Institute for Intelligent Autonomous Systems Tongji University Shanghai China National Key Laboratory of Autonomous Intelligent Unmanned Systems Shanghai China Frontiers Science Center for Intelligent Autonomous Systems Ministry of Education Shanghai China College of Automation Engineering Nanjing University of Aeronautics and Astronautics Jiangsu Nanjing China Tongji University Shanghai China Department of Mechanical and Automation Engineering the Chinese University of Hong Kong China State Grid Nanjing Lishui District Power Supply Jiangsu Nanjing China
Fisheye cameras offer a wider field of view compared to traditional pinhole cameras. This paper presents a pose estimation method for fisheye cameras based on the EPnP algorithm. A unified projection model is used to ... 详细信息
来源: 评论
Single-Photon-Memory Measurement-Device-Independent Quantum Secure Direct Communication - Part I: Its Fundamentals and Evolution
arXiv
收藏 引用
arXiv 2023年
作者: Li, Xiang-Jie Pan, Dong Long, Gui-Lu Hanzo, Lajos State Key Laboratory of Low-dimensional Quantum Physics Department of Physics Tsinghua University Beijing100084 China Beijing Academy of Quantum Information Sciences Beijing100193 China Frontier Science Center for Quantum Information Beijing100084 China Beijing National Research Center for Information Science and Technology Beijing100084 China School of Electronics and Computer Science University of Southampton SouthamptonSO17 1BJ United Kingdom
Quantum secure direct communication (QSDC) has attracted a lot of attention, which exploits deep-rooted quantum physical principles to guarantee unconditional security of communication in the face of eavesdropping. We... 详细信息
来源: 评论
Anisotropic tensile properties and high-cycle fatigue behavior of Ti6Al4V fabricated by single and dual laser-powder bed fusion
收藏 引用
Materials science and Engineering: A 2025年 941卷
作者: Guotai Li Peichen Hu Yuzhan Fan Ming Wu Mingjun Chen Tianyu Yu State Key Laboratory of Robotics and System Harbin Institute of Technology Harbin Heilongjiang 150001 China Key Laboratory of Micro-systems and Micro-structures Manufacturing Ministry of Education Harbin Heilongjiang 150001 China Department of Computer Science KU Leuven 3001 Leuven Belgium Department of Mechanical Engineering KU Leuven 3001 Leuven Belgium
The development of multi laser-powder bed fusion (PBF) technology has significantly reduced the production time for large engine components. However, the impact of thermal effects and microstructural characteristics i... 详细信息
来源: 评论