咨询与建议

限定检索结果

文献类型

  • 1,026 篇 会议
  • 938 篇 期刊文献

馆藏范围

  • 1,964 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,263 篇 工学
    • 871 篇 计算机科学与技术...
    • 734 篇 软件工程
    • 310 篇 信息与通信工程
    • 182 篇 控制科学与工程
    • 173 篇 生物工程
    • 166 篇 电气工程
    • 103 篇 光学工程
    • 98 篇 电子科学与技术(可...
    • 90 篇 机械工程
    • 88 篇 生物医学工程(可授...
    • 75 篇 化学工程与技术
    • 58 篇 仪器科学与技术
    • 58 篇 交通运输工程
    • 51 篇 动力工程及工程热...
    • 49 篇 土木工程
    • 45 篇 网络空间安全
    • 44 篇 建筑学
    • 38 篇 安全科学与工程
  • 695 篇 理学
    • 377 篇 数学
    • 194 篇 生物学
    • 160 篇 物理学
    • 115 篇 统计学(可授理学、...
    • 91 篇 化学
    • 56 篇 系统科学
  • 357 篇 管理学
    • 214 篇 管理科学与工程(可...
    • 161 篇 图书情报与档案管...
    • 68 篇 工商管理
  • 99 篇 医学
    • 81 篇 临床医学
    • 60 篇 基础医学(可授医学...
  • 56 篇 法学
    • 42 篇 社会学
  • 41 篇 农学
  • 31 篇 经济学
  • 24 篇 教育学
  • 6 篇 文学
  • 3 篇 军事学
  • 3 篇 艺术学

主题

  • 69 篇 feature extracti...
  • 67 篇 training
  • 65 篇 semantics
  • 64 篇 deep learning
  • 45 篇 predictive model...
  • 43 篇 computational mo...
  • 37 篇 data models
  • 33 篇 convolution
  • 33 篇 accuracy
  • 30 篇 neural networks
  • 28 篇 contrastive lear...
  • 28 篇 machine learning
  • 27 篇 object detection
  • 25 篇 graph neural net...
  • 23 篇 convolutional ne...
  • 22 篇 conferences
  • 22 篇 forecasting
  • 21 篇 reinforcement le...
  • 21 篇 task analysis
  • 21 篇 speech processin...

机构

  • 69 篇 key laboratory o...
  • 55 篇 school of comput...
  • 52 篇 south china univ...
  • 45 篇 school of softwa...
  • 40 篇 school of electr...
  • 39 篇 jiangsu key labo...
  • 37 篇 jiangsu key labo...
  • 35 篇 hunan provincial...
  • 34 篇 chongqing key la...
  • 32 篇 college of big d...
  • 32 篇 key laboratory o...
  • 32 篇 key laboratory o...
  • 32 篇 national enginee...
  • 31 篇 key laboratory o...
  • 30 篇 peng cheng labor...
  • 30 篇 school of comput...
  • 30 篇 jiangsu key labo...
  • 26 篇 beijing key labo...
  • 24 篇 school of comput...
  • 24 篇 university of ch...

作者

  • 38 篇 xu xiaolong
  • 36 篇 tan mingkui
  • 34 篇 wang guoyin
  • 26 篇 xiaolong xu
  • 23 篇 huang qingming
  • 21 篇 xu qianqian
  • 21 篇 hongyan ma
  • 20 篇 shen linlin
  • 16 篇 chen huajun
  • 16 篇 wu qingyao
  • 16 篇 miao qiguang
  • 16 篇 liu yiwen
  • 15 篇 yang zhiyong
  • 14 篇 xia shuyin
  • 13 篇 shang mingsheng
  • 13 篇 shutian liu
  • 13 篇 xianda hou
  • 13 篇 xue xingsi
  • 13 篇 changhong mi
  • 13 篇 hongyan zheng

语言

  • 1,834 篇 英文
  • 107 篇 其他
  • 35 篇 中文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=The Key Laboratory of Big Data and Intelligent Robots"
1964 条 记 录,以下是51-60 订阅
排序:
Subsampling Decomposition based k-Space Refinement for Accelerated MRI Reconstruction
Subsampling Decomposition based k-Space Refinement for Accel...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qiao, Xiaoyu Li, Weisheng Xiao, Bin Huang, Yuping Yang, Lijian Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
In accelerated MRI reconstruction problem, directly recovering all the missing k-space data from undersampled measurements is highly ill-posed and often leads to suboptimal performance. To address the problem, we prop... 详细信息
来源: 评论
Stacking U-Nets in U-shape: Redesigning the Information Flow in Model-based Networks for MRI Reconstruction
Stacking U-Nets in U-shape: Redesigning the Information Flow...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qiao, Xiaoyu Li, Weisheng Xiao, Bin Huang, Yuping Yang, Lijian Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
Model-based networks have shown convincing performance in MRI reconstruction. However, the unrolled cascades within the networks are constrained to solely obtain information from the preceding counterpart, resulting i... 详细信息
来源: 评论
SNNLog: A Log Parsing Scheme with Siamese Network and Fixed Depth Tree in Networks  26
SNNLog: A Log Parsing Scheme with Siamese Network and Fixed ...
收藏 引用
26th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2023
作者: Sun, Lei Xu, Xiaolong Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing210023 China
Syslog records critical information of network when the system is running, and has been used to help practitioners carry out various network maintenance and operation activities. Because of abundance of syslog, automa... 详细信息
来源: 评论
Learning Preconditioners in Gates-controlled Deep Unfolding Networks based on Quasi-Newton Methods For Accelerated MRI Reconstruction
Learning Preconditioners in Gates-controlled Deep Unfolding ...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Qiao, Xiaoyu Li, Weisheng Xiao, Bin Huang, Yuping Yang, Lijian Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing China Key Laboratory of Cyberspace Big Data Intelligent Security Chongqing University of Posts and Telecommunications Ministry of Education Chongqing China
Deep unfolding networks (DUNs) have made significant progress in MRI reconstruction, successfully tackling the problem of prolonged imaging time. However, the ill-conditioned nature of MRI reconstruction often causes ... 详细信息
来源: 评论
Economical Electricity Supplement for Mobile Collectors in Large-Scale Multitask WSNs  21
Economical Electricity Supplement for Mobile Collectors in L...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on big data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Zhai, Xin Xu, Lijie Zhang, Jialei Wang, Kun Xu, Jia Xu, Bei Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing210023 China
For large-scale multitask wireless sensor networks (LSM-WSNs), the traditional data collection mode could suffer low energy-efficiency on data transmission, since the large-scale multitask scenarios could result in mu... 详细信息
来源: 评论
An Evolutionary Multitasking Algorithm for Efficient Multiobjective Recommendations
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第3期6卷 518-532页
作者: Tian, Ye Ji, Luke Hu, Yiwei Ma, Haiping Wu, Le Zhang, Xingyi Anhui University Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Hefei230601 China Anhui University Institutes of Physical Science and Information Technology Hefei230601 China Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data Hefei230029 China
Represented by evolutionary algorithms and swarm intelligence algorithms, nature-inspired metaheuristics have been successfully applied to recommender systems and amply demonstrated effectiveness, in particular, for m... 详细信息
来源: 评论
Knowledge Circuits in Pretrained Transformers  38
Knowledge Circuits in Pretrained Transformers
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Yao, Yunzhi Zhang, Ningyu Xi, Zekun Wang, Mengru Xu, Ziwen Deng, Shumin Chen, Huajun Zhejiang University China National University of Singapore NUS-NCS Joint Lab Singapore Zhejiang Key Laboratory of Big Data Intelligent Computing China
The remarkable capabilities of modern large language models are rooted in their vast repositories of knowledge encoded within their parameters, enabling them to perceive the world and engage in reasoning. The inner wo...
来源: 评论
A Multi-Stream Structure-Enhanced Network for Mesh Denoising
A Multi-Stream Structure-Enhanced Network for Mesh Denoising
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Yang, Yutian Liang, Lingyu Yan, Jie Xu, Yong South China University of Technology Guangzhou510641 China Henan Key Laboratory of Chronic Disease Prevention and Therapy & Intelligent Health Management Henan China Guangdong Provincial Key Laboratory of Multimodal Big Data Intelligent Analysis 510641 China
Triangular meshes provide an efficient representation of 3D shapes. Various applications such as 3D simulation suffer from degradation in geometric quality. This paper proposes a novel Multi-stream Structure-Enhanced ... 详细信息
来源: 评论
Enhancing graph representation learning via type-aware decoupling and node influence allocation
收藏 引用
Applied Intelligence 2025年 第6期55卷 1-14页
作者: Zhu, Guochang Hu, Jun Liu, Li Zhang, Qinghua Wang, Guoyin School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongwen Road Chongqing Chongqing400065 China Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Chongwen Road Chongqing Chongqing400065 China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing400065 China
The traditional graph representation methods can fit the information of graph with low-dimensional vectors, but they cannot interpret their composition, resulting in insufficient security. Graph decoupling, as a metho... 详细信息
来源: 评论
A study of MySQL protocol-based database proxy approval system for fortress machine
收藏 引用
International Journal of data Science 2025年 第1期10卷 96-117页
作者: Zhang, Xian Luo, Xinhui Yin, Dong Qu, Taiguo Li, Hao Huaihua University Huaihua418000 China Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture in Hunan Province Huaihua418000 China Key Laboratory of Wuling-Mountain Health Big Data Intelligent Processing and Application in Hunan Province Universities Hunan Huaihua418000 China Huaihua Tourism School Hunan Huaihua418099 China
With the increase of enterprise informatisation, database security and compliance operation management have become increasingly important. Therefore, it is essential to design an efficient database proxy approval syst...
来源: 评论