咨询与建议

限定检索结果

文献类型

  • 191 篇 会议
  • 167 篇 期刊文献

馆藏范围

  • 358 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 243 篇 工学
    • 175 篇 计算机科学与技术...
    • 137 篇 软件工程
    • 58 篇 信息与通信工程
    • 35 篇 电气工程
    • 33 篇 生物工程
    • 30 篇 控制科学与工程
    • 30 篇 生物医学工程(可授...
    • 21 篇 光学工程
    • 19 篇 电子科学与技术(可...
    • 18 篇 机械工程
    • 14 篇 化学工程与技术
    • 13 篇 动力工程及工程热...
    • 9 篇 网络空间安全
    • 7 篇 环境科学与工程(可...
    • 6 篇 土木工程
    • 6 篇 安全科学与工程
  • 131 篇 理学
    • 61 篇 数学
    • 41 篇 物理学
    • 32 篇 生物学
    • 21 篇 统计学(可授理学、...
    • 18 篇 化学
    • 12 篇 系统科学
  • 64 篇 管理学
    • 36 篇 管理科学与工程(可...
    • 31 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 15 篇 医学
    • 14 篇 临床医学
    • 12 篇 基础医学(可授医学...
    • 7 篇 药学(可授医学、理...
  • 10 篇 法学
    • 7 篇 社会学
  • 7 篇 经济学
    • 7 篇 应用经济学
  • 5 篇 教育学
  • 3 篇 农学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 17 篇 training
  • 12 篇 feature extracti...
  • 11 篇 deep learning
  • 8 篇 machine learning
  • 8 篇 computer vision
  • 7 篇 neural networks
  • 7 篇 accuracy
  • 6 篇 predictive model...
  • 6 篇 federated learni...
  • 6 篇 data models
  • 5 篇 speech processin...
  • 5 篇 data mining
  • 5 篇 contrastive lear...
  • 5 篇 computational mo...
  • 5 篇 decoding
  • 5 篇 visualization
  • 5 篇 blockchain
  • 5 篇 prediction algor...
  • 5 篇 edge computing
  • 5 篇 robustness

机构

  • 35 篇 national enginee...
  • 22 篇 guangdong provin...
  • 18 篇 college of compu...
  • 12 篇 shenzhen institu...
  • 11 篇 key laboratory o...
  • 11 篇 guangdong key la...
  • 10 篇 tianjin key labo...
  • 10 篇 state key labora...
  • 10 篇 school of inform...
  • 9 篇 school of comput...
  • 9 篇 computer vision ...
  • 8 篇 school of inform...
  • 8 篇 dalian universit...
  • 7 篇 state key labora...
  • 6 篇 shandong provinc...
  • 6 篇 computer vision ...
  • 6 篇 intelligent dist...
  • 6 篇 university of ch...
  • 6 篇 computer vision ...
  • 6 篇 engineering rese...

作者

  • 26 篇 shen linlin
  • 12 篇 wang jinbao
  • 10 篇 zhang qiang
  • 10 篇 gao can
  • 9 篇 yu zitong
  • 9 篇 jian-tao zhou
  • 9 篇 wang bin
  • 9 篇 linlin shen
  • 8 篇 bei zeng
  • 8 篇 zhengfeng ji
  • 7 篇 ismail leila
  • 7 篇 zhou shihua
  • 7 篇 materwala huned
  • 6 篇 zhou jie
  • 6 篇 bin wang
  • 6 篇 liu jie
  • 6 篇 qiang zhang
  • 6 篇 dou wanchun
  • 6 篇 leila ismail
  • 6 篇 xie weicheng

语言

  • 303 篇 英文
  • 53 篇 其他
  • 4 篇 中文
检索条件"机构=the Laboratory of Intelligent Computing and Software Engineering"
358 条 记 录,以下是121-130 订阅
排序:
LinNet: linear network for efficient point cloud representation learning  24
LinNet: linear network for efficient point cloud representat...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Hao Deng Kunlei Jing Shengmei Cheng Cheng Liu Jiawei Ru Jiang Bo Lin Wang State-Province Joint Engineering and Research Center of Advanced Networking and Intelligent Information Services School of Information Science and Technology Northwest University and Shaanxi Key Laboratory of Higher Education Institution of Generative Artificial Intelligence and Mixed Reality School of Software Engineering Xi'an Jiaotong University and Department of Computing The Hong Kong Polytechnic University
Point-based methods have made significant progress, but improving their scalability in large-scale 3D scenes is still a challenging problem. In this paper, we delve into the point-based method and develop a simpler, f...
来源: 评论
Nonmonotonic propositional logic
收藏 引用
Frontiers of Computer Science 2021年 第3期15卷 215-216页
作者: Wei LI Yuefei SUI Yuhui WANG State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100191China Key Laboratory of Intelligent Information Processing Institute of Computing TechnologyChinese Academy of SciencesBeijing 100190China School of Computer and Control Engineering University of Chinese Academy of SciencesBeijing 100049China Information Technology Center China Reinsurance(Group)CorporationBeijing 100033China
Propositional logic[1]is basic,based on which other logics are *** deduction system for propositional logic is *** logics are a class of logics which deduction systems are *** ones are default logic[2,3],R-calculus[4]... 详细信息
来源: 评论
A Weighted Flat Lattice Transformer-based Knowledge Extraction Architecture for Chinese Named Entity Recognition
A Weighted Flat Lattice Transformer-based Knowledge Extracti...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Hengwei Zhang Yuejia Wu Jian-Tao Zhou Inner Mongolia University College of Computer Science Hohhot China Ministry of Education National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Engineering Research Center of Ecological Big Data Hohhot China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Hohhot China Inner Mongolia Key Laboratory of Social Computing and Data Processing Hohhot China Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Hohhot China Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
Named Entity Recognition (NER) is one of the contents of Knowledge Extraction (KE) that transforms data into knowledge representation. However, Chinese NER faces the problem of lacking clear word boundaries that limit... 详细信息
来源: 评论
How to Perform Energy-Balanced Underwater Data Collection in AUV-Aided UASNs: A Social Welfare-Based Node Clustering Approach
收藏 引用
IEEE Transactions on Computational Social Systems 2024年
作者: Lin, Chuan Han, Guangjie Lu, Chang Hussain Shah, Syed Bilal Zhang, Yu Wang, Feng Northeastern University Software College Shenyang110819 China Hohai University Key Laboratory of Data Analytics and Optimization for Smart Industry Ministry of Education Nanjing210013 China Hohai University Key Laboratory of Maritime Intelligent Network Information Technology Ministry of Education Nanjing210013 China Dalian University of Technology School of Software Dalian116024 China Dar Al-Hekma University School of Engineering Computing and Informatics Jeddah21589 Saudi Arabia Suzhou Vocational University School of Engineering Suzhou215004 China
The rapid evolution of the Internet of Underwater Things (IoUT) has led to the widespread adoption of autonomous underwater vehicle (AUV)-assisted underwater acoustic sensor networks (UASNs) for various applications s... 详细信息
来源: 评论
Like an Ophthalmologist: Dynamic Selection Driven Multi-View Learning for Diabetic Retinopathy Grading  39
Like an Ophthalmologist: Dynamic Selection Driven Multi-View...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Luo, Xiaoling Xu, Qihao Wu, Huisi Liu, Chengliang Lai, Zhihui Shen, Linlin Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen Key Laboratory of Visual Object Detection and Recognition Harbin Institute of Technology Shenzhen China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
Diabetic retinopathy (DR), with its large patient population, has become a formidable threat to human visual health. In the clinical diagnosis of DR, multi-view fundus images are considered to be more suitable for DR ... 详细信息
来源: 评论
Blockchain-Based Multi-Cloud Data Storage System Disaster Recovery
Blockchain-Based Multi-Cloud Data Storage System Disaster Re...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Feiyu Wang Jian-tao Zhou College of Computer Science Inner Mongolia University Hohhot Inner Mongolia China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Engineering Research Center of Ecological Big Data Ministry of Education National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian China
Cloud storage services have been used by most businesses and individual users. However, data loss, service interruptions and cyber attacks often lead to cloud storage services not being provided properly, and these in...
来源: 评论
BMDP:Blockchain-Based Multi-Cloud Storage Data Provenance
BMDP:Blockchain-Based Multi-Cloud Storage Data Provenance
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Feiyu Wang Jian-Tao Zhou Xu Guo College of Computer Science Inner Mongolia University Hohhot Inner Mongolia China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Engineering Research Center of Ecological Big Data Ministry of Education National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Engineering Laboratory for Big Data Analysis Technology China
In a multi-cloud storage system, provenance data records all operations and ownership during its lifecycle, which is critical for data security and audibility. However, recording provenance data also poses some challe...
来源: 评论
Realizing Emotional Interactions to Learn User Experience and Guide Energy Optimization for Mobile Architectures  22
Realizing Emotional Interactions to Learn User Experience an...
收藏 引用
Proceedings of the 55th Annual IEEE/ACM International Symposium on Microarchitecture
作者: Xueliang Li Zhuobin Shi Junyang Chen Yepang Liu National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China College of Computer Science and Software Engineering Shenzhen University China Research Institute of Trustworthy Autonomous Systems Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation and Department of Computer Science and Engineering Southern University of Science and Technology China
In the age of AI, mobile architectures such as smartphones are still "cold machines"; machines do not feel. If the architecture is able to feel users' feelings and runtime user experience (UX), it will a...
来源: 评论
Emotion Recognition Empowered Human-Computer Interaction with Domain Adaptation Network
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Xu, Xu Fu, Chong Chen, Junxin Northeastern University School of Computer Science and Engineering Shenyang110004 China Dalian University of Technology China The School of Software Dalian116621 China Northeastern University School of Computer Science and Engineering Shenyang110004 China Northeastern University Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Shenyang110819 China Ministry of Education Engineering Research Center of Security Technology of Complex Network System Shenyang110004 China Dalian University of Technology School of Software Dalian116621 China
Multi-modal emotion recognition plays a vital role in the human-computer interaction (HCI) for consumer electronics. Nowadays, many studies have developed multi-modal fusion algorithms for this ***, two challenging is... 详细信息
来源: 评论
GM-DF: Generalized Multi-Scenario Deepfake Detection
arXiv
收藏 引用
arXiv 2024年
作者: Lai, Yingxin Yu, Zitong Yang, Jing Li, Bin Kang, Xiangui Shen, Linlin The School of Computing and Information Technology Great Bay University Dongguan523000 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen University Shenzhen518060 China The Guangdong Key Laboratory of Information Security The School of Computer Science and Engineering Sun Yat-sen University Guangzhou510080 China Computer Vision Institute School of Computer Science & Software Engineering Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China
Existing face forgery detection usually follows the paradigm of training models in a single domain, which leads to limited generalization capacity when unseen scenarios and unknown attacks occur. In this paper, we ela... 详细信息
来源: 评论