×
验证码:
换一张
忘记密码?
记住我
×
登录
中文版
|
English
中国科学院计算技术研究所机构知识库
Institute of Computing Technology, Chinese Academy IR
登录
注册
ALL
ORCID
题名
作者
学科领域
关键词
文献类型
出处
收录类别
出版者
发表日期
存缴日期
资助项目
学科门类
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
新闻&公告
在结果中检索
研究单元&专题
中国科学院计算技... [597]
作者
Wang, Yin... [26]
Li, Xiaow... [25]
Li, Huawe... [24]
Gao, Lin [21]
Wang, Zha... [21]
Xia, Shih... [19]
更多...
文献类型
期刊论文 [597]
发表日期
2024 [49]
2023 [49]
2022 [48]
2021 [37]
2020 [45]
2019 [27]
更多...
语种
英语 [593]
中文 [4]
出处
JOURNAL ... [188]
IEEE TRAN... [66]
Journal o... [38]
FRONTIERS... [32]
COMPUTER ... [31]
IEEE TRAN... [24]
更多...
资助项目
Youth Inn... [24]
National ... [15]
National ... [14]
National ... [12]
National N... [9]
973 Progra... [7]
更多...
收录类别
SCI [551]
其他 [37]
资助机构
×
知识图谱
CSpace
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共597条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
WOS被引频次升序
WOS被引频次降序
提交时间升序
提交时间降序
期刊影响因子升序
期刊影响因子降序
题名升序
题名降序
发表日期升序
发表日期降序
Audio-guided self-supervised learning for disentangled visual speech representations
期刊论文
FRONTIERS OF COMPUTER SCIENCE, 2024, 卷号: 18, 期号: 6, 页码: 3
作者:
Feng, Dalu
;
Yang, Shuang
;
Shan, Shiguang
;
Chen, Xilin
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2024/12/06
Evaluation of tumor budding with virtual panCK stains generated by novel multi-model CNN framework
期刊论文
COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2024, 卷号: 257, 页码: 18
作者:
Hou, Xingzhong
;
Guan, Zhen
;
Zhang, Xianwei
;
Hu, Xiao
;
Zou, Shuangmei
;
Liang, Chunzi
;
Shi, Lulin
;
Zhang, Kaitai
;
You, Haihang
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2024/12/06
Virtual Stain
Stain-to-stain transformation
Multi-model framework
Explainable AI
Tumor budding
DiSAuth: A DNS-based secure authorization framework for protecting data decoupled from applications
期刊论文
COMPUTER NETWORKS, 2024, 卷号: 254, 页码: 18
作者:
Li, Ying
;
Wei, Jiuqi
;
Fei, Ziyu
;
Fu, Yufan
;
Lee, Xiaodong
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2024/12/06
Authorization
Data security and privacy
DNS
Blockchain
Securing the internet's backbone: A blockchain-based and incentive-driven architecture for DNS cache poisoning defense
期刊论文
COMPUTER NETWORKS, 2024, 卷号: 254, 页码: 18
作者:
Fu, Yufan
;
Lee, Xiaodong
;
Wei, Jiuqi
;
Li, Ying
;
Peng, Botao
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2024/12/06
DNS
Cache poisoning attack
Blockchain
Smart contract
Incentive mechanism
Wavelet-based selection-and-recalibration network for Parkinson's disease screening in OCT images
期刊论文
COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2024, 卷号: 256, 页码: 13
作者:
Huang, Jingqi
;
Zhang, Xiaoqing
;
Jin, Richu
;
Xu, Tao
;
Jin, Zi
;
Shen, Meixiao
;
Lv, Fan
;
Chen, Jiangfan
;
Liu, Jiang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2024/12/06
Deep learning
Parkinson's disease screening
Discrete wavelet transform
A survey of automated negotiation: Human factor, learning, and application
期刊论文
COMPUTER SCIENCE REVIEW, 2024, 卷号: 54, 页码: 39
作者:
Luo, Xudong
;
Li, Yanling
;
Huang, Qiaojuan
;
Zhan, Jieyu
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2024/12/06
Automated negotiation
Artificial intelligence
Electronic commerce
Intelligent agent
Fuzzy logic and constraint
Machine learning
Human-computer interaction
A resource-aware workload scheduling method for unbalanced GEMMs on GPUs
期刊论文
COMPUTER JOURNAL, 2024, 页码: 10
作者:
Liu, Hangda
;
Diao, Boyu
;
Chen, Wenxin
;
Xu, Yongjun
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2024/12/06
Diffusion-based Human Motion Style Transfer with Semantic Guidance
期刊论文
COMPUTER GRAPHICS FORUM, 2024, 页码: 12
作者:
Hu, Lei
;
Zhang, Zihao
;
Ye, Yongjing
;
Xu, Yiwen
;
Xia, Shihong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2024/12/06
CCS Concepts
center dot
Computing methodologies
->
Motion processing
Artificial intelligence
DRTP: A generic Differentiated Reliable Transport Protocol
期刊论文
COMPUTER COMMUNICATIONS, 2024, 卷号: 226, 页码: 13
作者:
Ren, Yongmao
;
Zhang, Yundong
;
Yin, Ming
;
Xu, Anmin
;
Zhou, Xu
;
Li, Cong
;
Qin, Yifang
;
Wu, Qinghua
;
Kaafar, Mohamed Ali
;
Xie, Gaogang
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2024/12/06
DRTP
Transport protocols
Differentiated reliable transport
Partially reliable transport
Congestion control
Millimeter Wave communications
On Modeling and Detecting Trojans in Instruction Sets
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 10, 页码: 3226-3239
作者:
Zhang, Ying
;
He, Aodi
;
Li, Jiaying
;
Rezine, Ahmed
;
Peng, Zebo
;
Larsson, Erik
;
Yang, Tao
;
Jiang, Jianhui
;
Li, Huawei
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2024/12/06
Trojan horses
Security
Program processors
Companies
Inspection
Hardware security
Reverse engineering
Deep test for security
hidden instruction Trojan (HIT)
unbounded model checking (UMC)
VLSI test