咨询与建议

限定检索结果

文献类型

  • 101 篇 期刊文献
  • 8 篇 会议

馆藏范围

  • 109 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 84 篇 工学
    • 60 篇 计算机科学与技术...
    • 30 篇 软件工程
    • 25 篇 信息与通信工程
    • 25 篇 控制科学与工程
    • 19 篇 电气工程
    • 16 篇 机械工程
    • 14 篇 电子科学与技术(可...
    • 10 篇 仪器科学与技术
    • 10 篇 材料科学与工程(可...
    • 8 篇 网络空间安全
    • 3 篇 环境科学与工程(可...
    • 2 篇 光学工程
    • 2 篇 核科学与技术
  • 57 篇 理学
    • 23 篇 数学
    • 16 篇 物理学
    • 11 篇 生物学
    • 10 篇 系统科学
    • 3 篇 天文学
    • 3 篇 大气科学
  • 12 篇 管理学
    • 11 篇 管理科学与工程(可...
  • 10 篇 医学
    • 7 篇 临床医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 公共卫生与预防医...
    • 3 篇 中药学(可授医学、...
  • 7 篇 法学
    • 4 篇 社会学
    • 2 篇 法学
  • 7 篇 文学
    • 3 篇 中国语言文学
    • 3 篇 新闻传播学
  • 6 篇 艺术学
    • 6 篇 设计学(可授艺术学...
  • 5 篇 农学
    • 3 篇 作物学
  • 2 篇 教育学
  • 1 篇 经济学

主题

  • 4 篇 b physics
  • 3 篇 deep learning
  • 3 篇 qcd
  • 3 篇 juno
  • 3 篇 spectroscopy
  • 2 篇 transformer
  • 2 篇 应对措施
  • 2 篇 柳叶刀
  • 2 篇 microscopic imag...
  • 2 篇 clock routing
  • 2 篇 hardware securit...
  • 2 篇 集成电路
  • 2 篇 rare decay
  • 2 篇 non-volatile mem...
  • 2 篇 heavy quark prod...
  • 2 篇 adversarial lear...
  • 2 篇 neutrino oscilla...
  • 2 篇 可靠性
  • 2 篇 人群健康
  • 2 篇 语音合成

机构

  • 36 篇 清华大学
  • 9 篇 university of ch...
  • 8 篇 institute of hig...
  • 7 篇 center for high ...
  • 7 篇 infn sezione di ...
  • 7 篇 instituto de fis...
  • 7 篇 infn sezione di ...
  • 7 篇 infn sezione di ...
  • 7 篇 nsc kharkiv inst...
  • 7 篇 department of co...
  • 7 篇 european organiz...
  • 7 篇 institute of par...
  • 7 篇 infn sezione di ...
  • 7 篇 nikhef national ...
  • 7 篇 oliver lodge lab...
  • 7 篇 i.physikalisches...
  • 7 篇 department of ph...
  • 7 篇 department of co...
  • 6 篇 infn sezione di ...
  • 6 篇 school of physic...

作者

  • 10 篇 蔡莲红
  • 8 篇 e.aslanides
  • 8 篇 j.h.lopes
  • 8 篇 t.maltsev
  • 8 篇 c.burr
  • 8 篇 m.de cian
  • 8 篇 j.hu
  • 8 篇 a.dziurda
  • 8 篇 d.dutta
  • 8 篇 a.palano
  • 8 篇 r.d.moise
  • 8 篇 a.sarti
  • 8 篇 c.gaspar
  • 8 篇 t.blake
  • 8 篇 m.f.cicala
  • 8 篇 l.cojocariu
  • 8 篇 l.anderlini
  • 8 篇 s.escher
  • 8 篇 m.hatch
  • 8 篇 r.calladine

语言

  • 72 篇 英文
  • 37 篇 中文
检索条件"作者=cai lianhong (department of computer science and technology of tsinghua university)"
109 条 记 录,以下是51-60 订阅
排序:
Focusing on your subject:Deep subject-aware image composition recommendation networks
收藏 引用
Computational Visual Media 2023年 第1期9卷 87-107页
作者: Guo-Ye Yang Wen-Yang Zhou Yun cai Song-Hai Zhang Fang-Lue Zhang BNRist Department of Computer Science and TechnologyTsinghua UniversityBeiing 100084China School of Engineering and computer science Victoria University of WellingtonWellington 6012New Zealand
Photo composition is one of the most important factors in the aesthetics of *** a popular application,composition recommendation for a photo focusing on a specific subject has been ignored by recent deep-learning-base... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
SmartPipe: Towards Interoperability of Industrial Applications via Computational Reflection
收藏 引用
Journal of computer science & technology 2020年 第1期35卷 161-178页
作者: Su Zhang Hua-Qian cai Yun Ma Tian-Yue Fan Ying Zhang Gang Huang Key Laboratory of High-Confidence Software technology(Peking university) Ministry of Education Beijing 100871China School of Software Tsinghua UniversityBeijing 100084China Hengyi Petrochemicals CO. LTD.Hangzhou 311215China National Engineering Research Center for Software Engineering Peking UniversityBeijing 100871China
With the advancement of new information technologies,a revolution is being taken place to bring the industry into a new era of intelligent *** of the key requirements of intelligent manufacturing is the interoperabili... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An Improved String-Searching Algorithm and Its Application in Component Security Testing
收藏 引用
tsinghua science and technology 2016年 第3期21卷 281-294页
作者: Jinfu Chen Saihua cai Lili Zhu Yuchi Guo Rubing Huang Xiaolei Zhao Yunqi Sheng School of computer science and Communication Engineering Jiangsu University
Mass monitor logs are produced during the process of component security testing. In order to mine the explicit and implicit security exception information of the tested component, the log should be searched for keywor... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An efficient VLSI architecture of speeded-up robust feature extraction for high resolution and high frame rate video
收藏 引用
science China(Information sciences) 2013年 第7期56卷 136-149页
作者: ZHANG WeiLong LIU LeiBo YIN ShouYi ZHOU RenYan cai ShanShan WEI ShaoJun Institute of Micro-Electronics and the National Laboratory for Information science and technology Tsinghua University
This paper proposes a VLSI architecture of the optimized Speeded-Up Robust Feature (SURF) algorithm. The SURF algorithm which is widely used in computer vision applications, locates interest points (IPoints) and extra... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A single layer zero skew clock routing in X architecture
收藏 引用
science in China(Series F) 2009年 第8期52卷 1466-1475页
作者: SHEN WeiXiang cai YiCi HONG XianLong HU Jiang LU Bing Electronic Design Automation Laboratory Departmeat of Computer Science and Technology Tsinghua University Beijing 100084 China Electrical and computer Engineering Texas A&M University College Station TX 77843 USA Cadence Design Systems Inc 35 Spring Street New Providence NJ 07974 USA
With its advantages in wirelength reduction and routing flexibility compared with conventional Manhattan routing, X architecture has been proposed and applied to modern IC design. As a critical part in high-performanc... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
光学感前计算技术及其卫星遥感应用综述(特邀)
收藏 引用
激光与光电子学进展 2024年 第2期61卷 425-439页
作者: 李天宇 王国庆 李维 陈宏伟 刘勋 王志斌 刘少冲 蔡滟馨 电子科技大学计算机科学与工程学院 四川成都611731 北京空间机电研究所 北京100094 清华大学电子工程系 北京100084
光学感前计算是一种在光电传感器前端的光学域进行信息计算处理的技术,包括编码压缩、全光智能推理等计算范式,具有传输即计算、结构即功能等显著特点,在卫星光学遥感领域有着广泛的应用前景。首先对用于感前计算的光场调制器件进行介绍... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Duple-EDA and sample density balancing
收藏 引用
science in China(Series F) 2009年 第9期52卷 1640-1650页
作者: cai YunPeng XU Hua SUN XiaoMin JIA PeiFa LIU ZeHua State Key Laboratory on Intelligent technology and Systems Tsinghua National Laboratory for Information Science and Technology Department of Computer Science and Technology Tsinghua University Beijing 100084 China School of computer Engineering Nanyang Technological University Singapore 639798 Singapore
In this paper, a new method is proposed to overcome the problem of local optima traps in a class of evolutionary algorithms, called estimation of distribution algorithms (EDAs), in real-valued function optimization.... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Patterns of Chromatin-Modifications Discriminate Different Genomic Features in Arabidopsis
收藏 引用
tsinghua science and technology 2013年 第5期18卷 431-440页
作者: Anuj Srivastava Xiaoyu Zhang Sal LaMarca Liming cai Russell L. Malmberg Institute of Bioinformatics University of Georgia The Jackson Laboratory department of Plant Biology University of Georgia department of computer science University of Georgia
Dynamic regulation and packaging of genetic information is achieved by the organization of DNA into chromatin. Nucleosomal core histones, which form the basic repeating unit of chromatin, are subject to various post-t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Application of optical proximity correction technology
收藏 引用
science in China(Series F) 2008年 第2期51卷 213-224页
作者: cai YiCi ZHOU Qiang HONG XianLong SHI Rui WANG Yang department of computer science and technology Tsinghua University Beijing 100084 China
As process technology scales down to very deep sub-micron (VDSM) in semiconductor manufacturing technology, intrinsic size becomes close to or even shorter than the wavelength used for optical lithography. Thus, som... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Reaction-diffusion modeling of malware propagation in mobile wireless sensor networks
收藏 引用
science China(Information sciences) 2013年 第9期56卷 257-274页
作者: WANG XiaoMing HE ZaoBo ZHAO XueQing LIN Chuang PAN Yi cai ZhiPeng School of computer science Shaanxi Normal University department of computer science and technology Tsinghua University department of computer science Georgia State University
Mobile Wireless Sensor Networks (MWSNs) are employed in many fields, such as intelligent transportation, community health monitoring, and animal behavior monitoring. However, MWSNs may be vulnerable to malicious inter... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论