咨询与建议

限定检索结果

文献类型

  • 319,861 篇 会议
  • 156,548 篇 期刊文献
  • 3,758 册 图书
  • 2,841 篇 学位论文
  • 514 篇 专利
  • 141 篇 科技报告

馆藏范围

  • 483,658 篇 电子文献
  • 30 种 纸本馆藏

日期分布

学科分类号

  • 310,053 篇 工学
    • 223,427 篇 计算机科学与技术...
    • 149,140 篇 软件工程
    • 52,233 篇 电气工程
    • 44,712 篇 信息与通信工程
    • 32,248 篇 控制科学与工程
    • 27,672 篇 电子科学与技术(可...
    • 20,455 篇 机械工程
    • 16,395 篇 材料科学与工程(可...
    • 15,165 篇 化学工程与技术
    • 14,400 篇 生物工程
    • 12,469 篇 动力工程及工程热...
    • 12,088 篇 仪器科学与技术
    • 11,099 篇 生物医学工程(可授...
    • 10,725 篇 光学工程
    • 10,373 篇 力学(可授工学、理...
    • 10,031 篇 土木工程
    • 8,032 篇 建筑学
    • 6,641 篇 交通运输工程
    • 6,489 篇 安全科学与工程
  • 131,381 篇 理学
    • 65,408 篇 数学
    • 41,665 篇 物理学
    • 20,393 篇 生物学
    • 16,933 篇 化学
    • 14,237 篇 统计学(可授理学、...
    • 11,072 篇 系统科学
  • 59,351 篇 管理学
    • 40,395 篇 管理科学与工程(可...
    • 20,958 篇 图书情报与档案管...
    • 17,066 篇 工商管理
  • 16,719 篇 医学
    • 12,167 篇 临床医学
    • 8,267 篇 基础医学(可授医学...
  • 7,476 篇 法学
  • 6,863 篇 教育学
  • 6,333 篇 经济学
  • 5,753 篇 农学
  • 1,693 篇 文学
  • 887 篇 军事学
  • 646 篇 艺术学
  • 147 篇 哲学
  • 95 篇 历史学

主题

  • 27,545 篇 computer science
  • 19,620 篇 application soft...
  • 14,962 篇 software
  • 10,769 篇 computational mo...
  • 10,187 篇 software enginee...
  • 10,152 篇 computer archite...
  • 9,648 篇 hardware
  • 6,407 篇 costs
  • 6,387 篇 parallel process...
  • 6,230 篇 feature extracti...
  • 5,724 篇 testing
  • 5,692 篇 data mining
  • 5,672 篇 deep learning
  • 5,398 篇 educational inst...
  • 5,316 篇 training
  • 5,306 篇 algorithm design...
  • 5,144 篇 protocols
  • 5,125 篇 semantics
  • 5,005 篇 machine learning
  • 4,714 篇 concurrent compu...

机构

  • 3,546 篇 nanjing univ sta...
  • 2,522 篇 shenzhen univ co...
  • 1,624 篇 state key labora...
  • 1,612 篇 university of ch...
  • 1,353 篇 nanjing univ inf...
  • 1,222 篇 college of compu...
  • 1,175 篇 tsinghua univ sc...
  • 1,081 篇 department of co...
  • 1,072 篇 univ chinese aca...
  • 976 篇 chinese acad sci...
  • 960 篇 norwegian univer...
  • 956 篇 dalian univ tech...
  • 899 篇 chinese acad sci...
  • 857 篇 univ elect sci &...
  • 750 篇 shandong univ sc...
  • 740 篇 school of softwa...
  • 711 篇 school of inform...
  • 711 篇 beihang univ sta...
  • 678 篇 university of sc...
  • 647 篇 school of comput...

作者

  • 663 篇 wang wei
  • 468 篇 wang lei
  • 410 篇 liu yang
  • 387 篇 zhang lei
  • 327 篇 li li
  • 320 篇 yang yang
  • 280 篇 liu jie
  • 273 篇 wang hao
  • 269 篇 liu wei
  • 254 篇 zhang wei
  • 213 篇 chen chen
  • 212 篇 li bo
  • 210 篇 wang jian
  • 205 篇 gao yang
  • 204 篇 shen linlin
  • 199 篇 yin baocai
  • 193 篇 wang tao
  • 184 篇 wang qing
  • 179 篇 leung victor c. ...
  • 175 篇 li yang

语言

  • 460,646 篇 英文
  • 14,664 篇 其他
  • 6,867 篇 中文
  • 860 篇 日文
  • 293 篇 德文
  • 80 篇 法文
  • 65 篇 俄文
  • 59 篇 朝鲜文
  • 45 篇 西班牙文
  • 20 篇 葡萄牙文
  • 15 篇 意大利文
  • 10 篇 荷兰文
  • 10 篇 土耳其文
  • 8 篇 阿拉伯文
  • 8 篇 斯洛文尼亚文
  • 6 篇 乌克兰文
  • 1 篇 拉托维亚文(列托)
  • 1 篇 波兰文
检索条件"机构=(Laboratory of Parallel Software and Computational Science)"
483663 条 记 录,以下是1051-1060 订阅
排序:
Inferential Statistical Analysis of Performance Portability  1
收藏 引用
14th International Conference on parallel Processing and Applied Mathematics, PPAM 2022
作者: Marowka, Ami Parallel Research Lab Haifa Israel
The assessment of the performance portability of hybrid programming models is based on many unverifiable observations. Drawing from the assessment by knowledgeable analysts, subjective conclusions from unverifiable da... 详细信息
来源: 评论
Phishing detection on Ethereum via transaction subgraphs embedding
IET Blockchain
收藏 引用
IET Blockchain 2023年 第4期3卷 194-203页
作者: Lv, Haifeng Ding, Yong Guangxi Key Laboratory of Machine Vision and Intelligent Control WuZhou University Wuzhou China Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guangxi Colleges and Universities Key Laboratory of Industry Software Technology WuZhou University Wuzhou China
With the rapid development of blockchain technology in the financial sector, the security of blockchain is being put to the test due to an increase in phishing fraud. Therefore, it is essential to study more effective... 详细信息
来源: 评论
Focus & Gating: A Multimodal Approach for Unveiling Relations in Noisy Social Media  24
Focus & Gating: A Multimodal Approach for Unveiling Relation...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: He, Liang Wang, Hongke Wu, Zhen Zhang, Jianbing Dai, Xinyu Chen, Jiajun National Key Laboratory for Novel Software Technology Nanjing University Jiangsu Nanjing China
Multimedia content's surge on the internet has made multimodal relation extraction vital for applications like intelligent search and knowledge graph construction. As a rich source of image-text data, social media... 详细信息
来源: 评论
Issue Title Generation: How Far Can Large Language Models Go?
Issue Title Generation: How Far Can Large Language Models Go...
收藏 引用
2024 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2024
作者: Yang, Jun Liu, Shifan He, Qifan Xie, Songcheng Cui, Zhanqi School of Computer Science Beijing Information Science and Technology University Beijing100101 China Nanjing University of Aeronautics and Astronautics Key Laboratory of Safety-Critical Software Ministry of Industry and Information Technology Nanjing210016 China
In open-source software and platforms, developers utilize issues to record software failures or propose new features. The title of an issue, which is a mandatory field, should accurately describe the core content in a... 详细信息
来源: 评论
An Efficient Maximal Ancestral Graph Listing Algorithm  41
An Efficient Maximal Ancestral Graph Listing Algorithm
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Wang, Tian-Zuo Du, Wen-Bo Zhou, Zhi-Hua National Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China
Maximal ancestral graph (MAG) is a prevalent graphical model to characterize causal relations in the presence of latent variables including latent confounders and selection variables. Given observational data, only a ... 详细信息
来源: 评论
DCI-Net: Remote Sensing Image-Based Object Detector  27th
DCI-Net: Remote Sensing Image-Based Object Detector
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Cui, Quanyue Lu, Jun College of Computer Science and Technology Heilongjiang University Harbin150080 China Jiaxiang Industrial Technology Research Institute of Heilongjiang University Shandong Jining272400 China Key Laboratory of Database and Parallel Computing of Heilongjiang Province Heilongjiang University Harbin150080 China
Recently the analysis of remotely sensed images has played a vital role in various aspects of research. The current researches ignore the unique prior knowledge in remote sensing images and do not consider exploring t... 详细信息
来源: 评论
Quantum Attacks on Type-3 Generalized Feistel Scheme and Unbalanced Feistel Scheme with Expanding Functions
收藏 引用
Chinese Journal of Electronics 2023年 第2期32卷 209-216页
作者: ZHANG Zhongya WU Wenling SUI Han WANG Bolin Trusted Computing and Information Assurance Laboratory Institute of Software Chinese Academy of Sciences University of Chinese Academy of Sciences Luoyang Normal University State Key Laboratory of Cryptology
Quantum algorithms are raising concerns in the field of cryptography all over the world. A growing number of symmetric cryptography algorithms have been attacked in the quantum setting. Type-3 generalized Feistel sche... 详细信息
来源: 评论
A Single Source Generalization Model via Spatial Amplitude Perturbation and Sensitivity Guidance for Colored Medical Image Segmentation  27th
A Single Source Generalization Model via Spatial Amplitude ...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Yang, Zeyuan Yu, Chunyan College of Computer and Data Science/College of Software Fuzhou University Fuzhou350108 China
For medical images, domain shift is a very common phenomenon. To address this issue, researchers have proposed unsupervised domain adaptation and multi-source domain generalization. However, these methods are sometime... 详细信息
来源: 评论
An Efficient DDOS Attack Detection in software-Defined Networks Using Enhanced Long Short-Term Memory  5
An Efficient DDOS Attack Detection in Software-Defined Netwo...
收藏 引用
5th International Conference on Electronics and Sustainable Communication Systems, ICESC 2024
作者: Nivethithai, S. Hariharan, B. Srm Institute of Science and Technology Department of Computer Science Kattankulathur India School of Computing Srm Institute of Science and Technology Department of Computational Intelligence Kattankulathur India
software-defined networking (SDN) offers enhanced control over network infrastructure through a central controller, but it remains vulnerable to security threats like DDoS attacks. This paper proposes an automatic att... 详细信息
来源: 评论
Ethical Aspects of ChatGPT in software Engineering Research
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第2期6卷 254-267页
作者: Akbar, Muhammad Azeem Khan, Arif Ali Liang, Peng Lappeenranta-Lahti University of Technology Software Engineering Department Lappeenranta15210 Finland University of Oulu M3S Empirical Software Engineering Research Unit Oulu90014 Finland Wuhan University School of Computer Science Wuhan430072 China
ChatGPT can improve software engineering (SE) research practices by offering efficient, accessible information analysis, and synthesis based on natural language interactions. However, ChatGPT could bring ethical chall... 详细信息
来源: 评论