咨询与建议

限定检索结果

文献类型

  • 320,071 篇 会议
  • 155,795 篇 期刊文献
  • 3,748 册 图书
  • 2,607 篇 学位论文
  • 514 篇 专利

馆藏范围

  • 482,729 篇 电子文献
  • 30 种 纸本馆藏

日期分布

学科分类号

  • 310,254 篇 工学
    • 222,721 篇 计算机科学与技术...
    • 148,618 篇 软件工程
    • 53,020 篇 电气工程
    • 44,459 篇 信息与通信工程
    • 31,686 篇 控制科学与工程
    • 28,245 篇 电子科学与技术(可...
    • 20,410 篇 机械工程
    • 17,374 篇 材料科学与工程(可...
    • 15,158 篇 化学工程与技术
    • 14,328 篇 生物工程
    • 12,414 篇 动力工程及工程热...
    • 12,016 篇 仪器科学与技术
    • 11,088 篇 生物医学工程(可授...
    • 10,562 篇 光学工程
    • 10,404 篇 力学(可授工学、理...
    • 10,017 篇 土木工程
    • 8,029 篇 建筑学
    • 6,600 篇 交通运输工程
    • 6,447 篇 安全科学与工程
  • 130,740 篇 理学
    • 65,377 篇 数学
    • 41,618 篇 物理学
    • 20,317 篇 生物学
    • 16,970 篇 化学
    • 14,374 篇 统计学(可授理学、...
    • 11,058 篇 系统科学
  • 59,070 篇 管理学
    • 40,233 篇 管理科学与工程(可...
    • 20,868 篇 图书情报与档案管...
    • 17,021 篇 工商管理
  • 16,408 篇 医学
    • 12,067 篇 临床医学
    • 8,242 篇 基础医学(可授医学...
  • 7,424 篇 法学
  • 6,848 篇 教育学
  • 6,303 篇 经济学
  • 5,590 篇 农学
  • 1,688 篇 文学
  • 886 篇 军事学
  • 650 篇 艺术学
  • 148 篇 哲学
  • 94 篇 历史学

主题

  • 27,472 篇 computer science
  • 19,657 篇 application soft...
  • 14,965 篇 software
  • 10,823 篇 computational mo...
  • 10,234 篇 software enginee...
  • 10,169 篇 computer archite...
  • 9,684 篇 hardware
  • 6,461 篇 costs
  • 6,423 篇 parallel process...
  • 6,262 篇 feature extracti...
  • 5,739 篇 testing
  • 5,692 篇 data mining
  • 5,656 篇 deep learning
  • 5,424 篇 educational inst...
  • 5,339 篇 training
  • 5,313 篇 algorithm design...
  • 5,158 篇 protocols
  • 5,139 篇 semantics
  • 4,869 篇 machine learning
  • 4,763 篇 concurrent compu...

机构

  • 3,551 篇 nanjing univ sta...
  • 2,531 篇 shenzhen univ co...
  • 1,638 篇 state key labora...
  • 1,609 篇 university of ch...
  • 1,364 篇 nanjing univ inf...
  • 1,224 篇 college of compu...
  • 1,178 篇 tsinghua univ sc...
  • 1,072 篇 univ chinese aca...
  • 1,067 篇 department of co...
  • 1,002 篇 chinese acad sci...
  • 970 篇 dalian univ tech...
  • 956 篇 norwegian univer...
  • 901 篇 chinese acad sci...
  • 859 篇 univ elect sci &...
  • 750 篇 shandong univ sc...
  • 738 篇 school of softwa...
  • 716 篇 school of inform...
  • 711 篇 beihang univ sta...
  • 678 篇 university of sc...
  • 659 篇 school of comput...

作者

  • 651 篇 wang wei
  • 468 篇 wang lei
  • 411 篇 liu yang
  • 390 篇 zhang lei
  • 324 篇 li li
  • 324 篇 yang yang
  • 288 篇 wang hao
  • 279 篇 liu jie
  • 267 篇 liu wei
  • 243 篇 zhang wei
  • 218 篇 wang jian
  • 218 篇 li bo
  • 215 篇 gao yang
  • 214 篇 shen linlin
  • 203 篇 yin baocai
  • 198 篇 chen chen
  • 188 篇 wang tao
  • 178 篇 leung victor c. ...
  • 173 篇 wang qing
  • 172 篇 zhang jian

语言

  • 448,556 篇 英文
  • 25,768 篇 其他
  • 6,871 篇 中文
  • 856 篇 日文
  • 314 篇 德文
  • 105 篇 法文
  • 74 篇 俄文
  • 61 篇 朝鲜文
  • 45 篇 西班牙文
  • 20 篇 葡萄牙文
  • 14 篇 斯洛文尼亚文
  • 13 篇 阿拉伯文
  • 12 篇 荷兰文
  • 11 篇 土耳其文
  • 6 篇 乌克兰文
  • 4 篇 意大利文
  • 1 篇 拉托维亚文(列托)
  • 1 篇 波兰文
  • 1 篇 罗马尼亚文
检索条件"机构=(Laboratory of Parallel Software and Computational Science)"
482735 条 记 录,以下是3901-3910 订阅
排序:
Intelligent-Based Extraction of Business Capabilities from Company Descriptions  7
Intelligent-Based Extraction of Business Capabilities from C...
收藏 引用
7th International Conference on Information Technology, Information Systems and Electrical Engineering, ICITISEE 2023
作者: Fahmi, Faisal Hamid, Siti Hafizah Ab Yuadi, Imam Airlangga University Faculty of Political and Social Science Department of Library and Information Science Indonesia Universiti Malaya Faculty of Computer Science & Information Technology Department of Software Engineering Malaysia
In the era of Big Data, Information can be generated, extracted, and utilized in diverse ways. In business, information about business capabilities can be a crucial aspect in understanding the strengths and competenci... 详细信息
来源: 评论
Text and Image Are Mutually Beneficial: Enhancing Training-Free Few-Shot Classification with CLIP  39
Text and Image Are Mutually Beneficial: Enhancing Training-F...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Li, Yayuan Guo, Jintao Qi, Lei Li, Wenbin Shi, Yinghuan National Key Laboratory for Novel Software Technology Nanjing University China School of Computer Science and Engineering Southeast University China
Contrastive Language-Image Pretraining (CLIP) has been widely used in vision tasks. Notably, CLIP has demonstrated promising performance in few-shot learning (FSL). However, existing CLIP-based methods in training-fre... 详细信息
来源: 评论
Accelerating Brain Simulations with the Fast Multipole Method  28th
Accelerating Brain Simulations with the Fast Multipole Metho...
收藏 引用
28th International Conference on parallel and Distributed Computing (Euro-Par)
作者: Noettgen, Hannah Czappa, Fabian Wolf, Felix Tech Univ Darmstadt Lab Parallel Programming Darmstadt Germany
The brain is probably the most complex organ in the human body. To understand processes such as learning or healing after brain lesions, we need suitable tools for brain simulations. The Model of Structural Plasticity... 详细信息
来源: 评论
Automatic Code Summarization Using Abbreviation Expansion and Subword Segmentation
收藏 引用
EXPERT SYSTEMS 2025年 第2期42卷
作者: Liang, Yu-Guo Fan, Gui-Sheng Yu, Hui-Qun Li, Ming-Chen Huang, Zi-Jie East China Univ Sci & Technol Sch Informat Sci & Engn Shanghai Peoples R China Shanghai Dev Ctr Comp Software Technol Shanghai Key Lab Comp Software Testing & Evaluatin Shanghai Peoples R China
Automatic code summarization refers to generating concise natural language descriptions for code snippets. It is vital for improving the efficiency of program understanding among software developers and maintainers. D... 详细信息
来源: 评论
SPRSPS: An Effective Preprocessing Framework to Enhance Vulnerability Detection in Deep Learning Models  24
SPRSPS: An Effective Preprocessing Framework to Enhance Vuln...
收藏 引用
4th Asia-Pacific Artificial Intelligence and Big Data Forum, AIBDF 2024
作者: Wang, Jiarui Guo, Wensheng Yang, Xia Sun, Haiyong School of Information and Software Engineering University of Electronic Science and Technology of China Sichuan Chengdu China Chengdu Lianan Tech Sichuan Chengdu China
Current vulnerability detection methods based on deep learning and program slicing techniques are widely used, but the program representations and slicing strategies they employ are not well-suited for this purpose. T... 详细信息
来源: 评论
Dancer: Dynamic Compression and Quantization Architecture for Deep Graph Convolutional Network
Dancer: Dynamic Compression and Quantization Architecture fo...
收藏 引用
Design, Automation and Test in Europe Conference and Exhibition
作者: Yunhao Dong Zhaoyu Zhong Yi Wang Chenlin Ma Tianyu Wang College of Computer Science and Software Engineering Shenzhen University Shenzhen China State Key Laboratory of Radio Frequency Heterogeneous Integration
Graph Convolutional Networks (GCNs) have been widely applied in fields such as social network analysis and recommendation systems. Recently, deep GCNs have emerged, enabling the exploration of deeper hidden informatio... 详细信息
来源: 评论
A generative adversarial network based on an efficient transformer for high-fidelity flow field reconstruction
收藏 引用
PHYSICS OF FLUIDS 2024年 第7期36卷
作者: Shen, Liming Deng, Liang Liu, Xuliang Wang, Yueqing Chen, Xinhai Liu, Jie Natl Univ Def Technol Lab Digitizing Software Frontier Equipment Changsha 410000 Peoples R China Natl Univ Def Technol Sci & Technol Parallel & Distributed Proc Lab Changsha 410000 Peoples R China China Aerodynam Res & Dev Ctr State Key Lab Aerodynam Mianyang 621000 Peoples R China China Aerodynam Res & Dev Ctr Computat Aerodynam Inst Mianyang 621000 Peoples R China
The reconstruction of high-fidelity flow fields from low-fidelity data has attracted considerable attention in fluid dynamics but poses many challenges to existing deep learning methods due to the spatiotemporal compl... 详细信息
来源: 评论
Truthful Double Auction-Based Resource Allocation Mechanisms for Latency-Sensitive Applications in Edge Clouds  18th
Truthful Double Auction-Based Resource Allocation Mechanisms...
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Wu, Dongkuo Wang, Xueyi Wang, Xingwei Huang, Min Wang, Zhitong College of Computer Science and Engineering Northeastern University Liaoning Shenyang China College of Software Northeastern University Liaoning Shenyang China College of Information Science and Engineering Northeastern University Liaoning Shenyang China
With the rapid advancement of wireless networks, edge computing has emerged as a promising paradigm for providing computing services to nearby latency-sensitive applications. Toward this trend, resource trading market... 详细信息
来源: 评论
Isolating Compiler Faults through Differentiated Compilation Configurations
收藏 引用
IEEE Transactions on software Engineering 2025年 第6期51卷 1838-1853页
作者: Yang, Yibiao Li, Qingyang Sun, Maolin Yang, Jing Wu, Jiangchang Zhou, Yuming Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China
Compilation optimization bugs are prevalent and can significantly affect the correctness of software products, posing serious challenges to software development. Identifying and localizing these bugs are critical task... 详细信息
来源: 评论
The Emergence of IIoT and its Cyber Security Issues in Critical Information Infrastructure  21
The Emergence of IIoT and its Cyber Security Issues in Criti...
收藏 引用
21st European Conference on Cyber Warfare and Security, ECCWS 2022
作者: Bhaiyat, Humairaa Yacoob Sithungu, Siphesihle Philezwini Academy of Computer Science and Software Engineering Faculty of Science University of Johannesburg South Africa
The emergence of the Industrial Internet of Things (IIoT) can transform and improve industrial domain processes. This is achieved by IIoT’s ability to collect and process vast amounts of data using technology such as... 详细信息
来源: 评论