咨询与建议

限定检索结果

文献类型

  • 319,861 篇 会议
  • 156,548 篇 期刊文献
  • 3,758 册 图书
  • 2,841 篇 学位论文
  • 514 篇 专利
  • 141 篇 科技报告

馆藏范围

  • 483,658 篇 电子文献
  • 30 种 纸本馆藏

日期分布

学科分类号

  • 310,053 篇 工学
    • 223,427 篇 计算机科学与技术...
    • 149,140 篇 软件工程
    • 52,233 篇 电气工程
    • 44,712 篇 信息与通信工程
    • 32,248 篇 控制科学与工程
    • 27,672 篇 电子科学与技术(可...
    • 20,455 篇 机械工程
    • 16,395 篇 材料科学与工程(可...
    • 15,165 篇 化学工程与技术
    • 14,400 篇 生物工程
    • 12,469 篇 动力工程及工程热...
    • 12,088 篇 仪器科学与技术
    • 11,099 篇 生物医学工程(可授...
    • 10,725 篇 光学工程
    • 10,373 篇 力学(可授工学、理...
    • 10,031 篇 土木工程
    • 8,032 篇 建筑学
    • 6,641 篇 交通运输工程
    • 6,489 篇 安全科学与工程
  • 131,381 篇 理学
    • 65,408 篇 数学
    • 41,665 篇 物理学
    • 20,393 篇 生物学
    • 16,933 篇 化学
    • 14,237 篇 统计学(可授理学、...
    • 11,072 篇 系统科学
  • 59,351 篇 管理学
    • 40,395 篇 管理科学与工程(可...
    • 20,958 篇 图书情报与档案管...
    • 17,066 篇 工商管理
  • 16,719 篇 医学
    • 12,167 篇 临床医学
    • 8,267 篇 基础医学(可授医学...
  • 7,476 篇 法学
  • 6,863 篇 教育学
  • 6,333 篇 经济学
  • 5,753 篇 农学
  • 1,693 篇 文学
  • 887 篇 军事学
  • 646 篇 艺术学
  • 147 篇 哲学
  • 95 篇 历史学

主题

  • 27,545 篇 computer science
  • 19,620 篇 application soft...
  • 14,962 篇 software
  • 10,769 篇 computational mo...
  • 10,187 篇 software enginee...
  • 10,152 篇 computer archite...
  • 9,648 篇 hardware
  • 6,407 篇 costs
  • 6,387 篇 parallel process...
  • 6,230 篇 feature extracti...
  • 5,724 篇 testing
  • 5,692 篇 data mining
  • 5,672 篇 deep learning
  • 5,398 篇 educational inst...
  • 5,316 篇 training
  • 5,306 篇 algorithm design...
  • 5,144 篇 protocols
  • 5,125 篇 semantics
  • 5,005 篇 machine learning
  • 4,714 篇 concurrent compu...

机构

  • 3,546 篇 nanjing univ sta...
  • 2,522 篇 shenzhen univ co...
  • 1,624 篇 state key labora...
  • 1,612 篇 university of ch...
  • 1,353 篇 nanjing univ inf...
  • 1,222 篇 college of compu...
  • 1,175 篇 tsinghua univ sc...
  • 1,081 篇 department of co...
  • 1,072 篇 univ chinese aca...
  • 976 篇 chinese acad sci...
  • 960 篇 norwegian univer...
  • 956 篇 dalian univ tech...
  • 899 篇 chinese acad sci...
  • 857 篇 univ elect sci &...
  • 750 篇 shandong univ sc...
  • 740 篇 school of softwa...
  • 711 篇 school of inform...
  • 711 篇 beihang univ sta...
  • 678 篇 university of sc...
  • 647 篇 school of comput...

作者

  • 663 篇 wang wei
  • 468 篇 wang lei
  • 410 篇 liu yang
  • 387 篇 zhang lei
  • 327 篇 li li
  • 320 篇 yang yang
  • 280 篇 liu jie
  • 273 篇 wang hao
  • 269 篇 liu wei
  • 254 篇 zhang wei
  • 213 篇 chen chen
  • 212 篇 li bo
  • 210 篇 wang jian
  • 205 篇 gao yang
  • 204 篇 shen linlin
  • 199 篇 yin baocai
  • 193 篇 wang tao
  • 184 篇 wang qing
  • 179 篇 leung victor c. ...
  • 175 篇 li yang

语言

  • 460,646 篇 英文
  • 14,664 篇 其他
  • 6,867 篇 中文
  • 860 篇 日文
  • 293 篇 德文
  • 80 篇 法文
  • 65 篇 俄文
  • 59 篇 朝鲜文
  • 45 篇 西班牙文
  • 20 篇 葡萄牙文
  • 15 篇 意大利文
  • 10 篇 荷兰文
  • 10 篇 土耳其文
  • 8 篇 阿拉伯文
  • 8 篇 斯洛文尼亚文
  • 6 篇 乌克兰文
  • 1 篇 拉托维亚文(列托)
  • 1 篇 波兰文
检索条件"机构=(Laboratory of Parallel Software and Computational Science)"
483663 条 记 录,以下是4361-4370 订阅
排序:
Incremental software Product Line Verification - A Performance Analysis with Dead Variable Code
Incremental Software Product Line Verification - A Performan...
收藏 引用
2023 Fachtagung des GI-Fachbereichs softwaretechnik, software Engineering 2023 - 2023 Conference of the GI software Engineering Division, software Engineering 2023
作者: Kröher, Christian Flöter, Moritz Gerling, Lea Schmid, Klaus University of Hildesheim Institute of Computer Science Software Systems Engineering Universitätsplatz 1 Hildesheim31141 Germany
In this work, we summarize our journal paper published in Empirical software Engineering (EMSE) in 2022 [Kr22]. Verification approaches for software Product Lines (SPL) aim at detecting variability-related defects and... 详细信息
来源: 评论
Demo2Test: Transfer Testing of Agent in Competitive Environment with Failure Demonstrations
收藏 引用
ACM TRANSACTIONS ON software ENGINEERING AND METHODOLOGY 2025年 第2期34卷 1-28页
作者: Chen, Jianming Wang, Yawen Wang, Junjie Xie, Xiaofei Wang, Dandan Wang, Qing Xu, Fanjiang Chinese Acad Sci Inst Software Beijing Peoples R China Singapore Management Univ Singapore Singapore
The competitive game between agents exists in many critical applications, such as military unmanned aerial vehicles. It is urgent to test these agents to reduce the significant losses caused by their failures. Existin... 详细信息
来源: 评论
An Improved GAN-based Depth Estimation Network for Face Anti-Spoofing  23
An Improved GAN-based Depth Estimation Network for Face Anti...
收藏 引用
9th International Conference on Computing and Artificial Intelligence, ICCAI 2023
作者: Zhang, Zongjie Cheng, Haibo Li, Wenting Wang, Ping School of Software and Microelectronics Peking University Beijing China School of Computer Science Peking University Beijing China
Face spoofing is a serious threat to the security of face recognition and face anti-spoofing (FAS) has become one of the popular research directions recently. The pipeline of modern face anti-spoofing methods is to tr... 详细信息
来源: 评论
ALF - Ambient Assisted Living for Healthcare Framework Based on IoMT and Big Data  7th
ALF - Ambient Assisted Living for Healthcare Framework Based...
收藏 引用
7th International Conference on Smart City Applications, SCA 2022
作者: Zahoor, Kanwal Bawany, Narmeen Zakaria Center for Computing Research Department of Computer Science and Software Engineering Jinnah University for Women Karachi74600 Pakistan
A rapid technology change has significant opportunities for almost every industry, especially for healthcare. By using advanced network technologies and Internet of Medical Things (IoMT) devices, health professionals ... 详细信息
来源: 评论
Enhancing Recommendation Effect through Knowledge Graph and Similarity Attention Mechanisms  3
Enhancing Recommendation Effect through Knowledge Graph and ...
收藏 引用
3rd International Conference on Electronic Information Engineering and Computer science, EIECS 2023
作者: Gu, Fangming Zhao, Weiqi Zheng, Haojie Fu, Huanzhao Lin, Hongyu Jilin University College of Computer Science and Technology Changchun China Jilin University College of Software Changchun China
To enhance the performance of recommendation models, numerous researchers have turned to knowledge graphs as auxiliary information. Nevertheless, prevailing recommendation methods primarily focus on utilizing knowledg... 详细信息
来源: 评论
Wafer Map Defect Recognition and Accurate Localization Based on Defect Completion Algorithm  10
Wafer Map Defect Recognition and Accurate Localization Based...
收藏 引用
10th IEEE International Conference on Cybernetics and Intelligent Systems and IEEE Conference on Robotics, Automation and Mechatronics, CIS-RAM 2023
作者: Sang, Tong Sun, Dai Zhao, Wei Chen, Ruohui Zeng, Zeng Shanghai University School of Microelectronics Shanghai China University of Science and Technology of China School of Software Hefei China
In order to achieve high quality monitoring and yield management, wafer defect detection for key processes has become a common consensus in advanced semiconductor manufacturing. The accuracy of wafer defect detection ... 详细信息
来源: 评论
Variational Auto-Encoder Model and Federated Approach for Non-Intrusive Load Monitoring in Smart Homes  28
Variational Auto-Encoder Model and Federated Approach for No...
收藏 引用
28th IEEE Symposium on Computers and Communications, ISCC 2023
作者: Kaspour, Shamisa Yassine, Abdulsalam Department of Computer Science Thunder Bay Canada Lakehead University Department of Software Engineering Thunder Bay Canada
Non-Intrusive Load Monitoring (NILM) is a technique used for identifying individual appliances' energy consumption from a household's total power usage. This study examines a novel energy disaggregation model ... 详细信息
来源: 评论
Application of Internet of Things Technology in Smart Home System
Application of Internet of Things Technology in Smart Home S...
收藏 引用
2023 International Conference on Computer, Artificial Intelligence, and Control Engineering, CAICE 2023
作者: Yang, Chang College of Computer Science and Technology College of Artificial Intelligence College of Software Nanjing University of Aeronautics and Astronautics China
In order to improve the construction of smart home system and create a smart home environment for users. This paper studies the application of Internet of Things technology in smart home system. This paper expounds th... 详细信息
来源: 评论
Implementation of an Effective Framework in Merging Cybersecurity and software Engineering  6
Implementation of an Effective Framework in Merging Cybersec...
收藏 引用
6th International Conference of Women in Data science at Prince Sultan University, WiDS-PSU 2023
作者: Alhuqail, Sara Khalid Jamail, Nor Shahida Mohd Prince Sultan University College of Computer Science and Information Sciences Department of Software Engineering Riyadh Saudi Arabia
Cyberattacks have increased. Security throughout software development reduces the program's attack surface. Despite several fixes. new research indicates software security weaknesses and hackers are rising. SSD se... 详细信息
来源: 评论
On the Limits of Decision: the Adjacent Fragment of First-Order Logic  50
On the Limits of Decision: the Adjacent Fragment of First-Or...
收藏 引用
50th International Colloquium on Automata, Languages, and Programming, ICALP 2023
作者: Bednarczyk, Bartosz Kojelis, Daumantas Pratt-Hartmann, Ian Computational Logic Group Technische Universität Dresden Germany Institute of Computer Science University of Wroclaw Poland Department of Computer Science University of Manchester United Kingdom Institute of Computer Science University of Opole Poland
We define the adjacent fragment AF of first-order logic, obtained by restricting the sequences of variables occurring as arguments in atomic formulas. The adjacent fragment generalizes (after a routine renaming) two-v... 详细信息
来源: 评论