咨询与建议

限定检索结果

文献类型

  • 318,868 篇 会议
  • 155,661 篇 期刊文献
  • 3,749 册 图书
  • 2,841 篇 学位论文
  • 514 篇 专利
  • 141 篇 科技报告

馆藏范围

  • 481,769 篇 电子文献
  • 29 种 纸本馆藏

日期分布

学科分类号

  • 308,521 篇 工学
    • 222,378 篇 计算机科学与技术...
    • 148,623 篇 软件工程
    • 52,012 篇 电气工程
    • 44,494 篇 信息与通信工程
    • 31,705 篇 控制科学与工程
    • 27,511 篇 电子科学与技术(可...
    • 20,348 篇 机械工程
    • 16,231 篇 材料科学与工程(可...
    • 15,055 篇 化学工程与技术
    • 14,371 篇 生物工程
    • 12,417 篇 动力工程及工程热...
    • 12,039 篇 仪器科学与技术
    • 11,071 篇 生物医学工程(可授...
    • 10,690 篇 光学工程
    • 10,314 篇 力学(可授工学、理...
    • 9,943 篇 土木工程
    • 7,958 篇 建筑学
    • 6,576 篇 交通运输工程
    • 6,467 篇 安全科学与工程
  • 130,893 篇 理学
    • 65,277 篇 数学
    • 41,493 篇 物理学
    • 20,332 篇 生物学
    • 16,822 篇 化学
    • 14,205 篇 统计学(可授理学、...
    • 11,055 篇 系统科学
  • 59,193 篇 管理学
    • 40,296 篇 管理科学与工程(可...
    • 20,894 篇 图书情报与档案管...
    • 17,032 篇 工商管理
  • 16,626 篇 医学
    • 12,109 篇 临床医学
    • 8,209 篇 基础医学(可授医学...
  • 7,466 篇 法学
  • 6,843 篇 教育学
  • 6,328 篇 经济学
  • 5,724 篇 农学
  • 1,693 篇 文学
  • 885 篇 军事学
  • 643 篇 艺术学
  • 148 篇 哲学
  • 94 篇 历史学

主题

  • 27,531 篇 computer science
  • 19,620 篇 application soft...
  • 14,863 篇 software
  • 10,741 篇 computational mo...
  • 10,134 篇 computer archite...
  • 10,092 篇 software enginee...
  • 9,645 篇 hardware
  • 6,393 篇 costs
  • 6,380 篇 parallel process...
  • 6,181 篇 feature extracti...
  • 5,707 篇 testing
  • 5,656 篇 data mining
  • 5,599 篇 deep learning
  • 5,397 篇 educational inst...
  • 5,306 篇 algorithm design...
  • 5,247 篇 training
  • 5,116 篇 protocols
  • 5,106 篇 semantics
  • 4,963 篇 machine learning
  • 4,714 篇 concurrent compu...

机构

  • 3,537 篇 nanjing univ sta...
  • 2,513 篇 shenzhen univ co...
  • 1,605 篇 state key labora...
  • 1,571 篇 university of ch...
  • 1,355 篇 nanjing univ inf...
  • 1,178 篇 college of compu...
  • 1,173 篇 tsinghua univ sc...
  • 1,075 篇 department of co...
  • 1,071 篇 univ chinese aca...
  • 987 篇 chinese acad sci...
  • 968 篇 dalian univ tech...
  • 959 篇 norwegian univer...
  • 899 篇 chinese acad sci...
  • 853 篇 univ elect sci &...
  • 744 篇 shandong univ sc...
  • 735 篇 school of softwa...
  • 711 篇 beihang univ sta...
  • 700 篇 school of inform...
  • 667 篇 university of sc...
  • 641 篇 school of comput...

作者

  • 661 篇 wang wei
  • 465 篇 wang lei
  • 407 篇 liu yang
  • 381 篇 zhang lei
  • 323 篇 li li
  • 315 篇 yang yang
  • 278 篇 liu jie
  • 275 篇 liu wei
  • 273 篇 wang hao
  • 242 篇 zhang wei
  • 214 篇 chen chen
  • 210 篇 li bo
  • 207 篇 wang jian
  • 204 篇 gao yang
  • 199 篇 yin baocai
  • 197 篇 shen linlin
  • 193 篇 wang tao
  • 182 篇 wang qing
  • 177 篇 leung victor c. ...
  • 175 篇 li yang

语言

  • 463,015 篇 英文
  • 10,670 篇 其他
  • 6,700 篇 中文
  • 854 篇 日文
  • 349 篇 德文
  • 153 篇 法文
  • 61 篇 俄文
  • 56 篇 朝鲜文
  • 43 篇 西班牙文
  • 26 篇 意大利文
  • 20 篇 葡萄牙文
  • 12 篇 荷兰文
  • 10 篇 土耳其文
  • 7 篇 斯洛文尼亚文
  • 6 篇 波兰文
  • 6 篇 乌克兰文
  • 4 篇 阿拉伯文
  • 1 篇 拉托维亚文(列托)
检索条件"机构=(Laboratory of Parallel Software and Computational Science)"
481774 条 记 录,以下是4661-4670 订阅
排序:
A robust watermarking algorithm against JPEG compression based on multiscale autoencoder
收藏 引用
IET IMAGE PROCESSING 2024年 第2期18卷 455-469页
作者: Zhang, Wei Chen, Rongrong Wang, Bin Dalian Univ Sch Software Engn Key Lab Adv Design & Intelligent Comp Dalian Peoples R China Dalian Univ Sch Software Engn Key Lab Adv Designand Intelligent Comp Dalian 116622 Peoples R China
The network structure of digital watermarking algorithm based on deep learning is usually encoder-noise layer-decoder. Most of the existing encoders suffer from the problem of insufficient feature extraction, and the ... 详细信息
来源: 评论
Deep API Sequence Generation via Golden Solution Samples and API Seeds
收藏 引用
ACM TRANSACTIONS ON software ENGINEERING AND METHODOLOGY 2025年 第2期34卷 1-21页
作者: Huang, Yuekai Wang, Junjie Wang, Song Wei, Moshi Shi, Lin Li, Zhe Wang, Qing Inst Software Chinese Acad Sci State Key Lab Intelligent Game Beijing Peoples R China Inst Software Chinese Acad Sci Sci & Technol Integrated Informat Syst Lab Beijing Peoples R China Univ Chinese Acad Sci Inst Software Chinese Acad Sci Beijing Peoples R China York Univ Toronto ON Canada Beihang Univ Beijing Peoples R China
Automatic API recommendation can accelerate developers' programming and has been studied for years. There are two orthogonal lines of approaches for this task, i.e., information retrieval-based (IR-based) approach... 详细信息
来源: 评论
Reformulating Key-Information Extraction as Next Sentence Prediction for Hierarchical Data
Reformulating Key-Information Extraction as Next Sentence Pr...
收藏 引用
18th International Conference on Document Analysis and Recognition (ICDAR)
作者: Kubade, Ashish Akundi, Prathyusha Mohd, Bilal Arif Syed Perfios Software Solut Private Ltd Bengaluru India
We present a reformulation of the Key-Information Extraction (KIE) problem from document images, as a Next-Sentence Prediction (NSP) task for identifying information in hierarchically structured data. KIE implemented ... 详细信息
来源: 评论
Can Evolutionary Clustering Have Theoretical Guarantees?
收藏 引用
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION 2024年 第5期28卷 1220-1234页
作者: Qian, Chao Nanjing Univ State Key Lab Novel Software Technol Nanjing 210023 Peoples R China
Clustering is a fundamental problem in many areas, which aims to partition a given data set into groups based on some distance measure, such that the data points in the same group are similar while that in different g... 详细信息
来源: 评论
Maximizing the Influence in Dynamic Social Networks: An Entropy-Based Linear Threshold Model  9
Maximizing the Influence in Dynamic Social Networks: An Entr...
收藏 引用
9th IEEE International Conference on Cyber Security and Cloud Computing and 8th IEEE International Conference on Edge Computing and Scalable Cloud, CSCloud-EdgeCom 2022
作者: Liu, Zekun Yu, Jianyong Liu, Yuqi Zhu, Hangyu Hunan University of Science and Technology Hunan Key Laboratory for Service Computing and Novel Software Technology School of Computer Science and Engineering Xiangtan China Guangdong Qilian Technology Co. Ltd Guangzhou China
Various communication methods allow modern people to communicate with each other more frequently, resulting in a more diverse network structure in today's social network due to its own dynamics. Compared with the ... 详细信息
来源: 评论
Testing the Limits: Unusual Text Inputs Generation for Mobile App Crash Detection with Large Language Model  24
Testing the Limits: Unusual Text Inputs Generation for Mobil...
收藏 引用
44th ACM/IEEE International Conference on software Engineering, ICSE 2024
作者: Liu, Zhe Chen, Chunyang Wang, Junjie Chen, Mengzhuo Wu, Boyu Tian, Zhilin Huang, Yuekai Hu, Jun Wang, Qing State Key Laboratory of Intelligent Game Beijing China Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Technical University of Munich Munich Germany DiDi Global Inc The Pennsylvania State University Work Done during the Internship at Iscas United States Science & Technology on Integrated Information System Laboratory China
Mobile applications have become a ubiquitous part of our daily life, providing users with access to various services and utilities. Text input, as an important interaction channel between users and applications, plays... 详细信息
来源: 评论
An Overview of Techniques for Obfuscated Android Malware Detection
收藏 引用
SN Computer science 2024年 第4期5卷 328页
作者: Siddiqui, Sidra Khan, Tamim Ahmed Department of Software Engineering Bahria University Islamabad Pakistan
Obfuscation is a method to hide coding strategies for security and privacy. Despite its positive use, malware experts have also used this technique to develop malware applications. A variety of malware has taken over ... 详细信息
来源: 评论
An efficient energy-aware and service quality improvement strategy applied in cloud computing
收藏 引用
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS software TOOLS AND APPLICATIONS 2023年 第6期26卷 4031-4049页
作者: Wang, Jinjiang Yu, Junyang Song, Yixin He, Xin Song, Yalin Henan Univ Sch Software Kaifeng 475000 Henan Peoples R China
Reducing the energy consumption while guaranteeing the quality of service (QoS) in the cloud data centers is challenge task for cloud providers. Dynamic virtual machine (VM) consolidation technology is regarded as a p... 详细信息
来源: 评论
Multimodal Sentiment Analysis under modality deficiency with prototype-Augmentation in software engineering  30
Multimodal Sentiment Analysis under modality deficiency with...
收藏 引用
30th IEEE International Conference on software Analysis, Evolution and Reengineering (SANER)
作者: Wang, Baolei Zhang, Xuan Du, Kunpeng Yunnan Univ Sch Software Kunming Peoples R China Yunnan Univ Sch Software Yunnan Key Lab Software Engn Kunming Peoples R China
Sentiment analysis has a wide range of promising applications in software engineering, and the development of deep learning has demonstrated that the uniform representation of different modalities can improve the mode... 详细信息
来源: 评论
Collaborative Estimating Multiple Gaussian Graphical Models on Resource Constrained Devices in IoT Networks
Collaborative Estimating Multiple Gaussian Graphical Models ...
收藏 引用
2023 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2023
作者: Zhan, Ying Wang, Beilun School of Software Engineering Southeast University Nanjing China School of Computer Science and Engineering Southeast University Nanjing China
In recent years, the rapid development of the Internet of Things (IoT) has attracted significant interest in smart healthcare. However, such collaborative IoT applications still face three major challenges: multi-task... 详细信息
来源: 评论