咨询与建议

限定检索结果

文献类型

  • 319,861 篇 会议
  • 156,548 篇 期刊文献
  • 3,758 册 图书
  • 2,841 篇 学位论文
  • 514 篇 专利
  • 141 篇 科技报告

馆藏范围

  • 483,658 篇 电子文献
  • 30 种 纸本馆藏

日期分布

学科分类号

  • 310,053 篇 工学
    • 223,427 篇 计算机科学与技术...
    • 149,140 篇 软件工程
    • 52,233 篇 电气工程
    • 44,712 篇 信息与通信工程
    • 32,248 篇 控制科学与工程
    • 27,672 篇 电子科学与技术(可...
    • 20,455 篇 机械工程
    • 16,395 篇 材料科学与工程(可...
    • 15,165 篇 化学工程与技术
    • 14,400 篇 生物工程
    • 12,469 篇 动力工程及工程热...
    • 12,088 篇 仪器科学与技术
    • 11,099 篇 生物医学工程(可授...
    • 10,725 篇 光学工程
    • 10,373 篇 力学(可授工学、理...
    • 10,031 篇 土木工程
    • 8,032 篇 建筑学
    • 6,641 篇 交通运输工程
    • 6,489 篇 安全科学与工程
  • 131,381 篇 理学
    • 65,408 篇 数学
    • 41,665 篇 物理学
    • 20,393 篇 生物学
    • 16,933 篇 化学
    • 14,237 篇 统计学(可授理学、...
    • 11,072 篇 系统科学
  • 59,351 篇 管理学
    • 40,395 篇 管理科学与工程(可...
    • 20,958 篇 图书情报与档案管...
    • 17,066 篇 工商管理
  • 16,719 篇 医学
    • 12,167 篇 临床医学
    • 8,267 篇 基础医学(可授医学...
  • 7,476 篇 法学
  • 6,863 篇 教育学
  • 6,333 篇 经济学
  • 5,753 篇 农学
  • 1,693 篇 文学
  • 887 篇 军事学
  • 646 篇 艺术学
  • 147 篇 哲学
  • 95 篇 历史学

主题

  • 27,545 篇 computer science
  • 19,620 篇 application soft...
  • 14,962 篇 software
  • 10,769 篇 computational mo...
  • 10,187 篇 software enginee...
  • 10,152 篇 computer archite...
  • 9,648 篇 hardware
  • 6,407 篇 costs
  • 6,387 篇 parallel process...
  • 6,230 篇 feature extracti...
  • 5,724 篇 testing
  • 5,692 篇 data mining
  • 5,672 篇 deep learning
  • 5,398 篇 educational inst...
  • 5,316 篇 training
  • 5,306 篇 algorithm design...
  • 5,144 篇 protocols
  • 5,125 篇 semantics
  • 5,005 篇 machine learning
  • 4,714 篇 concurrent compu...

机构

  • 3,546 篇 nanjing univ sta...
  • 2,522 篇 shenzhen univ co...
  • 1,624 篇 state key labora...
  • 1,612 篇 university of ch...
  • 1,353 篇 nanjing univ inf...
  • 1,222 篇 college of compu...
  • 1,175 篇 tsinghua univ sc...
  • 1,081 篇 department of co...
  • 1,072 篇 univ chinese aca...
  • 976 篇 chinese acad sci...
  • 960 篇 norwegian univer...
  • 956 篇 dalian univ tech...
  • 899 篇 chinese acad sci...
  • 857 篇 univ elect sci &...
  • 750 篇 shandong univ sc...
  • 740 篇 school of softwa...
  • 711 篇 school of inform...
  • 711 篇 beihang univ sta...
  • 678 篇 university of sc...
  • 647 篇 school of comput...

作者

  • 663 篇 wang wei
  • 468 篇 wang lei
  • 410 篇 liu yang
  • 387 篇 zhang lei
  • 327 篇 li li
  • 320 篇 yang yang
  • 280 篇 liu jie
  • 273 篇 wang hao
  • 269 篇 liu wei
  • 254 篇 zhang wei
  • 213 篇 chen chen
  • 212 篇 li bo
  • 210 篇 wang jian
  • 205 篇 gao yang
  • 204 篇 shen linlin
  • 199 篇 yin baocai
  • 193 篇 wang tao
  • 184 篇 wang qing
  • 179 篇 leung victor c. ...
  • 175 篇 li yang

语言

  • 460,646 篇 英文
  • 14,664 篇 其他
  • 6,867 篇 中文
  • 860 篇 日文
  • 293 篇 德文
  • 80 篇 法文
  • 65 篇 俄文
  • 59 篇 朝鲜文
  • 45 篇 西班牙文
  • 20 篇 葡萄牙文
  • 15 篇 意大利文
  • 10 篇 荷兰文
  • 10 篇 土耳其文
  • 8 篇 阿拉伯文
  • 8 篇 斯洛文尼亚文
  • 6 篇 乌克兰文
  • 1 篇 拉托维亚文(列托)
  • 1 篇 波兰文
检索条件"机构=(Laboratory of Parallel Software and Computational Science)"
483663 条 记 录,以下是591-600 订阅
排序:
PsmArena:Partitioned Shared Memory for NUMA-Awareness in Multithreaded Scientific Applications
收藏 引用
Tsinghua science and Technology 2021年 第3期26卷 287-295页
作者: Zhang Yang Aiqing Zhang Zeyao Mo Laboratory of Computational Physics Institute of Applied Physics and Computational MathematicsBeijing 100088China
The Distributed Shared Memory(DSM)architecture is widely used in today’s computer design to mitigate the ever-widening processing-memory gap,and it inevitably exhibits Non-Uniform Memory Access(NUMA)to shared-memory ... 详细信息
来源: 评论
Time Series Data Cleaning under Expressive Constraints on Both Rows and Columns  40
Time Series Data Cleaning under Expressive Constraints on Bo...
收藏 引用
40th IEEE International Conference on Data Engineering, ICDE 2024
作者: Ding, Xiaoou Li, Genglong Wang, Hongzhi Wang, Chen Song, Yichen School of Computer Science and Technology Harbin Institute of Technology China Tsinghua University National Engineering Laboratory for Big Data Software EIRI China
Time series data generated by thousands of sensors are suffering data quality problems. Traditional constraint-based techniques have greatly contributed to data cleaning applications. However, cleaning methods that su... 详细信息
来源: 评论
Session Types with Multiple Senders Single Receiver  9th
Session Types with Multiple Senders Single Receiver
收藏 引用
9th International Symposium on Dependable software Engineering: Theories, Tools and Applications, SETTA 2023
作者: Ji, Zekun Wang, Shuling Xu, Xiong State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Message passing is a fundamental element in software development, ranging from concurrent and mobile computing to distributed services, but it suffers from communication errors such as deadlocks. Session types are a t... 详细信息
来源: 评论
GreenB plus Tree: an energy-efficient B plus tree for MIMD architectures
收藏 引用
CCF TRANSACTIONS ON HIGH PERFORMANCE COMPUTING 2025年 第1期7卷 72-84页
作者: Peng, Muchun Wang, Qinglin Liang, Yuechao Guo, Weihao Yang, Shun Liang, Yaling Shi, Yongzhen Cao, Ligang Liu, Jie Natl Universe Def Technol Lab Digitizing Software Frontier Equipment Yanwachi St Changsha 410073 Hunan Peoples R China Natl Universe Def Technol Natl Key Lab Parallel & Distributed Comp Yanwachi St Changsha 410073 Hunan Peoples R China
In the current data-intensive landscape, B+trees are crucial data structures utilized across various fields like databases and web indexing. With the rise of data explosion, the demand for high-performance real-time q... 详细信息
来源: 评论
Expression Recognition and Intelligent Classroom State Mining in Teaching Videos Based on Semi-Supervised Learning Generative Adversarial Network  5
Expression Recognition and Intelligent Classroom State Minin...
收藏 引用
5th International Conference on Data-Driven Optimization of Complex Systems, DOCS 2023
作者: Fan, Ruoyu Liang, Meiyu Yin, Mengran Du, Junping Multimedia School of Computer Science National Pilot Software Engineering School Beijing University of Posts and Telecommunications Beijing Key Laboratory of Intelligent Communication Software Beijing China
We constructed a student classroom teaching video dataset, constructed a student classroom expression dataset through video frame extraction, face detection, face alignment, and facial extraction, and constructed a st... 详细信息
来源: 评论
Active self-training for weakly supervised 3D scene semantic segmentation
收藏 引用
computational Visual Media 2024年 第3期10卷 425-438页
作者: Gengxin Liu Oliver van Kaick Hui Huang Ruizhen Hu College of Computer Science&Software Engineering Shenzhen UniversityShenzhen 518060China School of Computer Science Carleton UniversityOttawa K1S 5B6Canada
Since the preparation of labeled datafor training semantic segmentation networks of pointclouds is a time-consuming process, weakly supervisedapproaches have been introduced to learn fromonly a small fraction of data.... 详细信息
来源: 评论
A Microservices Architecture Toolkit for Interconnected science Ecosystems
A Microservices Architecture Toolkit for Interconnected Scie...
收藏 引用
2024 Workshops of the International Conference for High Performance Computing, Networking, Storage and Analysis, SC Workshops 2024
作者: Brim, Michael J. Drane, Lance Mcdonnell, Marshall Engelmann, Christian Thakur, Addi Malviya Oak Ridge National Laboratory National Center for Computational Sciences Oak RidgeTN United States Oak Ridge National Laboratory Computer Science and Mathematics Division Oak RidgeTN United States
Microservices architecture is a promising approach for developing reusable scientific workflow capabilities for integrating diverse resources, such as experimental and observational instruments and advanced computatio... 详细信息
来源: 评论
Temporal Perceiver: A General Architecture for Arbitrary Boundary Detection
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2023年 第10期45卷 12506-12520页
作者: Tan, Jing Wang, Yuhong Wu, Gangshan Wang, Limin Nanjing University The State Key Laboratory for Novel Software Technology Jiangsu Nanjing210023 China
Generic Boundary Detection (GBD) aims at locating the general boundaries that divide videos into semantically coherent and taxonomy-free units, and could serve as an important pre-processing step for long-form video u... 详细信息
来源: 评论
A Cover-Independent Deep Image Hiding Method Based on Domain Attention Mechanism
收藏 引用
Computers, Materials & Continua 2024年 第3期78卷 3001-3019页
作者: Nannan Wu Xianyi Chen James Msughter Adeke Junjie Zhao School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044China School of Electronics and Information Engineering Nanjing University of Information Science and TechnologyNanjing210044China
Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information ***,these approaches have some *** example,a cover image lacks self-adaptability,inform... 详细信息
来源: 评论
Testing Constraint Checking Implementations via Principled Metamorphic Transformations  31
Testing Constraint Checking Implementations via Principled M...
收藏 引用
31st IEEE International Conference on software Analysis, Evolution and Reengineering, SANER 2024
作者: Gao, Mingchen Wang, Huiyan Xu, Chang Nanjing University State Key Laboratory for Novel Software Technology Nanjing China Nanjing University Department of Computer Science and Technology Nanjing China
Constraint checking techniques are being widely used for ensuring the consistency of software artifacts during their development and evolution (e.g., detecting inconsistency in an application's running contexts or... 详细信息
来源: 评论