咨询与建议

限定检索结果

文献类型

  • 5,047 篇 会议
  • 3,480 篇 期刊文献
  • 27 册 图书

馆藏范围

  • 8,554 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,769 篇 工学
    • 4,498 篇 计算机科学与技术...
    • 3,690 篇 软件工程
    • 1,024 篇 信息与通信工程
    • 731 篇 控制科学与工程
    • 482 篇 电气工程
    • 471 篇 生物工程
    • 397 篇 机械工程
    • 364 篇 电子科学与技术(可...
    • 266 篇 光学工程
    • 253 篇 生物医学工程(可授...
    • 204 篇 化学工程与技术
    • 187 篇 仪器科学与技术
    • 168 篇 网络空间安全
    • 164 篇 动力工程及工程热...
    • 155 篇 安全科学与工程
    • 139 篇 建筑学
    • 134 篇 交通运输工程
    • 123 篇 土木工程
  • 2,673 篇 理学
    • 1,707 篇 数学
    • 534 篇 生物学
    • 506 篇 物理学
    • 461 篇 统计学(可授理学、...
    • 327 篇 系统科学
    • 211 篇 化学
  • 1,680 篇 管理学
    • 994 篇 管理科学与工程(可...
    • 750 篇 图书情报与档案管...
    • 302 篇 工商管理
  • 195 篇 医学
    • 158 篇 临床医学
    • 138 篇 基础医学(可授医学...
  • 192 篇 法学
    • 142 篇 社会学
  • 101 篇 经济学
  • 86 篇 教育学
  • 74 篇 农学
  • 27 篇 文学
  • 27 篇 艺术学
  • 24 篇 军事学
  • 2 篇 哲学

主题

  • 292 篇 computer science
  • 271 篇 laboratories
  • 210 篇 semantics
  • 172 篇 feature extracti...
  • 152 篇 computational mo...
  • 140 篇 data mining
  • 137 篇 software
  • 127 篇 training
  • 126 篇 software enginee...
  • 119 篇 algorithm design...
  • 115 篇 deep learning
  • 112 篇 optimization
  • 112 篇 wireless sensor ...
  • 105 篇 educational inst...
  • 100 篇 cloud computing
  • 96 篇 accuracy
  • 92 篇 software testing
  • 90 篇 application soft...
  • 90 篇 testing
  • 88 篇 costs

机构

  • 1,017 篇 state key labora...
  • 214 篇 state key labora...
  • 204 篇 national key lab...
  • 202 篇 department of co...
  • 172 篇 college of compu...
  • 167 篇 department of co...
  • 142 篇 university of ch...
  • 116 篇 tianjin key labo...
  • 116 篇 school of inform...
  • 107 篇 state key labora...
  • 103 篇 college of compu...
  • 102 篇 guangxi key labo...
  • 97 篇 state key labora...
  • 94 篇 beijing key labo...
  • 91 篇 school of comput...
  • 89 篇 key laboratory o...
  • 87 篇 school of softwa...
  • 87 篇 state key labora...
  • 81 篇 shandong provinc...
  • 75 篇 national enginee...

作者

  • 66 篇 gao yang
  • 66 篇 junping du
  • 48 篇 yin baocai
  • 42 篇 shi yinghuan
  • 41 篇 wang wei
  • 39 篇 sanglu lu
  • 38 篇 baocai yin
  • 38 篇 guihai chen
  • 37 篇 zhou zhi-hua
  • 37 篇 baowen xu
  • 34 篇 yu huiqun
  • 34 篇 xu baowen
  • 33 篇 shen linlin
  • 32 篇 dou wanchun
  • 30 篇 shen furao
  • 30 篇 zhang hua
  • 30 篇 zhao jian
  • 29 篇 fan guisheng
  • 29 篇 li wu-jun
  • 28 篇 li xuandong

语言

  • 8,031 篇 英文
  • 266 篇 其他
  • 263 篇 中文
  • 3 篇 德文
  • 1 篇 法文
  • 1 篇 日文
检索条件"机构=Computer Software Technology Laboratory"
8554 条 记 录,以下是1-10 订阅
排序:
Deep learning-based software engineering: progress,challenges, and opportunities
收藏 引用
Science China(Information Sciences) 2025年 第1期68卷 57-144页
作者: Xiangping CHEN Xing HU Yuan HUANG He JIANG Weixing JI Yanjie JIANG Yanyan JIANG Bo LIU Hui LIU Xiaochen LI Xiaoli LIAN Guozhu MENG Xin PENG Hailong SUN Lin SHI Bo WANG Chong WANG Jiayi WANG Tiantian WANG Jifeng XUAN Xin XIA Yibiao YANG Yixin YANG Li ZHANG Yuming ZHOU Lu ZHANG School of Journalism and Communication Sun Yat-sen University School of Software Technology Zhejiang University School of Software Engineering Sun Yat-sen University School of Software Dalian University of Technology School of Computer Science and Technology Beijing Institute of Technology Key Laboratory of High Confidence Software Technologies (Peking University) Ministry of EducationSchool of Computer Science Peking University State Key Laboratory for Novel Software Technology Nanjing University School of Computer Science and Engineering Beihang University Institute of Information Engineering Chinese Academy of Sciences School of Computer Science Fudan University State Key Laboratory of Complex & Critical Software Environment (CCSE) School of Software Beihang University School of Computer and Information Technology Beijing Jiaotong University School of Computer Science and Technology Harbin Institute of Technology School of Computer Science Wuhan University Huawei Technologies
Researchers have recently achieved significant advances in deep learning techniques, which in turn has substantially advanced other research disciplines, such as natural language processing, image processing, speech r... 详细信息
来源: 评论
AsyCo: an asymmetric dual-task co-training model for partial-label learning
收藏 引用
Science China(Information Sciences) 2025年 第5期68卷 332-347页
作者: Beibei LI Yiyuan ZHENG Beihong JIN Tao XIANG Haobo WANG Lei FENG College of Computer Science Chongqing University State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences University of Chinese Academy of Sciences School of Software Technology Zhejiang University School of Computer Science and Engineering Nanyang Technological University
Partial-label learning(PLL) is a typical problem of weakly supervised learning, where each training instance is annotated with a set of candidate labels. Self-training PLL models achieve state-of-the-art performance b... 详细信息
来源: 评论
GTE: learning code AST representation efficiently and effectively
收藏 引用
Science China(Information Sciences) 2025年 第3期68卷 393-394页
作者: Yihao QIN Shangwen WANG Bo LIN Kang YANG Xiaoguang MAO College of Computer Science and Technology National University of Defense Technology Key Laboratory of Software Engineering for Complex Systems National University of Defense Technology
With the development of deep learning in recent years, code representation learning techniques have become the foundation of many software engineering tasks such as program classification [1] and defect detection. Ear...
来源: 评论
Grey-box Adversarial Attack on Communication in Communicative Multi-agent Reinforcement Learning
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4679-4693页
作者: Ma, Xiao Li, Wu-Jun Nanjing University National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing210023 China
Effective communication is a necessary condition for intelligent agents to collaborate in multi-agent environments. Although increasing attention has been paid to communicative multi-agent reinforcement learning (CMAR... 详细信息
来源: 评论
Clustered Reinforcement Learning
收藏 引用
Frontiers of computer Science 2025年 第4期19卷 43-57页
作者: Xiao MA Shen-Yi ZHAO Zhao-Heng YIN Wu-Jun LI National Key Laboratory for Novel Software Technology Department of Computer Science and TechnologyNanjing UniversityNanjing 210023China Department of Electrical Engineering and Computer Sciences University of CaliforniaBerkeleyCA 94720-1770USA
Exploration strategy design is a challenging problem in reinforcement learning(RL),especially when the environment contains a large state space or sparse *** exploration,the agent tries to discover unexplored(novel)ar... 详细信息
来源: 评论
FMCC-RT: a scalable and fine-grained all-reduce algorithm for large-scale SMP clusters
收藏 引用
Science China(Information Sciences) 2025年 第5期68卷 362-379页
作者: Jintao PENG Jie LIU Jianbin FANG Min XIE Yi DAI Zhiquan LAI Bo YANG Chunye GONG Xinjun MAO Guo MAO Jie REN School of Computer Science and Technology National University of Defense Technology Science and Technology on Parallel and Distributed Processing Laboratory National University of Defense Technology Laboratory of Digitizing Software for Frontier Equipment National University of Defense Technology National Supercomputer Center in Tianjin School of Computer Science Shaanxi Normal University
All-reduce is a widely used communication technique for distributed and parallel applications typically implemented using either a tree-based or ring-based scheme. Each of these approaches has its own limitations: tre... 详细信息
来源: 评论
Through-Wall Mobile Charging: Theory, Methodology, and Implementation
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 4971-4986页
作者: Sun, Yu Lin, Chi Yang, Wei Dai, Haipeng Ren, Jiankang Wang, Lei Wu, Guowei Dalian University of Technology School of Software Technology Dalian116024 China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Dalian116621 China Nanjing University State Key Laboratory for Novel Software Technology Jiangsu Nanjing210023 China Dalian University of Technology School of Computer Science and Technology Dalian116024 China
Wireless Power Transfer (WPT) has revolutionized the field of Wireless Rechargeable Sensor Networks (WRSNs), enabling sustainable operation of sensor nodes. Traditional mobile charging methods often require sensors to... 详细信息
来源: 评论
Accurate 3D Wireless Charging
收藏 引用
IEEE Transactions on Mobile Computing 2025年 第6期24卷 4733-4746页
作者: Yang, Wei Lin, Chi Sun, Yu Dai, Haipeng Ren, Jiankang Wang, Lei Wu, Guowei Dalian University of Technology Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province DUT School of Software Technology DUT-RU International School of Information Science and Engineering Dalian China Nanjing University State Key Laboratory for Novel Software Technology Jiangsu Nanjing210023 China Dalian University of Technology School of Computer Science and Technology Dalian116024 China
Wireless Rechargeable Sensor Networks (WRSNs) have become an important research issue as they can overcome the energy bottleneck problem of wireless sensor networks. However, existing 2D charging methods suffer from s... 详细信息
来源: 评论
FedMPS: A Robust Differential Privacy Federated Learning based on Local Model Partition and Sparsification for Heterogeneous IIoT Data
收藏 引用
IEEE Internet of Things Journal 2025年 第10期12卷 13757-13768页
作者: Wang, Danxin Gao, Yuyang Pang, Shanchen Zhang, Chen Zhang, Xiaoman Li, Ming School of Qingdao Institute of Software College of Computer Science and Technology Shandong Key Laboratory of Intelligent Oil and Gas Industrial Software Qingdao China Shandong Inspur Database Technology Co. Ltd Jinan China
In the emerging Industrial Internet of Things (IIoT) applications, Federated Learning (FL) enables model training without the need to transmit raw data directly. Nevertheless, transmitting model parameters could still... 详细信息
来源: 评论
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1399-1414页
作者: Xixi Yan Jing Zhang Pengyu Cheng Henan Key Laboratory of Network Cryptography Technology Network Information Security and Cryptography LaboratorySchool of SoftwareHenan Polytechnic UniversityJiaozuo454003China School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo454000China
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... 详细信息
来源: 评论