咨询与建议

限定检索结果

文献类型

  • 5,083 篇 会议
  • 3,486 篇 期刊文献
  • 28 册 图书

馆藏范围

  • 8,597 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,765 篇 工学
    • 4,487 篇 计算机科学与技术...
    • 3,674 篇 软件工程
    • 1,021 篇 信息与通信工程
    • 722 篇 控制科学与工程
    • 469 篇 电气工程
    • 469 篇 生物工程
    • 397 篇 机械工程
    • 365 篇 电子科学与技术(可...
    • 266 篇 光学工程
    • 251 篇 生物医学工程(可授...
    • 204 篇 化学工程与技术
    • 189 篇 仪器科学与技术
    • 167 篇 动力工程及工程热...
    • 162 篇 网络空间安全
    • 153 篇 安全科学与工程
    • 142 篇 建筑学
    • 134 篇 交通运输工程
    • 127 篇 土木工程
  • 2,677 篇 理学
    • 1,713 篇 数学
    • 530 篇 生物学
    • 510 篇 物理学
    • 463 篇 统计学(可授理学、...
    • 326 篇 系统科学
    • 211 篇 化学
  • 1,680 篇 管理学
    • 1,002 篇 管理科学与工程(可...
    • 741 篇 图书情报与档案管...
    • 309 篇 工商管理
  • 195 篇 医学
    • 160 篇 临床医学
    • 138 篇 基础医学(可授医学...
  • 194 篇 法学
    • 144 篇 社会学
  • 101 篇 经济学
  • 86 篇 教育学
  • 72 篇 农学
  • 27 篇 文学
  • 27 篇 艺术学
  • 24 篇 军事学
  • 2 篇 哲学

主题

  • 293 篇 computer science
  • 271 篇 laboratories
  • 207 篇 semantics
  • 167 篇 feature extracti...
  • 150 篇 computational mo...
  • 141 篇 data mining
  • 139 篇 software
  • 127 篇 software enginee...
  • 126 篇 training
  • 119 篇 algorithm design...
  • 118 篇 deep learning
  • 115 篇 optimization
  • 112 篇 wireless sensor ...
  • 105 篇 educational inst...
  • 100 篇 cloud computing
  • 95 篇 accuracy
  • 93 篇 software testing
  • 91 篇 testing
  • 90 篇 application soft...
  • 88 篇 costs

机构

  • 1,027 篇 state key labora...
  • 211 篇 state key labora...
  • 205 篇 department of co...
  • 204 篇 national key lab...
  • 170 篇 college of compu...
  • 169 篇 department of co...
  • 142 篇 university of ch...
  • 117 篇 tianjin key labo...
  • 114 篇 school of inform...
  • 108 篇 state key labora...
  • 101 篇 college of compu...
  • 100 篇 guangxi key labo...
  • 96 篇 state key labora...
  • 94 篇 beijing key labo...
  • 92 篇 school of comput...
  • 90 篇 key laboratory o...
  • 88 篇 state key labora...
  • 87 篇 school of softwa...
  • 79 篇 shandong provinc...
  • 74 篇 national enginee...

作者

  • 66 篇 junping du
  • 65 篇 gao yang
  • 48 篇 yin baocai
  • 42 篇 wang wei
  • 41 篇 shi yinghuan
  • 38 篇 baocai yin
  • 38 篇 guihai chen
  • 38 篇 sanglu lu
  • 37 篇 zhou zhi-hua
  • 37 篇 baowen xu
  • 35 篇 shen linlin
  • 33 篇 xu baowen
  • 32 篇 yu huiqun
  • 32 篇 dou wanchun
  • 31 篇 zhao jian
  • 30 篇 shen furao
  • 30 篇 zhang hua
  • 29 篇 li wu-jun
  • 28 篇 fan guisheng
  • 27 篇 liu yang

语言

  • 8,056 篇 英文
  • 286 篇 其他
  • 263 篇 中文
  • 2 篇 德文
检索条件"机构=Computer Software Technology Laboratory"
8597 条 记 录,以下是261-270 订阅
排序:
Multivariate Time Series Anomaly Detection based on Pre-trained Models with Dual-Attention Mechanism  35
Multivariate Time Series Anomaly Detection based on Pre-trai...
收藏 引用
35th IEEE International Symposium on software Reliability Engineering Workshops, ISSREW 2024
作者: Sun, Yongqian Guo, Yang Liang, Minghan Wen, Xidao Kuang, Junhua Zhang, Shenglin Li, Hongbo Xia, Kaixu Pei, Dan Nankai University China Tianjin Key Laboratory of Software Experience and Human Computer Interaction China BizSeer Haihe Laboratory of Information Technology Application Innovation China Tencent Tsinghua University Beijing National Research Center for Information Science and Technology China
In major tech companies, monitoring server performance data with anomaly detection algorithms is crucial for assessing operational status. Existing models often require separate training or fine-tuning for each server... 详细信息
来源: 评论
An efficient and balanced feature pyramid network: shared-FPN
收藏 引用
Optoelectronics Letters 2025年
作者: Tian Sulong Qin Longfei Pang Wenchao Gao Ying Zhao Dexin School of Computer Science and Engineering, Tianjin University of Technology Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology, Tianjin University of Technology
In the field of object detection, it is challenging to achieve a balance between neck complexity and accuracy. To address this issue, we propose an efficient and decoupled neck module called Shared-FPN(Shared Featur...
来源: 评论
Biomedical Named Entity Recognition Through Deep Reinforcement Learning
Biomedical Named Entity Recognition Through Deep Reinforceme...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Zhao, Zhehuan Xu, Bo Zou, Yuying Yang, Zhihao Wang, Menghan Lin, Hongfei Dalian University of Technology China Key Laboratory for Ubiquitous Network and Service Software of Liaoning Dalian China Dalian University of Technology China College of Computer Science and Technology Dalian China
Biomedical Named Entity Recognition (BioNER) is a crucial task in extracting entities from biomedical literature. It plays a key role as the initial step in various biomedical information extraction tasks. Pre-trainin... 详细信息
来源: 评论
Empowering Semantic Segmentation with Selective Frequency Enhancement and Attention Mechanism for Tampering Detection
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第6期5卷 3270-3283页
作者: Xu, Xu Lv, Wenrui Wang, Wei Zhang, Yushu Chen, Junxin Dalian University of Technology School of Software Dalian116621 China Northeastern University School of Computer Science and Engineering Shenyang110004 China Shenzhen MSU-BIT University Guangdong-Hong Kong-Macao Joint Laboratory for Emotion Intelligence and Pervasive Computing Artificial Intelligence Research Institute Shenzhen518172 China Beijing Institute of Technology School of Medical Technology Beijing100081 China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing210016 China
Nowadays, massive amounts of multimedia contents are exchanged in our daily life, while tampered images are also flooding the social networks. Tampering detection is therefore becoming increasingly important for multi... 详细信息
来源: 评论
Safety decision of autonomous driving behavior based on Bayesian network and its verification method  24
Safety decision of autonomous driving behavior based on Baye...
收藏 引用
24th IEEE International Conference on software Quality, Reliability and Security Companion, QRS-C 2024
作者: Li, Zexin Zhu, Yi Zhao, Li Zhao, Ying School of Computer Science and Technology Jiangsu Normal University Jiangsu Xuzhou China Nanjing University of Aeronautics and Astronautics Ministry of Industry and Information Technology Key Laboratory of Safety-Critical Software Jiangsu Nanjing China
With the increasing visibility of autonomous vehicles, the assurance of safe and precise behavioral decisions presents a substantial challenge within the realm of autonomous driving. The complexity of physical space, ... 详细信息
来源: 评论
Discrete Geometric Coded Data Layout for Large-scale Object Storage Systems  21
Discrete Geometric Coded Data Layout for Large-scale Object ...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Tian, Yi Xu, Guangping Yang, Hongzhang Ni, Yue Cao, JiaXin Yang, Lei Tianjin University of Technology School of Computer Science and Engineering Tianjin China Novel Software Technology Tianjin Key Laboratory of Intelligence Computing Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China Information Technology Co. Ltd. China
Regenerating codes are new network codes proposed to reduce the data required for fault repair, which can improve the recovery efficiency of faulty nodes in data storage systems. However, unlike Reed-Solomon code, whi... 详细信息
来源: 评论
A Model-Agnostic Interpretability Approach Based on Enhanced Hierarchical Clustering  24
A Model-Agnostic Interpretability Approach Based on Enhanced...
收藏 引用
24th IEEE International Conference on software Quality, Reliability and Security Companion, QRS-C 2024
作者: Ding, Xi Zhu, Yi Yu, Qiao Huang, Chongyang School of Computer Science and Technology Jiangsu Normal University Jiangsu Xuzhou China Nanjing University of Aeronautics and Astronautics Ministry of Industry and Information Technology Key Laboratory of Safety-Critical Software Jiangsu Nanjing China
The Local Interpretable Model-Agnostic Explanations (LIME) is a relatively novel technique for explaining black-box models. LIME generates perturbed instances of the model based on a random instance, and then approxim... 详细信息
来源: 评论
Community Smell Occurrence Prediction on Multi-Granularity by Developer-Oriented Features and Process Metrics
收藏 引用
Journal of computer Science & technology 2022年 第1期37卷 182-206页
作者: Zi-Jie Huang Zhi-Qing Shao Gui-Sheng Fan Hui-Qun Yu Xing-Guang Yang Kang Yang Department of Computer Science and Engineering East China University of Science and TechnologyShanghai 200237China Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai 200237China Shanghai Engineering Research Center of Smart Energy Shanghai 200237China
Community smells are sub-optimal developer community structures that hinder *** studies performed smell prediction and provided refactoring guidelines from a top-down aspect to help community ***,refactoring smells al... 详细信息
来源: 评论
Local Search For SMT On Linear and Multi-linear Real Arithmetic  23
Local Search For SMT On Linear and Multi-linear Real Arithme...
收藏 引用
23rd International Conference on Formal Methods in computer-Aided Design, FMCAD 2023
作者: Li, Bohan Cai, Shaowei Institute of Software Chinese Academy of Sciences State Key Laboratory of Computer Science Beijing China University of Chinese Academy of Sciences School of Computer Science and Technology Beijing China
Satisfiability Modulo Theories (SMT) has significant application in various domains. In this paper, we focus on quantifier-free Satisfiablity Modulo Real Arithmetic, referred to as SMT(RA), including both linear and n... 详细信息
来源: 评论
Light field depth estimation:A comprehensive survey from principles to future
收藏 引用
High-Confidence Computing 2024年 第1期4卷 92-107页
作者: Tun Wang Hao Sheng Rongshan Chen Da Yang Zhenglong Cui Sizhe Wang Ruixuan Cong Mingyuan Zhao State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and EngineeringBeihang UniversityBeijing 100191China Zhongfa Aviation Institute Beihang UniversityHangzhou 311115China Faculty of Applied Sciences Macao Polytechnic UniversityMacao 999078China State Key Laboratory of Software Development Environment School of Computer Science and EngineeringBeihang UniversityBeijing 100191China
Light Field(LF)depth estimation is an important research direction in the area of computer vision and computational photography,which aims to infer the depth information of different objects in threedimensional scenes... 详细信息
来源: 评论