咨询与建议

限定检索结果

文献类型

  • 5,156 篇 会议
  • 3,507 篇 期刊文献
  • 28 册 图书

馆藏范围

  • 8,691 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,850 篇 工学
    • 4,557 篇 计算机科学与技术...
    • 3,720 篇 软件工程
    • 1,039 篇 信息与通信工程
    • 752 篇 控制科学与工程
    • 475 篇 电气工程
    • 474 篇 生物工程
    • 398 篇 机械工程
    • 368 篇 电子科学与技术(可...
    • 272 篇 光学工程
    • 254 篇 生物医学工程(可授...
    • 204 篇 化学工程与技术
    • 189 篇 仪器科学与技术
    • 168 篇 动力工程及工程热...
    • 166 篇 网络空间安全
    • 155 篇 安全科学与工程
    • 149 篇 建筑学
    • 137 篇 交通运输工程
    • 135 篇 土木工程
  • 2,692 篇 理学
    • 1,720 篇 数学
    • 536 篇 生物学
    • 513 篇 物理学
    • 467 篇 统计学(可授理学、...
    • 325 篇 系统科学
    • 211 篇 化学
  • 1,694 篇 管理学
    • 1,009 篇 管理科学与工程(可...
    • 748 篇 图书情报与档案管...
    • 316 篇 工商管理
  • 198 篇 法学
    • 145 篇 社会学
  • 195 篇 医学
    • 161 篇 临床医学
    • 140 篇 基础医学(可授医学...
  • 102 篇 经济学
  • 90 篇 教育学
  • 72 篇 农学
  • 27 篇 文学
  • 27 篇 艺术学
  • 24 篇 军事学
  • 2 篇 哲学

主题

  • 294 篇 computer science
  • 271 篇 laboratories
  • 207 篇 semantics
  • 170 篇 feature extracti...
  • 149 篇 computational mo...
  • 142 篇 data mining
  • 138 篇 software
  • 130 篇 training
  • 129 篇 software enginee...
  • 120 篇 deep learning
  • 119 篇 algorithm design...
  • 115 篇 optimization
  • 112 篇 wireless sensor ...
  • 105 篇 educational inst...
  • 100 篇 cloud computing
  • 95 篇 accuracy
  • 92 篇 software testing
  • 90 篇 application soft...
  • 90 篇 testing
  • 88 篇 predictive model...

机构

  • 1,035 篇 state key labora...
  • 212 篇 state key labora...
  • 205 篇 department of co...
  • 205 篇 national key lab...
  • 184 篇 college of compu...
  • 171 篇 department of co...
  • 148 篇 university of ch...
  • 117 篇 tianjin key labo...
  • 111 篇 school of inform...
  • 108 篇 state key labora...
  • 104 篇 college of compu...
  • 100 篇 guangxi key labo...
  • 96 篇 state key labora...
  • 94 篇 school of comput...
  • 94 篇 beijing key labo...
  • 90 篇 key laboratory o...
  • 88 篇 school of softwa...
  • 87 篇 state key labora...
  • 80 篇 national enginee...
  • 79 篇 shandong provinc...

作者

  • 67 篇 gao yang
  • 65 篇 junping du
  • 47 篇 yin baocai
  • 41 篇 wang wei
  • 41 篇 shi yinghuan
  • 38 篇 baocai yin
  • 38 篇 sanglu lu
  • 37 篇 zhou zhi-hua
  • 37 篇 baowen xu
  • 37 篇 guihai chen
  • 37 篇 shen linlin
  • 33 篇 xu baowen
  • 31 篇 shen furao
  • 31 篇 zhao jian
  • 31 篇 yu huiqun
  • 31 篇 dou wanchun
  • 30 篇 zhang hua
  • 30 篇 li wu-jun
  • 28 篇 lu sanglu
  • 28 篇 fan guisheng

语言

  • 7,991 篇 英文
  • 443 篇 其他
  • 264 篇 中文
  • 2 篇 德文
检索条件"机构=Computer Software Technology Laboratory"
8691 条 记 录,以下是351-360 订阅
排序:
Efficient Large Scale Reverse-time Migration Imaging Computation based on Distributed Spark Cluster with GPUs  21
Efficient Large Scale Reverse-time Migration Imaging Computa...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Wangzhang, Suhui Yang, Ruizhang Gu, Rong Li, Bo Liu, Dingjin Wang, Zhaokang Nanjing University State Key Laboratory for Novel Software Technology China Sinopec Geophysical Research Institute China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology China
The reverse-time migration (RTM) imaging algorithm, which is used for complex underground structure analysis, is known as one of the current mainstream method of high-precision seismic imaging. Nowadays, as the fast d... 详细信息
来源: 评论
Learned Video Compression With Refined Adaptive Flow Pyramid And Coordinate-Aware Attention
Learned Video Compression With Refined Adaptive Flow Pyramid...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Huang, Qian Liu, Wenting Li, Xin Wang, Yiming College of Computer Science and Software Engineering Hohai University Nanjing China Key Laboratory of Water Big Data Technology Ministry of Water Resources Hohai University Nanjing China
In video compression, motion estimation and motion compensation are critical for achieving efficient encoding. Although the commonly used SpyNet and bilinear interpolation have contributed in improving the compression... 详细信息
来源: 评论
A survey on model-based reinforcement learning
收藏 引用
Science China(Information Sciences) 2024年 第2期67卷 59-84页
作者: Fan-Ming LUO Tian XU Hang LAI Xiong-Hui CHEN Weinan ZHANG Yang YU National Key Laboratory for Novel Software Technology Nanjing University Polixir. ai Department of Computer Science and Engineering Shanghai Jiao Tong University
Reinforcement learning(RL) interacts with the environment to solve sequential decision-making problems via a trial-and-error approach. Errors are always undesirable in real-world applications, even though RL excels at... 详细信息
来源: 评论
Revisiting Unsupervised Domain Adaptation Models: A Smoothness Perspective  16th
Revisiting Unsupervised Domain Adaptation Models: A Smoothne...
收藏 引用
16th Asian Conference on computer Vision, ACCV 2022
作者: Wang, Xiaodong Zhuo, Junbao Zhang, Mengru Wang, Shuhui Fang, Yuejian School of Software and Microelectronics Peking University Beijing China Key Laboratory of Intelligent Information Processing Indian Institute of Computer Technology CAS Beijing China MEGVII Technology Beijing China
Unsupervised Domain Adaptation (UDA) aims to leverage the labeled source data and unlabeled target data to generalize better in the target domain. UDA methods utilize better domain alignment or carefully-designed regu... 详细信息
来源: 评论
A Programming Language Learning Service by Linking Stack Overflow with Textbooks
A Programming Language Learning Service by Linking Stack Ove...
收藏 引用
2023 IEEE International Conference on Web Services, ICWS 2023
作者: Wu, Jiawei Sun, Yanchun Zhang, Jiaqi Zhou, Yuqi Huang, Gang Ministry of Education Key Laboratory of High Confidence Software Technologies China Peking University School of Computer Science Beijing China Peking University School of Software and Microelectronics Beijing China National Key Laboratory of Data Space Technology and System China
Before software developers actually start coding, an essential requirement is to be proficient in a programming language. However, as an important learning resource, programming language textbooks usually contain much... 详细信息
来源: 评论
DNS Covert Channel Attack Detection Based on Spatio-Temporal Feature Fusion  22
DNS Covert Channel Attack Detection Based on Spatio-Temporal...
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: You, Wei Zhao, Chunlei Shan, Chao Dong, Guozhong Yu, Jie Guan, Yong Tianjin University of Technology Tianjin Key Laboratory of Intelligent Computing and Software New Technology Tianjin China Coordination Center of China Hubei Branch of National Computer Network Emergency Response Technical Team HuBei China Pengcheng Laboratory Department of New Networks Shenzhen China
An increasing number of Advanced Persistent Threat (APT) organizations are utilizing DNS (Domain Name System) covert channels to evade network intrusion detection systems and establish private authoritative servers fo... 详细信息
来源: 评论
Deep Semantic and Attentive Network for Unsupervised Video Summarization
收藏 引用
ACM Transactions on Multimedia Computing, Communications and Applications 2022年 第2期18卷 1-21页
作者: Zhong, Sheng-Hua Lin, Jingxu Lu, Jianglin Fares, Ahmed Ren, Tongwei College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Electrical Engineering Computer Systems Engineering Program Faculty of Engineering at Shoubra Benha University Cairo Egypt State Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China
With the rapid growth of video data, video summarization is a promising approach to shorten a lengthy video into a compact version. Although supervised summarization approaches have achieved state-of-the-art performan... 详细信息
来源: 评论
A Versatile Low-Light Enhancement Module for Improved Workpiece Detection  13
A Versatile Low-Light Enhancement Module for Improved Workpi...
收藏 引用
13th International Conference of Information and Communication technology, ICTech 2024
作者: Yin, ZhenYu Lin, DaHeng Wang, XiaoHui Xin, Qi Zhang, XueMei Shenyang Institute of Computing Technology Chinese Academy of Sciences Shenyang110168 China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100049 China Liaoning Key Laboratory of Domestic Industrial Control Platform Technology on Basic Hardware & Software China School of Computer Science and Technology Shenyang University of Chemical Technology Shenyang110168 China
This study presents a versatile Low-Light Enhancement Module (LLEM) to enhance object detection models, particularly for workpieces in challenging lighting conditions. The LLEM seamlessly integrates into existing mode... 详细信息
来源: 评论
Unveiling Context-Related Anomalies: Knowledge Graph Empowered Decoupling of Scene and Action for Human-Related Video Anomaly Detection
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年
作者: Chen, Chenglizhao Liu, Xinyu Song, Mengke Li, Luming Yuan, Shaojiang Yu, Xu Pang, Shanchen Qingdao Institute of Software College of Computer Science and Technology China Shandong Key Laboratory of Intelligent Oil & Gas Industrial Software China State Key Laboratory of Chemical Safety China
Video anomaly detection methods are mainly classified into two categories based on their primary feature types: appearance-based and action-based. Appearance-based methods rely on low-level visual features like color,... 详细信息
来源: 评论
Reinforcement Learning Application Testing Method based on Multi-attribute Fusion  9
Reinforcement Learning Application Testing Method based on M...
收藏 引用
9th International Conference on Dependable Systems and Their Applications, DSA 2022
作者: Cai, Lizhi Wang, Jin Chen, Mingang Wang, Jilong School of Information Science and Engineering East China University of Science and Technology Shanghai China Shanghai Development Center of Computer Software Technology Shanghai Key Laboratory of Computer Software Testing & Evaluating Shanghai China
Reinforcement learning has been successfully applied to assess the reliability of applications, but the existing testing methods based on reinforcement learning have the problems of invalid interactive widgets and dif... 详细信息
来源: 评论