咨询与建议

限定检索结果

文献类型

  • 5,156 篇 会议
  • 3,507 篇 期刊文献
  • 28 册 图书

馆藏范围

  • 8,691 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,850 篇 工学
    • 4,557 篇 计算机科学与技术...
    • 3,720 篇 软件工程
    • 1,039 篇 信息与通信工程
    • 752 篇 控制科学与工程
    • 475 篇 电气工程
    • 474 篇 生物工程
    • 398 篇 机械工程
    • 368 篇 电子科学与技术(可...
    • 272 篇 光学工程
    • 254 篇 生物医学工程(可授...
    • 204 篇 化学工程与技术
    • 189 篇 仪器科学与技术
    • 168 篇 动力工程及工程热...
    • 166 篇 网络空间安全
    • 155 篇 安全科学与工程
    • 149 篇 建筑学
    • 137 篇 交通运输工程
    • 135 篇 土木工程
  • 2,692 篇 理学
    • 1,720 篇 数学
    • 536 篇 生物学
    • 513 篇 物理学
    • 467 篇 统计学(可授理学、...
    • 325 篇 系统科学
    • 211 篇 化学
  • 1,694 篇 管理学
    • 1,009 篇 管理科学与工程(可...
    • 748 篇 图书情报与档案管...
    • 316 篇 工商管理
  • 198 篇 法学
    • 145 篇 社会学
  • 195 篇 医学
    • 161 篇 临床医学
    • 140 篇 基础医学(可授医学...
  • 102 篇 经济学
  • 90 篇 教育学
  • 72 篇 农学
  • 27 篇 文学
  • 27 篇 艺术学
  • 24 篇 军事学
  • 2 篇 哲学

主题

  • 294 篇 computer science
  • 271 篇 laboratories
  • 207 篇 semantics
  • 170 篇 feature extracti...
  • 149 篇 computational mo...
  • 142 篇 data mining
  • 138 篇 software
  • 130 篇 training
  • 129 篇 software enginee...
  • 120 篇 deep learning
  • 119 篇 algorithm design...
  • 115 篇 optimization
  • 112 篇 wireless sensor ...
  • 105 篇 educational inst...
  • 100 篇 cloud computing
  • 95 篇 accuracy
  • 92 篇 software testing
  • 90 篇 application soft...
  • 90 篇 testing
  • 88 篇 predictive model...

机构

  • 1,035 篇 state key labora...
  • 212 篇 state key labora...
  • 205 篇 department of co...
  • 205 篇 national key lab...
  • 184 篇 college of compu...
  • 171 篇 department of co...
  • 148 篇 university of ch...
  • 117 篇 tianjin key labo...
  • 111 篇 school of inform...
  • 108 篇 state key labora...
  • 104 篇 college of compu...
  • 100 篇 guangxi key labo...
  • 96 篇 state key labora...
  • 94 篇 school of comput...
  • 94 篇 beijing key labo...
  • 90 篇 key laboratory o...
  • 88 篇 school of softwa...
  • 87 篇 state key labora...
  • 80 篇 national enginee...
  • 79 篇 shandong provinc...

作者

  • 67 篇 gao yang
  • 65 篇 junping du
  • 47 篇 yin baocai
  • 41 篇 wang wei
  • 41 篇 shi yinghuan
  • 38 篇 baocai yin
  • 38 篇 sanglu lu
  • 37 篇 zhou zhi-hua
  • 37 篇 baowen xu
  • 37 篇 guihai chen
  • 37 篇 shen linlin
  • 33 篇 xu baowen
  • 31 篇 shen furao
  • 31 篇 zhao jian
  • 31 篇 yu huiqun
  • 31 篇 dou wanchun
  • 30 篇 zhang hua
  • 30 篇 li wu-jun
  • 28 篇 lu sanglu
  • 28 篇 fan guisheng

语言

  • 7,991 篇 英文
  • 443 篇 其他
  • 264 篇 中文
  • 2 篇 德文
检索条件"机构=Computer Software Technology Laboratory"
8691 条 记 录,以下是361-370 订阅
排序:
Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment
收藏 引用
computers, Materials & Continua 2024年 第3期78卷 3177-3194页
作者: Bin Wu Xianyi Chen Jinzhou Huang Caicai Zhang Jing Wang Jing Yu Zhiqiang Zhao Zhuolin Mei School of Computer and Big Data Science Jiujiang UniversityJiujiang332005China Jiujiang Key Laboratory of Network and Information Security Jiujiang332005China School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China School of Computer Engineering Hubei University of Arts and ScienceXiangyang441053China School of Modern Information Technology Zhejiang Institute of Mechanical and Electrical EngineeringHangzhou310053China Information Center Jiangxi Changjiang Chemical Co.Ltd.Jiujiang332005China School of Mathematics and Computer Science Ningxia Normal UniversityGuyuan756099China
In a cloud environment,outsourced graph data is widely used in companies,enterprises,medical institutions,and so *** owners and users can save costs and improve efficiency by storing large amounts of graph data on clo... 详细信息
来源: 评论
ACCEL: an efflcient and privacy-preserving federated logistic regression scheme over vertically partitioned data
收藏 引用
Science China(Information Sciences) 2022年 第7期65卷 98-99页
作者: Jiaqi ZHAO Hui ZHU Fengwei WANG Rongxing LU Hui LI Zhongmin ZHOU Haitao WAN State Key Laboratory of Integrated Networks Services Xidian University Faculty of Computer Science University of New Brunswick China Mobile (Suzhou) Software Technology Co. Ltd.
Dear editor,With the age of big data coming, massive data are being generated distributedly all the time and stored as the form of data islands; meanwhile, data privacy and security are strengthened with the introduct... 详细信息
来源: 评论
A Surrogate-Assisted Evolutionary Algorithm for Expensive Dynamic Multimodal Optimzation  13
A Surrogate-Assisted Evolutionary Algorithm for Expensive Dy...
收藏 引用
13th IEEE Congress on Evolutionary Computation, CEC 2024
作者: Wu, Xunfeng Liu, Songbai Ji, Junkai Ma, Lijia Leung, Victor C. M. Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China The University of British Columbia Department of Electrical and Computer Engineering Vancouver Canada
Surrogate-assisted evolutionary algorithms (SAEAs) have demonstrated promising optimization performance in addressing expensive dynamic optimization problems or expensive multimodal optimization problems. However, non... 详细信息
来源: 评论
Detection of Deepfakes: Protecting Images and Vedios Against Deepfake  21
Detection of Deepfakes: Protecting Images and Vedios Against...
收藏 引用
21st International computer Conference on Wavelet Active Media technology and Information Processing, ICCWAMTIP 2024
作者: Tian, Ying Zhou, Wang Haq, Amin Ul Sichuan Police College Intelligent Policing Key Laboratory of Sichuan Province LuZhou China School of Computer and Software Engineering Xihua University Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China
In recent years, with the rapid development of deep learning and computer vision technology, the forgery technology of images and videos has become increasingly mature, posing new challenges to information security an... 详细信息
来源: 评论
On interleaving space exploration of multi-threaded programs
收藏 引用
Frontiers of computer Science 2021年 第4期15卷 17-28页
作者: Dongjie CHEN Yanyan JIANG Chang XU Xiaoxing MA State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China Department of Computer Science and Technology Nanjing UniversityNanjing 210023China
Exploring the interleaving space of a multithreaded program to efficiently detect concurrency bugs is important but also difficult because of the astronomically many thread *** paper presents a novel framework to deco... 详细信息
来源: 评论
Instance-adaptive Zero-shot Chain-of-Thought Prompting  38
Instance-adaptive Zero-shot Chain-of-Thought Prompting
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Yuan, Xiaosong Shen, Chen Yan, Shaotian Zhang, Xiaofeng Xie, Liang Wang, Wenxiao Guan, Renchu Wang, Ying Ye, Jieping College of Computer Science and Technology Jilin University China Key Laboratory of Symbolic Computation and Knowledge Engineering MoE Jilin University China Alibaba Cloud Computing China Shanghai Jiao Tong University China College of Computer Science and Technology Zhejiang University of Technology China College of Software Zhejiang University China
Zero-shot Chain-of-Thought (CoT) prompting emerges as a simple and effective strategy for enhancing the performance of large language models (LLMs) in real-world reasoning tasks. Nonetheless, the efficacy of a singula...
来源: 评论
NOFTrack: Efficient Multi-Object Tracking with a Speed Advantage
NOFTrack: Efficient Multi-Object Tracking with a Speed Advan...
收藏 引用
2024 International Symposium on Digital Home, ISDH 2024
作者: Jiang, Ming Ke, Jiehao Guo, Biao Metaverse Application Engineering Center Guilin University of Electronic Technology Guilin China School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guilin University of Electronic Technology Guangxi Key Laboratory of Trusted Software Guilin China
In the field of multi-object tracking (MOT), accurately tracking the position and characteristics of targets is crucial. However, traditional methods often overlook detection results with low confidence, which can lea... 详细信息
来源: 评论
ACbot:an IIoT platform for industrial robots
收藏 引用
Frontiers of computer Science 2025年 第4期19卷 13-27页
作者: Rui WANG Xudong MOU Tianyu WO Mingyang ZHANG Yuxin LIU Tiejun WANG Pin LIU Jihong YAN Xudong LIU School of Computer Science and Engineering Beihang UniversityBeijing 100191China Zhongguancun Laboratory Beijing 100194China School of Software Beihang UniversityBeijing 100191China School of Mechatronics Engineering Harbin Institute of TechnologyHarbin 150001China Hangzhou Innovation Institute Beihang UniversityHangzhou 310051China School of Information Engineering China University of GeosciencesBeijing 100083China
As the application of Industrial Robots(IRs)scales and related participants increase,the demands for intelligent Operation and Maintenance(O&M)and multi-tenant collaboration *** methods could no longer cover the r... 详细信息
来源: 评论
An accident prediction architecture based on spatio-clock stochastic and hybrid model for autonomous driving safety
An accident prediction architecture based on spatio-clock st...
收藏 引用
作者: Wang, Jinyong Huang, Zhiqiu Huang, Xiaowei Wang, Tiexin Shen, Guohua Xie, Jian College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Key Laboratory of Safety-Critical Software Ministry of Industry and Information Technology Nanjing China Department of Computer Science University of Liverpool Liverpool United Kingdom
Collaborative and autonomous driving vehicles combine hardware and software complex processes, also are heavily dependent on and influenced by the world of physical and cyber interactions. They have enabled many new f... 详细信息
来源: 评论
CCMOP: A Runtime Verification Tool for C/C++ Programs  23rd
CCMOP: A Runtime Verification Tool for C/C++ Programs
收藏 引用
23rd International Conference on Runtime Verification, RV 2023
作者: Xing, Yongchao Chen, Zhenbang Xu, Shibo Zhang, Yufeng College of Computer National University of Defense Technology Changsha China Key Laboratory of Software Engineering for Complex Systems National University of Defense Technology Changsha China College of Computer Science and Electronic Engineering Hunan University Changsha China
Runtime verification (RV) is an effective lightweight formal method for improving software’s reliability at runtime. There exist no RV tools specially designed for C++ programs. This paper introduces the first one, i... 详细信息
来源: 评论