咨询与建议

限定检索结果

文献类型

  • 5,156 篇 会议
  • 3,507 篇 期刊文献
  • 28 册 图书

馆藏范围

  • 8,691 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,850 篇 工学
    • 4,557 篇 计算机科学与技术...
    • 3,720 篇 软件工程
    • 1,039 篇 信息与通信工程
    • 752 篇 控制科学与工程
    • 475 篇 电气工程
    • 474 篇 生物工程
    • 398 篇 机械工程
    • 368 篇 电子科学与技术(可...
    • 272 篇 光学工程
    • 254 篇 生物医学工程(可授...
    • 204 篇 化学工程与技术
    • 189 篇 仪器科学与技术
    • 168 篇 动力工程及工程热...
    • 166 篇 网络空间安全
    • 155 篇 安全科学与工程
    • 149 篇 建筑学
    • 137 篇 交通运输工程
    • 135 篇 土木工程
  • 2,692 篇 理学
    • 1,720 篇 数学
    • 536 篇 生物学
    • 513 篇 物理学
    • 467 篇 统计学(可授理学、...
    • 325 篇 系统科学
    • 211 篇 化学
  • 1,694 篇 管理学
    • 1,009 篇 管理科学与工程(可...
    • 748 篇 图书情报与档案管...
    • 316 篇 工商管理
  • 198 篇 法学
    • 145 篇 社会学
  • 195 篇 医学
    • 161 篇 临床医学
    • 140 篇 基础医学(可授医学...
  • 102 篇 经济学
  • 90 篇 教育学
  • 72 篇 农学
  • 27 篇 文学
  • 27 篇 艺术学
  • 24 篇 军事学
  • 2 篇 哲学

主题

  • 294 篇 computer science
  • 271 篇 laboratories
  • 207 篇 semantics
  • 170 篇 feature extracti...
  • 149 篇 computational mo...
  • 142 篇 data mining
  • 138 篇 software
  • 130 篇 training
  • 129 篇 software enginee...
  • 120 篇 deep learning
  • 119 篇 algorithm design...
  • 115 篇 optimization
  • 112 篇 wireless sensor ...
  • 105 篇 educational inst...
  • 100 篇 cloud computing
  • 95 篇 accuracy
  • 92 篇 software testing
  • 90 篇 application soft...
  • 90 篇 testing
  • 88 篇 predictive model...

机构

  • 1,035 篇 state key labora...
  • 212 篇 state key labora...
  • 205 篇 department of co...
  • 205 篇 national key lab...
  • 184 篇 college of compu...
  • 171 篇 department of co...
  • 148 篇 university of ch...
  • 117 篇 tianjin key labo...
  • 111 篇 school of inform...
  • 108 篇 state key labora...
  • 104 篇 college of compu...
  • 100 篇 guangxi key labo...
  • 96 篇 state key labora...
  • 94 篇 school of comput...
  • 94 篇 beijing key labo...
  • 90 篇 key laboratory o...
  • 88 篇 school of softwa...
  • 87 篇 state key labora...
  • 80 篇 national enginee...
  • 79 篇 shandong provinc...

作者

  • 67 篇 gao yang
  • 65 篇 junping du
  • 47 篇 yin baocai
  • 41 篇 wang wei
  • 41 篇 shi yinghuan
  • 38 篇 baocai yin
  • 38 篇 sanglu lu
  • 37 篇 zhou zhi-hua
  • 37 篇 baowen xu
  • 37 篇 guihai chen
  • 37 篇 shen linlin
  • 33 篇 xu baowen
  • 31 篇 shen furao
  • 31 篇 zhao jian
  • 31 篇 yu huiqun
  • 31 篇 dou wanchun
  • 30 篇 zhang hua
  • 30 篇 li wu-jun
  • 28 篇 lu sanglu
  • 28 篇 fan guisheng

语言

  • 7,991 篇 英文
  • 443 篇 其他
  • 264 篇 中文
  • 2 篇 德文
检索条件"机构=Computer Software Technology Laboratory"
8691 条 记 录,以下是371-380 订阅
排序:
AgileShard: Turning the Sharded Blockchain into a Real-Time Transaction Processing System  44
AgileShard: Turning the Sharded Blockchain into a Real-Time ...
收藏 引用
44th IEEE Real-Time Systems Symposium, RTSS 2023
作者: Shi, Jianfeng Wu, Heng Liu, Wang Gao, Heran Zhang, Wenbo University of Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Nanjing China Software Engineering Technology Research and Development Center Institute of Software Chinese Academy of Sciences Beijing China Nanjing Institute of Software Technology Nanjing China Institute of Software Chinese Academy of Sciences State Key Laboratory of Computer Science Beijing China
Blockchain, as an emerging transaction processing system, suffers from low throughput and high latency. Sharded blockchains can significantly increase throughput by dividing nodes into groups (i.e., shards) to process... 详细信息
来源: 评论
eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI Defense  1
收藏 引用
18th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2022
作者: Zhang, Tianning Cai, Miao Zhang, Diming Huang, Hao Department of Computer Science and Technology Nanjing University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China School of Computer and Information Hohai University Nanjing China College of Computer Engineering Jiangsu University of Science and Technology Nanjing China
Signal Return Oriented Programming (SROP) is a dangerous code reuse attack method. Recently, defense techniques have been proposed to defeat SROP attacks. In this paper, we leverage the signal nesting mechanism provid... 详细信息
来源: 评论
Privacy-preserving and efficient user matching based on attribute encryption in mobile social networks
Privacy-preserving and efficient user matching based on attr...
收藏 引用
作者: Wu, Lei Zhao, Shengnan Wei, Xia Meng, Lingzhen School of Information Science and Engineering Shandong Normal University Jinan China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan China
With the rapid popularity of social networking platforms, users can be matched when sharing their profiles. However, there is a risk of leakage of sensitive user information during the user matching process, which lea... 详细信息
来源: 评论
Research on Quality Model for Quantum Simulator software  26
Research on Quality Model for Quantum Simulator Software
收藏 引用
26th ACIS International Winter Conference on software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD-Winter 2023
作者: Wang, Chao Chen, Jingwei Ge, JianXin Wu, XueZhong Qu, QianQian Luo, Le Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai Development Center of Computer Software Technology Shanghai China Qudoor Technologies Inc. Hefei China Software Engineering of Computer and Information Engineering College Shanghai Polytechnic University Shanghai China Qudoor Technologies Inc. School of Physics and Astronomy Sun Yat-Sen University Zhuhai China
In recent years, the demand for arithmetic power from all walks of life is growing, especially the increasing popularity of AIGC, which makes people realize that huge technological progress cannot be made without the ... 详细信息
来源: 评论
A Feature-Aware Transformer Approach for Enhanced Maritime Trajectory Prediction
A Feature-Aware Transformer Approach for Enhanced Maritime T...
收藏 引用
2024 International Conference Optoelectronic Information and Optical Engineering, OIOE 2024
作者: Wang, Wuyong Ma, Xingkong Liu, Bo College of Computer Science and Technology National University of Defense Technology Changsha410073 China State Key Laboratory of Complex & Critical Software Environment Changsha410073 China Strategic Evaluation and Consultation Center Academy of Military Sciences Beijing100000 China
Predicting ship trajectories is vital for enhancing maritime safety, optimizing route planning, and boosting the efficiency of maritime traffic management. Current research often neglects the complex marine environmen... 详细信息
来源: 评论
Generating Targeted Universal Adversarial Perturbation against Automatic Speech Recognition via Phoneme Tailoring
Generating Targeted Universal Adversarial Perturbation again...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Zhang, Yujun Chen, Yanqu Wang, Jiakai Hu, Jin Tao, Renshuai Liu, Xianglong State Key Laboratory of Complex & Critical Software Environment Beihang University China School of Computer Science and Engineering Beihang University China College of Computer Science Beijing University of Technology China Zhongguancun Laboratory China School of Computer and Information Technology Beijing Jiaotong University China Institute of Data Space Hefei Comprehensive National Science Center China
There is a growing concern about adversarial attacks against automatic speech recognition (ASR) systems. Although research into targeted universal adversarial examples (AEs) has progressed, current methods are constra... 详细信息
来源: 评论
Bi-Orthogonal Projection Learning for Dimensionality Reduction  3
Bi-Orthogonal Projection Learning for Dimensionality Reducti...
收藏 引用
3rd International Conference on Intelligent Power and Systems, ICIPS 2023
作者: Liang, Yingyi Fan, Junjun Li, Chunsheng Wen, Jiajun Guangdong University of Technology Guangzhou China Shenzhen University College of Computer Science & Software Engineering Shenzhen China Laboratory for Artificial Intelligence in Design Hong Kong
This paper proposes a novel bi-orthogonal projection learning (BOPL) for dimensionality reduction (DR) methods, which further extends the existing DR to a more flexible, robust, and sparse embedding framework. Unlike ... 详细信息
来源: 评论
Measurement and Optimization of Repetition Scheme in NB-IoT Uplink  26
Measurement and Optimization of Repetition Scheme in NB-IoT ...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Chen, Kai Chang, Xiangmao Zhan, Jun Zhao, Yanchao Nanjing University of Aeronautics and Astronautics Computer Science and Technology Nanjing China Key Laboratory of Safety-Critical Software Nanjing University of Aeronautics and Astronautics Nanjing China
Narrowband Internet of Things (NB-IoT) is an low-power wide area network based on cellar architecture. The repetition scheme is a key solution to achieve enhanced coverage with low complexity in the uplink. However, t... 详细信息
来源: 评论
SLAM: Towards Efficient Multilingual Reasoning via Selective Language Alignment  31
SLAM: Towards Efficient Multilingual Reasoning via Selective...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Fan, Yuchun Mu, Yongyu Wang, Yilin Huang, Lei Ruan, Junhao Li, Bei Xiao, Tong Huang, Shujian Feng, Xiaocheng Zhu, Jingbo NLP Lab School of Computer Science and Engineering Northeastern University Shenyang China NiuTrans Research Shenyang China Harbin Institute of Technology Harbin China Meituan Inc. National Key Laboratory for Novel Software Technology Nanjing University China
Despite the significant improvements achieved by large language models (LLMs) in English reasoning tasks, these models continue to struggle with multilingual reasoning. Recent studies leverage a full-parameter and two... 详细信息
来源: 评论
A Dynamic Interest-Aware Message-Passing GCN for Recommendation  24
A Dynamic Interest-Aware Message-Passing GCN for Recommendat...
收藏 引用
24th IEEE International Conference on software Quality, Reliability and Security Companion, QRS-C 2024
作者: He, Weichao Zhu, Yi Song, Mei Wu, Zixin Hao, Guosheng School of Computer Science and Technology Jiangsu Normal University Jiangsu Xuzhou China Jiangsu Engineering Technology Research Center of Ict in Education Jiangsu Xuzhou China Ministry of Industry and Information Technology Key Laboratory of Safety-Critical Software Jiangsu Nanjing China
Over the past few years, Graph Convolutional Networks (GCN) have emerged as a promising tool in the field of recommendation. They have the ability to effectively learn user and item embeddings by leveraging collaborat... 详细信息
来源: 评论