咨询与建议

限定检索结果

文献类型

  • 5,174 篇 会议
  • 3,478 篇 期刊文献
  • 27 册 图书

馆藏范围

  • 8,679 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,808 篇 工学
    • 4,513 篇 计算机科学与技术...
    • 3,664 篇 软件工程
    • 1,025 篇 信息与通信工程
    • 736 篇 控制科学与工程
    • 473 篇 生物工程
    • 472 篇 电气工程
    • 395 篇 机械工程
    • 384 篇 电子科学与技术(可...
    • 272 篇 光学工程
    • 251 篇 生物医学工程(可授...
    • 204 篇 化学工程与技术
    • 188 篇 仪器科学与技术
    • 169 篇 网络空间安全
    • 166 篇 动力工程及工程热...
    • 155 篇 安全科学与工程
    • 148 篇 建筑学
    • 136 篇 交通运输工程
    • 135 篇 土木工程
  • 2,665 篇 理学
    • 1,694 篇 数学
    • 535 篇 生物学
    • 515 篇 物理学
    • 460 篇 统计学(可授理学、...
    • 324 篇 系统科学
    • 211 篇 化学
  • 1,685 篇 管理学
    • 1,002 篇 管理科学与工程(可...
    • 744 篇 图书情报与档案管...
    • 312 篇 工商管理
  • 198 篇 法学
    • 147 篇 社会学
  • 195 篇 医学
    • 159 篇 临床医学
    • 141 篇 基础医学(可授医学...
  • 101 篇 经济学
  • 90 篇 教育学
  • 72 篇 农学
  • 27 篇 文学
  • 26 篇 艺术学
  • 23 篇 军事学
  • 2 篇 哲学

主题

  • 293 篇 computer science
  • 272 篇 laboratories
  • 208 篇 semantics
  • 169 篇 feature extracti...
  • 150 篇 computational mo...
  • 142 篇 data mining
  • 141 篇 software
  • 137 篇 software enginee...
  • 127 篇 training
  • 121 篇 deep learning
  • 119 篇 algorithm design...
  • 115 篇 optimization
  • 108 篇 wireless sensor ...
  • 105 篇 educational inst...
  • 101 篇 cloud computing
  • 98 篇 accuracy
  • 92 篇 costs
  • 91 篇 software testing
  • 90 篇 application soft...
  • 89 篇 predictive model...

机构

  • 1,025 篇 state key labora...
  • 209 篇 state key labora...
  • 202 篇 national key lab...
  • 191 篇 department of co...
  • 182 篇 college of compu...
  • 168 篇 department of co...
  • 151 篇 university of ch...
  • 123 篇 tianjin key labo...
  • 113 篇 school of inform...
  • 109 篇 state key labora...
  • 104 篇 college of compu...
  • 100 篇 guangxi key labo...
  • 96 篇 state key labora...
  • 94 篇 beijing key labo...
  • 93 篇 school of comput...
  • 91 篇 key laboratory o...
  • 88 篇 school of softwa...
  • 86 篇 state key labora...
  • 83 篇 shandong provinc...
  • 78 篇 national enginee...

作者

  • 64 篇 junping du
  • 63 篇 gao yang
  • 46 篇 yin baocai
  • 41 篇 shi yinghuan
  • 40 篇 zhang hua
  • 40 篇 wang wei
  • 39 篇 shen linlin
  • 38 篇 baocai yin
  • 38 篇 sanglu lu
  • 37 篇 zhou zhi-hua
  • 37 篇 baowen xu
  • 37 篇 guihai chen
  • 34 篇 xu baowen
  • 32 篇 dou wanchun
  • 31 篇 yu huiqun
  • 30 篇 shen furao
  • 30 篇 zhao jian
  • 28 篇 lu sanglu
  • 28 篇 fan guisheng
  • 28 篇 li wu-jun

语言

  • 7,636 篇 英文
  • 807 篇 其他
  • 247 篇 中文
  • 2 篇 德文
检索条件"机构=Computer and Software Technology Laboratory"
8679 条 记 录,以下是71-80 订阅
排序:
Global video object segmentation with spatial constraint module
收藏 引用
Computational Visual Media 2023年 第2期9卷 385-400页
作者: Yadang Chen Duolin Wang Zhiguo Chen Zhi-Xin Yang Enhua Wu Engineering Research Center of Digital Forensics Ministry of EducationSchool of Computer and SoftwareNanjing University of Information Science and TechnologyNanjing 210044China State Key Laboratory of Internet of Things for Smart City Department of Electromechanical EngineeringUniversity of MacaoMacao 999078China State Key Laboratory of Computer Science Institute of SoftwareUniversity of Chinese Academy of SciencesBeijing 100190China Faculty of Science and Technology University of MacaoMacao 999078China
We present a lightweight and efficient semisupervised video object segmentation network based on the space-time memory *** some extent,our method solves the two difficulties encountered in traditional video object se... 详细信息
来源: 评论
Audio2AB:Audio-driven collaborative generation of virtual character animation
收藏 引用
虚拟现实与智能硬件(中英文) 2024年 第1期6卷 56-70页
作者: Lichao NIU Wenjun XIE Dong WANG Zhongrui CAO Xiaoping LIU School of Computer Science and Information Engineering Hefei University of TechnologyHeifei 230009China School of Software Hefei University of TechnologyHeifei 230009China Anhui Province Key Laboratory of Industry Safety and Emergency Technology Hefei University of TechnologyHefei 230601China
Background Considerable research has been conducted in the areas of audio-driven virtual character gestures and facial animation with some degree of ***,few methods exist for generating full-body animations,and the po... 详细信息
来源: 评论
Combining KNN with AutoEncoder for Outlier Detection
收藏 引用
Journal of computer Science & technology 2024年 第5期39卷 1153-1166页
作者: Shu-Zheng Liu Shuai Ma Han-Qing Chen Li-Zhen Cui Jie Ding State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100191China School of Software Shandong UniversityJinan 250100China Joint SDU-NTU Centre for Artificial Intelligence Research Shandong UniversityJinan 250100China School of Computer Science Jiangsu University of Science and TechnologyZhenjiang 212003China
K-nearest neighbor(KNN)is one of the most fundamental methods for unsupervised outlier detection because of its various advantages,e.g.,ease of use and relatively high ***,most data analytic tasks need to deal with hi... 详细信息
来源: 评论
Desensitization Method of Image Data in the Internet of Vehicles Based on Instance Segmentation  2
Desensitization Method of Image Data in the Internet of Vehi...
收藏 引用
2nd International Conference on Algorithms, Microchips, and Network Applications, AMNA 2023
作者: Li, Shuang Zhou, Yue Zhang, Xin Zhang, Meng School of Computer Science Fudan University 200433 China Shanghai Key Laboratory of Computer Software Testing and Evaluating Shanghai Development Center of Computer Software Technology 201112 China
With the continuous development of intelligent connected vehicle industry, cameras and other vehicle-mounted devices are widely used, so the amount of data collection is increasing. There is a large amount of sensitiv... 详细信息
来源: 评论
A Reduced State-Space Generation Method for Concurrent Systems Based on CPN-PR Model
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年 第6期44卷 2328-2342页
作者: Zhong, Wenjie Sun, Tao Zhou, Jian-Tao Wang, Zhuowei Song, Xiaoyu Inner Mongolia University College of Computer Science the Engineering Research Center of Ecological Big Data Ministry of Education the Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software the Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot010000 China Guangdong University of Technology School of Computer Science and Technology Guangzhou510006 China Portland State University Department of Electrical and Computer Engineering PortlandOR97207 United States
Colored Petri nets (CPNs) provide descriptions of the concurrent behaviors for software and hardware. Model checking based on CPNs is an effective method to simulate and verify the concurrent behavior in system design... 详细信息
来源: 评论
RSCache: A Tail Latency Friendly Cache Based on NVMe SSDs  22
RSCache: A Tail Latency Friendly Cache Based on NVMe SSDs
收藏 引用
22nd IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2024
作者: Lu, Jincheng Cai, Miao Ye, Baoliu Hohai University College of Computer Science and Software Engineering Nanjing China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing China Nanjing University State Key Laboratory for Novel Software Technology Nanjing China
High fan-out requests are prevalent in systems employing multi-tier architectures. These requests are divided into several sub-requests for parallel processing. However, a high fan-out request must await all sub-reque... 详细信息
来源: 评论
Keyword extraction method based on complex network
收藏 引用
International Journal of Information and Communication technology 2024年 第4期25卷 323-335页
作者: Yang, Zhen Gong, Huajian Ma, Weiyun Yin, Chunlin Li, Jie Liu, Siyang Zhu, Hua Zhao, Na Electric Power Research Institute of Yunnan Power Grid Kunming650217 China School of Computer Science and Technology Xidian University Xian710000 China Key Laboratory in Software Engineering of Yunnan Province School of Software Yunnan University Kunming650091 China
Keyword extraction has a wide range of applications in the field of natural language processing. Many research results on keyword extraction at present. Among them, keyword extraction methods are based on complex netw... 详细信息
来源: 评论
A prompt-based approach to adversarial example generation and robustness enhancement
收藏 引用
Frontiers of computer Science 2024年 第4期18卷 85-96页
作者: Yuting YANG Pei HUANG Juan CAO Jintao LI Yun LIN Feifei MA Key Lab of Intelligent Information Processing of Chinese Academy of Sciences(CAS) Institute of Computing TechnologyCASBeijing 100190China School of Computer Science and Technology University of Chinese Academy of SciencesBeijing 100049China Department of Computer Science Stanford UniversityCA 94305USA School of Computing National University of SingaporeSingapore 119077Singapore Laboratory of Parallel Software and Computational Science Institute of SoftwareChinese Academy of SciencesBeijing 100190China
Recent years have seen the wide application of natural language processing(NLP)models in crucial areas such as finance,medical treatment,and news media,raising concerns about the model robustness and *** find that pro... 详细信息
来源: 评论
Continual Adaptation for Unsupervised Time Series Anomaly Detection  9
Continual Adaptation for Unsupervised Time Series Anomaly De...
收藏 引用
9th International Conference on Intelligent Computing and Signal Processing, ICSP 2024
作者: Yu, Ting Ding, Bo Wang, Xu College of Computer National University of Defense Technology State Key Laboratory of Complex & Critical Software Environment Changsha China
The application of time series anomaly detection has been widespread across various industrial scenarios. Although current algorithms for time series anomaly detection have shown promising results, they primarily focu... 详细信息
来源: 评论
Integrating Extractive and Abstractive Models for Code Comment Generation  23
Integrating Extractive and Abstractive Models for Code Comme...
收藏 引用
23rd IEEE International Conference on software Quality, Reliability, and Security, QRS 2023
作者: Sun, Weisong Hu, Yuling Xu, Yingfei Chen, Yuchen Fang, Chunrong Nanjing University State Key Laboratory for Novel Software Technology Nanjing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
Code comments play an essential role in aiding developers understand and maintain source code. Current code comment generation techniques can be classified into categories: extractive methods and abstractive methods. ... 详细信息
来源: 评论