咨询与建议

限定检索结果

文献类型

  • 4,017 篇 会议
  • 2,561 篇 期刊文献
  • 47 册 图书

馆藏范围

  • 6,625 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,159 篇 工学
    • 2,745 篇 计算机科学与技术...
    • 2,210 篇 软件工程
    • 799 篇 信息与通信工程
    • 606 篇 控制科学与工程
    • 528 篇 电气工程
    • 454 篇 电子科学与技术(可...
    • 342 篇 生物工程
    • 337 篇 机械工程
    • 295 篇 光学工程
    • 281 篇 生物医学工程(可授...
    • 212 篇 仪器科学与技术
    • 212 篇 动力工程及工程热...
    • 165 篇 化学工程与技术
    • 144 篇 材料科学与工程(可...
    • 129 篇 交通运输工程
    • 123 篇 土木工程
    • 108 篇 建筑学
  • 2,033 篇 理学
    • 1,130 篇 数学
    • 511 篇 物理学
    • 414 篇 生物学
    • 299 篇 统计学(可授理学、...
    • 271 篇 系统科学
    • 181 篇 化学
  • 1,087 篇 管理学
    • 681 篇 管理科学与工程(可...
    • 440 篇 图书情报与档案管...
    • 293 篇 工商管理
  • 253 篇 医学
    • 215 篇 临床医学
    • 170 篇 基础医学(可授医学...
    • 113 篇 药学(可授医学、理...
  • 138 篇 法学
    • 101 篇 社会学
  • 100 篇 经济学
  • 51 篇 农学
  • 44 篇 教育学
  • 21 篇 文学
  • 20 篇 军事学
  • 14 篇 艺术学

主题

  • 303 篇 laboratories
  • 300 篇 computer science
  • 236 篇 software enginee...
  • 140 篇 application soft...
  • 135 篇 data mining
  • 112 篇 computational mo...
  • 104 篇 feature extracti...
  • 95 篇 costs
  • 94 篇 quality of servi...
  • 91 篇 semantics
  • 86 篇 computer archite...
  • 83 篇 algorithm design...
  • 81 篇 deep learning
  • 81 篇 wireless sensor ...
  • 81 篇 software
  • 79 篇 testing
  • 78 篇 software systems
  • 77 篇 software testing
  • 76 篇 protocols
  • 74 篇 optimization

机构

  • 227 篇 state key labora...
  • 156 篇 college of compu...
  • 117 篇 department of co...
  • 96 篇 national enginee...
  • 70 篇 department of co...
  • 68 篇 school of softwa...
  • 67 篇 state key labora...
  • 63 篇 department of co...
  • 54 篇 department of co...
  • 53 篇 state key labora...
  • 48 篇 peng cheng labor...
  • 48 篇 national key lab...
  • 45 篇 shanghai key lab...
  • 43 篇 key laboratory o...
  • 42 篇 university of ch...
  • 39 篇 tsinghua nationa...
  • 35 篇 school of comput...
  • 31 篇 department of el...
  • 30 篇 department of co...
  • 30 篇 beijing key labo...

作者

  • 52 篇 rajkumar buyya
  • 46 篇 shen linlin
  • 41 篇 junping du
  • 33 篇 mei-ling shyu
  • 33 篇 yu huiqun
  • 32 篇 shu-ching chen
  • 30 篇 fan guisheng
  • 29 篇 shen furao
  • 28 篇 zhao jian
  • 25 篇 chen shu-ching
  • 25 篇 baowen xu
  • 25 篇 zhou mengchu
  • 23 篇 yang yang
  • 22 篇 hamid soltanian-...
  • 21 篇 sylvain martel
  • 21 篇 xu baowen
  • 21 篇 zongli lin
  • 20 篇 mengchu zhou
  • 20 篇 ji zhen
  • 20 篇 buyya rajkumar

语言

  • 5,985 篇 英文
  • 516 篇 其他
  • 126 篇 中文
  • 3 篇 德文
  • 2 篇 日文
  • 1 篇 法文
检索条件"机构=Department of Computer Engineering System Software Laboratory"
6625 条 记 录,以下是751-760 订阅
排序:
Resolving Spurious Temporal Location Dependency for Video Corpus Moment Retrieval
Resolving Spurious Temporal Location Dependency for Video Co...
收藏 引用
IEEE International Conference on systems, Man and Cybernetics
作者: Yishuo Zhang Lanshan Zhang Zhizhen Zhang Ziyi Wang Xiaohui Xie Wendong Wang School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China Beijing Key Laboratory of Network System and Network Culture Beijing University of Posts and Telecommunications Beijing China Shenzhen International Graduate School Tsinghua University Shenzhen China Department of Computer Science and Technology Tsinghua University Beijing China
Video Corpus Moment Retrieval aims to retrieve the relevant video from a large corpus and localize the corresponding moment within the target video based on a specific query. Existing methods have achieved promising a... 详细信息
来源: 评论
Programming by Example Made Easy
arXiv
收藏 引用
arXiv 2023年
作者: Wu, Jiarong Wei, Lili Jiang, Yanyan Cheung, Shing-Chi Ren, Luyao Xu, Chang Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong Department of Electrical and Computer Engineering McGill University Montreal Canada State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China Key Lab of High Confidence Software Technologies Ministry of Education Department of Computer Science and Technology EECS Peking University Beijing China
Programming by example (PBE) is an emerging programming paradigm that automatically synthesizes programs specified by user-provided input-output examples. Despite the convenience for end-users, implementing PBE tools ... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Securely Fine-tuning Pre-trained Encoders Against Adversaria...
收藏 引用
IEEE Symposium on Security and Privacy
作者: Ziqi Zhou Minghui Li Wei Liu Shengshan Hu Yechao Zhang Wei Wan Lulu Xue Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
A systematic Literature Review on Large Language Models for Automated Program Repair
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Quanjun Fang, Chunrong Xie, Yang Ma, Yuxiang Sun, Weisong Yang, Yun Chen, Zhenyu State Key Laboratory for Novel Software Technology Nanjing University China School of Computer Science and Engineering Nanyang Technological University Singapore Department of Computing Technologies Swinburne University of Technology Australia
Automated Program Repair (APR) attempts to patch software bugs and reduce manual debugging efforts. Very recently, with the advances in Large Language Models (LLMs), a rapidly increasing number of APR techniques have ... 详细信息
来源: 评论
MRLATO: An Adaptive Task Offloading Mechanism Based on Meta Reinforcement Learning in Edge Computing Environment
收藏 引用
IEEE Transactions on Vehicular Technology 2025年
作者: Zhang, Peiying Liu, Jiamin Guizani, Maher Wang, Jian Kumar, Neeraj Tan, Lizhuang Qingdao Institute of Software College of Computer Science and Technology Qingdao266580 China Shandong Key Laboratory of Intelligent Oil & Gas Industrial Software Qingdao266580 China Ministry of Education Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Jinan250014 China University of Texas Arlington Computer Science and Engineering Department TX United States College of Science Qingdao266580 China Thapar University Department of Computer Science and Engineering Patiala147004 India Jinan250014 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan250014 China
Traditional cloud computing models struggle to meet the requirements of latency-sensitive applications when processing large amounts of data. As a solution, Multi-access Edge Computing (MEC) extends computing resource... 详细信息
来源: 评论
Applying system Thinking to Learn from Accident of Modern Automatic Control systems
收藏 引用
Chinese Journal of Electronics 2025年 第2期23卷 409-414页
作者: Ru Niu Yuan Cao Xiaocheng Ge Tao Tang State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing China School of Electronics and Information Engineering National Engineering Research Center of Rail Transportation Operation and Control System Beijing Jiaotong University Beijing China Department of Computer Science University of York York UK
Modern societies increasingly rely on automatic control systems. These systems are hardly pure technical systems; instead they are complex socio-technical systems, which consist of technical elements and social compon... 详细信息
来源: 评论
A deep learning-based approach for predicting ubiquitination sites using word embedding techniques
A deep learning-based approach for predicting ubiquitination...
收藏 引用
International Conference on computer and Information Technology (ICCIT)
作者: Md. Faruk Hosen Md. Abul Basar Md. Samim Hossain Sakib Sarker Md. Suhag Ali Monir Morshed Muhammad Shahin Uddin Department of Information and Communication Technology Mawlana Bhashani Science and Technology University Tangail Bangladesh Department of Computing and Information System Daffodil International University (DIU) Ashulia Dhaka Bangladesh Department of Computer Science and Engineering Uttara University Dhaka Department of Software Engineering Daffodil International University (DIU) Ashulia Dhaka Bangladesh
Ubiquitination is a prevalent and reversible post-translational modification (PTM) that controls apoptosis and plays a crucial role in protein breakdown and cell disorders. Ubiquitination also involved in the control ... 详细信息
来源: 评论
GM-DF: Generalized Multi-Scenario Deepfake Detection
arXiv
收藏 引用
arXiv 2024年
作者: Lai, Yingxin Yu, Zitong Yang, Jing Li, Bin Kang, Xiangui Shen, Linlin The School of Computing and Information Technology Great Bay University Dongguan523000 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen University Shenzhen518060 China The Guangdong Key Laboratory of Information Security The School of Computer Science and Engineering Sun Yat-sen University Guangzhou510080 China Computer Vision Institute School of Computer Science & Software Engineering Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China
Existing face forgery detection usually follows the paradigm of training models in a single domain, which leads to limited generalization capacity when unseen scenarios and unknown attacks occur. In this paper, we ela... 详细信息
来源: 评论
Breaking Barriers in Physical-World Adversarial Examples: Improving Robustness and Transferability via Robust Feature  39
Breaking Barriers in Physical-World Adversarial Examples: Im...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Wang, Yichen Chou, Yuxuan Zhou, Ziqi Zhang, Hangtao Wan, Wei Hu, Shengshan Li, Minghui National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China
As deep neural networks (DNNs) are widely applied in the physical world, many researches are focusing on physical-world adversarial examples (PAEs), which introduce perturbations to inputs and cause the model's in... 详细信息
来源: 评论
Imperceptible and Reliable Adversarial Attack  1
收藏 引用
4th International Conference on Frontiers in Cyber Security, FCS 2021
作者: Zhang, Jiawei Wang, Jinwei Luo, Xiangyang Ma, Bin Xiong, Naixue School of Computer and Software Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science and Technology Nanjing210044 China State Key Laboratory of Mathematical Engineering and Advanced Computing Zhenzhou450001 China Shandong Provincial Key Laboratory of Computer Networks and Qilu University of Technology Jinan250353 China Department of Computer Science and Mathematics Sul Ross State University AlpineTX79830 United States
Deep neural networks are vulnerable to adversarial examples, which can fool classifiers by adding small perturbations. Various adversarial attack methods have been proposed in the past several years, and most of them ... 详细信息
来源: 评论