咨询与建议

限定检索结果

文献类型

  • 4,538 篇 会议
  • 3,102 篇 期刊文献
  • 52 册 图书

馆藏范围

  • 7,692 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,956 篇 工学
    • 3,571 篇 计算机科学与技术...
    • 2,851 篇 软件工程
    • 890 篇 信息与通信工程
    • 712 篇 控制科学与工程
    • 439 篇 电气工程
    • 408 篇 电子科学与技术(可...
    • 394 篇 生物工程
    • 369 篇 机械工程
    • 283 篇 生物医学工程(可授...
    • 277 篇 光学工程
    • 211 篇 仪器科学与技术
    • 173 篇 动力工程及工程热...
    • 167 篇 化学工程与技术
    • 140 篇 土木工程
    • 139 篇 交通运输工程
    • 126 篇 建筑学
    • 123 篇 安全科学与工程
    • 120 篇 材料科学与工程(可...
  • 2,408 篇 理学
    • 1,402 篇 数学
    • 512 篇 物理学
    • 480 篇 生物学
    • 361 篇 统计学(可授理学、...
    • 334 篇 系统科学
    • 183 篇 化学
  • 1,379 篇 管理学
    • 837 篇 管理科学与工程(可...
    • 578 篇 图书情报与档案管...
    • 337 篇 工商管理
  • 271 篇 医学
    • 224 篇 临床医学
    • 181 篇 基础医学(可授医学...
  • 162 篇 法学
    • 121 篇 社会学
  • 109 篇 经济学
  • 71 篇 农学
  • 54 篇 教育学
  • 24 篇 文学
  • 19 篇 军事学
  • 14 篇 艺术学

主题

  • 482 篇 computer science
  • 372 篇 laboratories
  • 238 篇 software enginee...
  • 154 篇 data mining
  • 143 篇 application soft...
  • 131 篇 computational mo...
  • 119 篇 semantics
  • 117 篇 feature extracti...
  • 116 篇 software
  • 109 篇 wireless sensor ...
  • 107 篇 computer archite...
  • 102 篇 costs
  • 99 篇 software testing
  • 99 篇 algorithm design...
  • 96 篇 quality of servi...
  • 93 篇 optimization
  • 92 篇 protocols
  • 92 篇 testing
  • 89 篇 deep learning
  • 88 篇 software systems

机构

  • 493 篇 state key labora...
  • 213 篇 department of co...
  • 202 篇 department of co...
  • 170 篇 state key labora...
  • 157 篇 college of compu...
  • 108 篇 state key labora...
  • 101 篇 university of ch...
  • 90 篇 national enginee...
  • 88 篇 national key lab...
  • 84 篇 school of softwa...
  • 81 篇 department of co...
  • 66 篇 department of co...
  • 60 篇 department of co...
  • 60 篇 department of co...
  • 55 篇 state key labora...
  • 51 篇 state key labora...
  • 50 篇 tsinghua nationa...
  • 45 篇 national key lab...
  • 44 篇 peng cheng labor...
  • 43 篇 key laboratory o...

作者

  • 52 篇 rajkumar buyya
  • 42 篇 shen linlin
  • 41 篇 junping du
  • 32 篇 shen furao
  • 32 篇 baowen xu
  • 31 篇 yu huiqun
  • 30 篇 guihai chen
  • 30 篇 xu baowen
  • 29 篇 li wu-jun
  • 28 篇 xiang-yang li
  • 28 篇 zhao jian
  • 27 篇 dou wanchun
  • 26 篇 fan guisheng
  • 25 篇 zhou zhi-hua
  • 24 篇 jun zhang
  • 24 篇 yang tianbao
  • 23 篇 mei-ling shyu
  • 23 篇 shu-ching chen
  • 22 篇 yang yang
  • 22 篇 wang wei

语言

  • 7,174 篇 英文
  • 337 篇 其他
  • 178 篇 中文
  • 4 篇 德文
  • 1 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science Software System Laboratory"
7692 条 记 录,以下是171-180 订阅
排序:
SWPFOPLD: A Profiling and Optimizing Loader for SW26010Pro Processors  8
SWPFOPLD: A Profiling and Optimizing Loader for SW26010Pro P...
收藏 引用
8th International Conference on computer and Communication systems, ICCCS 2023
作者: Qian, Hong Wu, Wei Zhu, Qi Wang, Fei Zhao, Jinwei Zheng, Yan School of Computer Science and Technology University of Science and Technology of China Hefei China Jiangnan Institute of Computing Technology System Software Research Department Wuxi China Tsinghua University Department of Computer Science and Technology Beijing China National Research Center of Parallel Computer Engineering and Technology Beijing China
The Sunway family supercomputers have achieved a series of remarkable achievements. However, the toolchains provided by them are not perfect, which has brought great challenges to the development of high-performance a... 详细信息
来源: 评论
Improved Demonstration-Knowledge Utilization in Reinforcement Learning
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第5期5卷 2139-2150页
作者: Liu, Yanyu Zeng, Yifeng Ma, Biyang Pan, Yinghui Gao, Huifan Zhang, Yuting Xiamen University Xiamen Key Laboratory of Big Data Intelligent Analysis and Decision Department of Automation Xiamen361102 China Northumbria University Department of Computer and Information Sciences NewcastleNE1 8ST United Kingdom Minnan Normal University Department of Computer Science Zhangzhou363000 China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China
Reinforcement learning (RL) has made great success in recent years. Generally, the learning process requires a huge amount of interaction with the environment before an agent can achieve acceptable performance. This m... 详细信息
来源: 评论
A Study of Data Augmentation for Imbalance Problem in Network Traffic  3
A Study of Data Augmentation for Imbalance Problem in Networ...
收藏 引用
3rd International Conference on Blockchain Technology and Information Security, ICBCTIS 2023
作者: Wang, Xu Sun, Shimin Han, Li School of Computer Science and Engineering Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Autonomous Intelligent Technology and System School of Software Tiangong University Tianjin China School of Computer Science and Engineering Tianjin University of Technology National Engineering Laboratory for Computer Virus Prevention and Control Technology Tianjin China
The complexity and diversity of smart grid systems increase the likelihood of anomalies in communications between devices in the system, and how these anomalies are detected is critical to the security of the grid sys... 详细信息
来源: 评论
An EnKF-LSTM Assimilation Algorithm for Crop Growth Model
IEEE Transactions on AgriFood Electronics
收藏 引用
IEEE Transactions on AgriFood Electronics 2024年 第2期2卷 372-380页
作者: Zhou, Siqi Wang, Ling Liu, Jie Tang, Jinshan Harbin Institution of Technology Department of Computer Science and Technology Harbin150001 China Harbin Institute of Technology Department of Computer Science and Technology Harbin150001 China National Key Laboratory of Smart Farming Technology and System Heilongjiang Harbin150000 China George Mason University Department of Health Administration and Policy College of Public Health FairfaxVA22033 United States
Accurate and timely prediction of crop growth is of great significance to ensure crop yields, and researchers have developed several crop models for the prediction of crop growth. However, there are large differences ... 详细信息
来源: 评论
Fine-Grained software Vulnerability Detection via Neural Architecture Search  28th
Fine-Grained Software Vulnerability Detection via Neural Ar...
收藏 引用
28th International Conference on Database systems for Advanced Applications, DASFAA 2023
作者: Du, Qianjin Kuang, Xiaohui Li, Xiang Zhao, Gang The Department of Computer Science and Technology Tsinghua University Beijing100084 China National Key Laboratory of Science and Technology on Information System Security Beijing100084 China
Vulnerability detection methods based on the deep learning have achieved remarkable performance improvements compared to traditional methods. Current deep learning-based detectors mostly use a single RNN or its varian... 详细信息
来源: 评论
OblivTime: Oblivious and Efficient Interval Skyline Query Processing Over Encrypted Time-Series Data
收藏 引用
IEEE Transactions on Services Computing 2025年 第03期18卷 1602-1617页
作者: Ouyang, Huajie Zheng, Yifeng Wang, Songlei Hua, Zhongyun Harbin Institute of Technology School of Computer Science and Technology Guangdong Shenzhen518055 China The Hong Kong Polytechnic University Department of Electrical and Electronic Engineering Hong Kong Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen518055 China
Time-series data is prevalent in many applications like smart homes, smart grids, and healthcare. And it is now increasingly common to store and query time-series data in the cloud. Despite the benefits, data privacy ... 详细信息
来源: 评论
Gene Expression Variability Linked to Chromatin Clique Configurations and cis-Regulatory Elements  24
Gene Expression Variability Linked to Chromatin Clique Confi...
收藏 引用
Proceedings of the 2024 8th International Conference on Computational Biology and Bioinformatics
作者: Gatis Melkus Andrejs Sizovs Sandra Silina Peteris Rucevskis Lelde Lace Edgars Celms Juris Viksna Research Laboratory of System Modeling and Software Technologies Institute of Mathematics and Computer Science University of Latvia Riga Latvia
来源: 评论
BHJO: A Novel Hybrid Metaheuristic Algorithm Combining the Beluga Whale, Honey Badger, and Jellyfish Search Optimizers for Solving Engineering Design Problems
收藏 引用
computer Modeling in Engineering & sciences 2024年 第10期141卷 219-265页
作者: Farouq Zitouni Saad Harous Abdulaziz S.Almazyad Ali Wagdy Mohamed Guojiang Xiong Fatima Zohra Khechiba Khadidja  Kherchouche Department of Computer Science and Information Technology Kasdi Merbah UniversityP.O.Box 30000OuarglaAlgeria Department of Computer Science College of Computing and InformaticsUniversity of SharjahP.O.Box 27272SharjahUnited Arab Emirates Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityP.O.Box 51178Riyadh11543Saudi Arabia Operations Research Department Faculty of Graduate Studies for Statistical ResearchCairo UniversityGiza12613Egypt Applied Science Research Center Applied Science Private UniversityAmman11937Jordan Guizhou Key Laboratory of Intelligent Technology in Power System College of Electrical EngineeringGuizhou UniversityGuiyang550025China
Hybridizing metaheuristic algorithms involves synergistically combining different optimization techniques to effectively address complex and challenging optimization *** approach aims to leverage the strengths of mult... 详细信息
来源: 评论
Exploring Global and Local Information for Anomaly Detection with Normal Samples
Exploring Global and Local Information for Anomaly Detection...
收藏 引用
2023 IEEE International Conference on systems, Man, and Cybernetics, SMC 2023
作者: Xu, Fan Wang, Nan Zhao, Xibin School of Computer Science and Technology University of Science and Technology of China Hefei230026 China School of Software Beijing Jiaotong University Beijing100044 China Key Laboratory for Information System Security Beijing100084 China
Anomaly detection aims to detect data that do not conform to regular patterns, and such data is also called outliers. The anomalies to be detected are often tiny in proportion, containing crucial information, and are ...
来源: 评论
Poster Abstract: Ripple: Large-Scale Service and Configuration Management in the Cloud  25
Poster Abstract: Ripple: Large-Scale Service and Configurati...
收藏 引用
25th ACM International Middleware Conference Demos, Posters and Doctoral Symposium, MIDDLEWARE 2024
作者: Ji, Shuping Tang, Zhen Wang, Wei Li, Hui Yao, Jianguo Jacobsen, Hans-Arno Institute of Software Chinese Academy of Sciences Beijing China Shanghai Jiao Tong University Jinan Inspur Data Technology Co. Ltd Shanghai China University of Toronto Toronto Canada Key Laboratory of System Software CAS State Key Laboratory of Computer Science Institute of Software at CAS University of CAS Beijing China University of CAS Nanjing College Nanjing China Nanjing Institute of Software Technology Nanjing China
Microservice architectures backed by container technology have been widely used in many real-world cloud-native applications. The number of containers in cloud data centers continues to increase, expected to reach sev... 详细信息
来源: 评论