咨询与建议

限定检索结果

文献类型

  • 4,538 篇 会议
  • 3,102 篇 期刊文献
  • 52 册 图书

馆藏范围

  • 7,692 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,956 篇 工学
    • 3,571 篇 计算机科学与技术...
    • 2,851 篇 软件工程
    • 890 篇 信息与通信工程
    • 712 篇 控制科学与工程
    • 439 篇 电气工程
    • 408 篇 电子科学与技术(可...
    • 394 篇 生物工程
    • 369 篇 机械工程
    • 283 篇 生物医学工程(可授...
    • 277 篇 光学工程
    • 211 篇 仪器科学与技术
    • 173 篇 动力工程及工程热...
    • 167 篇 化学工程与技术
    • 140 篇 土木工程
    • 139 篇 交通运输工程
    • 126 篇 建筑学
    • 123 篇 安全科学与工程
    • 120 篇 材料科学与工程(可...
  • 2,408 篇 理学
    • 1,402 篇 数学
    • 512 篇 物理学
    • 480 篇 生物学
    • 361 篇 统计学(可授理学、...
    • 334 篇 系统科学
    • 183 篇 化学
  • 1,379 篇 管理学
    • 837 篇 管理科学与工程(可...
    • 578 篇 图书情报与档案管...
    • 337 篇 工商管理
  • 271 篇 医学
    • 224 篇 临床医学
    • 181 篇 基础医学(可授医学...
  • 162 篇 法学
    • 121 篇 社会学
  • 109 篇 经济学
  • 71 篇 农学
  • 54 篇 教育学
  • 24 篇 文学
  • 19 篇 军事学
  • 14 篇 艺术学

主题

  • 482 篇 computer science
  • 372 篇 laboratories
  • 238 篇 software enginee...
  • 154 篇 data mining
  • 143 篇 application soft...
  • 131 篇 computational mo...
  • 119 篇 semantics
  • 117 篇 feature extracti...
  • 116 篇 software
  • 109 篇 wireless sensor ...
  • 107 篇 computer archite...
  • 102 篇 costs
  • 99 篇 software testing
  • 99 篇 algorithm design...
  • 96 篇 quality of servi...
  • 93 篇 optimization
  • 92 篇 protocols
  • 92 篇 testing
  • 89 篇 deep learning
  • 88 篇 software systems

机构

  • 493 篇 state key labora...
  • 213 篇 department of co...
  • 202 篇 department of co...
  • 170 篇 state key labora...
  • 157 篇 college of compu...
  • 108 篇 state key labora...
  • 101 篇 university of ch...
  • 90 篇 national enginee...
  • 88 篇 national key lab...
  • 84 篇 school of softwa...
  • 81 篇 department of co...
  • 66 篇 department of co...
  • 60 篇 department of co...
  • 60 篇 department of co...
  • 55 篇 state key labora...
  • 51 篇 state key labora...
  • 50 篇 tsinghua nationa...
  • 45 篇 national key lab...
  • 44 篇 peng cheng labor...
  • 43 篇 key laboratory o...

作者

  • 52 篇 rajkumar buyya
  • 42 篇 shen linlin
  • 41 篇 junping du
  • 32 篇 shen furao
  • 32 篇 baowen xu
  • 31 篇 yu huiqun
  • 30 篇 guihai chen
  • 30 篇 xu baowen
  • 29 篇 li wu-jun
  • 28 篇 xiang-yang li
  • 28 篇 zhao jian
  • 27 篇 dou wanchun
  • 26 篇 fan guisheng
  • 25 篇 zhou zhi-hua
  • 24 篇 jun zhang
  • 24 篇 yang tianbao
  • 23 篇 mei-ling shyu
  • 23 篇 shu-ching chen
  • 22 篇 yang yang
  • 22 篇 wang wei

语言

  • 7,174 篇 英文
  • 337 篇 其他
  • 178 篇 中文
  • 4 篇 德文
  • 1 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Department of Computer Science Software System Laboratory"
7692 条 记 录,以下是261-270 订阅
排序:
Efficient Nearest Neighbor Emotion Classification with BERT-whitening
Efficient Nearest Neighbor Emotion Classification with BERT-...
收藏 引用
2022 Conference on Empirical Methods in Natural Language Processing, EMNLP 2022
作者: Yin, Wenbiao Shang, Lin State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Retrieval-based methods have been proven effective in many NLP tasks. Previous methods use representations from the pre-trained model for similarity search directly. However, the sentence representations from the pre-... 详细信息
来源: 评论
SHT-based public auditing protocol with error tolerance in FDL-empowered IoVs
收藏 引用
Digital Communications and Networks 2024年 第1期10卷 142-149页
作者: Kui Zhu Yongjun Ren Jian Shen Pandi Vijayakumar Pradip Kumar Sharma School of Computer and Software Nanjing University of Information Science&TechnologyNanjing210044China Peng Cheng Laboratory Shenzhen518000China Department of Computer Science and Engineering University College of Engineering TindivanamTamil Nadu604001India Department of Computing Science University of AberdeenAberdeenAB243UEUK
With the intelligentization of the Internet of Vehicles(lovs),Artificial Intelligence(Al)technology is becoming more and more essential,especially deep *** Deep Learning(FDL)is a novel distributed machine learning tec... 详细信息
来源: 评论
An accident prediction architecture based on spatio-clock stochastic and hybrid model for autonomous driving safety
An accident prediction architecture based on spatio-clock st...
收藏 引用
作者: Wang, Jinyong Huang, Zhiqiu Huang, Xiaowei Wang, Tiexin Shen, Guohua Xie, Jian College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Key Laboratory of Safety-Critical Software Ministry of Industry and Information Technology Nanjing China Department of Computer Science University of Liverpool Liverpool United Kingdom
Collaborative and autonomous driving vehicles combine hardware and software complex processes, also are heavily dependent on and influenced by the world of physical and cyber interactions. They have enabled many new f... 详细信息
来源: 评论
Foes or Friends: Embracing Ground Effect for Edge Detection on Lightweight Drones  24
Foes or Friends: Embracing Ground Effect for Edge Detection ...
收藏 引用
30th International Conference on Mobile Computing and Networking, ACM MobiCom 2024
作者: Zhao, Chenyu Ruan, Ciyu Xu, Jingao Wang, Haoyang Wang, Shengbo Li, Jiaqi Zha, Jirong Yang, Zheng Liu, Yunhao Zhang, Xiao-Ping Chen, Xinlei Shenzhen International Graduate School Tsinghua University China Computer Science Department Carnegie Mellon University United States Pengcheng Laboratory China RISC-V International Open Source Laboratory China School of Software Tsinghua University China
Drone-based rapid and accurate environmental edge detection is highly advantageous for tasks such as disaster relief and autonomous navigation. Current methods, using radar or cameras, raise deployment costs and burde... 详细信息
来源: 评论
Gamification using Octalysis Framework in Knowledge Management system for Vocational High Schools during the Covid-19 Pandemic  7
Gamification using Octalysis Framework in Knowledge Manageme...
收藏 引用
7th International Conference on Informatics and Computing, ICIC 2022
作者: Firdaus, Mgs. Afriyan Indah, Dwi Rosa Sazaki, Yoppy Ariefin, Eka Prasetyo Nuriza, Muhammad Fachri Rafly, Muhammad Universitas Sriwijaya Faculty of Computer Science Information System Department Palembang Indonesia Universitas Sriwijaya Data Structure and Accounting Information System Laboratory Faculty of Computer Science Palembang Indonesia Universitas Sriwijaya Faculty of Computer Science Informatics Management Department Palembang Indonesia
Knowledge management systems enable teachers and students to interact directly in the knowledge transfer process during the Covid-19 pandemic. In addition, applying the gamification concept in vocational disciplines c... 详细信息
来源: 评论
DNBP-CCA:A Novel Approach to Enhancing Heterogeneous Data Traffic and Reliable Data Transmission for Body Area Network
收藏 引用
computers, Materials & Continua 2024年 第5期79卷 2851-2878页
作者: Abdulwadood Alawadhi Mohd.Hasbullah Omar Abdullah Almogahed Noradila Nordin Salman A.Alqahtani Atif M.Alamri InterNetWorks Research Laboratory School of ComputingUniversiti Utara MalaysiaSintok06010Malaysia Faculty of Computer Science and Information Technology Universiti Tun Hussein Onn MalaysiaParit RajaJohor86400Malaysia School of Games&Creative Technology University for the Creative ArtsFarnhamGU97DSUK Computer Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia Software Engineering Department College of Computer and Information SciencesKing Saud UniversityRiyadh11543Saudi Arabia
The increased adoption of Internet of Medical Things (IoMT) technologies has resulted in the widespread use ofBody Area Networks (BANs) in medical and non-medical domains. However, the performance of IEEE 802.15.4-bas... 详细信息
来源: 评论
Code Vulnerability Detection via Nearest Neighbor Mechanism
Code Vulnerability Detection via Nearest Neighbor Mechanism
收藏 引用
2022 Findings of the Association for Computational Linguistics: EMNLP 2022
作者: Du, Qianjin Kuang, Xiaohui Zhao, Gang Department of Computer Science and Technology Tsinghua University China National Key Laboratory of Science and Technology on Information System Security China
Code vulnerability detection is a fundamental and challenging task in the software security field. Existing research works aim to learn semantic information from the source code by utilizing NLP technologies. However,... 详细信息
来源: 评论
A Composite Decomposition Method for Large-Scale Global Optimization
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第12期5卷 6304-6319页
作者: Tian, Maojiang Chen, Minyang Du, Wei Tang, Yang Jin, Yaochu Yen, Gary G. Southern University of Science and Technology Department of Computer Science and Engineering Shenzhen518055 China East China University of Science and Technology Key Laboratory of Smart Manufacturing in Energy Chemical Process Ministry of Education Shanghai200237 China East China University of Science and Technology Engineering Research Center of Process System Engineering Ministry of Education Shanghai200237 China Westlake University School of Engineering Hangzhou310030 China Oklahoma State University School of Electrical and Computer Engineering StillwaterOK74048 United States
Cooperative coevolution (CC) algorithms, based on the divide-and-conquer strategy, have emerged as the predominant approach to solving large-scale global optimization (LSGO) problems. The efficiency and accuracy of th... 详细信息
来源: 评论
Deep Semantic and Attentive Network for Unsupervised Video Summarization
收藏 引用
ACM Transactions on Multimedia Computing, Communications and Applications 2022年 第2期18卷 1-21页
作者: Zhong, Sheng-Hua Lin, Jingxu Lu, Jianglin Fares, Ahmed Ren, Tongwei College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Department of Electrical Engineering Computer Systems Engineering Program Faculty of Engineering at Shoubra Benha University Cairo Egypt State Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China
With the rapid growth of video data, video summarization is a promising approach to shorten a lengthy video into a compact version. Although supervised summarization approaches have achieved state-of-the-art performan... 详细信息
来源: 评论
GridDroid--An Effective and Efficient Approach for Android Repackaging Detection Based on Runtime Graphical User Interface
收藏 引用
Journal of computer science & Technology 2022年 第1期37卷 147-181页
作者: Jun Ma Qing-Wei Sun Chang Xu Xian-Ping Tao State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China Department of Computer Science and Technology Nanjing UniversityNanjing 210023China Huatai Securities Co. Ltd.Nanjing 210019China
Repackaging brings serious threats to Android *** birthmark techniques are typically applied to detect repackaged *** based on apps'runtime graphical user interfaces(GUI)are effective,especially for obfuscated or ... 详细信息
来源: 评论