咨询与建议

限定检索结果

文献类型

  • 1,406 篇 会议
  • 1,116 篇 期刊文献
  • 6 册 图书

馆藏范围

  • 2,528 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,754 篇 工学
    • 1,415 篇 计算机科学与技术...
    • 1,149 篇 软件工程
    • 317 篇 信息与通信工程
    • 240 篇 控制科学与工程
    • 139 篇 生物工程
    • 111 篇 电子科学与技术(可...
    • 105 篇 电气工程
    • 100 篇 机械工程
    • 74 篇 光学工程
    • 65 篇 仪器科学与技术
    • 62 篇 生物医学工程(可授...
    • 55 篇 动力工程及工程热...
    • 51 篇 化学工程与技术
    • 45 篇 网络空间安全
    • 33 篇 建筑学
    • 32 篇 安全科学与工程
    • 31 篇 土木工程
  • 765 篇 理学
    • 495 篇 数学
    • 147 篇 生物学
    • 141 篇 统计学(可授理学、...
    • 139 篇 物理学
    • 101 篇 系统科学
    • 58 篇 化学
  • 507 篇 管理学
    • 331 篇 管理科学与工程(可...
    • 198 篇 图书情报与档案管...
    • 111 篇 工商管理
  • 59 篇 法学
    • 43 篇 社会学
  • 46 篇 医学
    • 41 篇 临床医学
    • 36 篇 基础医学(可授医学...
  • 35 篇 经济学
    • 35 篇 应用经济学
  • 18 篇 教育学
  • 14 篇 农学
  • 10 篇 艺术学
  • 7 篇 文学
  • 6 篇 军事学

主题

  • 107 篇 computer science
  • 71 篇 laboratories
  • 65 篇 semantics
  • 47 篇 software
  • 42 篇 software enginee...
  • 42 篇 wireless sensor ...
  • 42 篇 algorithm design...
  • 40 篇 cloud computing
  • 38 篇 optimization
  • 38 篇 web services
  • 36 篇 feature extracti...
  • 36 篇 testing
  • 34 篇 computational mo...
  • 33 篇 reinforcement le...
  • 33 篇 software testing
  • 33 篇 clustering algor...
  • 32 篇 protocols
  • 30 篇 routing
  • 30 篇 task analysis
  • 28 篇 educational inst...

机构

  • 960 篇 state key labora...
  • 221 篇 department of co...
  • 127 篇 national key lab...
  • 108 篇 state key labora...
  • 106 篇 state key labora...
  • 87 篇 state key labora...
  • 78 篇 college of compu...
  • 67 篇 department of co...
  • 55 篇 school of comput...
  • 51 篇 state key labora...
  • 48 篇 national key lab...
  • 45 篇 nanjing universi...
  • 42 篇 school of artifi...
  • 34 篇 state key labora...
  • 34 篇 school of comput...
  • 33 篇 the state key la...
  • 32 篇 state key lab. f...
  • 27 篇 school of electr...
  • 27 篇 university of ch...
  • 27 篇 department of co...

作者

  • 59 篇 gao yang
  • 46 篇 dou wanchun
  • 42 篇 sanglu lu
  • 41 篇 shi yinghuan
  • 39 篇 guihai chen
  • 37 篇 li wu-jun
  • 33 篇 zhang lijun
  • 31 篇 shen furao
  • 31 篇 ying mingsheng
  • 30 篇 zhao jian
  • 30 篇 xu baowen
  • 30 篇 qi lei
  • 28 篇 lu sanglu
  • 28 篇 chen guihai
  • 27 篇 baowen xu
  • 27 篇 xu xiaolong
  • 27 篇 chen zhenyu
  • 26 篇 wanchun dou
  • 26 篇 jie wu
  • 26 篇 xu chang

语言

  • 2,327 篇 英文
  • 121 篇 其他
  • 79 篇 中文
  • 2 篇 德文
检索条件"机构=Department of Computer Science and Technology&State Key Laboratory for Novel Software Technology"
2528 条 记 录,以下是131-140 订阅
排序:
LEARNING WITH LOGICAL CONSTRAINTS BUT WITHOUT SHORTCUT SATISFACTION  11
LEARNING WITH LOGICAL CONSTRAINTS BUT WITHOUT SHORTCUT SATIS...
收藏 引用
11th International Conference on Learning Representations, ICLR 2023
作者: Li, Zenan Liu, Zehua Yao, Yuan Xu, Jingwei Chen, Taolue Ma, Xiaoxing Lü, Jian State Key Lab of Novel Software Technology Nanjing University China Department of Mathematics The University of Hong Kong Hong Kong Department of Computer Science Birkbeck University of London United Kingdom
Recent studies have explored the integration of logical knowledge into deep learning via encoding logical constraints as an additional loss ***, existing approaches tend to vacuously satisfy logical constraints throug... 详细信息
来源: 评论
Revisiting Stochastic Multi-Level Compositional Optimization
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 第7期47卷 5613-5624页
作者: Wei Jiang Sifan Yang Yibo Wang Tianbao Yang Lijun Zhang National Key Laboratory for Novel Software Technology Nanjing University Nanjing China National Key Laboratory for Novel Software Technology School of Artiicial Intelligence Nanjing University Nanjing China Department of Computer Science and Engineering Texas A&M University College Station TX USA
This paper explores stochastic multi-level compositional optimization, where the objective function is a composition of multiple smooth functions. Traditional methods for solving this problem suffer from either sub-op... 详细信息
来源: 评论
On Efficient Packet Batching and Resource Allocation for GPU based NFV Acceleration  31
On Efficient Packet Batching and Resource Allocation for GPU...
收藏 引用
31st IEEE/ACM International Symposium on Quality of Service, IWQoS 2023
作者: Zeng, Deze Zhu, Andong Gu, Lin Chen, Quan Guo, Minyi School of Computer Science China University of Geosciences Hubei Wuhan China Nanjing University State Key Lab. for Novel Software Technology Nanjing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Shanghai Jiao Tong University Department of Computer Science and Engineering Shanghai China
Network Function Virtualization (NFV) has already become an essential technology for improving the scalability and flexibility of modern computer networks. The performance gap has become the main issue that impedes th... 详细信息
来源: 评论
Hashing based Contrastive Learning for Virtual Screening
arXiv
收藏 引用
arXiv 2024年
作者: Han, Jin Hong, Yun Li, Wu-Jun National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing210023 China
Virtual screening (VS) is a critical step in computer-aided drug discovery, aiming to identify molecules that bind to a specific target receptor like protein. Traditional VS methods, such as docking, are often too tim... 详细信息
来源: 评论
A Privacy Preserving Method for IoT Forensics
A Privacy Preserving Method for IoT Forensics
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Zhang, Wenzheng Chen, Boxi Fu, Xiao Gu, Qing Shi, Jin Du, Xiaojiang Zhou, Xiaoyang Nanjing University State Key Laboratory for Novel Software Technology Nanjing China Nanjing University School of Information Management Nanjing China Stevens Institute of Technology Department of Electrical and Computer Engineering HobokenNJ United States Innovation Research Institute Nanjing China
The diversity of the Internet of Things (IoT) poses challenges to privacy protection, especially in the field of digital forensics. How to ensure that only the private information of the suspect is provided, and not t... 详细信息
来源: 评论
Hashing for Protein Structure Similarity Search
arXiv
收藏 引用
arXiv 2024年
作者: Han, Jin Li, Wu-Jun National Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing210023 China
Protein structure similarity search (PSSS), which tries to search proteins with similar structures, plays a crucial role across diverse domains from drug design to protein function prediction and molecular evolution. ... 详细信息
来源: 评论
Testing Constraint Checking Implementations via Principled Metamorphic Transformations
Testing Constraint Checking Implementations via Principled M...
收藏 引用
IEEE International Conference on software Analysis, Evolution and Reengineering (SANER)
作者: Mingchen Gao Huiyan Wang Chang Xu State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
Constraint checking techniques are being widely used for ensuring the consistency of software artifacts during their development and evolution (e.g., detecting inconsistency in an application's running contexts or... 详细信息
来源: 评论
FedLPS: Heterogeneous Federated Learning for Multiple Tasks with Local Parameter Sharing
arXiv
收藏 引用
arXiv 2024年
作者: Jia, Yongzhe Zhang, Xuyun Beheshti, Amin Dou, Wanchun State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University China School of Computing Macquarie University Australia
Federated Learning (FL) has emerged as a promising solution in Edge Computing (EC) environments to process the proliferation of data generated by edge devices. By collaboratively optimizing the global machine learning... 详细信息
来源: 评论
Similarity-navigated conformal prediction for graph neural networks  24
Similarity-navigated conformal prediction for graph neural n...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Jianqing Song Jianguo Huang Wenyu Jiang Baoming Zhang Shuangjie Li Chongjun Wang State Key Laboratory of Novel Software Technology Nanjing University Department of Statistics and Data Science Southern University of Science and Technology and College of Computing and Data Science Nanyang Technological University Department of Statistics and Data Science Southern University of Science and Technology and State Key Laboratory of Novel Software Technology Nanjing University
Graph Neural Networks have achieved remarkable accuracy in semi-supervised node classification tasks. However, these results lack reliable uncertainty estimates. Conformal prediction methods provide a theoretical guar...
来源: 评论
Distributed GAN: Toward a Faster Reinforcement-Learning-Based Architecture Search
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2022年 第3期3卷 391-401页
作者: Shi, Jiachen Fan, Yi Zhou, Guoqiang Shen, Jun Nanjing University of Posts and Telecommunications College of Computer Science Nanjing210046 China Nanjing University State Key Laboratory for Novel Software Technology Nanjing210046 China University of Wollongong School of Computing and Information Technology WollongongNSW2522 Australia
In the existing reinforcement learning (RL)-based neural architecture search (NAS) methods for a generative adversarial network (GAN), both the generator and the discriminator architecture are usually treated as the s... 详细信息
来源: 评论