咨询与建议

限定检索结果

文献类型

  • 1,409 篇 会议
  • 1,088 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 2,502 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,725 篇 工学
    • 1,388 篇 计算机科学与技术...
    • 1,122 篇 软件工程
    • 308 篇 信息与通信工程
    • 233 篇 控制科学与工程
    • 139 篇 生物工程
    • 114 篇 电子科学与技术(可...
    • 105 篇 电气工程
    • 99 篇 机械工程
    • 73 篇 光学工程
    • 64 篇 仪器科学与技术
    • 62 篇 生物医学工程(可授...
    • 52 篇 动力工程及工程热...
    • 51 篇 化学工程与技术
    • 45 篇 网络空间安全
    • 33 篇 建筑学
    • 31 篇 土木工程
    • 31 篇 安全科学与工程
  • 748 篇 理学
    • 481 篇 数学
    • 147 篇 生物学
    • 140 篇 物理学
    • 136 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 58 篇 化学
  • 501 篇 管理学
    • 329 篇 管理科学与工程(可...
    • 194 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 59 篇 法学
    • 43 篇 社会学
  • 45 篇 医学
    • 40 篇 临床医学
    • 36 篇 基础医学(可授医学...
  • 35 篇 经济学
    • 35 篇 应用经济学
  • 18 篇 教育学
  • 14 篇 农学
  • 9 篇 艺术学
  • 7 篇 文学
  • 6 篇 军事学

主题

  • 107 篇 computer science
  • 71 篇 laboratories
  • 64 篇 semantics
  • 49 篇 software
  • 42 篇 software enginee...
  • 42 篇 algorithm design...
  • 40 篇 cloud computing
  • 37 篇 optimization
  • 37 篇 wireless sensor ...
  • 37 篇 web services
  • 36 篇 testing
  • 35 篇 feature extracti...
  • 34 篇 computational mo...
  • 33 篇 software testing
  • 33 篇 clustering algor...
  • 32 篇 protocols
  • 31 篇 reinforcement le...
  • 30 篇 routing
  • 30 篇 task analysis
  • 28 篇 educational inst...

机构

  • 941 篇 state key labora...
  • 207 篇 department of co...
  • 125 篇 national key lab...
  • 109 篇 state key labora...
  • 108 篇 state key labora...
  • 86 篇 state key labora...
  • 78 篇 college of compu...
  • 66 篇 department of co...
  • 54 篇 school of comput...
  • 52 篇 state key labora...
  • 47 篇 national key lab...
  • 46 篇 nanjing universi...
  • 41 篇 school of artifi...
  • 34 篇 state key labora...
  • 33 篇 school of comput...
  • 32 篇 the state key la...
  • 32 篇 state key lab. f...
  • 28 篇 department of co...
  • 27 篇 university of ch...
  • 27 篇 school of comput...

作者

  • 56 篇 gao yang
  • 47 篇 dou wanchun
  • 42 篇 sanglu lu
  • 41 篇 shi yinghuan
  • 39 篇 guihai chen
  • 37 篇 li wu-jun
  • 33 篇 zhang lijun
  • 31 篇 ying mingsheng
  • 31 篇 qi lei
  • 30 篇 shen furao
  • 30 篇 xu baowen
  • 29 篇 zhao jian
  • 29 篇 chen guihai
  • 28 篇 lu sanglu
  • 27 篇 baowen xu
  • 27 篇 xu xiaolong
  • 27 篇 chen zhenyu
  • 26 篇 wanchun dou
  • 26 篇 jie wu
  • 26 篇 xu chang

语言

  • 2,223 篇 英文
  • 221 篇 其他
  • 57 篇 中文
  • 2 篇 德文
检索条件"机构=Department of Computer Science and Technology&State Key Laboratory for Novel Software Technology"
2502 条 记 录,以下是251-260 订阅
排序:
Git Merge Conflict Resolution Leveraging Strategy Classification and LLM
Git Merge Conflict Resolution Leveraging Strategy Classifica...
收藏 引用
IEEE International Conference on software Quality, Reliability and Security (QRS)
作者: Chaochao Shen Wenhua Yang Minxue Pan Yu Zhou College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics China State Key Laboratory for Novel Software Technology Nanjing University China
In the realm of collaborative software development, version control systems (VCS) like Git play an indispensable role, enabling concurrent development and facilitating seamless integration of disparate code contributi...
来源: 评论
An efficient split learning framework for recurrent neural network in mobile edge environment  22
An efficient split learning framework for recurrent neural n...
收藏 引用
2022 Conference on Research in Adaptive and Convergent Systems, RACS 2022
作者: Zhou, Wenxuan Qu, Zhihao Zhao, Yanchao Tang, Bin Ye, Baoliu Key Laboratory of Water Big Data Technology of Ministry of Water Resources and School of Computer and Information Hohai University Jiangsu Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Jiangsu Nanjing China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Jiangsu Nanjing China
Split learning is an emerging distributed machine learning paradigm that exhibits great advantages in privacy protection and training efficiency. Most previous studies pay attention to client-server based split learni... 详细信息
来源: 评论
CADEC: A Combinatorial Auction for Dynamic Distributed DNN Inference Scheduling in Edge-Cloud Networks
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Xu, Xiaolong Hu, Yuhao Cui, Guangming Qi, Lianyong Dou, Wanchun Nanjing University of Information Science and Technology School of Software Nanjing210044 China Nanjing University of Information Science and Technology Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services School of Software China Nanjing University State Key Laboratory for Novel Software Technology China College of Computer science and technology Qingdao China Georgia State University Department of Computer Science United States
Deep Neural Network (DNN) Inference, as a key enabler of intelligent applications, is often computation-intensive and latency-sensitive. Combining the advantages of cloud computing (abundant computing resources) and e... 详细信息
来源: 评论
Integrating Dual Prototypes for Task-Wise Adaption in Pre-Trained Model-Based Class-Incremental Learning
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Zhiming Yang, Suorong Xu, Baile Zhao, Jian Shen, Furao National Key Laboratory for Novel Software Technology Nanjing University China School of Artificial Intelligence Nanjing University China Department of Computer Science and Technology Nanjing University China
Class-incremental learning (CIL) aims to acquire new classes while conserving historical knowledge incrementally. Despite existing pre-trained model (PTM) based methods performing excellently in CIL, it is better to f... 详细信息
来源: 评论
Dynamical Trust Construction Schema with Fuzzy Decision in P2P Systems
收藏 引用
Chinese Journal of Electronics 2023年 第3期18卷 417-421页
作者: Yang Wang Ruchuan Wang Zhijie Han College of Computer Science and Technology Nanjing University of Posts and Telecommunications Nanjing China Department of Computer Anhui Normal University Wuhu China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
The security problem for Peer-to-peer (P2P) systems has been gradually recognized as an important topic of P2P applications. Among existing solution for P2P security, how to establish trust relationship among peers is... 详细信息
来源: 评论
Attention Is All You Need for LLM-based Code Vulnerability Localization
arXiv
收藏 引用
arXiv 2024年
作者: Li, Yue Li, Xiao Wu, Hao Zhang, Yue Cheng, Xiuzhen Zhong, Sheng Xu, Fengyuan National Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science Drexel University Philadelphia United States School of Computer Science and Technology Shandong University Qingdao China
The rapid expansion of software systems and the growing number of reported vulnerabilities have emphasized the importance of accurately identifying vulnerable code segments. Traditional methods for vulnerability local... 详细信息
来源: 评论
Understanding and Enhancing Issue Prioritization in GitHub
Understanding and Enhancing Issue Prioritization in GitHub
收藏 引用
IEEE International Conference on Automated software Engineering (ASE)
作者: Yingying He Wenhua Yang Minxue Pan Yasir Hussain Yu Zhou College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics China State Key Laboratory for Novel Software Technology Nanjing University China
GitHub has become a prominent platform for open source software development, facilitating collaboration and communication among a diverse group of contributors. Efficient issue tracking is a crucial aspect of managing...
来源: 评论
SAPPX: Securing COTS Binaries with Automatic Program Partitioning for Intel SGX
SAPPX: Securing COTS Binaries with Automatic Program Partiti...
收藏 引用
International Symposium on software Reliability Engineering (ISSRE)
作者: Jiawei Huang Hao Han Fengyuan Xu Bing Chen College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics China State Key Laboratory of Novel Software Technology Nanjing University China
In the era of cloud computing, many applications are migrated to public servers not fully controlled by users who may fear their critical operations or data from being compromised by attackers. Previous studies have s...
来源: 评论
An Innovative Approach To software Modularization Based On The Artificial Fish Swarm Algorithm  22
An Innovative Approach To Software Modularization Based On T...
收藏 引用
Proceedings of the 2022 6th International Conference on Electronic Information technology and computer Engineering
作者: Jianqiang Pan Cheng Zhang Huihui Jia Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology State Key Lab for Novel Software Technology Anhui University China
It gets more and more expensive to maintain the complete software system as time goes on since the software architecture grows more complicated and the software code is more difficult to understand. This issue may be ... 详细信息
来源: 评论
NBMon: NB-IoT-based UAV Network Routing Monitoring System  24
NBMon: NB-IoT-based UAV Network Routing Monitoring System
收藏 引用
24th IEEE International Conference on High Performance Computing and Communications, 8th IEEE International Conference on Data science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Tang, Ji'ao Zhu, Xiaojun Dong, Chao Zhang, Lei College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics China College of Electronic and Information Engineering Nanjing University of Aeronautics and Astronautics China Nanjing University State Key Laboratory of Novel Software Technology Nanjing China
The routing state of UAV networks is difficult to monitor, making many new routing protocols hard to evaluate on UAVs. In this paper, we propose NBMon, an NB-IoT-based routing monitoring system for UAV networks, which... 详细信息
来源: 评论