咨询与建议

限定检索结果

文献类型

  • 1,411 篇 会议
  • 1,100 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 2,516 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,736 篇 工学
    • 1,394 篇 计算机科学与技术...
    • 1,128 篇 软件工程
    • 309 篇 信息与通信工程
    • 238 篇 控制科学与工程
    • 140 篇 生物工程
    • 116 篇 电子科学与技术(可...
    • 108 篇 电气工程
    • 101 篇 机械工程
    • 76 篇 光学工程
    • 64 篇 仪器科学与技术
    • 63 篇 生物医学工程(可授...
    • 52 篇 动力工程及工程热...
    • 51 篇 化学工程与技术
    • 45 篇 网络空间安全
    • 34 篇 建筑学
    • 32 篇 土木工程
    • 31 篇 安全科学与工程
  • 753 篇 理学
    • 482 篇 数学
    • 147 篇 生物学
    • 143 篇 物理学
    • 136 篇 统计学(可授理学、...
    • 101 篇 系统科学
    • 58 篇 化学
  • 502 篇 管理学
    • 329 篇 管理科学与工程(可...
    • 195 篇 图书情报与档案管...
    • 112 篇 工商管理
  • 59 篇 法学
    • 43 篇 社会学
  • 46 篇 医学
    • 41 篇 临床医学
    • 36 篇 基础医学(可授医学...
  • 35 篇 经济学
    • 35 篇 应用经济学
  • 18 篇 教育学
  • 14 篇 农学
  • 9 篇 艺术学
  • 7 篇 文学
  • 6 篇 军事学

主题

  • 107 篇 computer science
  • 71 篇 laboratories
  • 63 篇 semantics
  • 50 篇 software
  • 42 篇 software enginee...
  • 42 篇 algorithm design...
  • 40 篇 cloud computing
  • 38 篇 optimization
  • 37 篇 wireless sensor ...
  • 37 篇 web services
  • 36 篇 feature extracti...
  • 36 篇 testing
  • 34 篇 computational mo...
  • 33 篇 software testing
  • 33 篇 clustering algor...
  • 32 篇 protocols
  • 31 篇 reinforcement le...
  • 30 篇 routing
  • 30 篇 task analysis
  • 28 篇 educational inst...

机构

  • 945 篇 state key labora...
  • 209 篇 department of co...
  • 124 篇 national key lab...
  • 107 篇 state key labora...
  • 107 篇 state key labora...
  • 87 篇 state key labora...
  • 79 篇 college of compu...
  • 67 篇 department of co...
  • 54 篇 school of comput...
  • 51 篇 state key labora...
  • 48 篇 nanjing universi...
  • 47 篇 national key lab...
  • 42 篇 school of artifi...
  • 34 篇 state key labora...
  • 33 篇 school of comput...
  • 32 篇 state key lab. f...
  • 31 篇 the state key la...
  • 29 篇 university of ch...
  • 28 篇 department of co...
  • 27 篇 school of electr...

作者

  • 58 篇 gao yang
  • 47 篇 dou wanchun
  • 42 篇 sanglu lu
  • 42 篇 shi yinghuan
  • 39 篇 guihai chen
  • 37 篇 li wu-jun
  • 33 篇 zhang lijun
  • 32 篇 qi lei
  • 31 篇 shen furao
  • 31 篇 ying mingsheng
  • 30 篇 zhao jian
  • 30 篇 xu baowen
  • 29 篇 chen guihai
  • 28 篇 lu sanglu
  • 27 篇 baowen xu
  • 27 篇 xu xiaolong
  • 27 篇 chen zhenyu
  • 26 篇 wanchun dou
  • 26 篇 jie wu
  • 26 篇 xu chang

语言

  • 2,176 篇 英文
  • 282 篇 其他
  • 57 篇 中文
  • 2 篇 德文
检索条件"机构=Department of Computer Science and Technology&State Key Laboratory for Novel Software Technology"
2516 条 记 录,以下是321-330 订阅
排序:
Investigating Efficacy of Perplexity in Detecting LLM-Generated Code
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Jinwei Zhang, He Yang, Yanjin Cheng, Zeru Lyu, Jun Liu, Bohan Zhou, Xin Yang, Lanxin Bacchelli, Alberto Chiam, Yin Kia Chiew, Thiam Kian State Key Laboratory of Novel Software Technology Software Institute Nanjing University Nanjing210008 China Department of Informatics University of Zürich Zürich8006 Switzerland Department of Software Engineering Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur50603 Malaysia
Large language model-generated code (LLMgCode) has become increasingly prevalent in software development. Many studies report that LLMgCode has more quality and security issues than human-authored code (HaCode). It is... 详细信息
来源: 评论
Policy Learning from Tutorial Books via Understanding, Rehearsing and Introspecting  38
Policy Learning from Tutorial Books via Understanding, Rehea...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Chen, Xiong-Hui Wang, Ziyan Du, Yali Jiang, Shengyi Fang, Meng Yu, Yang Wang, Jun National Key Laboratory for Novel Software Technology Nanjing University China School of Artificial Intelligence Nanjing University China Cooperative AI Lab Department of Informatics King's College London United Kingdom AI Centre Department of Computer Science University College London United Kingdom University of Liverpool United Kingdom The University of Hong Kong Hong Kong
When humans need to learn a new skill, we can acquire knowledge through written books, including textbooks, tutorials, etc. However, current research for decision-making, like reinforcement learning (RL), has primaril...
来源: 评论
IIoT Mobile Business Data Placement Strategy Based on Bayesian Optimization Algorithm  24
IIoT Mobile Business Data Placement Strategy Based on Bayesi...
收藏 引用
24th IEEE International Conference on High Performance Computing and Communications, 8th IEEE International Conference on Data science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Shen, Zhijie Liu, Bowen Xu, Xiaolong Qi, Lianyong Dai, Fei Dou, Wanchun State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Shenzhen China College of Big Data and Intelligent Engineering Southwest Forestry University Kunming China Qingdao China School of Computer Science Nanjing University of Information Science and Technology Nanjing China
As a standardized and systematic management method, business process management plays an important role in the industrial Internet of Things (IIoT) scenario. With the rapid development of mobile Internet and the incre... 详细信息
来源: 评论
Optimal Mixing for Randomly Sampling Edge Colorings on Trees Down to the Max Degree
arXiv
收藏 引用
arXiv 2024年
作者: Carlson, Charlie Chen, Xiaoyu Feng, Weiming Vigoda, Eric Department of Computer Science University of California Santa Barbara United States State Key Laboratory for Novel Software Technology New Cornerstone Science Laboratory Nanjing University China Institute for Theoretical Studies ETH Zürich Switzerland
We address the convergence rate of Markov chains for randomly generating an edge coloring of a given tree. Our focus is on the Glauber dynamics which updates the color at a randomly chosen edge in each step. For a tre... 详细信息
来源: 评论
A Method of Multidimensional software Aging Prediction Based on Ensemble Learning: A Case of Android Os
SSRN
收藏 引用
SSRN 2023年
作者: Nie, Yuge Chen, Yulei Jiang, Yujia Wu, Huayao Yin, Beibei Cai, Kai-Yuan Beihang University School of Automation Science and Electrical Engineering Beijing100083 China Nanjing University State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing210023 China
Context: software aging refers to the phenomenon of performance degradation, increasing failure rate, or system crash due to resource consumption and error accumulation in software systems running for a long time. Pre... 详细信息
来源: 评论
Multi-agent dynamic algorithm configuration  22
Multi-agent dynamic algorithm configuration
收藏 引用
Proceedings of the 36th International Conference on Neural Information Processing Systems
作者: Ke Xue Jiacheng Xu Lei Yuan Miqing Li Chao Qian Zongzhang Zhang Yang Yu State Key Laboratory for Novel Software Technology Nanjing University State Key Laboratory for Novel Software Technology Nanjing University and Polixir Technologies CERCIA School of Computer Science University of Birmingham
Automated algorithm configuration relieves users from tedious, trial-and-error tuning tasks. A popular algorithm configuration tuning paradigm is dynamic algorithm configuration (DAC), in which an agent learns dynamic...
来源: 评论
FM-FCN:A Neural Network with Filtering Modules for Accurate Vital Signs Extraction
收藏 引用
Research 2025年 第1期2024卷 92-106页
作者: Fangfang Zhu Qichao Niu Xiang Li Qi Zhao Honghong Su Jianwei Shuai Department of Physics and Fujian Provincial Key Laboratory for Soft Functional Materials ResearchXiamen UniversityXiamen 361005China National Institute for Data Science in Health and Medicine and State Key Laboratory of Cellular Stress BiologyInnovation Center for Cell Signaling NetworkXiamen UniversityXiamen 361005China Vitalsilicon Technology Co.Ltd. JiaxingZhejiang 314006China School of Computer Science and Software Engineering University of Science and Technology LiaoningAnshan 114051China Yangtze Delta Region Institute of Tsinghua University ZhejiangJiaxing 314006China Wenzhou Institute University of Chinese Academy of SciencesWenzhou 325001China Oujiang Laboratory (Zhejiang Lab for Regenerative Medicine Vision and Brain Health)Wenzhou 325001China
Neural networks excel at capturing local spatial patterns through convolutional modules,but they may struggle to identify and effectively utilize the morphological and amplitude periodic nature of physiological *** th... 详细信息
来源: 评论
3D Gaussian Splatting: Survey, Technologies, Challenges, and Opportunities
arXiv
收藏 引用
arXiv 2024年
作者: Bao, Yanqi Ding, Tianyu Huo, Jing Liu, Yaoli Li, Yuxin Li, Wenbin Gao, Yang Luo, Jiebo State Key Laboratory for Novel Software Technology Nanjing University 210023 China Applied Sciences Group Microsoft Corporation Redmond United States Department of Computer Science University of Rochester United States
3D Gaussian Splatting (3DGS) has emerged as a prominent technique with the potential to become a mainstream method for 3D representations. It can effectively transform multiview images into explicit 3D Gaussian throug... 详细信息
来源: 评论
Time and Cost-Efficient Cloud Data Transmission based on Serverless Computing Compression
Time and Cost-Efficient Cloud Data Transmission based on Ser...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Rong Gu Xiaofei Chen Haipeng Dai Shulin Wang Zhaokang Wang Yaofeng Tu Yihua Huang Guihai Chen State Key Laboratory for Novel Software Technology Nanjing University China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics China ZTE Cooperation China
Nowadays, there exists a lot of cross-region data transmission demand on cloud. It is promising to use serverless computing for compressing data to save the transmission data amount. However, it is challenging to esti...
来源: 评论
A FRAMEWORK FOR SAFE PROBABILISTIC INVARIANCE VERIFICATION OF STOCHASTIC DYNAMICAL SYSTEMS
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Taoran Yu, Yiqing Xia, Bican Wang, Ji Xue, Bai Key Laboratory of System Software Chinese Academy of Sciences State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Department of Information Science School of Mathematical Sciences Peking University China State Key Laboratory of High Performance Computing College of Computer Science and Technology National University of Defense Technology China
Ensuring safety through set invariance has proven to be a valuable method in various robotics and control applications. This paper introduces a comprehensive framework for the safe probabilistic invariance verificatio... 详细信息
来源: 评论