咨询与建议

限定检索结果

文献类型

  • 877 篇 会议
  • 568 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,446 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 982 篇 工学
    • 669 篇 计算机科学与技术...
    • 586 篇 软件工程
    • 209 篇 信息与通信工程
    • 155 篇 控制科学与工程
    • 108 篇 生物工程
    • 106 篇 电气工程
    • 101 篇 机械工程
    • 74 篇 生物医学工程(可授...
    • 66 篇 电子科学与技术(可...
    • 65 篇 光学工程
    • 52 篇 化学工程与技术
    • 40 篇 安全科学与工程
    • 30 篇 仪器科学与技术
    • 30 篇 动力工程及工程热...
    • 29 篇 土木工程
    • 28 篇 建筑学
    • 28 篇 交通运输工程
    • 23 篇 材料科学与工程(可...
  • 492 篇 理学
    • 274 篇 数学
    • 111 篇 生物学
    • 98 篇 物理学
    • 80 篇 统计学(可授理学、...
    • 75 篇 系统科学
    • 53 篇 化学
  • 281 篇 管理学
    • 150 篇 管理科学与工程(可...
    • 146 篇 图书情报与档案管...
    • 58 篇 工商管理
  • 44 篇 法学
    • 39 篇 社会学
  • 42 篇 医学
    • 38 篇 临床医学
    • 32 篇 基础医学(可授医学...
  • 21 篇 经济学
  • 16 篇 教育学
  • 11 篇 农学
  • 3 篇 军事学
  • 1 篇 哲学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 52 篇 training
  • 39 篇 semantics
  • 33 篇 feature extracti...
  • 29 篇 computational mo...
  • 27 篇 deep learning
  • 27 篇 data mining
  • 26 篇 neural networks
  • 25 篇 laboratories
  • 24 篇 convolution
  • 21 篇 optimization
  • 21 篇 wireless sensor ...
  • 21 篇 accuracy
  • 20 篇 computer science
  • 18 篇 machine learning
  • 18 篇 robustness
  • 17 篇 data models
  • 16 篇 reinforcement le...
  • 16 篇 software enginee...
  • 16 篇 convolutional ne...
  • 15 篇 conferences

机构

  • 64 篇 college of compu...
  • 56 篇 beijing key labo...
  • 52 篇 school of softwa...
  • 48 篇 school of electr...
  • 37 篇 beijing key labo...
  • 35 篇 key laboratory o...
  • 34 篇 guangdong key la...
  • 30 篇 state key labora...
  • 28 篇 national enginee...
  • 22 篇 seventh research...
  • 21 篇 school of comput...
  • 21 篇 guangdong provin...
  • 20 篇 shenzhen institu...
  • 18 篇 university of ch...
  • 18 篇 peng cheng labor...
  • 17 篇 school of inform...
  • 16 篇 beijing key labo...
  • 15 篇 beijing key labo...
  • 14 篇 guangdong key la...
  • 14 篇 key laboratory o...

作者

  • 78 篇 junping du
  • 51 篇 yingmin jia
  • 49 篇 shen linlin
  • 30 篇 fashan yu
  • 25 篇 du junping
  • 18 篇 huadong ma
  • 17 篇 jia yingmin
  • 16 篇 linlin shen
  • 15 篇 wu qingyao
  • 14 篇 yin baocai
  • 14 篇 cai yi
  • 13 篇 yu fashan
  • 13 篇 xie weicheng
  • 12 篇 liang liu
  • 11 篇 deyuan meng
  • 11 篇 xi zhang
  • 11 篇 tan mingkui
  • 11 篇 meiyu liang
  • 10 篇 zhang qiang
  • 10 篇 liang meiyu

语言

  • 1,352 篇 英文
  • 66 篇 其他
  • 30 篇 中文
  • 1 篇 西班牙文
检索条件"机构=Intelligent Software and Software Engineering Laboratory"
1446 条 记 录,以下是1-10 订阅
排序:
A Decision-Making Model for Autonomous Vehicles Considering Pedestrian’s Time Pressure Based on Game Theory and Reinforcement Learning
收藏 引用
IEEE Access 2025年 13卷 87730-87739页
作者: Lin, Qing-Feng Xue, Heng-Yu Lyu, Yang Li, Qing-Kun Ou, Ju-Shang Beihang University School of Transportation Science and Engineering Beijing100191 China Intelligent Policing Key Laboratory of Sichuan Province Luzhou646000 China Chinese Academy of Sciences Institute of Software Beijing100190 China Automotive Software Innovation Center Chongqing400015 China
Due to the obvious randomness, pedestrian crossing behavior is hard to predict, which challenges the decision-making of autonomous vehicles (AVs). Recent solutions have been able to adapt to structured road scenes wit... 详细信息
来源: 评论
Fix the Tests: Augmenting LLMs to Repair Test Cases with Static Collector and Neural Reranker  35
Fix the Tests: Augmenting LLMs to Repair Test Cases with Sta...
收藏 引用
35th IEEE International Symposium on software Reliability engineering, ISSRE 2024
作者: Liu, Jun Yan, Jiwei Xie, Yuanyuan Yan, Jun Zhang, Jian State Key Laboratory of Computer Science Institute of Software China Chinese Academy of Sciences Technology Center of Software Engineering Institute of Software China China UCAS School of Intelligent Science and Technology Hangzhou Institute for Advanced Study China
During software evolution, it is advocated that test code should co-evolve with production code. In real development scenarios, test updating may lag behind production code changing, which may cause compilation failur... 详细信息
来源: 评论
A Color Image Encryption Algorithm Based on Complementary Map and Iterative Convolutional Code  24
A Color Image Encryption Algorithm Based on Complementary Ma...
收藏 引用
8th International Conference on Machine Learning and Soft Computing, ICMLSC 2024
作者: Xie, Yanlu Zhou, Shihua Lv, Hui Wang, Bin Che, Chao Zhang, Qiang Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education School of Software Engineering Dalian University Dalian China
Encryption is a valid means to safeguard the safety of images, and for color images, encryption should be performed considering the intrinsic correlation between R, G, and B components. In this paper, we propose an im... 详细信息
来源: 评论
FIFAWC:a dataset with detailed annotation and rich semantics for group activity recognition
收藏 引用
Frontiers of Computer Science 2024年 第6期18卷 271-272页
作者: Duoxuan PEI Di HUANG Yunhong WANG State Key Laboratory of Software Development Environment School of Computer Science and EngineeringBeihang UniversityBeijing 100191China Intelligent Recognition and Image Processing Lab. School of Computer Science and EngineeringBeihang UniversityBeijing 100191China
1 *** Activity Recognition(GAR),which aims to identify activities performed collectively in videos,has gained significant attention *** conventional action recognition centered on single individuals,GAR explores the c... 详细信息
来源: 评论
Lightweight Anonymous Authentication Frameworks for Wireless Sensor Networks  3
Lightweight Anonymous Authentication Frameworks for Wireless...
收藏 引用
3rd International Conference on Computer Technologies, ICCTech 2024
作者: Fu, Qin Xiong, Ling He, Mingxing Yang, Xingchun Xihua University School of Computer and Software Engineering Chengdu China Intelligent Policing Key Laboratory of Sichuan Province Chengdu China
Due to the limited resources, authentication schemes for low-cost wireless sensors networks (WSNs) environment prefer to use lightweight cryptographic primitives, like symmetric key encryption/decryption or hash funct... 详细信息
来源: 评论
Based on the Conformer End-to-End Chinese Speech Recognition Method  4
Based on the Conformer End-to-End Chinese Speech Recognition...
收藏 引用
4th International Conference on Electronic Information engineering and Computer Science, EIECS 2024
作者: Feng, Haiwen Shi, Yunxiao School of Software Engineering Shenyang University of Technology Shenyang Key Laboratory of Intelligent Manufacturing of High-end Industrial Equipment Liaoning Shenyang China School of Software Engineering Shenyang University of Technology ShenganpLiaoning China
Aiming at the problem that the acoustic input network of Conformer encoder is insufficient for Fbank speech feature extraction, an end-to-end speech recognition modeling method of DM-Conformer is proposed. Firstly, th... 详细信息
来源: 评论
Blockchain-Enabled Secure, Fair and Scalable Data Sharing in Zero-Trust Edge-End Environment
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2056-2069页
作者: Xu, Xiaolong Meng, Ke Xiang, Haolong Cui, Guangming Xia, Xiaoyu Dou, Wanchun Nanjing210044 China Nanjing University of Information Science and Technology School of Software and the Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services Nanjing210044 China RMIT University School of Computing Technologies MelbourneVIC3000 Australia Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China
In edge computing, the Zero-Trust Security Model (ZTSM), as a key enabling technology for next-generation networks, plays a crucial role in providing authentication for addressing data sharing concerns, such as freque... 详细信息
来源: 评论
Exploring implicit influence for social recommendation based on GNN
收藏 引用
Soft Computing 2024年 第19期28卷 11001-11014页
作者: Liu, Zhewei Yang, Peilin Hao, Qingbo Zheng, Wenguang Xiao, Yingyuan Engineering Research Center of Learning-Based Intelligent System Ministry of Education Tianjin University of Technology Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin University of Technology Tianjin China
In recent years, the method of using graph neural networks (GNN) to learn users’ social influence has been widely applied to social recommendation and has shown effectiveness, but several important challenges have no... 详细信息
来源: 评论
Expression Recognition and intelligent Classroom State Mining in Teaching Videos Based on Semi-Supervised Learning Generative Adversarial Network  5
Expression Recognition and Intelligent Classroom State Minin...
收藏 引用
5th International Conference on Data-Driven Optimization of Complex Systems, DOCS 2023
作者: Fan, Ruoyu Liang, Meiyu Yin, Mengran Du, Junping Multimedia School of Computer Science National Pilot Software Engineering School Beijing University of Posts and Telecommunications Beijing Key Laboratory of Intelligent Communication Software Beijing China
We constructed a student classroom teaching video dataset, constructed a student classroom expression dataset through video frame extraction, face detection, face alignment, and facial extraction, and constructed a st... 详细信息
来源: 评论
Oil Well Acoustic Dynamic Liquid Level Detection Based on EEMD  3
Oil Well Acoustic Dynamic Liquid Level Detection Based on EE...
收藏 引用
3rd International Conference on High Performance Computing and Communication engineering, HPCCE 2023
作者: Yang, Ming Sha, Zhiqiang Sun, Yanqing School of Information Engineering Harbin University Harbin150086 China Heilongjiang Provincial Key Laboratory of the Intelligent Perception and Intelligent Software Harbin University Harbin150086 China Daqing Software Technology Research Institute Co. Ltd. Daqing163711 China
The detection of oil well dynamic liquid level using acoustic methods requires digital signal processing techniques to reduce environmental noises. Most denoising techniques consist of filter-based approaches and spec... 详细信息
来源: 评论