咨询与建议

限定检索结果

文献类型

  • 1,147 篇 会议
  • 453 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,605 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,258 篇 工学
    • 986 篇 计算机科学与技术...
    • 841 篇 软件工程
    • 296 篇 信息与通信工程
    • 175 篇 控制科学与工程
    • 97 篇 电子科学与技术(可...
    • 93 篇 生物工程
    • 85 篇 电气工程
    • 69 篇 机械工程
    • 69 篇 光学工程
    • 51 篇 化学工程与技术
    • 50 篇 生物医学工程(可授...
    • 43 篇 动力工程及工程热...
    • 39 篇 材料科学与工程(可...
    • 37 篇 仪器科学与技术
    • 36 篇 建筑学
    • 31 篇 安全科学与工程
    • 30 篇 土木工程
    • 26 篇 交通运输工程
  • 734 篇 理学
    • 514 篇 数学
    • 156 篇 物理学
    • 123 篇 统计学(可授理学、...
    • 98 篇 生物学
    • 85 篇 系统科学
    • 53 篇 化学
  • 392 篇 管理学
    • 217 篇 图书情报与档案管...
    • 204 篇 管理科学与工程(可...
    • 90 篇 工商管理
  • 42 篇 法学
    • 34 篇 社会学
  • 34 篇 医学
    • 26 篇 临床医学
  • 25 篇 经济学
    • 25 篇 应用经济学
  • 20 篇 农学
  • 11 篇 艺术学
  • 9 篇 文学
  • 8 篇 教育学
  • 3 篇 军事学

主题

  • 45 篇 semantics
  • 21 篇 optimization
  • 20 篇 support vector m...
  • 19 篇 data mining
  • 19 篇 computational mo...
  • 17 篇 forecasting
  • 17 篇 training
  • 16 篇 wireless sensor ...
  • 15 篇 feature extracti...
  • 15 篇 clustering algor...
  • 14 篇 computer science
  • 14 篇 cloud computing
  • 13 篇 educational inst...
  • 12 篇 conferences
  • 12 篇 image segmentati...
  • 11 篇 sensor nodes
  • 11 篇 reinforcement le...
  • 11 篇 classification (...
  • 10 篇 learning systems
  • 10 篇 collaborative fi...

机构

  • 67 篇 state key lab. f...
  • 39 篇 state key lab. o...
  • 32 篇 key lab. of shan...
  • 32 篇 state key lab. o...
  • 31 篇 university of ch...
  • 31 篇 department of co...
  • 28 篇 state key lab. o...
  • 24 篇 state key lab. o...
  • 23 篇 key lab. of mach...
  • 22 篇 state key lab. o...
  • 21 篇 school of comput...
  • 21 篇 state key lab. o...
  • 20 篇 school of comput...
  • 17 篇 graduate univers...
  • 17 篇 school of comput...
  • 16 篇 moe key lab of a...
  • 14 篇 department of co...
  • 14 篇 peng cheng labor...
  • 14 篇 school of comput...
  • 13 篇 school of cyber ...

作者

  • 34 篇 zhao hai
  • 28 篇 huang qingming
  • 23 篇 zhan naijun
  • 21 篇 xue bai
  • 17 篇 yu kai
  • 16 篇 wang feng
  • 15 篇 xia gui-song
  • 15 篇 yang yang
  • 15 篇 xu qianqian
  • 14 篇 cao xiaochun
  • 13 篇 lu bao-liang
  • 13 篇 yang zhiyong
  • 12 篇 guosheng kang
  • 12 篇 cai deng
  • 12 篇 deng hui
  • 12 篇 liu jin
  • 12 篇 he xiaofei
  • 12 篇 chen lu
  • 11 篇 kong fang
  • 11 篇 jiang shuqiang

语言

  • 1,539 篇 英文
  • 53 篇 中文
  • 14 篇 其他
检索条件"机构=Key Lab. of Computer Science"
1605 条 记 录,以下是1-10 订阅
排序:
Synthesizing Invariants for Polynomial Programs by Semidefinite Programming
收藏 引用
ACM Transactions on Programming Languages and Systems 2025年 第1期47卷 1-35页
作者: Wu, Hao Wang, Qiuye Xue, Bai Zhan, Naijun Zhi, Lihong Yang, Zhi-Hong State Key Lab. of Computer Sciences Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Fermat Labs Huawei Inc. Dongguan China Key Lab. of System Software and State Key Lab. of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Key Laboratory of High Confidence Software Technology School of Computer Science Peking University Beijing China School of Mathematics and Statistics Central South University Changsha China
Constraint-solving-based program invariant synthesis takes a parametric invariant template and encodes the (inductive) invariant conditions into constraints. The problem of characterizing the set of all valid paramete... 详细信息
来源: 评论
Improving prompt tuning-based software vulnerability assessment by fusing source code and vulnerability description
收藏 引用
Automated Software Engineering 2025年 第2期32卷 1-29页
作者: Wang, Jiyu Chen, Xiang Pei, Wenlong Yang, Shaoyu School of Artificial Intelligence and Computer Science Nantong University Jiangsu Nantong China State Key Lab. for Novel Software Technology Nanjing University Jiangsu Nanjing China
To effectively allocate resources for vulnerability remediation, it is crucial to prioritize vulnerability fixes based on vulnerability severity. With the increasingnumber of vulnerabilities in recent years, there is ... 详细信息
来源: 评论
Exploring the Feasibility and Challenges of Treating Follow-up Patients via a Mobile Platform in China
收藏 引用
Proceedings of the ACM on Human-computer Interaction 2025年 第2期9卷 1-31页
作者: Fu, Jiaojiao Zhou, Yangfan Wang, Xin Guo, Yi School of Information Science and Engineering East China University of Science and Technology School of Computer Science Fudan University China School of Computer Science Fudan University China Shanghai Key Lab. of Intelligent Information Processing China
Mobile technology is being increasingly adopted in teleconsultation for its convenience and mobility. Although widely accepted by physicians for informal online consultations, the effectiveness of mobile platforms in ... 详细信息
来源: 评论
ESA: Example Sieve Approach for Multi-Positive and Unlab.led Learning  25
ESA: Example Sieve Approach for Multi-Positive and Unlabeled...
收藏 引用
18th ACM International Conference on Web Search and Data Mining, WSDM 2025
作者: Li, Zhongnian Wei, Meng Ying, Peng Xu, Xinzheng School of Computer Science and Technology China University of Mining and Technology Xuzhou China Mine Digitization Engineering Research Center of the Ministry of Education Xuzhou China State Key Lab. for Novel Software Technology Nanjing University Nanjing China
Learning from Multi-Positive and Unlab.led (MPU) data has gradually attracted significant attention from practical applications. Unfortunately, the risk of MPU also suffer from the shift of minimum risk, particularly ... 详细信息
来源: 评论
Poster Abstract: IMU-assisted Image Stitching for Scenes with Obstructions Based on Camera Motion Sensing  25
Poster Abstract: IMU-assisted Image Stitching for Scenes wit...
收藏 引用
Proceedings of the 23rd ACM Conference on Embedded Networked Sensor Systems
作者: Saibing Han Yanling Bu Yanchao Zhao Lei Xie College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China State Key Lab. for Novel Software Technology Nanjing University Nanjing China
Image stitching is often affected by obstructions such as pedestrians and vehicles. Traditional methods often ignore obstructions or retain them, leading to artifacts. They also cause edge distortion due to fixed-pers... 详细信息
来源: 评论
Automated Clinical Summary Generation via Integrating Structured and Unstructured Data  12th
Automated Clinical Summary Generation via Integrating Struct...
收藏 引用
12th CCF Conference on BigData, BigData 2024
作者: Fu, Jiaojiao Yang, Bowen Guo, Yi Zhou, Yangfan Wang, Xin School of Information Science and Engineering East China University of Science and Technology Shanghai China Shanghai Key Lab. of Intelligent Information Processing Fudan University Shanghai China School of Computer Science Fudan University Shanghai China
Automatically generating clinical texts can significantly reduce the time physicians spend on clinical data recording, which is particularly important for developing countries where physicians are extremely busy due t... 详细信息
来源: 评论
The NeRF Signature: Codebook-Aided Watermarking for Neural Radiance Fields
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 第6期47卷 4652-4667页
作者: Ziyuan Luo Anderson Rocha Boxin Shi Qing Guo Haoliang Li Renjie Wan Department of Computer Science Hong Kong Baptist University Hong Kong SAR China Artificial Intelligence Lab. Recod.ai Institute of Computing University of Campinas Campinas Brazil State Key Laboratory of Multimedia Information Processing and National Engineering Research Center of Visual Technology School of Computer Science Peking University Beijing China IHPC and CFAR Agency for Science Technology and Research (A*STAR) Singapore Department of Electrical Engineering City University of Hong Kong Kowloon Hong Kong
Neural Radiance Fields (NeRF) have been gaining attention as a significant form of 3D content representation. With the proliferation of NeRF-based creations, the need for copyright protection has emerged as a critical... 详细信息
来源: 评论
Toward Covert and Reliable Communication for Anti-eavesdropping Transmission in V2X Networks
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Xu, Rui Li, Gaolei Wu, Jun Li, Jianhua Zhao, Yue Liu, Yuchen Chen, Mingzhe Shanghai Jiao Tong University School of Electronic Information and Electrical Engineering Shanghai200030 China Xidian University State Key Lab. of ISN School of Telecommunication Engineering Shaanxi 710071 China North Carolina State University Department of Computer Science Raleigh27607 United States University of Miami Department of Electrical and Computer Engineering Coral Gables33156 United States
The integration of covert communication in vehicle-to-everything (V2X) network has recently shown great potential to improve efficiency and reliability of data transmission under adversarial eavesdropping scenarios. I... 详细信息
来源: 评论
Congestion Control Method for Campus Opportunity Network Based on Ant Colony Algorithm
收藏 引用
Chinese Journal of Electronics 2025年 第2期34卷 576-585页
作者: Li, Peng Cao, Yumei Jia, Huan Wang, Xiaoming Wu, Xiaojun School of Computer Science Shaanxi Normal University Xi an710119 China Key Lab. of Intelligent Comp. and Service Technology for Folk Song Ministry of Culture and Tourism Xi'an710119 China Key Laboratory of Modern Teaching Technology Ministry of Education Xi'an710062 China Engineering Laboratory of Teaching Information Technology of Shaanxi Province Xi'an710119 China Xi'an Key Laboratory of Cultural Tourism Resources Development and Utilization Xi'an710062 China
Due to the limited storage resources of portable devices, congestion control has become a hot direction in opportunity networks. To address the issue of heavy loads on certain nodes, which can impact routing efficienc... 详细信息
来源: 评论
Fairness-Aware Incentive Mechanism for Multi-Server Federated Learning in Edge-Enabled Wireless Networks with Differential Privacy
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Yang, Yu Peng, Kai Wang, Shangguang Xu, Xiaolong Xiao, Peiyun Leung, Victor C.M Huaqiao University College of Engineering Quanzhou362021 China Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China Nanjing University of Information Science and Technology School of Software Nanjing China Nanjing University State Key Lab. for Novel Software Technology Nanjing210093 China Shenzhen University College of the Computer Science and Software Engineering Shenzhen518060 China University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada
As a distributed machine learning method, federated learning (FL) can collab.ratively train a global model with multiple devices without sharing the original data, thus protecting certain privacy. However, due to the ... 详细信息
来源: 评论