咨询与建议

限定检索结果

文献类型

  • 609 篇 会议
  • 222 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 834 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 637 篇 工学
    • 537 篇 计算机科学与技术...
    • 447 篇 软件工程
    • 123 篇 信息与通信工程
    • 91 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 21 篇 建筑学
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 交通运输工程
    • 17 篇 土木工程
    • 16 篇 生物医学工程(可授...
    • 9 篇 航空宇航科学与技...
  • 358 篇 理学
    • 260 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 213 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 109 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 computational mo...
  • 13 篇 web services
  • 12 篇 data mining
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy
  • 7 篇 training

机构

  • 89 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 28 篇 university of ch...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 13 篇 school of comput...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 school of comput...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 23 篇 zhan naijun
  • 20 篇 xue bai
  • 15 篇 liu jin
  • 13 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 9 篇 zhan bohua
  • 9 篇 liu jianxun
  • 9 篇 jianxun liu
  • 8 篇 kang guosheng
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 793 篇 英文
  • 31 篇 中文
  • 10 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
834 条 记 录,以下是1-10 订阅
排序:
Synthesizing Invariants for Polynomial Programs by Semidefinite Programming
收藏 引用
ACM Transactions on Programming Languages and systems 2025年 第1期47卷 1-35页
作者: Wu, Hao Wang, Qiuye Xue, Bai Zhan, Naijun Zhi, Lihong Yang, Zhi-Hong State Key Lab. of Computer Sciences Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Fermat Labs Huawei Inc. Dongguan China Key Lab. of System Software and State Key Lab. of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Key Laboratory of High Confidence Software Technology School of Computer Science Peking University Beijing China School of Mathematics and Statistics Central South University Changsha China
Constraint-solving-based program invariant synthesis takes a parametric invariant template and encodes the (inductive) invariant conditions into constraints. The problem of characterizing the set of all valid paramete... 详细信息
来源: 评论
Improving prompt tuning-based software vulnerability assessment by fusing source code and vulnerability description
收藏 引用
Automated software Engineering 2025年 第2期32卷 1-29页
作者: Wang, Jiyu Chen, Xiang Pei, Wenlong Yang, Shaoyu School of Artificial Intelligence and Computer Science Nantong University Jiangsu Nantong China State Key Lab. for Novel Software Technology Nanjing University Jiangsu Nanjing China
To effectively allocate resources for vulnerability remediation, it is crucial to prioritize vulnerability fixes based on vulnerability severity. With the increasingnumber of vulnerabilities in recent years, there is ... 详细信息
来源: 评论
SACM: spatial attributes of complex movements in multi-object tracking
收藏 引用
Multimedia Tools and Applications 2025年 1-20页
作者: Li, Hongjun Li, Jiaxin Sun, Xiaohu School of Information Science and Technology Nantong University Jiangsu Nantong226019 China State Key Lab. for Novel Software Technology Nanjing University Jiangsu Nantong210023 China Nantong Research Institute for Advanced Communication Technologies Jiangsu Nantong226019 China
Multi-object tracking is a crucial task in computer vision, but it faces significant challenges due to complex scenes and interactions between tracked objects. To address these challenges, we propose a complex movemen... 详细信息
来源: 评论
ESA: Example Sieve Approach for Multi-Positive and Unlab.led Learning  25
ESA: Example Sieve Approach for Multi-Positive and Unlabeled...
收藏 引用
18th ACM International Conference on Web Search and Data Mining, WSDM 2025
作者: Li, Zhongnian Wei, Meng Ying, Peng Xu, Xinzheng School of Computer Science and Technology China University of Mining and Technology Xuzhou China Mine Digitization Engineering Research Center of the Ministry of Education Xuzhou China State Key Lab. for Novel Software Technology Nanjing University Nanjing China
Learning from Multi-Positive and Unlab.led (MPU) data has gradually attracted significant attention from practical applications. Unfortunately, the risk of MPU also suffer from the shift of minimum risk, particularly ... 详细信息
来源: 评论
Poster Abstract: IMU-assisted Image Stitching for Scenes with Obstructions Based on Camera Motion Sensing  25
Poster Abstract: IMU-assisted Image Stitching for Scenes wit...
收藏 引用
Proceedings of the 23rd ACM Conference on Embedded Networked Sensor systems
作者: Saibing Han Yanling Bu Yanchao Zhao Lei Xie College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China State Key Lab. for Novel Software Technology Nanjing University Nanjing China
Image stitching is often affected by obstructions such as pedestrians and vehicles. Traditional methods often ignore obstructions or retain them, leading to artifacts. They also cause edge distortion due to fixed-pers... 详细信息
来源: 评论
Palmprint Anti-spoofing via Frequency Enhancement and Selection  18th
Palmprint Anti-spoofing via Frequency Enhancement and Select...
收藏 引用
18th Chinese Conference on Biometric Recognition, CCBR 2024
作者: Ren, Yani Shao, Huikai Zhong, Dexing School of Automation Science and Engineering Xi’an Jiaotong University Shaanxi Xi’an710049 China State Key Lab. for Novel Software Technology Nanjing University Jiangsu NanJing210000 China Xi’an Yizhanghui Technology Co. Shannxi Xi’an712000 China Pazhou Lab Guangzhou510335 China Research Institute of Xi’an Jiaotong University Zhejiang311215 China
Palmprint recognition has attracted considerable interest from researchers as a convenient and secure biometric identification technology. The majority of research on palmprint recognition focuses on enhancing recogni... 详细信息
来源: 评论
Fairness-Aware Incentive Mechanism for Multi-Server Federated Learning in Edge-Enabled Wireless Networks with Differential Privacy
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Yang, Yu Peng, Kai Wang, Shangguang Xu, Xiaolong Xiao, Peiyun Leung, Victor C.M Huaqiao University College of Engineering Quanzhou362021 China Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China Nanjing University of Information Science and Technology School of Software Nanjing China Nanjing University State Key Lab. for Novel Software Technology Nanjing210093 China Shenzhen University College of the Computer Science and Software Engineering Shenzhen518060 China University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada
As a distributed machine learning method, federated learning (FL) can collab.ratively train a global model with multiple devices without sharing the original data, thus protecting certain privacy. However, due to the ... 详细信息
来源: 评论
An LLM-Empowered Adaptive Evolutionary Algorithm For Multi-Component Deep Learning systems
arXiv
收藏 引用
arXiv 2025年
作者: Tian, Haoxiang Han, Xingshuo Wu, Guoquan Guo, An Zhou, Yuan Zhang, Jie Li, Shuo Wei, Jun Zhang, Tianwei Key Lab of System Software CAS State Key Lab of Computer Science ISCAS Beijing China University of CAS Beijing China Nanyang Technological University Singapore Continental-NTU Corporate Lab Singapore Nanjing Institute of Software Technology University of CAS Nanjing China Nanjing University Nanjing China Zhejiang Sci-Tech University Hangzhou China CFAR IHPC A*STAR Singapore
Multi-objective evolutionary algorithms (MOEAs) are widely used for searching optimal solutions in complex multi-component applications. Traditional MOEAs for multi-component deep learning (MCDL) systems face challeng... 详细信息
来源: 评论
Modeling and analyzing method for CPS software architecture energy consumption
Journal of Software
收藏 引用
Journal of software 2013年 第11期8卷 2974-2981页
作者: Zhang, Guangquan Zhang, Kan Zhu, Xueyang Chen, Mingcai Xu, Chengkai Shao, Yuzhen School of Computer Science and Technology Soochow University Suzhou China State Key Lab. for Novel Software Technology Nanjing University Nanjing China State Key Lab. of Computer Science Institute of Software Chinese Academy of Science Beijing China
CPS is a kind of networked embedded system. Its trustworthiness and cost are impacted by energy consumption. So design a low-power, high trustworthiness CPS has been a major challenge. Modeling and analyzing the energ... 详细信息
来源: 评论
DRL-Based Optimization for AoI and Energy Consumption in C-V2X Enabled IoV
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green Communications and Networking 2025年
作者: Zhang, Zheng Wu, Qiong Fan, Pingyi Cheng, Nan Chen, Wen Letaief, Khaled B. Jiangnan University School of Internet of Things Engineering Wuxi214122 China Tsinghua University Beijing National Research Center for Information Science and Technology Department of Electronic Engineering State Key laboratory of Space Network and Communications Tsinghua University Beijing100084 China Xidian University State Key Lab. of ISN School of Telecom-munications Engineering Xi'an710071 China Shanghai Jiao Tong University Department of Electronic Engineering Shanghai200240 China Department of Electrical and Computer Engineer-ing Hong Kong
To address communication latency issues, the Third Generation Partnership Project (3GPP) has defined Cellular-Vehicle to Everything (C-V2X) technology, which includes Vehicle-to-Vehicle (V2V) communication for direct ... 详细信息
来源: 评论