咨询与建议

限定检索结果

文献类型

  • 608 篇 会议
  • 222 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 833 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 634 篇 工学
    • 534 篇 计算机科学与技术...
    • 445 篇 软件工程
    • 123 篇 信息与通信工程
    • 90 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 357 篇 理学
    • 259 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 214 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 computational mo...
  • 13 篇 web services
  • 12 篇 data mining
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy
  • 7 篇 training

机构

  • 87 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 28 篇 university of ch...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 12 篇 beijing key lab....
  • 12 篇 school of comput...
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 school of comput...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 22 篇 zhan naijun
  • 19 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 9 篇 zhan bohua
  • 9 篇 liu jianxun
  • 8 篇 kang guosheng
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 791 篇 英文
  • 31 篇 中文
  • 11 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
833 条 记 录,以下是21-30 订阅
排序:
Concrete Structural Crack Damage Classification Using Nonlinear Dimension Reduction and Broad Learning system
Concrete Structural Crack Damage Classification Using Nonlin...
收藏 引用
2024 IEEE International Conference on systems, Man, and Cybernetics, SMC 2024
作者: Wang, Bingshu Lin, Jia Zhuang, Xiaodong Zhang, Guanghui Chen, C.L. Philip School of Software Northwestern Polytechnical University Xi'an China Shenzhen University Guangdong Key Lab. of Intelligent Info. Processing and Shenzhen Key Laboratory of Media Security Shenzhen China School of Computer Science and Technology Shandong University Qingdao China School of Computer Science and Engineering South China University of Technology Guangzhou China
Concrete structural crack damage classification is of importance for road safety. This paper proposes a new method based on broad neural network for crack damage classification in concrete structures. It includes thre... 详细信息
来源: 评论
FedCrowd: Towards Promoting the Concurrency of the Server in Asynchronous Federated Learning  2
FedCrowd: Towards Promoting the Concurrency of the Server in...
收藏 引用
2nd International Symposium on Electrical, Electronics and Information Engineering, ISEEIE 2022
作者: Xi, Wen Liao, Yuying Zhou, Bin Wang, Haiyang Gao, Liqun College of Computer Science and Technology National University of Defence Technology Changsha China National University of Defence Technology Key Lab. of Software Engineering for Complex System Changsha China
Federated learning is a privacy-preserving machine learning paradigm where a global model is trained collab.ratively across resource-limited devices such as mobile phones, wearable devices, and sensors while the train... 详细信息
来源: 评论
A New Framework for Bounding Reachability Probabilities of Continuous-time Stochastic systems
arXiv
收藏 引用
arXiv 2023年
作者: Xue, Bai State Key Lab. of Computer Science Institute of Software Chinese Academy of Sciences Beijing China
This manuscript presents an innovative framework for constructing barrier functions to bound reachability probabilities for continuous-time stochastic systems described by stochastic differential equations (SDEs). The... 详细信息
来源: 评论
An Iterative Method for Computing Controlled Reach-Avoid Sets
An Iterative Method for Computing Controlled Reach-Avoid Set...
收藏 引用
American Control Conference (ACC)
作者: Dejin Ren Taoran Wu Bai Xue State Key Lab. of Computer Science CAS Institute of Software Beijing China University of Chinese Academy of Sciences Beijing China
This paper focuses on addressing the problem of computing controlled reach-avoid sets for continuous-time systems modeled by polynomial ordinary differential equations with control inputs in order to ensure the safety... 详细信息
来源: 评论
On Efficient Packet Batching and Resource Allocation for GPU based NFV Acceleration  31
On Efficient Packet Batching and Resource Allocation for GPU...
收藏 引用
31st IEEE/ACM International Symposium on Quality of Service, IWQoS 2023
作者: Zeng, Deze Zhu, Andong Gu, Lin Chen, Quan Guo, Minyi School of Computer Science China University of Geosciences Hubei Wuhan China Nanjing University State Key Lab. for Novel Software Technology Nanjing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Shanghai Jiao Tong University Department of Computer Science and Engineering Shanghai China
Network Function Virtualization (NFV) has already become an essential technology for improving the scalab.lity and flexibility of modern computer networks. The performance gap has become the main issue that impedes th... 详细信息
来源: 评论
Long- and Short- Term Sequential Recommendation with Temporal Interval  19
Long- and Short- Term Sequential Recommendation with Tempora...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and Computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalab.e Computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy Computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: He, Kun Liu, Qiyan Li, Qianmu Meng, Shunmei Nanjing University of Science and Technology Nanjing China University of Toronto Computer Engineering Canada Nanjing University State Key Lab. for Novel Software Technology Nanjing China
Sequential recommendation aims to learn the changes of users' interests according to their historical behaviors and predict the most likely next item. Since user's historical behavior are sequential actions, u... 详细信息
来源: 评论
Adversarial Recovery Network for Low-Light Person Re-Identification  23
Adversarial Recovery Network for Low-Light Person Re-Identif...
收藏 引用
6th International Conference on Image and Graphics Processing, ICIGP 2023
作者: Xu, Liu Wang, Xiao Yuan, Xin Mao, Zhu Xu, Xin School of Computer Science and Technology Wuhan University of Science and Technology China School of Computer Science and Technology Wuhan University of Science and Technology ChinaHubei Prov. Key Lab. of Intelligent Information Processing and Real-time Industrial System Wuhan University of Science and Technology China
Person re-identification (re-ID), which is to connect pedestrians with the same identity in different scenarios, has been more widely used in case detection of security. The re-ID datasets and technology have contribu... 详细信息
来源: 评论
A Comprehensive Study of Present Data Deduplication  23
A Comprehensive Study of Present Data Deduplication
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on Data science and systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Xue, Zilong Qian, Huixun Shen, Lingling Wu, Xiaotong School of Computer and Electronic Information Nanjing Normal University Nanjing China Nanjing University State Key Lab. for Novel Software Technology China
With the proliferation of the Internet of Things (IoT), various computing paradigms have been proposed and are developing rapidly these years, which led to the explosive increase of the data amount. However, the signi... 详细信息
来源: 评论
Formally Verified C Code Generation from Hybrid Communicating Sequential Processes
Formally Verified C Code Generation from Hybrid Communicatin...
收藏 引用
IEEE/ACM International Conference on Cyber-Physical systems (ICCPS)
作者: Shuling Wang Zekun Ji Xiong Xu Bohua Zhan Qiang Gao Naijun Zhan State Key Lab. of Computer Science Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Hybrid Communicating Sequential Processes (HCSP) is a formal model for hybrid systems, including primitives for evolution along an ordinary differential equation (ODE), communication, and parallel composition. Code ge... 详细信息
来源: 评论
HHLPar: Automated Theorem Prover for Parallel Hybrid Communicating Sequential Processes
arXiv
收藏 引用
arXiv 2024年
作者: Jin, Xiangyu Zhan, Bohua Wang, Shuling Zhan, Naijun Key Laboratory of System Software State Key Lab. of Computer Science ISCAS China University of Chinese Academy of Sciences China Huawei Technologies Co. Ltd. China National Key Laboratory of Space Integrated Information System ISCAS China School of Computer Science Peking University China
We present a tool called HHLPar for verifying hybrid systems modelled in Hybrid Communicating Sequential Processes (HCSP). HHLPar is built upon a Hybrid Hoare Logic for HCSP, which is able to reason about continuous-t... 详细信息
来源: 评论