咨询与建议

限定检索结果

文献类型

  • 608 篇 会议
  • 223 篇 期刊文献

馆藏范围

  • 831 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 635 篇 工学
    • 536 篇 计算机科学与技术...
    • 447 篇 软件工程
    • 123 篇 信息与通信工程
    • 90 篇 控制科学与工程
    • 44 篇 电子科学与技术(可...
    • 43 篇 电气工程
    • 41 篇 生物工程
    • 36 篇 机械工程
    • 28 篇 动力工程及工程热...
    • 26 篇 光学工程
    • 23 篇 化学工程与技术
    • 22 篇 建筑学
    • 21 篇 材料科学与工程(可...
    • 19 篇 安全科学与工程
    • 18 篇 仪器科学与技术
    • 18 篇 土木工程
    • 18 篇 交通运输工程
    • 16 篇 生物医学工程(可授...
    • 10 篇 航空宇航科学与技...
  • 356 篇 理学
    • 259 篇 数学
    • 59 篇 物理学
    • 56 篇 统计学(可授理学、...
    • 52 篇 系统科学
    • 43 篇 生物学
    • 27 篇 化学
  • 214 篇 管理学
    • 120 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 57 篇 工商管理
  • 25 篇 法学
    • 19 篇 社会学
  • 16 篇 经济学
    • 16 篇 应用经济学
  • 8 篇 医学
  • 6 篇 教育学
  • 6 篇 农学
  • 4 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 22 篇 semantics
  • 13 篇 computational mo...
  • 13 篇 web services
  • 12 篇 data mining
  • 10 篇 computer science
  • 10 篇 optimization
  • 10 篇 forecasting
  • 9 篇 clustering algor...
  • 8 篇 conferences
  • 8 篇 computer archite...
  • 8 篇 neural networks
  • 8 篇 analytical model...
  • 7 篇 ordinary differe...
  • 7 篇 software quality
  • 7 篇 feature extracti...
  • 7 篇 software
  • 7 篇 cloud computing
  • 7 篇 measurement
  • 7 篇 privacy
  • 7 篇 training

机构

  • 87 篇 state key lab. f...
  • 56 篇 state key lab. o...
  • 28 篇 university of ch...
  • 27 篇 state key lab. o...
  • 26 篇 state key lab. o...
  • 22 篇 state key lab. o...
  • 22 篇 computer school ...
  • 14 篇 tianjin key lab....
  • 14 篇 state key lab. f...
  • 13 篇 department of co...
  • 13 篇 school of comput...
  • 12 篇 beijing key lab....
  • 12 篇 state key lab. o...
  • 11 篇 key laboratory o...
  • 11 篇 school of comput...
  • 10 篇 department of co...
  • 10 篇 state key labora...
  • 10 篇 hunan provincial...
  • 10 篇 school of comput...
  • 10 篇 nanjing universi...

作者

  • 22 篇 zhan naijun
  • 19 篇 xue bai
  • 15 篇 liu jin
  • 12 篇 guosheng kang
  • 11 篇 du junping
  • 11 篇 chen ling
  • 10 篇 liu wei
  • 10 篇 wang hongan
  • 10 篇 liu jianxun
  • 9 篇 kang guosheng
  • 9 篇 zhan bohua
  • 8 篇 he keqing
  • 8 篇 bai xue
  • 8 篇 wu enhua
  • 8 篇 sanglu lu
  • 8 篇 he yanxiang
  • 8 篇 dai guozhong
  • 8 篇 jianxun liu
  • 7 篇 zhang degan
  • 7 篇 zhang xiaolong

语言

  • 789 篇 英文
  • 31 篇 中文
  • 11 篇 其他
检索条件"机构=Key Lab. of System Software and State Key Lab. of Computer Science"
831 条 记 录,以下是81-90 订阅
排序:
Requirements Modeling Aided by ChatGPT: An Experience in Embedded systems
Requirements Modeling Aided by ChatGPT: An Experience in Emb...
收藏 引用
IEEE International Requirements Engineering Conference Workshops (REW)
作者: Kun Ruan Xiaohong Chen Zhi Jin Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China School of Computer Science Peking University China Ministry of Education Key Lab. of High-Confidence of Software Technologies (PKU) China
Requirements modeling is a crucial tool for requirements analysis and has been demonstrated to aid in the comprehension and analysis of requirements. However, constructing requirements models from natural language des...
来源: 评论
An LLM-Empowered Adaptive Evolutionary Algorithm For Multi-Component Deep Learning systems
arXiv
收藏 引用
arXiv 2025年
作者: Tian, Haoxiang Han, Xingshuo Wu, Guoquan Guo, An Zhou, Yuan Zhang, Jie Li, Shuo Wei, Jun Zhang, Tianwei Key Lab of System Software CAS State Key Lab of Computer Science ISCAS Beijing China University of CAS Beijing China Nanyang Technological University Singapore Continental-NTU Corporate Lab Singapore Nanjing Institute of Software Technology University of CAS Nanjing China Nanjing University Nanjing China Zhejiang Sci-Tech University Hangzhou China CFAR IHPC A*STAR Singapore
Multi-objective evolutionary algorithms (MOEAs) are widely used for searching optimal solutions in complex multi-component applications. Traditional MOEAs for multi-component deep learning (MCDL) systems face challeng... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Intersecting-boundary-sensitive fingerprinting for tampering detection of DNN models  24
Intersecting-boundary-sensitive fingerprinting for tampering...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Xiaofan Bai Chaoxiang He Xiaojing Ma Bin Benjamin Zhu Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security Microsoft School of Computer Science and Technology Huazhong University of Science and Technology and National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab.
Cloud-based AI services offer numerous benefits but also introduce vulnerabilities, allowing for tampering with deployed DNN models, ranging from injecting malicious behaviors to reducing computing resources. Fingerpr...
来源: 评论
Bridge the Gap between Supervised and Unsupervised Learning for Fine-Grained Classification
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Jiabao Li, Yang Wei, Xiu-Shen Li, Hang Miao, Zhuang Zhang, Rui Army Engineering University of PLA Jiangsu Nanjing210007 China PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology Jiangsu Nanjing210094 China State Key Lab. for Novel Software Technology Nanjing University Jiangsu Nanjing210023 China
Unsupervised learning technology has caught up with or even surpassed supervised learning technology in general object classification (GOC) and person re-identification (re-ID). However, it is found that the unsupervi... 详细信息
来源: 评论
A mathematical model for efficient extraction of key locations from point-cloud data in track area
收藏 引用
Industrial Artificial Intelligence 2023年 第1期1卷 1-14页
作者: Chen, Shuyue Wu, Jiaolv Lu, Jian Wang, Xizhao College of Mathematics and Statistics Shenzhen University Shenzhen China School of Software Engineering Shenzhen Institue of Information Technology Shenzhen China Shenzhen No. 3 Vocational School of Technology Shenzhen China College of Engineering Huaqiao University Quanzhou China Shenzhen Key Lab. of Advanced Machine Learning and Applications Shenzhen University Shenzhen China Guangdong Key Lab. of Intelligent Information Process Shenzhen University Shenzhen China College of Computer Science and Software Engineering Shenzhen University Shenzhen China
During the construction of a metro system, it is inevitable that deviations will occur between the excavated tunnel and the original designed scheme. As such, it is necessary to adjust the designed scheme to accommoda...
来源: 评论
Towards Efficient Workflow Scheduling Over Yarn Cluster Using Deep Reinforcement Learning
Towards Efficient Workflow Scheduling Over Yarn Cluster Usin...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Jianguo Xue Ting Wang Puyu Cai MoE Engineering Research Center of Software/Hardware Co-design Technology and Application Shanghai Key Lab. of Trustworthy Computing East China Normal University China Department of Computer Science and Engineering Michigan State University USA
Hadoop Yarn is an open-source cluster manager responsible for resource management and job scheduling. However, data-driven applications are typically organized into workflows that consist of a series of jobs with depe...
来源: 评论
SliceProp: A Slice-Wise Bidirectional Propagation Model for Interactive 3D Medical Image Segmentation  1
SliceProp: A Slice-Wise Bidirectional Propagation Model for ...
收藏 引用
1st IEEE International Conference on Medical Artificial Intelligence, MedAI 2023
作者: Xu, Xin Lu, Wenjing Lei, Jiahao Qiu, Peng Shen, Hong-Bin Yang, Yang Shanghai Jiao Tong University Key Lab. of Shanghai Education Commission for Intelligent Interaction and Cognitive Engineering Department of Computer Science and Engineering Shanghai200240 China Shanghai Ninth People's Hospital Shanghai Jiao Tong University School of Medicine Department of Vascular Surgery China Shanghai Jiao Tong University Institute of Image Processing and Pattern Recognition Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai200240 China
Interactive medical image segmentation methods have become increasingly popular in recent years. These methods combine manual lab.ling and automatic segmentation, reducing the workload of annotation while maintaining ... 详细信息
来源: 评论
DDS2M: Self-Supervised Denoising Diffusion Spatio-Spectral Model for Hyperspectral Image Restoration
DDS2M: Self-Supervised Denoising Diffusion Spatio-Spectral M...
收藏 引用
International Conference on computer Vision (ICCV)
作者: Yuchun Miao Lefei Zhang Liangpei Zhang Dacheng Tao National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Hubei Luojia Laboratory State Key Lab. of Information Engineering in Surveying Mapping and Remote Sensing Wuhan University Sydney AI Centre School of Computer Science The University of Sydney
Diffusion models have recently received a surge of interest due to their impressive performance for image restoration, especially in terms of noise robustness. However, existing diffusion-based methods are trained on ...
来源: 评论
The Embedding Path Order for Lambda-Free Higher-Order Terms
Journal of Applied Logics
收藏 引用
Journal of Applied Logics 2021年 第10期8卷 2447-2470页
作者: Bentkamp, Alexander Vrije Universiteit Amsterdam Netherlands State Key Lab. of Computer Science Institute of Software CAS Beijing China
The embedding path order, introduced in this article, is a variant of the recursive path order (RPO) for untyped λ-free higher-order terms (also called applicative first-order terms). Unlike other higher-order varian... 详细信息
来源: 评论