咨询与建议

限定检索结果

文献类型

  • 330 篇 期刊文献
  • 278 篇 会议

馆藏范围

  • 608 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 415 篇 工学
    • 308 篇 计算机科学与技术...
    • 266 篇 软件工程
    • 94 篇 信息与通信工程
    • 70 篇 生物工程
    • 52 篇 电气工程
    • 48 篇 控制科学与工程
    • 38 篇 机械工程
    • 35 篇 光学工程
    • 31 篇 生物医学工程(可授...
    • 29 篇 电子科学与技术(可...
    • 16 篇 化学工程与技术
    • 14 篇 建筑学
    • 14 篇 土木工程
    • 13 篇 动力工程及工程热...
    • 12 篇 仪器科学与技术
    • 11 篇 交通运输工程
    • 11 篇 网络空间安全
  • 206 篇 理学
    • 112 篇 数学
    • 73 篇 生物学
    • 38 篇 物理学
    • 31 篇 统计学(可授理学、...
    • 18 篇 系统科学
    • 17 篇 化学
  • 116 篇 管理学
    • 67 篇 管理科学与工程(可...
    • 56 篇 图书情报与档案管...
    • 23 篇 工商管理
  • 24 篇 法学
    • 19 篇 社会学
  • 18 篇 医学
    • 17 篇 临床医学
    • 12 篇 基础医学(可授医学...
  • 8 篇 教育学
    • 8 篇 教育学
  • 6 篇 经济学
  • 6 篇 农学
  • 3 篇 军事学

主题

  • 34 篇 semantics
  • 22 篇 training
  • 20 篇 deep learning
  • 16 篇 feature extracti...
  • 13 篇 convolution
  • 11 篇 neural networks
  • 11 篇 visualization
  • 10 篇 conferences
  • 10 篇 graph neural net...
  • 9 篇 data models
  • 8 篇 task analysis
  • 8 篇 signal processin...
  • 8 篇 optimization
  • 8 篇 predictive model...
  • 8 篇 decoding
  • 8 篇 codes
  • 7 篇 deep neural netw...
  • 7 篇 three-dimensiona...
  • 7 篇 recommender syst...
  • 7 篇 speech processin...

机构

  • 49 篇 school of softwa...
  • 38 篇 school of big da...
  • 38 篇 key laboratory o...
  • 21 篇 school of softwa...
  • 20 篇 state key labora...
  • 20 篇 school of cyber ...
  • 19 篇 school of comput...
  • 18 篇 national enginee...
  • 17 篇 hubei key labora...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...
  • 16 篇 key laboratory o...
  • 16 篇 college of compu...
  • 16 篇 services computi...
  • 15 篇 key laboratory o...
  • 15 篇 beijing advanced...
  • 15 篇 cluster and grid...
  • 15 篇 state key labora...
  • 14 篇 school of inform...
  • 12 篇 peng cheng labor...

作者

  • 15 篇 huang sheng
  • 15 篇 wu qingyao
  • 14 篇 hu shengshan
  • 14 篇 li minghui
  • 13 篇 tan mingkui
  • 13 篇 cai yi
  • 12 篇 shen linlin
  • 11 篇 jin hai
  • 10 篇 zhang leo yu
  • 10 篇 qingyao wu
  • 9 篇 cui bin
  • 9 篇 meng yan
  • 8 篇 hai jin
  • 8 篇 zhou ziqi
  • 7 篇 lü jinhu
  • 7 篇 ling xu
  • 7 篇 minghui li
  • 7 篇 shengshan hu
  • 7 篇 fei dai
  • 7 篇 zhang wentao

语言

  • 562 篇 英文
  • 42 篇 其他
  • 5 篇 中文
检索条件"机构=Key Laboratory of Big Data and Intelligent Robot School of Software Engineering"
608 条 记 录,以下是421-430 订阅
排序:
Peculiar: Smart Contract Vulnerability Detection Based on Crucial data Flow Graph and Pre-training Techniques
Peculiar: Smart Contract Vulnerability Detection Based on Cr...
收藏 引用
International Symposium on software Reliability engineering (ISSRE)
作者: Hongjun Wu Zhuo Zhang Shangwen Wang Yan Lei Bo Lin Yihao Qin Haoyu Zhang Xiaoguang Mao National University of Defense Technology Changsha China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China School of Big Data & Software Engineering Chongqing University Chongqing China Defense Innovation Institute Academy of Military Sciences Beijing China
Smart contracts with natural economic attributes have been widely and rapidly developed in various fields. However, the bugs and vulnerabilities in smart contracts have brought huge economic losses, which has strength... 详细信息
来源: 评论
Test-Time Domain Adaptation by Learning Domain-Aware Batch Normalization
arXiv
收藏 引用
arXiv 2023年
作者: Wu, Yanan Chi, Zhixiang Wang, Yang Plataniotis, Konstantinos N. Feng, Songhe Key Laboratory of Big Data & Artificial Intelligence in Transportation Ministry of Education Beijing Jiaotong University Beijing100044 China School of Computer and Information Technology Beijing Jiaotong University Beijing100044 China The Edward S Rogers Sr. ECE Department University of Toronto TorontoM5S3G8 Canada Department of Computer Science and Software Engineering Concordia University MontrealH3G2J1 Canada
Test-time domain adaptation aims to adapt the model trained on source domains to unseen target domains using a few unlabeled images. Emerging research has shown that the label and domain information is separately embe... 详细信息
来源: 评论
K-Core Decomposition on Super Large Graphs with Limited Resources
arXiv
收藏 引用
arXiv 2021年
作者: Gao, Shicheng Xu, Jie Li, Xiaosen Fu, Fangcheng Zhang, Wentao Ouyang, Wen Tao, Yangyu Cui, Bin School of Electronic and Computer Engineering Shenzhen Graduate School Peking University China Tencent Inc. China Center for Data Science Peking University National Engineering Laboratory for Big Data Analysis and Applications China School of CS Key Laboratory of High Confidence Software Technologies Peking University China Institute of Computational Social Science Peking University Qingdao China
K-core decomposition is a commonly used metric to analyze graph structure or study the relative importance of nodes in complex graphs. Recent years have seen rapid growth in the scale of the graph, especially in indus... 详细信息
来源: 评论
Simulation Research on Nonlinear Modeling and Control of Switched Reluctance Motor
Simulation Research on Nonlinear Modeling and Control of Swi...
收藏 引用
第32届中国控制与决策会议
作者: Luan Ru Zou Hongjian Guo Jinru The School of Electrical and Information Engineering Beijing University of Civil Engineering and Architecture Beijing Key Laboratory of Intelligent Processing for Building Big Data
The model of a switched reluctance motor(SRM) directly influences it's performance and control ***,the doubly salient structure,switching power supply and seriously saturated magnetic circuit,make it difficult to ... 详细信息
来源: 评论
Detail retention and enhancement for camouflaged object detection
收藏 引用
Neurocomputing 2025年
作者: Shangjing Chen Feng Xu Tao Zeng Xin Li Jiale Chen Xin Lyu College of Computer Science and Software Engineering Hohai University Nanjing 211100 China School of Computer Engineering Jiangsu Ocean University Lianyungang 222005 China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing 211100 China
The objective of camouflaged object detection is to segment objects that share similar visual attributes with their backgrounds. Existing methods leverage the consistency and variability of the object to pinpoint its ...
来源: 评论
An Empirical Study of Solidity Language Features
An Empirical Study of Solidity Language Features
收藏 引用
IEEE International Conference on software Quality, Reliability and Security Companion (QRS-C)
作者: Ziyan Wang Xiangping Chen Xiaocong Zhou Yuan Huang Zibin Zheng Jiajing Wu School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangdong Key Laboratory for Big Data Analysis and Simulation of Public Opinion School of Communication and Design Sun Yat-sen University Guangzhou China School of Software Engineering Sun Yat-sen University Zhuhai China
Solidity, like other programming languages, is evolving with many new features being introduced and deprecated features being removed. However, not every feature benefits developers and sometimes it may do more harm t... 详细信息
来源: 评论
Two-Stage Attention-Based Model for Code Search with Textual and Structural Features
Two-Stage Attention-Based Model for Code Search with Textual...
收藏 引用
IEEE International Conference on software Analysis, Evolution and Reengineering (SANER)
作者: Ling Xu Huanhuan Yang Chao Liu Jianhang Shuai Meng Yan Yan Lei Zhou Xu Key Laboratory of Dependable Service Computing in Cyber Physical Society (Chongqing University) Ministry of Education China School of Big Data and Software Engineering Chongqing University Chongqing China College of Computer Science and Technology Zhejiang University Hangzhou China
Searching and reusing existing code from a large scale codebase can largely improve developers' programming efficiency. To support code reuse, early code search models leverage information retrieval (IR) technique... 详细信息
来源: 评论
Utilization of machine learning and neural networks to optimize the enclosure angle, magnetic field, and radiation parameter for mixed convection of hybrid nanofluid flow next to assess environmental impact
收藏 引用
engineering Analysis with Boundary Elements 2023年 146卷 252-262页
作者: Tao Hai Hayder A. Dhahad Masood Ashraf Ali Vishal Goyal Sattam Fahad Almojil Abdulaziz Ibrahim Almohana Abdulrhman Fahmi Alali Khaled Twfiq Almoalimi Farah Qasim Ahmed Alyousuf School of Computer and Information Qiannan Normal University for Nationalities Duyun Guizhou 558000 China Key Laboratory of Complex Systems and Intelligent Optimization of Guizhou Duyun Guizhou 558000 China Institute for Big Data Analytics and Artificial Intelligence (IBDAAI) Universiti Teknologi MARA Shah Alam Selangor 40450 Malaysia Mechanical Engineering Department University of Technology Baghdad Iraq Department of Industrial Engineering College of Engineering Prince Sattam bin Abdulaziz University Alkharj 16273 Saudi Arabia Department of Electronics and Communication Engineering GLA University Mathura India Department of Civil Engineering College of Engineering King Saud University P.O. Box 800 Riyadh 11421 Saudi Arabia Department of Information Technology College of Engineering and Computer Science Lebanese French University Kurdistan Region Iraq
This paper examines the mixed convective heat transfer (HTR) of nanofluid (NFD) flow in a rectangular enclosure with the upper moving wall numerically. The lower wall has a high temperature and a number of semi-circul... 详细信息
来源: 评论
PRAD: Unsupervised KPI Anomaly Detection by Joint Prediction and Reconstruction of Multivariate Time Series
PRAD: Unsupervised KPI Anomaly Detection by Joint Prediction...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Zhiying Xiong Qilin Fan Kai Wang Xiuhua Li Xu Zhang Qingyu Xiong School of Big Data and Software Engineering Chongqing University Chongqing China Chongqing Key Laboratory of Digital Cinema Art Theory and Technology Chongqing University Chongqing China School of Computer Science and Technology Harbin Institute of Technology Weihai China Research Institute of Cyberspace Security Harbin Institute of Technology Weihai China Haihe Laboratory of Information Technology Application Innovation Tianjin China Department of Computer Science University of Exeter Exeter UK
Detecting anomalies for key performance indicator (KPI) data is of paramount importance to ensure the quality and reliability of network services. However, building the anomaly detection system for KPI is challenging ...
来源: 评论
Animating turbulent fluid with a robust and efficient high-order advection method
Animating turbulent fluid with a robust and efficient high-o...
收藏 引用
作者: Zhu, Jian Li, Silong Cai, Ruichu Hao, Zhifeng Huang, Guoheng Sheng, Bin Wu, Enhua School of Computers Guangdong University of Technology Guangzhou China School of Mathematics and Big Data Foshan University Foshan China Department of Computer Science & Engineering Shanghai Jiao Tong University Shanghai China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China
The accuracy of advection has a great influence on the visual effect of fluid simulation. Constrained interpolation profile (CIP) method has been an important advection scheme because of its third-order accuracy and t... 详细信息
来源: 评论