咨询与建议

限定检索结果

文献类型

  • 7,238 篇 会议
  • 4,794 篇 期刊文献
  • 20 册 图书

馆藏范围

  • 12,052 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,081 篇 工学
    • 5,779 篇 计算机科学与技术...
    • 4,741 篇 软件工程
    • 1,476 篇 信息与通信工程
    • 991 篇 控制科学与工程
    • 743 篇 生物工程
    • 654 篇 电气工程
    • 620 篇 机械工程
    • 602 篇 电子科学与技术(可...
    • 452 篇 化学工程与技术
    • 430 篇 光学工程
    • 407 篇 生物医学工程(可授...
    • 313 篇 仪器科学与技术
    • 300 篇 材料科学与工程(可...
    • 271 篇 动力工程及工程热...
    • 226 篇 网络空间安全
    • 211 篇 土木工程
    • 209 篇 交通运输工程
    • 205 篇 安全科学与工程
    • 204 篇 建筑学
  • 3,725 篇 理学
    • 2,199 篇 数学
    • 813 篇 物理学
    • 799 篇 生物学
    • 603 篇 统计学(可授理学、...
    • 380 篇 系统科学
    • 366 篇 化学
  • 2,277 篇 管理学
    • 1,382 篇 管理科学与工程(可...
    • 1,002 篇 图书情报与档案管...
    • 431 篇 工商管理
  • 276 篇 医学
    • 235 篇 临床医学
  • 260 篇 法学
    • 214 篇 社会学
  • 149 篇 经济学
  • 120 篇 教育学
  • 99 篇 农学
  • 32 篇 艺术学
  • 31 篇 文学
  • 31 篇 军事学
  • 11 篇 哲学

主题

  • 322 篇 semantics
  • 283 篇 feature extracti...
  • 275 篇 software enginee...
  • 256 篇 laboratories
  • 222 篇 computational mo...
  • 204 篇 computer science
  • 203 篇 data mining
  • 185 篇 deep learning
  • 161 篇 training
  • 156 篇 optimization
  • 134 篇 educational inst...
  • 131 篇 algorithm design...
  • 118 篇 predictive model...
  • 113 篇 image segmentati...
  • 112 篇 wireless sensor ...
  • 112 篇 software
  • 111 篇 machine learning
  • 109 篇 convolution
  • 101 篇 conferences
  • 99 篇 quality of servi...

机构

  • 635 篇 state key labora...
  • 471 篇 state key labora...
  • 370 篇 beijing key labo...
  • 209 篇 school of comput...
  • 193 篇 university of ch...
  • 186 篇 college of compu...
  • 139 篇 state key labora...
  • 137 篇 state key labora...
  • 119 篇 key laboratory o...
  • 109 篇 state key labora...
  • 109 篇 national key lab...
  • 103 篇 school of comput...
  • 100 篇 state key labora...
  • 97 篇 school of inform...
  • 92 篇 beijing key labo...
  • 81 篇 school of softwa...
  • 80 篇 guangxi key labo...
  • 77 篇 beijing key labo...
  • 77 篇 national enginee...
  • 74 篇 beijing key labo...

作者

  • 94 篇 yin baocai
  • 93 篇 junping du
  • 79 篇 baocai yin
  • 75 篇 du junping
  • 61 篇 wu bin
  • 58 篇 huadong ma
  • 57 篇 gao yang
  • 53 篇 ma huadong
  • 52 篇 tao dacheng
  • 47 篇 bin wu
  • 42 篇 xiao limin
  • 40 篇 zhang lei
  • 39 篇 shen furao
  • 39 篇 wang qing
  • 39 篇 lishan kang
  • 39 篇 huang di
  • 37 篇 yanfeng sun
  • 36 篇 liu yang
  • 36 篇 zhao jian
  • 35 篇 yunhui shi

语言

  • 10,406 篇 英文
  • 1,366 篇 其他
  • 300 篇 中文
  • 1 篇 德文
  • 1 篇 西班牙文
  • 1 篇 法文
检索条件"机构=Key Laboratory of Intelligent Software and Software Engineering"
12052 条 记 录,以下是4961-4970 订阅
排序:
Kaya: A Testing Framework for Blockchain-based Decentralized Applications
Kaya: A Testing Framework for Blockchain-based Decentralized...
收藏 引用
International Conference on software Maintenance (ICSM)
作者: Zhenhao Wu Jiashuo Zhang Jianbo Gao Yue Li Qingshan Li Zhi Guan Zhong Chen Key Laboratory of High Confidence Software Technologies Peking University MoE Beijing China EECS Peking University Beijing China National Engineering Research Center for Software Engineering Peking University Beijing China
In recent years, many decentralized applications based on blockchain (DApp) have been developed. Some development tools provide testing functions, but only for developers to write unit tests for smart contracts rather... 详细信息
来源: 评论
Anaerobic Granular Sludge Performance in an Expanded Granular Sludge Bed Reactor Treating Calcium-Rich Wastewater by Adjusting Caco3 Crystallization: Effect of Upflow Velocity and Ca2+ Concentration
SSRN
收藏 引用
SSRN 2023年
作者: Liu, Xiaoji Pan, Dongning Yuan, Quan Feng, Xiyuan Li, Meixuan Song, Xuening Li, Meiling Ge, Yajuan Xing, Yukun Yu, Yuanzhou Jin, Zhengyu Key Laboratory of Ecology and Environment in Minority Areas National Ethnic Affairs Commission College of Life & Environmental Sciences Minzu University of China Beijing100081 China School of Ecology and Environment Beijing Technology and Business University Beijing100048 China CECEP(Feixi)WTE CO. Ltd Hefei231241 China State Key Joint Laboratory of Environment Simulation and Pollution Control School of Environment Tsinghua University Beijing100084 China Harbin Institute of Technology Software Engineering Co. Ltd Harbin150028 China Tianjin Research Institute for Water Transport Engineering M.O.T Tianjin300000 China Huanan Construction Limited Company China Construction Sixth Engineering Bureau Shenzhen518108 China
The role of upflow velocity and Ca2+ concentration in controlling the type and rate of CaCO3 crystallization and their impacts on an expanded granular sludge bed (EGSB) reactor were studied. An improved upflow velocit... 详细信息
来源: 评论
Dimensional response analysis of self-centering piers subjected to near-fault pulse-like ground motions
收藏 引用
Structures 2025年 79卷
作者: Guiqiang Guo Dongxia Sun Zongliang Wu Zhihao Wang Dixiong Yang School of Civil Engineering and Transportation North China University of Water Resources and Electric Power Zhengzhou 450045 China State Key Laboratory of Structural Analysis Optimization and CAE Software for Industrial Equipment Department of Engineering Mechanics Dalian University of Technology Dalian 116024 China
The self-centering piers are generally equipped with energy dissipation devices and recentering devices so that the peak and residual drifts can be effectively controlled. However, there is no efforts conducted to sys...
来源: 评论
Automatic Detection and Repair Recommendation for Missing Checks
收藏 引用
Journal of Computer Science & Technology 2019年 第5期34卷 972-992页
作者: Ling-Yun Situ Lin-Zhang Wang Yang Liu Bing Mao Xuan-Dong Li State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China Department of Computer Science and Technology Nanjing UniversityNanjing 210023China School of Computer Science and Engineering Nanyang Technological UniversitySingapore 639798Singapore
Missing checks for untrusted inputs used in security-sensitive operations is one of the major causes of various vulnerabilities. Efficiently detecting and repairing missing checks are essential for prognosticating pot... 详细信息
来源: 评论
Detail retention and enhancement for camouflaged object detection
收藏 引用
Neurocomputing 2025年 648卷
作者: Shangjing Chen Feng Xu Tao Zeng Xin Li Jiale Chen Xin Lyu College of Computer Science and Software Engineering Hohai University Nanjing 211100 China School of Computer Engineering Jiangsu Ocean University Lianyungang 222005 China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing 211100 China
The objective of camouflaged object detection is to segment objects that share similar visual attributes with their backgrounds. Existing methods leverage the consistency and variability of the object to pinpoint its ... 详细信息
来源: 评论
From similarity perspective: a robust collaborative filtering approach for service recommendations
收藏 引用
Frontiers of Computer Science 2019年 第2期13卷 231-246页
作者: Min GAO Bin LING Linda YANG Junhao WEN Qingyu XIONG Shun LI Key Laboratory of Dependable Service Computing in Cyber Physical Society (Chongqing University) Ministry of Education Chongqing 400044 China School of Software Engineering Chongqing University Chongqing 400044 China School of Engineering University of Portsmouth Portsmouth PO1 3 AH UK
Collaborative filtering (CF) is a technique commonly used for personalized recommendation and Web service quality-of-service (QoS) prediction. However, CF is vulnerable to shilling attackers who inject fake user profi... 详细信息
来源: 评论
Evidence-aware hierarchical interactive attention networks for explainable claim verification  29
Evidence-aware hierarchical interactive attention networks f...
收藏 引用
29th International Joint Conference on Artificial Intelligence, IJCAI 2020
作者: Wu, Lianwei Rao, Yuan Yang, Xiong Wang, Wanzhen Nazir, Ambreen Lab of Social Intelligence and Complexity Data Processing School of Software Engineering Xi'an Jiaotong University China Shannxi Joint Key Laboratory for Artifact Intelligence Sub-Lab of Xi'an Jiaotong University China Research Institute of Xi'an Jiaotong University Shenzhen China
Exploring evidence from relevant articles to confirm the veracity of claims is a trend towards explainable claim verification. However, most strategies capture the top-k check-worthy articles or salient words as evide... 详细信息
来源: 评论
Knowledge Graph Augmented Network Towards Multiview Representation Learning for Aspect-based Sentiment Analysis
arXiv
收藏 引用
arXiv 2022年
作者: Zhong, Qihuang Ding, Liang Liu, Juhua Du, Bo Jin, Hua Tao, Dacheng The National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence School of Computer Science Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China The Research Center for Graphic Communication Printing and Packaging Institute of Artificial Intelligence Wuhan University Wuhan China The JD Explore Academy *** Beijing China The Affiliated Hospital of Kunming University of Science and Technology Kunming China
Aspect-based sentiment analysis (ABSA) is a fine-grained task of sentiment analysis. To better comprehend long complicated sentences and obtain accurate aspect-specific information, linguistic and commonsense knowledg... 详细信息
来源: 评论
On Pareto-frontier Approximate Computing for Many-core Systems
On Pareto-frontier Approximate Computing for Many-core Syste...
收藏 引用
intelligent Technology and Embedded Systems (ICITES), International Conference on
作者: Xinyue Hou Xiaohang Wang Maurizio Palesi Amit Kumar Singh Yingtao Jiang Mei Yang Letian Huang Junying Chen Key Laboratory of Big Data and Intelligent Robot (South China University of Technology) Ministry of Education School of Software Engineering South China University of Technology University of Catania Catania Italy School of Computer Science and Electronic Engineering University of Essex Colchester United Kingdom University of Nevada Las Vegas USA School of Electronic Science and Engineering University of Electronic Science and Technology of China China
Approximate computing is an emerging paradigm that aggressively improves performance or reduces energy consumption by sacrificing computation quality for error forgiving applications. Various approximate techniques, i... 详细信息
来源: 评论
Vulnerability Analysis through Interface-based Checker Design
Vulnerability Analysis through Interface-based Checker Desig...
收藏 引用
IEEE International Conference on software Quality, Reliability and Security Companion (QRS-C)
作者: Xiang Du Liangze Yin Peng Wu Liyuan Jia Wei Dong Key Laboratory Of Software Engineering for Complex Systems College of Computer Science National University of Defense Technology Changsha China
Checkers design is a main step for static analysis of different vulnerabilities. This paper focuses on static analysis on code property graph, which combines abstract syntax tree, control flow graph, and program depen... 详细信息
来源: 评论