咨询与建议

限定检索结果

文献类型

  • 1,197 篇 会议
  • 838 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 2,040 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,454 篇 工学
    • 1,168 篇 计算机科学与技术...
    • 978 篇 软件工程
    • 267 篇 信息与通信工程
    • 186 篇 控制科学与工程
    • 143 篇 生物工程
    • 91 篇 电子科学与技术(可...
    • 86 篇 电气工程
    • 83 篇 机械工程
    • 75 篇 光学工程
    • 61 篇 生物医学工程(可授...
    • 50 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 33 篇 建筑学
    • 31 篇 网络空间安全
    • 29 篇 土木工程
    • 29 篇 安全科学与工程
  • 638 篇 理学
    • 400 篇 数学
    • 150 篇 生物学
    • 121 篇 统计学(可授理学、...
    • 116 篇 物理学
    • 86 篇 系统科学
    • 50 篇 化学
  • 435 篇 管理学
    • 262 篇 管理科学与工程(可...
    • 189 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 41 篇 医学
    • 38 篇 临床医学
    • 33 篇 基础医学(可授医学...
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 52 篇 semantics
  • 43 篇 laboratories
  • 39 篇 wireless sensor ...
  • 38 篇 feature extracti...
  • 31 篇 optimization
  • 30 篇 software
  • 28 篇 data mining
  • 28 篇 software testing
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 27 篇 web services
  • 24 篇 routing
  • 24 篇 image segmentati...
  • 24 篇 software enginee...
  • 24 篇 testing
  • 23 篇 monitoring
  • 23 篇 accuracy
  • 22 篇 task analysis

机构

  • 524 篇 state key labora...
  • 222 篇 department of co...
  • 130 篇 national key lab...
  • 108 篇 state key labora...
  • 75 篇 state key lab. f...
  • 55 篇 national key lab...
  • 55 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 state key lab fo...
  • 48 篇 national key lab...
  • 39 篇 department of co...
  • 37 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 computer vision ...
  • 27 篇 school of electr...
  • 27 篇 department of co...
  • 25 篇 department of co...
  • 21 篇 nanjing universi...
  • 21 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 30 篇 shen furao
  • 30 篇 zhao jian
  • 30 篇 zhang lijun
  • 29 篇 tong lu
  • 29 篇 lu tong
  • 28 篇 gao yang
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 23 篇 qi lianyong
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 xu xiaolong
  • 22 篇 zhang xuyun
  • 22 篇 chen guihai
  • 22 篇 palaiahnakote sh...
  • 21 篇 xuandong li

语言

  • 1,919 篇 英文
  • 61 篇 中文
  • 58 篇 其他
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2040 条 记 录,以下是341-350 订阅
排序:
Long- and Short- Term Sequential Recommendation with Temporal Interval
Long- and Short- Term Sequential Recommendation with Tempora...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Kun He Qiyan Liu Qianmu Li Shunmei Meng Nanjing University of Science and Technology Nanjing China Computer Engineering University of Toronto State Key Lab. for Novel Software Technology Nanjing University Nanjing China
Sequential recommendation aims to learn the changes of users’ interests according to their historical behaviors and predict the most likely next item. Since user’s historical behavior are sequential actions, user’s...
来源: 评论
YOLOO: You Only Learn from Others Once
arXiv
收藏 引用
arXiv 2024年
作者: Gu, Lipeng Wei, Mingqiang Yan, Xuefeng Zhu, Dingkun Zhao, Wei Xie, Haoran Liu, Yong-Jin School of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Shenzhen Institute of Research Nanjing University of Aeronautics and Astronautics Shenzhen China The School of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China The Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing China The School of Computer Science Jiangsu University of Technology Changzhou China The Division of Artificial Intelligence School of Data Science Lingnan University New Territories Hong Kong The MOE-Key Laboratory of Pervasive Computing Department of Computer Science and Technology Tsinghua University Beijing China
Multi-modal 3D multi-object tracking (MOT) typically necessitates extensive computational costs of deep neural networks (DNNs) to extract multi-modal representations. In this paper, we propose an intriguing question: ... 详细信息
来源: 评论
Graphology based handwritten character analysis for human behaviour identification
收藏 引用
CAAI Transactions on Intelligence technology 2020年 第1期5卷 55-65页
作者: Subhankar Ghosh Palaiahnakote Shivakumara Prasun Roy Umapada Pal Tong Lu Indian Statistical Institute Kolkata 700108India Faculty of Computer Science and Information Technology University of Malaya50603 Kuala LumpurMalaysia National Key Lab for Novel Software Technology Nanjing University210093 NanjingPeople’s Republic of China
Graphology-based handwriting analysis to identify human behavior,irrespective of applications,is *** existing methods that use characters,words and sentences for behavioural analysis with human intervention,we propose... 详细信息
来源: 评论
HYBRID VALUE ESTIMATION FOR OFF-POLICY EVALUATION AND OFFLINE REINFORCEMENT LEARNING
arXiv
收藏 引用
arXiv 2022年
作者: Jin, Xue-Kun Liu, Xu-Hui Jiang, Shengyi Yu, Yang National Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science The University of Hong Kong Hong Kong Polixir.ai
Value function estimation is an indispensable subroutine in reinforcement learning, which becomes more challenging in the offline setting. In this paper, we propose Hybrid Value Estimation (HVE) to reduce value estima... 详细信息
来源: 评论
BPMN++: Comprehensive Business Process Modeling for Industrial Internet Application
BPMN++: Comprehensive Business Process Modeling for Industri...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Hangyu Cheng Guosheng Kang Jianxun Liu Yiping Wen Buqing Cao Zhen Wang School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan China Hunan Provincial Key Lab. for Services Computing and Novel Software Technology HNUST Xiangtan China
Business process management is the end-to-end business process modeling, analysis, and optimization to achieve business goals. Business Process Modeling Notation (BPMN) is usually used to represent business process mo... 详细信息
来源: 评论
Further Explanations on "SAT Requires Exhaustive Search"
arXiv
收藏 引用
arXiv 2024年
作者: Dong, Qingxiu Zhou, Guangyan Xu, Ke School of Computer Science Peking University China Department of Mathematics and Statistics Beijing Technology and Business University China State Key Lab of Software Development Environment Beihang University China
Recently, Xu and Zhou [2023] introduced a constructive approach for exploring computational hardness, proving that SAT requires exhaustive search. In light of certain misinterpretations concerning the contributions an...
来源: 评论
MACRO: Incentivizing Multi-Leader Game-Based Pareto-Efficient Crowdsourcing for Video Analytics
MACRO: Incentivizing Multi-Leader Game-Based Pareto-Efficien...
收藏 引用
International Conference on Data Engineering
作者: Yu Chen Sheng Zhang Ziying Zhou Xiaokun Wang Yu Liang Ning Chen Yuting Yan Mingjun Xiao Jie Wu Zhuzhong Qian Harry Xu State Key Lab. for Novel Software Technology Nanjing University P.R. China School of Systems Science Beijing Normal University China School of Computer and Electronic Information / School of Artificial Intelligence Nanjing Normal University China School of Computer Science and Technology University of Science and Technology of China P.R. China Center for Networked Computing Temple University USA Computer Science Department Samueli School of Engineering University of California Los Angeles USA
In recent years, many crowdsourcing platforms have emerged, using the resources of recruited workers to perform diverse outsourcing tasks, where the video analytics attracts much attention due to its practical implica... 详细信息
来源: 评论
Migrant Resettlement by Evolutionary Multi-objective Optimization
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Dan-Xuan Gu, Yu-Ran Qian, Chao Mu, Xin Tang, Ke National Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China School of Artificial Intelligence Nanjing University Nanjing210023 China Peng Cheng Laboratory Shenzhen518000 China Shenzhen Key Laboratory of Computational Intelligence Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen518055 China
Migration has been a universal phenomenon, which brings opportunities as well as challenges for global development. As the number of migrants (e.g., refugees) increases rapidly in recent years, a key challenge faced b... 详细信息
来源: 评论
Smoothed online convex optimization based on discounted-normal-predictor  22
Smoothed online convex optimization based on discounted-norm...
收藏 引用
Proceedings of the 36th International Conference on Neural Information Processing Systems
作者: Lijun Zhang Wei Jiang Jinfeng Yi Tianbao Yang National Key Laboratory for Novel Software Technology Nanjing University Nanjing China and Peng Cheng Laboratory Shenzhen China National Key Laboratory for Novel Software Technology Nanjing University Nanjing China JD AI Research Beijing China Department of Computer Science and Engineering Texas A & M University College Station
In this paper, we investigate an online prediction strategy named as Discounted-Normal-Predictor [Kapralov and Panigrahy, 2010] for smoothed online convex optimization (SOCO), in which the learner needs to minimize no...
来源: 评论
Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing
收藏 引用
Chinese Journal of Electronics 2023年 第2期21卷 254-259页
作者: Hongbing Cheng Chunming Rong Zhenghua Tan Qingkai Zeng State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Information Engineering Jiangsu City Vocation College Nanjing China Department of Electronic Engineering and Computer Science University of Stavanger Stavanger Norway Department of Electronic Systems Aalborg University Aalborg Denmark
Cloud computing will be a main information infrastructure in the future; it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for clo... 详细信息
来源: 评论