咨询与建议

限定检索结果

文献类型

  • 1,210 篇 会议
  • 845 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 2,060 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,471 篇 工学
    • 1,181 篇 计算机科学与技术...
    • 981 篇 软件工程
    • 268 篇 信息与通信工程
    • 197 篇 控制科学与工程
    • 143 篇 生物工程
    • 91 篇 电子科学与技术(可...
    • 87 篇 电气工程
    • 83 篇 机械工程
    • 77 篇 光学工程
    • 61 篇 生物医学工程(可授...
    • 50 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 34 篇 建筑学
    • 31 篇 网络空间安全
    • 30 篇 土木工程
    • 29 篇 安全科学与工程
  • 641 篇 理学
    • 401 篇 数学
    • 150 篇 生物学
    • 121 篇 统计学(可授理学、...
    • 118 篇 物理学
    • 86 篇 系统科学
    • 50 篇 化学
  • 437 篇 管理学
    • 261 篇 管理科学与工程(可...
    • 192 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 41 篇 医学
    • 38 篇 临床医学
    • 33 篇 基础医学(可授医学...
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 52 篇 semantics
  • 43 篇 laboratories
  • 40 篇 feature extracti...
  • 39 篇 wireless sensor ...
  • 31 篇 optimization
  • 30 篇 software
  • 29 篇 data mining
  • 28 篇 software testing
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 27 篇 web services
  • 25 篇 image segmentati...
  • 24 篇 routing
  • 24 篇 software enginee...
  • 24 篇 testing
  • 24 篇 accuracy
  • 23 篇 monitoring
  • 23 篇 training

机构

  • 528 篇 state key labora...
  • 221 篇 department of co...
  • 131 篇 national key lab...
  • 108 篇 state key labora...
  • 79 篇 state key lab. f...
  • 56 篇 national key lab...
  • 55 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 state key lab fo...
  • 48 篇 national key lab...
  • 40 篇 department of co...
  • 36 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 computer vision ...
  • 27 篇 department of co...
  • 25 篇 department of co...
  • 25 篇 school of electr...
  • 22 篇 nanjing universi...
  • 22 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 31 篇 zhang lijun
  • 30 篇 shen furao
  • 30 篇 lu tong
  • 29 篇 zhao jian
  • 29 篇 tong lu
  • 28 篇 gao yang
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 24 篇 qi lianyong
  • 23 篇 xu xiaolong
  • 23 篇 zhang xuyun
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 chen guihai
  • 22 篇 palaiahnakote sh...
  • 21 篇 xuandong li

语言

  • 1,894 篇 英文
  • 103 篇 其他
  • 62 篇 中文
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2060 条 记 录,以下是541-550 订阅
排序:
CHECKING CONTINUOUS STOCHASTIC LOGIC AGAINST QUANTUM CONTINUOUS-TIME MARKOV CHAINS
arXiv
收藏 引用
arXiv 2022年
作者: Mei, Jingyi Xu, Ming Guan, Ji Deng, Yuxin Yu, Nengkun Shanghai Key Lab of Trustworthy Computing East China Normal University China Shanghai Key Lab of Trustworthy Computing & MoE Engineering Research Center of Software/Hardware Co-design Technology and Application East China Normal University China State Key Lab of Computer Science Institute of Software Chinese Academy of Sciences China Department of Computer Science Stony Brook University United States
Verifying quantum systems has attracted a lot of interest in the last decades. In this paper, we study the quantitative model-checking of quantum continuous-time Markov chains (quantum CTMCs). The branching-time prope... 详细信息
来源: 评论
An Intelligent Resource Scheduling Method with Edge Channel Deployment for BPM
An Intelligent Resource Scheduling Method with Edge Channel ...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Bowen Liu Wanchun Dou Xiaokang Zhou Xuyun Zhang Lianyong Qi Fei Dai Chaochao Chen State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Faculty of Data Science Shiga University Hikone Japan Department of Computing Macquarie University Sydney Australia College of Computer and Software China University of Petroleum (East China) Qingdao China College of Big Data and Intelligent Engineering Southwest Forestry University Kunming China College of Computer Science and Technology Zhejiang University Hangzhou China
Edge computing is a novel computing paradigm that offers kinds of resources at the network edge. In edge computing, terminal users are connected to edge servers via the wireless network and there are various channels ...
来源: 评论
Four-Valued Monitorability of ω -Regular Languages  22nd
Four-Valued Monitorability of ω -Regular Languages
收藏 引用
22nd International Conference on Formal Engineering Methods, ICFEM 2020
作者: Chen, Zhe Chen, Yunyun Hierons, Robert M. Wu, Yifan College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Shanghai Key Laboratory of Trustworthy Computing Shanghai China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science The University of Sheffield Sheffield United Kingdom
The use of runtime verification has led to interest in deciding whether a property is monitorable: whether it is always possible for the satisfaction or violation of the property to be determined after a finite future... 详细信息
来源: 评论
A Quantum Probability Driven Framework for Joint Multi-Modal Sarcasm, Sentiment and Emotion Analysis
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Yaochen Zhang, Yazhou Song, Dawei School of Computer Science and Technology Beijing Institute of Technology Beijing100081 China School of Computing and Communications The Open University Walton Hall United Kingdom School of Nursing The Hong Kong Polytechnic University Hong Kong Ministry of Education China Artificial Intelligence Laboratory China Mobile Communication Group Tianjin Co. Ltd. China State Key Lab. for Novel Software Technology Nanjing University Nanjing China Zhengzhou University of Light Industry China
Sarcasm, sentiment, and emotion are three typical kinds of spontaneous affective responses of humans to external events and they are tightly intertwined with each other. Such events may be expressed in multiple modali... 详细信息
来源: 评论
Your transformer may not be as powerful as you expect  22
Your transformer may not be as powerful as you expect
收藏 引用
Proceedings of the 36th International Conference on Neural Information Processing Systems
作者: Shengjie Luo Shanda Li Shuxin Zheng Tie-Yan Liu Liwei Wang Di He National Key Laboratory of General Artificial Intelligence School of Intelligence Science and Technology Peking University and Zhejiang Lab Machine Learning Department School of Computer Science Carnegie Mellon University Microsoft Research National Key Laboratory of General Artificial Intelligence School of Intelligence Science and Technology Peking University and Center for Data Science Peking University National Key Laboratory of General Artificial Intelligence School of Intelligence Science and Technology Peking University
Relative Positional Encoding (RPE), which encodes the relative distance between any pair of tokens, is one of the most successful modifications to the original Transformer. As far as we know, theoretical understanding...
来源: 评论
Automatic Detection and Repair Recommendation for Missing Checks
收藏 引用
Journal of computer science & technology 2019年 第5期34卷 972-992页
作者: Ling-Yun Situ Lin-Zhang Wang Yang Liu Bing Mao Xuan-Dong Li State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China Department of Computer Science and Technology Nanjing UniversityNanjing 210023China School of Computer Science and Engineering Nanyang Technological UniversitySingapore 639798Singapore
Missing checks for untrusted inputs used in security-sensitive operations is one of the major causes of various vulnerabilities. Efficiently detecting and repairing missing checks are essential for prognosticating pot... 详细信息
来源: 评论
Mutant reduction evaluation: What is there and what is missing?
arXiv
收藏 引用
arXiv 2021年
作者: Zhang, Peng Wang, Yang Liu, Xutong Li, Yanhui Yang, Yibao Wang, Ziyuan Zhou, Xiaoyu Chen, Lin Zhou, Yuming State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China School of Computer Nanjing University of Posts and Telecommunication China School of Computer Science and Engineering Southeast University China
Background. Mutation testing is a commonly used fault injection technique for evaluating the effectiveness of a test suite. However, it is usually computationally expensive. Therefore, many mutation reduction strategi... 详细信息
来源: 评论
Cloud-based storage and computing for remote sensing big data:a technical review
收藏 引用
International Journal of Digital Earth 2022年 第1期15卷 1417-1445页
作者: Chen Xu Xiaoping Du Xiangtao Fan Gregory Giuliani Zhongyang Hu Wei Wang Jie Liu Teng Wang Zhenzhen Yan Junjie Zhu Tianyang Jiang Huadong Guo Key Lab of Digital Earth Sciences Aerospace Information Research InstituteChinese Academy of SciencesBeijingPeople’s Republic of China International Research Center of Big Data for Sustainable Development Goals BeijingPeople’s Republic of China College of Resources and Environment University of Chinese Academy of SciencesBeijingPeople’s Republic of China Institute for Environmental Sciences/GRID-Geneva University of GenevaGenevaSwitzerland Institute for Marine and Atmospheric research Utrecht (IMAU) Utrecht UniversityUtrechtThe Netherlands State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of SciencesBeijingPeople’s Republic of China Tianyi Cloud People’s Republic of China Telecom Co.LtdGuangzhouPeople’s Republic of China Department of Computer Science and Technology Tsinghua UniversityBeijingPeople's Republic of China
The rapid growth of remote sensing big data(RSBD)has attracted considerable attention from both academia and *** the progress of computer technologies,conventional computing implementations have become technically ine... 详细信息
来源: 评论
When Deep Learning Meets Information Retrieval-based Bug Localization: A Survey
arXiv
收藏 引用
arXiv 2025年
作者: Niu, Feifei Li, Chuanyi Liu, Kui Xia, Xin Lo, David State Key Laboratory for Novel Software Technology Software Institute Nanjing University Nanjing China Software Engineering Application Technology Lab Huawei Hangzhou China College of Computer Science and Technology Zhejiang University China School of Computing and Information Systems Singapore Management University Singapore
Bug localization is a crucial aspect of software maintenance, running through the entire software lifecycle. Information retrieval-based bug localization (IRBL) identifies buggy code based on bug reports, expediting t... 详细信息
来源: 评论
FLBench: A Benchmark Suite for Federated Learning  1st
FLBench: A Benchmark Suite for Federated Learning
收藏 引用
1st BenchCouncil International Federated Intelligent Computing and Block Chain Conferences, FICC 2020
作者: Liang, Yuan Guo, Yange Gong, Yanxia Luo, Chunjie Zhan, Jianfeng Huang, Yunyou Guangxi Key Lab of Multi -Source Information Mining & Security Department of Computer Science Guangxi Normal University Guilin541004 China Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China BenchCouncil R&D Lab - Guilin Guilin China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China
Federated learning is a new machine learning paradigm. The goal is to build a machine learning model from the data sets distributed on multiple devices–so-called an isolated data island–while keeping their data secu... 详细信息
来源: 评论