咨询与建议

限定检索结果

文献类型

  • 1,210 篇 会议
  • 845 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 2,060 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,471 篇 工学
    • 1,181 篇 计算机科学与技术...
    • 981 篇 软件工程
    • 268 篇 信息与通信工程
    • 197 篇 控制科学与工程
    • 143 篇 生物工程
    • 91 篇 电子科学与技术(可...
    • 87 篇 电气工程
    • 83 篇 机械工程
    • 77 篇 光学工程
    • 61 篇 生物医学工程(可授...
    • 50 篇 动力工程及工程热...
    • 43 篇 仪器科学与技术
    • 43 篇 化学工程与技术
    • 34 篇 建筑学
    • 31 篇 网络空间安全
    • 30 篇 土木工程
    • 29 篇 安全科学与工程
  • 641 篇 理学
    • 401 篇 数学
    • 150 篇 生物学
    • 121 篇 统计学(可授理学、...
    • 118 篇 物理学
    • 86 篇 系统科学
    • 50 篇 化学
  • 437 篇 管理学
    • 261 篇 管理科学与工程(可...
    • 192 篇 图书情报与档案管...
    • 78 篇 工商管理
  • 46 篇 法学
    • 36 篇 社会学
  • 41 篇 医学
    • 38 篇 临床医学
    • 33 篇 基础医学(可授医学...
  • 26 篇 经济学
    • 26 篇 应用经济学
  • 16 篇 教育学
  • 15 篇 农学
  • 9 篇 艺术学
  • 6 篇 文学
  • 4 篇 军事学

主题

  • 78 篇 computer science
  • 52 篇 semantics
  • 43 篇 laboratories
  • 40 篇 feature extracti...
  • 39 篇 wireless sensor ...
  • 31 篇 optimization
  • 30 篇 software
  • 29 篇 data mining
  • 28 篇 software testing
  • 27 篇 computational mo...
  • 27 篇 algorithm design...
  • 27 篇 protocols
  • 27 篇 web services
  • 25 篇 image segmentati...
  • 24 篇 routing
  • 24 篇 software enginee...
  • 24 篇 testing
  • 24 篇 accuracy
  • 23 篇 monitoring
  • 23 篇 training

机构

  • 528 篇 state key labora...
  • 221 篇 department of co...
  • 131 篇 national key lab...
  • 108 篇 state key labora...
  • 79 篇 state key lab. f...
  • 56 篇 national key lab...
  • 55 篇 state key labora...
  • 51 篇 state key labora...
  • 51 篇 state key lab fo...
  • 48 篇 national key lab...
  • 40 篇 department of co...
  • 36 篇 school of artifi...
  • 31 篇 department of co...
  • 29 篇 faculty of compu...
  • 28 篇 computer vision ...
  • 27 篇 department of co...
  • 25 篇 department of co...
  • 25 篇 school of electr...
  • 22 篇 nanjing universi...
  • 22 篇 school of comput...

作者

  • 40 篇 dou wanchun
  • 37 篇 li wu-jun
  • 36 篇 guihai chen
  • 33 篇 sanglu lu
  • 31 篇 zhang lijun
  • 30 篇 shen furao
  • 30 篇 lu tong
  • 29 篇 zhao jian
  • 29 篇 tong lu
  • 28 篇 gao yang
  • 25 篇 yang tianbao
  • 25 篇 xu chang
  • 24 篇 qi lianyong
  • 23 篇 xu xiaolong
  • 23 篇 zhang xuyun
  • 22 篇 zhou zhi-hua
  • 22 篇 zhang yan
  • 22 篇 chen guihai
  • 22 篇 palaiahnakote sh...
  • 21 篇 xuandong li

语言

  • 1,894 篇 英文
  • 103 篇 其他
  • 62 篇 中文
  • 2 篇 德文
检索条件"机构=National Key Lab of Novel Software Technology and Department of Computer Science and Technology"
2060 条 记 录,以下是591-600 订阅
排序:
Divide and contrast: source-free domain adaptation via adaptive contrastive learning  22
Divide and contrast: source-free domain adaptation via adapt...
收藏 引用
Proceedings of the 36th International Conference on Neural Information Processing Systems
作者: Ziyi Zhang Weikai Chen Hui Cheng Zhen Li Siyuan Li Liang Lin Guanbin Li National Key Laboratory of Novel Software Technology Nanjing University Nanjing China Tencent America School of Computer Science and Engineering Sun Yat-sen University Guangzhou China The Chinese University of Hong Kong Shenzhen China and Shenzhen Research Institute of Big Data Shenzhen China AI Lab School of Engineering Westlake University Hangzhou China
We investigate a practical domain adaptation task, called source-free unsupervised domain adaptation (SFUDA), where the source pretrained model is adapted to the target domain without access to the source data. Existi...
来源: 评论
A Survey on Temporal Knowledge Graph Completion: Taxonomy, Progress, and Prospects
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Jiapu Wang, Boyue Qiu, Meikang Pan, Shirui Xiong, Bo Liu, Heng Luo, Linhao Liu, Tengfei Hu, Yongli Yin, Baocai Gao, Wen Beijing Municipal Key Lab of Multimedia and Intelligent Software Technology Beijing Artificial Intelligence Institute Faculty of Information Technology Beijing University of Technology Beijing100124 China The Beacom College of Computer and Cyber Sciences Dakota State University MadisonSD United States Griffith University QLD Australia The Department of Computer Science University of Stuttgart Stuttgart70569 Germany The Department of Data Science and AI Monash University Melbourne Australia The Institute of Digital Media Peking University Beijing100871 China The School of Electronic and Computer Engineering Peking University Shenzhen Graduate School Shenzhen518055 China
Temporal characteristics are prominently evident in a substantial volume of knowledge, which underscores the pivotal role of Temporal Knowledge Graphs (TKGs) in both academia and industry. However, TKGs often suffer f... 详细信息
来源: 评论
Approximate equivalence checking of noisy quantum circuits
arXiv
收藏 引用
arXiv 2021年
作者: Hong, Xin Ying, Mingsheng Feng, Yuan Zhou, Xiangzhen Li, Sanjiang Centre for Quantum Software and Information University of Technology Sydney Australia State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences China Department of Computer Science and Technology Tsinghua University China State Key Lab of Millimeter Waves Southeast University China
We study the fundamental design automation problem of equivalence checking in the NISQ (Noisy Intermediate-Scale Quantum) computing realm where quantum noise is present inevitably. The notion of approximate equivalenc... 详细信息
来源: 评论
SoLar: sinkhorn label refinery for imbalanced partial-label learning  22
SoLar: sinkhorn label refinery for imbalanced partial-label ...
收藏 引用
Proceedings of the 36th International Conference on Neural Information Processing Systems
作者: Haobo Wang Mingxuan Xia Yixuan Li Yuren Mao Lei Feng Gang Chen Junbo Zhao Key Lab of Intelligent Computing based Big Data of Zhejiang Province Zhejiang University School of Software Technology Zhejiang University Department of Computer Sciences University of Wisconsin-Madison College of Computer Science Chongqing University and Center for Advanced Intelligence Project RIKEN
Partial-label learning (PLL) is a peculiar weakly-supervised learning task where the training samples are generally associated with a set of candidate labels instead of single ground truth. While a variety of label di...
来源: 评论
Uplink Control Information Based Clustered Access and Discontinuous Reception Management for mMTC
收藏 引用
IEEE Communications Letters 2025年 第6期29卷 1380-1384页
作者: Wang, Shao-Di Wang, Chang-Long Wang, Hui-Ming Zhou, Feng Leung, Victor C. M. Xidian University Key Laboratory of Electronic Information Countermeasure and Simulation Technology of Ministry of Education Xi’an710071 China Xi’an Jiaotong University School of Information and Communication Engineering Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an710049 China Shenzhen MSU BIT University Artificial Intelligence Research Institute Shenzhen518172 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China The University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada
Uplink control information (UCI) and discontinuous reception (DRX) play important roles for massive machine type communication (mMTC). Despite their standalone significance, a conspicuous gap exists in comprehensively... 详细信息
来源: 评论
Refine-Net: Normal Refinement Neural Network for Noisy Point Clouds
arXiv
收藏 引用
arXiv 2022年
作者: Zhou, Haoran Chen, Honghua Zhang, Yingkui Wei, Mingqiang Xie, Haoran Wang, Jun Lu, Tong Qin, Jing Zhang, Xiao-Ping State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China MIIT Key Laboratory of Pattern Analysis and Machine Intelligence Nanjing China Department of Computing and Decision Sciences Lingnan University Hong Kong School of Nursing The Hong Kong Polytechnic University Hong Kong Department of Electrical Computer and Biomedical Engineering Ryerson University Toronto Canada
Point normal, as an intrinsic geometric property of 3D objects, not only serves conventional geometric tasks such as surface consolidation and reconstruction, but also facilitates cutting-edge learning-based technique... 详细信息
来源: 评论
Low-Speed Injection Attack Detection on CAN Bus  3rd
Low-Speed Injection Attack Detection on CAN Bus
收藏 引用
3rd International Conference on Frontiers in Cyber Security, FCS 2020
作者: Wang, Chundong Li, Chuang An, Tongle Cheng, Xiaochun Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Ministry of Education Tianjin University of Technology Tianjin300384 China Department of Computer Science Middlesex University LondonNW4 4BT United Kingdom
The car CAN (Controller Area Network) bus message injection attacks seriously affects various functions of the safety of cars, life and property. However, low-speed injection attack is detection inconspicuous in a maj... 详细信息
来源: 评论
A Survey of Deep Face Restoration: Denoise, Super-Resolution, Deblur, Artifact Removal
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Tao Zhang, Kaihao Chen, Xuanxi Luo, Wenhan Deng, Jiankang Lu, Tong Cao, Xiaochun Liu, Wei Li, Hongdong Zafeiriou, Stefanos State Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China College of Engineering and Computer Science Australian National University CanberraACT Australia Shenzhen Campus of Sun Yat-sen University Shenzhen518107 China Department of Computing Imperial College London London United Kingdom Tencent Shenzhen518107 China
Face Restoration (FR) aims to restore High-Quality (HQ) faces from Low-Quality (LQ) input images, which is a domain-specific image restoration problem in the low-level computer vision area. The early face restoration ... 详细信息
来源: 评论
Local Gradient Difference Features for Classification of 2D-3D Natural Scene Text Images
Local Gradient Difference Features for Classification of 2D-...
收藏 引用
International Conference on Pattern Recognition
作者: Lokesh Nandanwar Palaiahnakote Shivakumara Ramachandra Raghavendra Tong Lu Umapada Pal Daniel Lopresti Nor Badrul Anuar Faculty of Computer Science and Information Technology University of Malaya Kuala Lumpur Malaysia Faculty of Information Technology and Electrical Engineering IIK NTNU Norway National Key Lab for Novel Software Technology Nanjing University Nanjing China Computer Vision and Pattern Recognition Unit Indian Statistical Institute Kolkata India Computer Science & Engineering Lehigh University Bethlehem PA USA
Methods developed for normal 2D text detection do not work well for text that is rendered using decorative, 3D effects, etc. This paper proposes a new method for classification of 2D and 3D natural scene text images s... 详细信息
来源: 评论
A Service-Enhanced Task Offloading Method in MEC-Enabled IoV Networks
A Service-Enhanced Task Offloading Method in MEC-Enabled IoV...
收藏 引用
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, UIC-ATC
作者: Bohai Zhao Kai Peng Victor C.M. Leung Yunni Xia College of Engineering Huaqiao University Quanzhou P.R.China State Key Lab. for Novel Software Technology Nanjing University Nanjing P.R.China School of Computer Science and Software Engineering Shenzhen University Shenzhen P.R.China Department of Electrical and Computer Engineering The University of British Columbia Vancouver Canada School of computers Chongqing University Chongqing P.R.China
To facilitate the evolution from independent transportation means to vehicle-to-infrastructure communications, traditional vehicle-to-vehicle (V2V) technologies are growing to a more advanced and generalized paradigm,...
来源: 评论