咨询与建议

限定检索结果

文献类型

  • 3,502 篇 会议
  • 3,395 篇 期刊文献
  • 65 册 图书

馆藏范围

  • 6,962 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,853 篇 工学
    • 3,367 篇 计算机科学与技术...
    • 2,826 篇 软件工程
    • 1,069 篇 信息与通信工程
    • 718 篇 生物工程
    • 693 篇 控制科学与工程
    • 533 篇 电气工程
    • 522 篇 生物医学工程(可授...
    • 502 篇 电子科学与技术(可...
    • 467 篇 光学工程
    • 347 篇 机械工程
    • 280 篇 化学工程与技术
    • 248 篇 仪器科学与技术
    • 204 篇 动力工程及工程热...
    • 140 篇 材料科学与工程(可...
    • 124 篇 交通运输工程
    • 111 篇 安全科学与工程
  • 2,773 篇 理学
    • 1,317 篇 数学
    • 810 篇 物理学
    • 790 篇 生物学
    • 413 篇 统计学(可授理学、...
    • 312 篇 化学
    • 283 篇 系统科学
  • 1,281 篇 管理学
    • 736 篇 管理科学与工程(可...
    • 575 篇 图书情报与档案管...
    • 331 篇 工商管理
  • 479 篇 医学
    • 408 篇 临床医学
    • 344 篇 基础医学(可授医学...
    • 240 篇 药学(可授医学、理...
    • 132 篇 公共卫生与预防医...
  • 213 篇 法学
    • 188 篇 社会学
  • 101 篇 经济学
  • 78 篇 教育学
  • 68 篇 农学
  • 38 篇 文学
  • 23 篇 艺术学
  • 18 篇 军事学
  • 5 篇 哲学
  • 1 篇 历史学

主题

  • 142 篇 machine learning
  • 129 篇 semantics
  • 126 篇 deep learning
  • 96 篇 feature extracti...
  • 85 篇 computational mo...
  • 85 篇 training
  • 83 篇 artificial intel...
  • 77 篇 computer science
  • 75 篇 deep neural netw...
  • 68 篇 accuracy
  • 64 篇 data mining
  • 62 篇 visualization
  • 58 篇 object detection
  • 56 篇 neural networks
  • 55 篇 reinforcement le...
  • 54 篇 forecasting
  • 53 篇 computer archite...
  • 51 篇 internet of thin...
  • 51 篇 image segmentati...
  • 50 篇 optimization

机构

  • 214 篇 department of co...
  • 79 篇 department of co...
  • 57 篇 tencent ai lab
  • 49 篇 department of co...
  • 44 篇 department of co...
  • 43 篇 college of compu...
  • 39 篇 pazhou lab
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 department of el...
  • 35 篇 peng cheng labor...
  • 32 篇 huawei noah's ar...
  • 31 篇 tsinghua univers...
  • 31 篇 department of co...
  • 30 篇 university of sc...
  • 30 篇 state key lab on...
  • 30 篇 university of ch...
  • 29 篇 institute for ar...
  • 28 篇 state key lab on...

作者

  • 71 篇 sun maosong
  • 52 篇 liu zhiyuan
  • 43 篇 sun fuchun
  • 42 篇 bhowmik biswajit
  • 35 篇 zhu jun
  • 33 篇 huang minlie
  • 30 篇 biswajit bhowmik
  • 30 篇 huang wenbing
  • 26 篇 yu kai
  • 26 篇 liu yang
  • 25 篇 timofte radu
  • 24 篇 zhang min
  • 24 篇 chen hao
  • 22 篇 liu qun
  • 21 篇 zhang lei
  • 20 篇 fuchun sun
  • 20 篇 qinghua zheng
  • 19 篇 jun zhu
  • 17 篇 zhao hai
  • 17 篇 zheng qinghua

语言

  • 5,736 篇 英文
  • 1,151 篇 其他
  • 85 篇 中文
  • 2 篇 日文
  • 1 篇 斯洛文尼亚文
检索条件"机构=Programming Technology Lab Computer Science Department"
6962 条 记 录,以下是441-450 订阅
排序:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities  24
On the Effectiveness of Function-Level Vulnerability Detecto...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Li, Zhen Wang, Ning Zou, Deqing Li, Yating Zhang, Ruqian Xu, Shouhuai Zhang, Chao Jin, Hai Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security Cluster and Grid Computing Lab National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hong Kong Jin YinHu Laboratory Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China University of Colorado Colorado Springs Department of Computer Science Colorado Springs Colorado United States Institute for Network Sciences and Cyberspace Tsinghua University Beijing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Software vulnerabilities are a major cyber threat and it is important to detect them. One important approach to detecting vulnerabilities is to use deep learning while treating a program function as a whole, known as ... 详细信息
来源: 评论
SUL32C: secure ultra-lightweight 32-bit cipher for IoT devices
收藏 引用
The Journal of Supercomputing 2025年 第9期81卷 1-58页
作者: Witwit, Athraa J. H. Fanfakh, Ahmed Idrees, Ali Kadhum Department of Information Networks College of Information Technology University of Babylon Hillah Iraq Department of Computer Science College of Science for Women University of Babylon Hillah Iraq Smart Edge Lab Faculty of Computer Science University of Applied Science and Arts Dortmund Germany
The increasing number of IoT devices used in various applications is drawing attention to the Internet of Things (IoT). However, due to its limited processing capabilities, data confidentiality is crucial. Security is... 详细信息
来源: 评论
BinaryAI: Binary Software Composition Analysis via Intelligent Binary Source Code Matching  24
BinaryAI: Binary Software Composition Analysis via Intellige...
收藏 引用
44th ACM/IEEE International Conference on Software Engineering, ICSE 2024
作者: Jiang, Ling An, Junwen Huang, Huihui Tang, Qiyi Nie, Sen Wu, Shi Zhang, Yuqun Southern University of Science and Technology Shenzhen China Tencent Security Keen Lab Shanghai China Research Institute of Trustworthy Autonomous Systems Southern University of Science and Technology Shenzhen China Southern University of Science and Technol-ogy Department of Computer Science and Engineering Shenzhen China Guangdong Provincial Key Laboratory of Brain-inspired Intelligent Computation China
While third-party libraries (TPLs) are extensively reused to enhance productivity during software development, they can also introduce potential security risks such as vulnerability propagation. Software composition a... 详细信息
来源: 评论
Roland: Robust In-band Parallel Communication for Magnetic MIMO Wireless Power Transfer System  42
Roland: Robust In-band Parallel Communication for Magnetic M...
收藏 引用
42nd IEEE International Conference on computer Communications, INFOCOM 2023
作者: Zhou, Wangqiu Zhou, Hao Cui, Xiang Wang, Xinyu Wang, Xiaoyan Liu, Zhi Linke Lab School of Computer Science and Technology University of Science and Technology of China China University of Science and Technology of China Cas Key Laboratory of Wireless-Optical Communications China Deqing Alpha Innovation Institute Huzhou China Ibaraki University Graduate School of Science and Engineering Ibaraki Japan The University of Electro-Communications Department of Computer and Network Engineering Tokyo182-8585 Japan
In recent years, receiver (RX) feedback communication has attracted increasing attention to enhance the charging performance for magnetic resonant coupling (MRC) based wireless power transfer (WPT) systems. People pre... 详细信息
来源: 评论
Generalized Multi-protocol label Switching based Virtualization for Cloud Computing  1
Generalized Multi-protocol Label Switching based Virtualizat...
收藏 引用
1st International Conference on Connected Systems and Intelligence, CSI 2022
作者: Saxena, Rajat Patel, Ajay Singh Shri Vaishnav Institute of Information Technology Shri Vaishnav Vidyapeeth Vishwavidyalaya Cloud computing Lab Department of Computer Science and Engineering Indore India Cloud computing Lab Department of Computer Science and Engineering Indore India
Generalized Multi Protocol label Switching (GMPLS) or Multi-Protocol Lambda Switching is a new technology which produce amplification in Multi Protocol label Switching (MPLS) to provide support network switching, spac... 详细信息
来源: 评论
An Ensemble Model for Gait Classification in Children and Adolescent with Cerebral Palsy: A Low-Cost Approach  1
收藏 引用
11th International Conference on Soft Computing for Problem Solving, SocProS 2022
作者: Chakraborty, Saikat Sambhavi, Sruti Panda, Prashansa Nandy, Anup Odisha Bhubaneswar India Machine Intelligence and Bio-motion Research Lab Department of Computer Science and Engineering National Institute of Technology Rourkela Odisha Rourkela India
A fast and precise automatic gait diagnostic system is an urgent need for real-time clinical gait assessment. Existing machine intelligence-based systems to detect cerebral palsy gait have often ignored the crucial is... 详细信息
来源: 评论
MSPA-DLA++: A Multi-Scale Phase Attention Deep Layer Aggregation for Lesion Detection in Multi-Phase CT Images
MSPA-DLA++: A Multi-Scale Phase Attention Deep Layer Aggrega...
收藏 引用
19th World Congress on Medical and Health Informatics, MedInfo 2023
作者: Kitrungrotsakul, Titinunt Xu, Yingying Chen, Qingqing Liu, Jing Li, Yinhao Lin, Lanfen Hu, Hongjie Tong, Ruofeng Li, Jingsong Chen, Yen-Wei Research Center for Healthcare Data Science Zhejiang Lab China Department of Radiology Sir Run Run Shaw Hospital China Graduate School of Information Science and Engineering Ritsumeikan Univ. Japan College of Computer Science and Technology Zhejiang Univ. China
Object detection using convolutional neural networks (CNNs) has achieved high performance and achieved state-of-the-art results with natural images. Compared to natural images, medical images present several challenge... 详细信息
来源: 评论
Performance Analysis of Disruptive Instances in Cloud Environment
Performance Analysis of Disruptive Instances in Cloud Enviro...
收藏 引用
International Communication Systems and Networks and Workshops, COMSNETS
作者: Pranab Nandy Rounak Saha Anurag Satpathy Sandip Chakraborty Sourav Kanti Addya Department of Computer Science and Engineering Cloud and Smart System Services Lab National Institute of Technology Karnataka Surathkal India Department of Computer Science and Engineering Cloud and Smart System Services Lab Missouri University of Science and Technology USA Department of Computer Science and Engineering Cloud and Smart System Services Lab Indian Institute of Technology Kharagpur India
Virtualization enables the service providers (SPs) to logically partition the resources into virtual machines (VM) instances. Real-world SPs such as Amazon, Google, Microsoft Azure, IBM, and Oracle provide different f...
来源: 评论
Container lifecycle-aware scheduling for serverless computing
Container lifecycle-aware scheduling for serverless computin...
收藏 引用
作者: Wu, Song Tao, Zhiheng Fan, Hao Huang, Zhuo Zhang, Xinmin Jin, Hai Yu, Chen Cao, Chun National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University Nanjing China
Elastic scaling in response to changes on demand is a main benefit of serverless computing. When bursty workloads arrive, a serverless platform launches many new containers and initializes function environments (known... 详细信息
来源: 评论
Verification of COVIFIND Test Kit for COVID-19  21
Verification of COVIFIND Test Kit for COVID-19
收藏 引用
21st IEEE India Council International Conference, INDICON 2024
作者: Kumar, Sunil Rathore, Rohan Bhowmik, Biswajit National Institute of Technology Karnataka Maharshi Patanjali Cps Lab Brics Laboratory Department of Computer Science and Engineering Surathkal Mangalore 575025 India
The ongoing global challenges of infectious diseases, particularly COVID-19, highlight the critical need for accurate and timely diagnostic tools. Rapid antigen test kits have become essential for swiftly detecting CO... 详细信息
来源: 评论