咨询与建议

限定检索结果

文献类型

  • 1,441 篇 会议
  • 972 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,415 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,564 篇 工学
    • 1,013 篇 计算机科学与技术...
    • 773 篇 软件工程
    • 318 篇 信息与通信工程
    • 220 篇 控制科学与工程
    • 174 篇 电子科学与技术(可...
    • 170 篇 电气工程
    • 145 篇 机械工程
    • 126 篇 生物工程
    • 77 篇 交通运输工程
    • 76 篇 仪器科学与技术
    • 69 篇 光学工程
    • 67 篇 化学工程与技术
    • 65 篇 材料科学与工程(可...
    • 63 篇 动力工程及工程热...
    • 63 篇 生物医学工程(可授...
    • 53 篇 网络空间安全
    • 44 篇 安全科学与工程
  • 782 篇 理学
    • 436 篇 数学
    • 152 篇 生物学
    • 143 篇 物理学
    • 130 篇 统计学(可授理学、...
    • 106 篇 系统科学
    • 64 篇 化学
    • 31 篇 大气科学
  • 418 篇 管理学
    • 263 篇 管理科学与工程(可...
    • 175 篇 图书情报与档案管...
    • 81 篇 工商管理
  • 60 篇 医学
    • 45 篇 临床医学
    • 40 篇 基础医学(可授医学...
  • 57 篇 法学
    • 47 篇 社会学
  • 29 篇 经济学
  • 24 篇 农学
  • 13 篇 教育学
  • 7 篇 军事学
  • 4 篇 文学
  • 2 篇 艺术学

主题

  • 82 篇 feature extracti...
  • 68 篇 computer archite...
  • 61 篇 training
  • 56 篇 laboratories
  • 47 篇 computational mo...
  • 42 篇 accuracy
  • 40 篇 semantics
  • 39 篇 optimization
  • 38 篇 costs
  • 34 篇 delay
  • 33 篇 web services
  • 31 篇 federated learni...
  • 30 篇 hardware
  • 29 篇 bandwidth
  • 27 篇 deep learning
  • 27 篇 throughput
  • 27 篇 petri nets
  • 27 篇 data mining
  • 27 篇 algorithm design...
  • 27 篇 data models

机构

  • 116 篇 key laboratory o...
  • 101 篇 tianjin key labo...
  • 91 篇 key laboratory o...
  • 89 篇 key laboratory o...
  • 87 篇 department of co...
  • 81 篇 key laboratory o...
  • 70 篇 the key laborato...
  • 54 篇 key laboratory o...
  • 43 篇 key laboratory o...
  • 41 篇 national enginee...
  • 39 篇 school of comput...
  • 38 篇 institute of com...
  • 37 篇 school of cyber ...
  • 36 篇 shandong provinc...
  • 36 篇 key laboratory o...
  • 32 篇 university of ch...
  • 30 篇 key laboratory o...
  • 30 篇 graduate univers...
  • 30 篇 chinese academy ...
  • 29 篇 key laboratory o...

作者

  • 50 篇 xiaowei li
  • 36 篇 jin hai
  • 34 篇 hai jin
  • 33 篇 changjun jiang
  • 32 篇 zhou mengchu
  • 30 篇 jiang changjun
  • 29 篇 huawei li
  • 25 篇 zhang hua
  • 23 篇 li xiaowei
  • 22 篇 mengchu zhou
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 21 篇 cheng wang
  • 20 篇 shen linlin
  • 20 篇 xiao yingyuan
  • 19 篇 yan chungang
  • 19 篇 ding zhijun
  • 18 篇 hu shengshan
  • 18 篇 yinhe han
  • 17 篇 miao duoqian

语言

  • 2,229 篇 英文
  • 101 篇 中文
  • 92 篇 其他
检索条件"机构=Service Computing Technology and System Key Laboratory"
2415 条 记 录,以下是551-560 订阅
排序:
Automated Vulnerability Discovery system Based on Hybrid Execution  7
Automated Vulnerability Discovery System Based on Hybrid Exe...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Liu, Tong Wang, Zhongru Zhang, Yuntao Liu, Zhehui Fang, Binxing Pang, Zhengyuan Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service Beijing China Chinese Academy of Cyberspace Studies Beijing China North China University of Technology School of Information Science and Technology Beijing100144 China Beijing DigApis Technology Co. Ltd Beijing100871 China JiangSu DigApis Technology Co. Ltd Jiangsu Nantong226000 China
At present, program vulnerabilities occur frequently, which seriously threatens the security of cyberspace. Automated vulnerability discovery technology has attracted more and more attention because of its efficiency ... 详细信息
来源: 评论
Internet of Digital Twin: Framework, Applications and Enabling Technologies
收藏 引用
IEEE Communications Surveys and Tutorials 2025年
作者: Liu, Ruhan Luan, Tom H. Qu, Youyang Xiang, Yong Gao, Longxiang Zhao, Dongmei Deakin University School of Info Technology MelbourneVIC3125 Australia Xi'an Jiaotong University School of Cyber Science and Engineering Shaanxi Xi'an710049 China Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Jinan China McMaster University Department of Electrical and Computer Engineering HamiltonON Canada
Intelligent physical systems, such as smart vehicles and robotic arms, are increasingly integrated into both industrial and everyday applications. However, the systems typically face hardware limitations that constrai... 详细信息
来源: 评论
Localized Adaptive Channel and Power Selection With TinyML (LACPSA) in Dense IEEE 802.11 WLANs
Localized Adaptive Channel and Power Selection With TinyML (...
收藏 引用
IEEE International Conference on Smart Internet of Things (SmartIoT)
作者: Khalid Ibrahim Qureshi Cheng Lu Ruoheng Luo Muhammad Ali Lodhi Lei Wang Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Dalian University of Technology Dalian China Guangdong-Hong Kong-Macao Joint Laboratory for Emotion Intelligence and Pervasive Computing Artificial Intelligence Research Institute Shenzhen MSU-BIT University China
In dense IEEE 802.11 WLANs, optimized channel allocation and transmission power control are crucial for miti- gating interference and congestion. Traditional approaches face significant challenges due to limited chann... 详细信息
来源: 评论
Multimodal Dialogue Emotion Recognition Based on Label Optimization and Coarse-Grained Assisted Fine-Grained
Multimodal Dialogue Emotion Recognition Based on Label Optim...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Zhibo Zhang Zhenyu Yang Yan Huang Baojie Xu Wenyue Hu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science China
Multimodal dialogue emotion recognition integrates data from multiple modalities to accurately identify emotional states in conversations. However, differences in expression and information density across modalities c... 详细信息
来源: 评论
HiCoCS: High Concurrency Cross-Sharding on Permissioned Blockchains
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Lingxiao Dong, Xuewen Wan, Zhiguo Lu, Di Zhang, Yushu Shen, Yulong School of Computer Science and Technology Xidian University Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education Shaanxi Key Laboratory of Blockchain and Secure Computing Xi’an710071 China Zhejiang Lab Zhejiang Hangzhou311121 China School of Computer Science and Technology Xidian University Shaanxi Key Laboratory of Network and System Security Xi’an710071 China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Jiangsu Nanjing210016 China
As the foundation of the Web3 trust system, blockchain technology faces increasing demands for scalability. Sharding emerges as a promising solution, but it struggles to handle highly concurrent cross-shard transactio... 详细信息
来源: 评论
Improving Chinese Spelling Check by Character Pronunciation Prediction: The Effects of Adaptivity and Granularity
Improving Chinese Spelling Check by Character Pronunciation ...
收藏 引用
2022 Conference on Empirical Methods in Natural Language Processing, EMNLP 2022
作者: Li, Jiahao Wang, Quan Mao, Zhendong Guo, Junbo Yang, Yanyan Zhang, Yongdong University of Science and Technology of China Hefei China MOE Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China People's Daily Online Co. Beijing China People's Public Security University of China Beijing China
Chinese spelling check (CSC) is a fundamental NLP task that detects and corrects spelling errors in Chinese texts. As most of these spelling errors are caused by phonetic similarity, effectively modeling the pronuncia... 详细信息
来源: 评论
Towards Planning Package Delivery Paths by Exploiting the Crowd of Private Cars
Towards Planning Package Delivery Paths by Exploiting the Cr...
收藏 引用
IEEE International Conference on High Performance computing and Communications (HPCC)
作者: Hejing Nie Yiping Wen Tiancai Li Sipeng OuYang Muyang Tian School of Computer Science and Engineering Hunan University of Science and Technology China Hunan Key Laboratory for Service computing and Novel Software Technology Hunan University of Science & Technology
Crowdsourced delivery can provide cost-effective deliveries and it is becoming increasingly important in practice. This paper considers a package delivery problem which exploits relays of private cars to transport pac... 详细信息
来源: 评论
An Efficient Authentication Protocol for Brand Cosmetics Anti-Counterfeiting system
An Efficient Authentication Protocol for Brand Cosmetics Ant...
收藏 引用
IEEE International Conference on Cyber Security and Cloud computing (CSCloud)
作者: Xiangwei Meng Qingchun Yu Wei Lang Yufeng Liang Zisang Xu Kuanching Li Nanjing University of Aeronautics and Astronautics Nanjing China Hunan University of Science and Technology Xiangtan China Hunan Key Laboratory for Service computing and Novel Software Technology Hunan University of Science and Technology Xiangtan China Changsha University of Science and Technology Changsha China
The counterfeit brand cosmetics made available on the market have always been a widespread concern. Traditional anti-counterfeiting schemes usually focus on the authenticity of brand cosmetics. However, verifying the ...
来源: 评论
Cross-Modal Representation Reconstruction for Zero-Shot Classification
Cross-Modal Representation Reconstruction for Zero-Shot Clas...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal Processing
作者: Yu Wang Shenjie Zhao Key Laboratory of Embedded System and Service Computing Ministry of Education P. R. China Mojie Technology (Ningbo)
Zero-shot learning (ZSL) aims to recognize novel classes without training samples through transferring knowledge from seen classes, based on the assumption that both the seen and unseen classes share a latent semantic... 详细信息
来源: 评论
CacheAlarm: Monitoring Sensitive Behaviors of Android Apps Using Cache Side Channel
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Tian, Jianwen Ma, Haoyu Gao, Debin Kuang, Xiaohui Academy of Military Sciences Institute of System Engineering China Beijing Jiaotong University School of Cyberspace Science and Technology Beijing100044 China Beijing Jiaotong University Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100045 China Singapore Management University School of Computing and Information Systems Singapore
Malware attack has been a serious threat to the security and privacy of both individual and corporation users of the Android platform. Business entities seek to protect themselves by means of monitoring privacy-relate... 详细信息
来源: 评论