咨询与建议

限定检索结果

文献类型

  • 4,380 篇 会议
  • 3,326 篇 期刊文献
  • 25 册 图书

馆藏范围

  • 7,731 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,212 篇 工学
    • 3,698 篇 计算机科学与技术...
    • 3,094 篇 软件工程
    • 949 篇 信息与通信工程
    • 613 篇 控制科学与工程
    • 493 篇 电气工程
    • 489 篇 生物工程
    • 398 篇 机械工程
    • 380 篇 电子科学与技术(可...
    • 338 篇 化学工程与技术
    • 301 篇 生物医学工程(可授...
    • 289 篇 光学工程
    • 223 篇 材料科学与工程(可...
    • 205 篇 动力工程及工程热...
    • 193 篇 仪器科学与技术
    • 151 篇 土木工程
    • 145 篇 建筑学
    • 145 篇 安全科学与工程
    • 137 篇 交通运输工程
  • 2,572 篇 理学
    • 1,483 篇 数学
    • 643 篇 物理学
    • 541 篇 生物学
    • 410 篇 统计学(可授理学、...
    • 275 篇 化学
    • 263 篇 系统科学
  • 1,450 篇 管理学
    • 888 篇 管理科学与工程(可...
    • 624 篇 图书情报与档案管...
    • 296 篇 工商管理
  • 222 篇 医学
    • 189 篇 临床医学
    • 161 篇 基础医学(可授医学...
  • 180 篇 法学
    • 139 篇 社会学
  • 107 篇 经济学
  • 89 篇 教育学
  • 61 篇 农学
  • 25 篇 艺术学
  • 23 篇 军事学
  • 19 篇 文学
  • 1 篇 哲学

主题

  • 201 篇 semantics
  • 167 篇 feature extracti...
  • 163 篇 software enginee...
  • 146 篇 training
  • 136 篇 computer science
  • 132 篇 laboratories
  • 126 篇 computational mo...
  • 120 篇 deep learning
  • 119 篇 software
  • 117 篇 data mining
  • 110 篇 optimization
  • 90 篇 algorithm design...
  • 87 篇 cloud computing
  • 86 篇 machine learning
  • 82 篇 data models
  • 80 篇 predictive model...
  • 78 篇 testing
  • 77 篇 neural networks
  • 75 篇 clustering algor...
  • 74 篇 educational inst...

机构

  • 634 篇 state key labora...
  • 169 篇 college of compu...
  • 156 篇 state key labora...
  • 135 篇 national key lab...
  • 104 篇 school of inform...
  • 91 篇 school of comput...
  • 86 篇 university of ch...
  • 83 篇 national enginee...
  • 76 篇 peng cheng labor...
  • 76 篇 state key labora...
  • 73 篇 guangxi key labo...
  • 71 篇 school of softwa...
  • 70 篇 shandong provinc...
  • 69 篇 school of comput...
  • 64 篇 department of co...
  • 64 篇 school of softwa...
  • 63 篇 key laboratory f...
  • 60 篇 school of inform...
  • 60 篇 state key labora...
  • 55 篇 college of compu...

作者

  • 56 篇 gao yang
  • 52 篇 liu risheng
  • 51 篇 junping du
  • 38 篇 shen linlin
  • 38 篇 shi yinghuan
  • 36 篇 shen furao
  • 35 篇 yu huiqun
  • 33 篇 zhao jian
  • 32 篇 fan xin
  • 31 篇 wang wei
  • 29 篇 fan guisheng
  • 28 篇 zhou zhi-hua
  • 28 篇 wang lei
  • 28 篇 guihai chen
  • 25 篇 biffl stefan
  • 24 篇 baowen xu
  • 23 篇 dou wanchun
  • 22 篇 wang jian
  • 22 篇 tao dacheng
  • 21 篇 zhang lei

语言

  • 7,264 篇 英文
  • 294 篇 其他
  • 176 篇 中文
检索条件"机构=Software Engineering Technology Laboratory"
7731 条 记 录,以下是91-100 订阅
排序:
Tree Regularization for Visual Explanations of Cancer Cell Classification
Tree Regularization for Visual Explanations of Cancer Cell C...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Raza, Muhammad Umair Chen, Jie Wang, Li Nawaz, Adil Leung, Victor C.M. Li, Jianqiang Shenzhen University College of Computer Science and Software Engineering China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology China
The challenge of interpretability remains a significant barrier to adopting deep neural networks in healthcare domains. Although tree regularization aims to align a deep neural network's decisions with a single ax... 详细信息
来源: 评论
Real-Time DAG Task Allocation Strategy for Multiprocessor by Optimistic Parallelism  24
Real-Time DAG Task Allocation Strategy for Multiprocessor by...
收藏 引用
24th IEEE International Conference on Communication technology, ICCT 2024
作者: Chen, Yumeng Liu, Songlin Zhou, Jianhong Ling, Xiang University of Electronic Science and Technology of China National Key Laboratory of Science and Technology on Communications China Xihua University School of Computer and Software Engineering China
In modern real-time operating systems, complex task loads are often modeled as directed acyclic graphs (DAG) and executed in parallel on multiprocessor systems. The topological constraints present in DAG tasks prevent... 详细信息
来源: 评论
An Iterative Deep Neural Network Pruning Method Based on Filter Redundancy Assessment  5
An Iterative Deep Neural Network Pruning Method Based on Fil...
收藏 引用
5th International Seminar on Artificial Intelligence, Networking and Information technology, AINIT 2024
作者: Lai, Xiaochen Wang, Lukang Zhang, Liyong School of Software Dalian University of Technology Dalian China Key Laboratory For Ubiquitous Network and Service Software of Liaoning Province Dalian China School of Control Science and Engineering Dalian University of Technology Dalian China
Storage and inference of deep neural network models are resource-intensive, limiting their deployment on edge devices. Structured pruning methods can reduce the resource requirements for model storage and inference by... 详细信息
来源: 评论
PredRacer: Predictively Detecting Data Races in Android Applications  31
PredRacer: Predictively Detecting Data Races in Android Appl...
收藏 引用
31st IEEE International Conference on software Analysis, Evolution and Reengineering, SANER 2024
作者: Guo, Xin Qi, Xiaofang Li, Yanhui Wu, Chao School of Computer Science and Engineering Southeast University China Nanjing University State Key Laboratory for Novel Software Technology China
Android platform offers a hybrid concurrency model encompassing multi-threading and asynchronous messaging for concurrent programming. The model is powerful but complex, making it difficult for developers to analyze c... 详细信息
来源: 评论
An Approach to Optimize Symbolic Execution in Ethereum Smart Contracts  24
An Approach to Optimize Symbolic Execution in Ethereum Smart...
收藏 引用
24th IEEE International Conference on software Quality, Reliability and Security Companion, QRS-C 2024
作者: Liu, Yi Cai, Lizhi Chai, Chenchen Ma, Yuan School of Information Science and Engineering East China University of Science and Technology Shanghai China Shanghai Development Center of Computer Software Technology Shanghai Key Laboratory of Computer Software Testing & Evaluating Shanghai China
As the application of smart contracts in blockchain technology becomes increasingly widespread, their security issues have emerged as a focal point of both research and practice. Although symbolic execution technology... 详细信息
来源: 评论
Investigating White-Box Attacks for On-Device Models  24
Investigating White-Box Attacks for On-Device Models
收藏 引用
44th ACM/IEEE International Conference on software engineering, ICSE 2024
作者: Zhou, Mingyi Gao, Xiang Wu, Jing Liu, Kui Sun, Hailong Li, Li Monash University MelbourneVIC Australia Beihang University Beijing China Huawei Software Engineering Application Technology Lab China Beihang University Beijing China Yunnan Key Laboratory of Software Engineering China
Numerous mobile apps have leveraged deep learning capabilities. However, on-device models are vulnerable to attacks as they can be easily extracted from their corresponding mobile apps. Although the structure and para... 详细信息
来源: 评论
On-demand imidazolidinyl urea-based tissue-like,self-healable,and antibacterial hydrogels for infectious wound care
收藏 引用
Bioactive Materials 2025年 第2期44卷 116-130页
作者: Qi Wu Krishanu Ghosal Nadine Kana’an Shounak Roy Nagham Rashed Ranabir Majumder Mahitosh Mandal Liang Gao Shady Farah The Laboratory for Advanced Functional/Medicinal Polymers&Smart Drug Delivery Technologies The Wolfson Faculty of Chemical EngineeringTechnion-Israel Institute of TechnologyHaifa3200003Israel School of Medical Science and Technology Indian Institute of Technology KharagpurWest Bengal721302India Jinan Key Laboratory of High Performance Industrial Software Jinan Institute of Supercomputing TechnologyJinan250000China The Russell Berrie Nanotechnology Institute Technion-Israel Institute of TechnologyHaifa3200003Israel
Bacterial wound infections are a growing challenge in healthcare,posing severe risks like systemic infection,organ failure,and sepsis,with projections predicting over 10 million deaths annually by *** hydrogels,with a... 详细信息
来源: 评论
An Efficient and Provably Secure SM2 Key-Insulated Signature Scheme for Industrial Internet of Things
收藏 引用
Computer Modeling in engineering & Sciences 2024年 第1期138卷 903-915页
作者: Senshan Ouyang Xiang Liu Lei Liu Shangchao Wang Baichuan Shao Yang Zhao School of Mechanical Engineering Northwestern Polytechnical UniversityXi’anChina Department of Process and Information Technology Chengdu Aircraft Industrial(Group)Co.Ltd.ChengduChina School of Information and Software Engineering The Network and Data Security Key Laboratory of Sichuan ProvinceUniversity of Electronic Science and Technology of ChinaChengduChina
With the continuous expansion of the Industrial Internet of Things(IIoT),more andmore organisations are placing large amounts of data in the cloud to reduce ***,the channel between cloud servers and smart equipment is... 详细信息
来源: 评论
Rethinking-based Code Summarization with Chain of Comments  31
Rethinking-based Code Summarization with Chain of Comments
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Cao, Liuwen He, Hongkui Huang, Hailin Wang, Jiexin Cai, Yi School of Software Engineering South China University of Technology China Key Laboratory of Big Data and Intelligent Robot South China University of Technology Ministry of Education China
Automatic code summarization aims to generate concise natural language descriptions (summary) for source code, which can free software developers from the heavy burden of manual commenting and software maintenance. Ex... 详细信息
来源: 评论
FastVGG network and its application in automatic identification of traffic signs
收藏 引用
International Journal of Information and Communication technology 2022年 第2期20卷 192-203页
作者: Gui, Kaige Gao, Shangbing Li, Xinyuan Lu, Zhonghe College of Computer and Software Engineering Huaiyin Institute of Technology Huaian223001 China Jiangsu Mobile Internet of Things Technology Engineering Laboratory Huaian223001 China
Traffic sign recognition is an important part of driver assistance systems. Because the types of traffic signs are complex and diverse, they are difficult to identify. Traditional recognition methods require manual ex... 详细信息
来源: 评论