咨询与建议

限定检索结果

文献类型

  • 2,010 篇 会议
  • 1,876 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 3,902 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,746 篇 工学
    • 2,083 篇 计算机科学与技术...
    • 1,679 篇 软件工程
    • 402 篇 信息与通信工程
    • 295 篇 控制科学与工程
    • 217 篇 电子科学与技术(可...
    • 216 篇 生物工程
    • 176 篇 电气工程
    • 169 篇 机械工程
    • 164 篇 光学工程
    • 110 篇 生物医学工程(可授...
    • 109 篇 化学工程与技术
    • 85 篇 仪器科学与技术
    • 82 篇 材料科学与工程(可...
    • 73 篇 安全科学与工程
    • 68 篇 动力工程及工程热...
    • 63 篇 土木工程
    • 61 篇 建筑学
    • 60 篇 交通运输工程
    • 58 篇 网络空间安全
  • 1,409 篇 理学
    • 882 篇 数学
    • 318 篇 物理学
    • 245 篇 生物学
    • 212 篇 统计学(可授理学、...
    • 153 篇 系统科学
    • 112 篇 化学
  • 627 篇 管理学
    • 374 篇 管理科学与工程(可...
    • 275 篇 图书情报与档案管...
    • 127 篇 工商管理
  • 82 篇 医学
    • 74 篇 临床医学
  • 79 篇 法学
    • 61 篇 社会学
  • 49 篇 经济学
  • 31 篇 农学
  • 16 篇 教育学
  • 16 篇 军事学
  • 14 篇 艺术学
  • 8 篇 文学
  • 3 篇 哲学

主题

  • 117 篇 semantics
  • 79 篇 computer science
  • 72 篇 computational mo...
  • 58 篇 software
  • 57 篇 laboratories
  • 53 篇 machine learning
  • 48 篇 deep learning
  • 46 篇 software enginee...
  • 44 篇 training
  • 41 篇 feature extracti...
  • 37 篇 accuracy
  • 36 篇 visualization
  • 34 篇 model checking
  • 32 篇 graphics process...
  • 32 篇 data mining
  • 32 篇 software testing
  • 32 篇 testing
  • 32 篇 data models
  • 30 篇 reinforcement le...
  • 30 篇 image segmentati...

机构

  • 721 篇 state key labora...
  • 446 篇 university of ch...
  • 181 篇 state key labora...
  • 78 篇 institute of sof...
  • 75 篇 department of co...
  • 71 篇 state key lab. f...
  • 67 篇 school of comput...
  • 64 篇 school of comput...
  • 52 篇 state key lab of...
  • 50 篇 state key lab of...
  • 49 篇 state key labora...
  • 48 篇 state key lab fo...
  • 43 篇 graduate univers...
  • 42 篇 state key lab. o...
  • 40 篇 chinese informat...
  • 38 篇 department of co...
  • 38 篇 state key lab of...
  • 38 篇 department of co...
  • 37 篇 college of compu...
  • 36 篇 school of comput...

作者

  • 81 篇 sun le
  • 73 篇 han xianpei
  • 54 篇 wu enhua
  • 53 篇 lin hongyu
  • 43 篇 zhan naijun
  • 40 篇 cai shaowei
  • 40 篇 sun maosong
  • 38 篇 zhang jian
  • 37 篇 ying mingsheng
  • 37 篇 zhang lijun
  • 35 篇 huang minlie
  • 32 篇 liu zhiyuan
  • 31 篇 gao yang
  • 31 篇 xue bai
  • 29 篇 jian zhang
  • 27 篇 shi yinghuan
  • 26 篇 wei jun
  • 26 篇 lu yaojie
  • 25 篇 enhua wu
  • 24 篇 shen yi-dong

语言

  • 3,558 篇 英文
  • 238 篇 其他
  • 110 篇 中文
检索条件"机构=State Key Lab of Computer Science Institute of Software"
3902 条 记 录,以下是1-10 订阅
排序:
LPW: an efficient data-aware cache replacement strategy for Apache Spark
收藏 引用
science China(Information sciences) 2023年 第1期66卷 77-96页
作者: Hui LI Shuping JI Hua ZHONG Wei WANG Lijie XU Zhen TANG Jun WEI Tao HUANG State Key Lab of Computer Science Institute of Software Chinese Academy of Sciences University of Chinese Academy of Sciences Nanjing Institute of Software Technology
Caching is one of the most important techniques for the popular distributed big data processing framework Spark. For this big data parallel computing framework, which is designed to support various applications based ... 详细信息
来源: 评论
AsyCo: an asymmetric dual-task co-training model for partial-label learning
收藏 引用
science China(Information sciences) 2025年 第5期68卷 332-347页
作者: Beibei LI Yiyuan ZHENG Beihong JIN Tao XIANG Haobo WANG Lei FENG College of Computer Science Chongqing University State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences University of Chinese Academy of Sciences School of Software Technology Zhejiang University School of Computer Science and Engineering Nanyang Technological University
Partial-label learning(PLL) is a typical problem of weakly supervised learning, where each training instance is annotated with a set of candidate labels. Self-training PLL models achieve state-of-the-art performance b... 详细信息
来源: 评论
Deep learning-based software engineering: progress,challenges, and opportunities
收藏 引用
science China(Information sciences) 2025年 第1期68卷 57-144页
作者: Xiangping CHEN Xing HU Yuan HUANG He JIANG Weixing JI Yanjie JIANG Yanyan JIANG Bo LIU Hui LIU Xiaochen LI Xiaoli LIAN Guozhu MENG Xin PENG Hailong SUN Lin SHI Bo WANG Chong WANG Jiayi WANG Tiantian WANG Jifeng XUAN Xin XIA Yibiao YANG Yixin YANG Li ZHANG Yuming ZHOU Lu ZHANG School of Journalism and Communication Sun Yat-sen University School of Software Technology Zhejiang University School of Software Engineering Sun Yat-sen University School of Software Dalian University of Technology School of Computer Science and Technology Beijing Institute of Technology Key Laboratory of High Confidence Software Technologies (Peking University) Ministry of EducationSchool of Computer Science Peking University State Key Laboratory for Novel Software Technology Nanjing University School of Computer Science and Engineering Beihang University Institute of Information Engineering Chinese Academy of Sciences School of Computer Science Fudan University State Key Laboratory of Complex & Critical Software Environment (CCSE) School of Software Beihang University School of Computer and Information Technology Beijing Jiaotong University School of Computer Science and Technology Harbin Institute of Technology School of Computer Science Wuhan University Huawei Technologies
Researchers have recently achieved significant advances in deep learning techniques, which in turn has substantially advanced other research disciplines, such as natural language processing, image processing, speech r... 详细信息
来源: 评论
A buffer overflow detection and defense method based on RiSC-V instruction set extension
收藏 引用
Cybersecurity 2024年 第2期7卷 28-43页
作者: Chang Liu Yan-Jun Wu Jing-Zheng Wu Chen Zhao Intelligent Software Research Center Institute of SoftwareChinese Academy of SciencesBejingChina University of Chinese Academy of Sciences BeijingChina State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of SciencesBeijingChina
Buffer overflow poses a serious threat to the memory security of modern operating *** overwrites the con-tents of other memory areas by breaking through the buffer capacity limit,destroys the system execution environ-... 详细信息
来源: 评论
Committed-programming reductions: formalizations,implications and relations
收藏 引用
science China(Information sciences) 2024年 第10期67卷 151-171页
作者: Jiang ZHANG Yu YU Dengguo FENG Shuqin FAN Zhenfeng ZHANG State Key Laboratory of Cryptology Department of Computer Science and Engineering Shanghai Jiao Tong University Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences
In this work, we introduce a class of black-box(BB) reductions called committed-programming reduction(CPRed) in the random oracle model(ROM) and obtain the following interesting results:(1) we demonstrate that some we... 详细信息
来源: 评论
Detecting Metadata-Related Logic Bugs in Database Systems via Raw Database Construction  50th
Detecting Metadata-Related Logic Bugs in Database Systems vi...
收藏 引用
50th International Conference on Very Large Data Bases, VLDB 2024
作者: Song, Jiansen Dou, Wensheng Gao, Yu Cui, Ziyu Zheng, Yingying Wang, Dong Wang, Wei Wei, Jun Huang, Tao Key Lab of System Software at CAS State Key Lab of Computer Science at Institute of Software at CAS University of CAS Beijing China Nanjing Institute of Software Technology University of CAS Nanjing China Institute of Software at CAS China
Database Management Systems (DBMSs) are widely used to efficiently store and retrieve data. DBMSs usually support various metadata, e.g., integrity constraints for ensuring data integrity and indexes for locating data... 详细信息
来源: 评论
Quantum search with prior knowledge
收藏 引用
science China(Information sciences) 2024年 第9期67卷 321-329页
作者: Xiaoyu HE Xiaoming SUN Jialing ZHANG State Key Lab of Processors Institute of Computing Technology Chinese Academy of Sciences School of Computer Science and Technology University of Chinese Academy of Sciences
The combination of contextual side information and search is a powerful paradigm in the scope of artificial intelligence. The prior knowledge enables the identification of possible solutions but may be imperfect. Cont... 详细信息
来源: 评论
An energy constraint position-based dynamics with corrected SPH kernel
收藏 引用
science China(Information sciences) 2023年 第1期66卷 144-157页
作者: Wei CAO Luan LYU Zhixin YANG Enhua WU College of Computer Science and Technology China University of Petroleum Faculty of Science and Technology University of Macau State Key Laboratory of Internet of Things for Smart City University of Macau State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Guangzhou Greater Bay Area Virtual Reality Research Institute
We introduce an improved position-based dynamics method with corrected smoothed particle hydrodynamics(SPH) kernel to simulate deformable solids. Using a strain energy constraint that follows the continuum mechanics, ... 详细信息
来源: 评论
Heuristic Search with Cut Point Based Strategy for Critical Node Problem
收藏 引用
Journal of computer science & Technology 2024年 第6期39卷 1328-1340页
作者: Zhi-Han Chen Shao-Wei Cai Jian Gao Shi-Ke Ge Chan-Juan Liu Jin-Kun Lin School of Computer Science and Technology University of Chinese Academy of SciencesBeijing 101408China Key Laboratory of System Software(Chinese Academy of Sciences)and State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of SciencesBeijing 100190China College of Information Science and Technology Northeast Normal UniversityChangchun 130024China School of Computer Science and Technology Dalian University of TechnologyDalian 116024China SeedMath Technology Limited Beijing 100086China
The critical node problem(CNP)aims to deal with critical node identification in a graph,which has extensive applications in many *** CNP is a challenging task due to its computational complexity,and it attracts much a... 详细信息
来源: 评论
A sharding blockchain-based UAV system for search and rescue missions
收藏 引用
Frontiers of computer science 2025年 第3期19卷 103-118页
作者: Xihan ZHANG Jiashuo ZHANG Jianbo GAO Libin XIA Zhi GUAN Hao HU Zhong CHEN School of Computer Science Peking UniversityBeijing 100871China Peking University Chongqing Research Institute of Big Data Chongqing 401329China National Engineering Research Center for Software Engineering Peking UniversityBeijing 100871China State Key Lab for Novel Software Technology Nanjing UniversityNanjing 210023China
Sharding is a promising technique to tackle the critical weakness of scalability in blockchain-based unmanned aerial vehicle(UAV)search and rescue(SAR)*** breaking up the blockchain network into smaller partitions cal... 详细信息
来源: 评论