咨询与建议

限定检索结果

文献类型

  • 2,010 篇 会议
  • 1,873 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 3,899 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,743 篇 工学
    • 2,079 篇 计算机科学与技术...
    • 1,686 篇 软件工程
    • 403 篇 信息与通信工程
    • 288 篇 控制科学与工程
    • 218 篇 电子科学与技术(可...
    • 216 篇 生物工程
    • 179 篇 电气工程
    • 170 篇 机械工程
    • 164 篇 光学工程
    • 110 篇 生物医学工程(可授...
    • 109 篇 化学工程与技术
    • 86 篇 仪器科学与技术
    • 82 篇 材料科学与工程(可...
    • 73 篇 安全科学与工程
    • 68 篇 动力工程及工程热...
    • 65 篇 土木工程
    • 62 篇 建筑学
    • 60 篇 交通运输工程
    • 58 篇 网络空间安全
  • 1,412 篇 理学
    • 885 篇 数学
    • 319 篇 物理学
    • 245 篇 生物学
    • 212 篇 统计学(可授理学、...
    • 152 篇 系统科学
    • 112 篇 化学
  • 628 篇 管理学
    • 373 篇 管理科学与工程(可...
    • 277 篇 图书情报与档案管...
    • 127 篇 工商管理
  • 81 篇 医学
    • 73 篇 临床医学
  • 79 篇 法学
    • 61 篇 社会学
  • 49 篇 经济学
  • 31 篇 农学
  • 16 篇 教育学
  • 16 篇 军事学
  • 14 篇 艺术学
  • 8 篇 文学
  • 3 篇 哲学

主题

  • 117 篇 semantics
  • 79 篇 computer science
  • 72 篇 computational mo...
  • 58 篇 software
  • 57 篇 laboratories
  • 53 篇 machine learning
  • 47 篇 deep learning
  • 46 篇 software enginee...
  • 44 篇 training
  • 41 篇 feature extracti...
  • 37 篇 accuracy
  • 36 篇 visualization
  • 34 篇 model checking
  • 32 篇 graphics process...
  • 32 篇 data mining
  • 32 篇 software testing
  • 32 篇 testing
  • 32 篇 data models
  • 31 篇 reinforcement le...
  • 31 篇 image segmentati...

机构

  • 724 篇 state key labora...
  • 446 篇 university of ch...
  • 181 篇 state key labora...
  • 78 篇 institute of sof...
  • 75 篇 department of co...
  • 71 篇 state key lab. f...
  • 66 篇 school of comput...
  • 64 篇 school of comput...
  • 52 篇 state key lab of...
  • 50 篇 state key lab of...
  • 49 篇 state key labora...
  • 48 篇 state key lab fo...
  • 43 篇 graduate univers...
  • 42 篇 state key lab. o...
  • 40 篇 chinese informat...
  • 38 篇 department of co...
  • 38 篇 department of co...
  • 37 篇 state key lab of...
  • 37 篇 college of compu...
  • 36 篇 school of comput...

作者

  • 82 篇 sun le
  • 73 篇 han xianpei
  • 54 篇 wu enhua
  • 53 篇 lin hongyu
  • 43 篇 zhan naijun
  • 40 篇 cai shaowei
  • 40 篇 sun maosong
  • 38 篇 zhang lijun
  • 38 篇 zhang jian
  • 37 篇 ying mingsheng
  • 35 篇 huang minlie
  • 32 篇 liu zhiyuan
  • 31 篇 gao yang
  • 31 篇 xue bai
  • 29 篇 jian zhang
  • 27 篇 shi yinghuan
  • 26 篇 wei jun
  • 26 篇 lu yaojie
  • 25 篇 enhua wu
  • 24 篇 shen yi-dong

语言

  • 3,571 篇 英文
  • 221 篇 其他
  • 110 篇 中文
检索条件"机构=State Key Lab of Computer Science Institute of Software"
3899 条 记 录,以下是181-190 订阅
排序:
An Iterative Method for Computing Controlled Reach-Avoid Sets
An Iterative Method for Computing Controlled Reach-Avoid Set...
收藏 引用
American Control Conference (ACC)
作者: Dejin Ren Taoran Wu Bai Xue State Key Lab. of Computer Science CAS Institute of Software Beijing China University of Chinese Academy of Sciences Beijing China
This paper focuses on addressing the problem of computing controlled reach-avoid sets for continuous-time systems modeled by polynomial ordinary differential equations with control inputs in order to ensure the safety... 详细信息
来源: 评论
Learning a Mini-Batch Graph Transformer via Two-Stage Interaction Augmentation  27
Learning a Mini-Batch Graph Transformer via Two-Stage Intera...
收藏 引用
27th European Conference on Artificial Intelligence, ECAI 2024
作者: Li, Wenda Chen, Kaixuan Liu, Shunyu Zheng, Tongya Huang, Wenjie Song, Mingli State Key Laboratory of Blockchain and Security Zhejiang University China School of Software Technology Zhejiang University China Institute of Blockchain and Data Security China Big Graph Center School of Computer and Computing Science Hangzhou City University China College of Computer Science and Technology Zhejiang University Hangzhou China
Mini-batch Graph Transformer (MGT), as an emerging graph learning model, has demonstrated significant advantages in semi-supervised node prediction tasks with improved computational efficiency and enhanced model robus... 详细信息
来源: 评论
LEARNING WITH LOGICAL CONSTRAINTS BUT WITHOUT SHORTCUT SATISFACTION  11
LEARNING WITH LOGICAL CONSTRAINTS BUT WITHOUT SHORTCUT SATIS...
收藏 引用
11th International Conference on Learning Representations, ICLR 2023
作者: Li, Zenan Liu, Zehua Yao, Yuan Xu, Jingwei Chen, Taolue Ma, Xiaoxing Lü, Jian State Key Lab of Novel Software Technology Nanjing University China Department of Mathematics The University of Hong Kong Hong Kong Department of Computer Science Birkbeck University of London United Kingdom
Recent studies have explored the integration of logical knowledge into deep learning via encoding logical constraints as an additional loss ***, existing approaches tend to vacuously satisfy logical constraints throug... 详细信息
来源: 评论
ExcePy: A Python Benchmark for Bugs with Python Built-in Types  29
ExcePy: A Python Benchmark for Bugs with Python Built-in Typ...
收藏 引用
29th IEEE International Conference on software Analysis, Evolution and Reengineering, SANER 2022
作者: Zhang, Xin Yan, Rongjie Yan, Jiwei Cui, Baoquan Yan, Jun Zhang, Jian State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences China Technology Center of Software Engineering Institute of Software Chinese Academy of Sciences China University of Chinese Academy of Sciences China
As bugs of Python built-in types can cause code crashes, detecting them is critical to the robustness of the software. Researchers have concluded plenty of patterns for the bug causes and applied these patterns in det... 详细信息
来源: 评论
Active Learning of One-Clock Timed Automata Using Constraint Solving  20th
Active Learning of One-Clock Timed Automata Using Constrain...
收藏 引用
20th International Symposium on Automated Technology for Verification and Analysis, ATVA 2022
作者: Xu, Runqing An, Jie Zhan, Bohua State Key Laboratory of Computer Science Institute of Software CAS Beijing China University of Chinese Academy of Sciences Beijing China Max Planck Institute for Software Systems Kaiserslautern Germany
Active automata learning in the framework of Angluin’s L∗ algorithm has been applied to learning many kinds of automata models. In applications to timed models such as timed automata, the main challenge is to determi... 详细信息
来源: 评论
DENOISING WITH A JOINT-EMBEDDING PREDICTIVE ARCHITECTURE
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Dengsheng Hu, Jie Wei, Xiaoming Wu, Enhua Meituan China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences China
Joint-embedding predictive architectures (JEPAs) have shown substantial promise in self-supervised representation learning, yet their application in generative modeling remains underexplored. Conversely, diffusion mod... 详细信息
来源: 评论
On Efficient Packet Batching and Resource Allocation for GPU based NFV Acceleration  31
On Efficient Packet Batching and Resource Allocation for GPU...
收藏 引用
31st IEEE/ACM International Symposium on Quality of Service, IWQoS 2023
作者: Zeng, Deze Zhu, Andong Gu, Lin Chen, Quan Guo, Minyi School of Computer Science China University of Geosciences Hubei Wuhan China Nanjing University State Key Lab. for Novel Software Technology Nanjing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Shanghai Jiao Tong University Department of Computer Science and Engineering Shanghai China
Network Function Virtualization (NFV) has already become an essential technology for improving the scalability and flexibility of modern computer networks. The performance gap has become the main issue that impedes th... 详细信息
来源: 评论
Harvesting Event Schemas from Large Language Models  8th
Harvesting Event Schemas from Large Language Models
收藏 引用
8th China Conference on Knowledge Graph and Semantic Computing, CCKS 2023
作者: Tang, Jialong H., Lin Z., Li Y., Lu X., Han L., Sun Chinese Information Processing Laboratory Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Event schema provides a conceptual, structural and formal language to represent events and model the world event knowledge. Unfortunately, it is challenging to automatically induce high-quality and high-coverage event... 详细信息
来源: 评论
Planning with Linear Temporal Logic Specifications: Handling Quantifiable and Unquantifiable Uncertainty
arXiv
收藏 引用
arXiv 2025年
作者: Yu, Pian Li, Yong Parker, David Kwiatkowska, Marta United Kingdom Department of Computer Science University of Oxford United Kingdom Key Laboratory of System Software Chinese Academy of Sciences State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences China
This work studies the planning problem for robotic systems under both quantifiable and unquantifiable uncertainty. The objective is to enable the robotic systems to optimally fulfill high-level tasks specified by Line... 详细信息
来源: 评论
Sufficient and Necessary Barrier-like Conditions for Safety and Reach-avoid Verification of Stochastic Discrete-time Systems
arXiv
收藏 引用
arXiv 2024年
作者: Xue, Bai Key Laboratory of System Software Chinese Academy of Sciences State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China
In this paper, we examine sufficient and necessary barrier-like conditions for the safety verification and reach-avoid verification of stochastic discrete-time systems. Safety verification aims to certify the satisfac... 详细信息
来源: 评论