咨询与建议

限定检索结果

文献类型

  • 2,010 篇 会议
  • 1,876 篇 期刊文献
  • 16 册 图书

馆藏范围

  • 3,902 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,746 篇 工学
    • 2,083 篇 计算机科学与技术...
    • 1,679 篇 软件工程
    • 402 篇 信息与通信工程
    • 295 篇 控制科学与工程
    • 217 篇 电子科学与技术(可...
    • 216 篇 生物工程
    • 176 篇 电气工程
    • 169 篇 机械工程
    • 164 篇 光学工程
    • 110 篇 生物医学工程(可授...
    • 109 篇 化学工程与技术
    • 85 篇 仪器科学与技术
    • 82 篇 材料科学与工程(可...
    • 73 篇 安全科学与工程
    • 68 篇 动力工程及工程热...
    • 63 篇 土木工程
    • 61 篇 建筑学
    • 60 篇 交通运输工程
    • 58 篇 网络空间安全
  • 1,409 篇 理学
    • 882 篇 数学
    • 318 篇 物理学
    • 245 篇 生物学
    • 212 篇 统计学(可授理学、...
    • 153 篇 系统科学
    • 112 篇 化学
  • 627 篇 管理学
    • 374 篇 管理科学与工程(可...
    • 275 篇 图书情报与档案管...
    • 127 篇 工商管理
  • 82 篇 医学
    • 74 篇 临床医学
  • 79 篇 法学
    • 61 篇 社会学
  • 49 篇 经济学
  • 31 篇 农学
  • 16 篇 教育学
  • 16 篇 军事学
  • 14 篇 艺术学
  • 8 篇 文学
  • 3 篇 哲学

主题

  • 117 篇 semantics
  • 79 篇 computer science
  • 72 篇 computational mo...
  • 58 篇 software
  • 57 篇 laboratories
  • 53 篇 machine learning
  • 48 篇 deep learning
  • 46 篇 software enginee...
  • 44 篇 training
  • 41 篇 feature extracti...
  • 37 篇 accuracy
  • 36 篇 visualization
  • 34 篇 model checking
  • 32 篇 graphics process...
  • 32 篇 data mining
  • 32 篇 software testing
  • 32 篇 testing
  • 32 篇 data models
  • 30 篇 reinforcement le...
  • 30 篇 image segmentati...

机构

  • 721 篇 state key labora...
  • 446 篇 university of ch...
  • 181 篇 state key labora...
  • 78 篇 institute of sof...
  • 75 篇 department of co...
  • 71 篇 state key lab. f...
  • 67 篇 school of comput...
  • 64 篇 school of comput...
  • 52 篇 state key lab of...
  • 50 篇 state key lab of...
  • 49 篇 state key labora...
  • 48 篇 state key lab fo...
  • 43 篇 graduate univers...
  • 42 篇 state key lab. o...
  • 40 篇 chinese informat...
  • 38 篇 department of co...
  • 38 篇 state key lab of...
  • 38 篇 department of co...
  • 37 篇 college of compu...
  • 36 篇 school of comput...

作者

  • 81 篇 sun le
  • 73 篇 han xianpei
  • 54 篇 wu enhua
  • 53 篇 lin hongyu
  • 43 篇 zhan naijun
  • 40 篇 cai shaowei
  • 40 篇 sun maosong
  • 38 篇 zhang jian
  • 37 篇 ying mingsheng
  • 37 篇 zhang lijun
  • 35 篇 huang minlie
  • 32 篇 liu zhiyuan
  • 31 篇 gao yang
  • 31 篇 xue bai
  • 29 篇 jian zhang
  • 27 篇 shi yinghuan
  • 26 篇 wei jun
  • 26 篇 lu yaojie
  • 25 篇 enhua wu
  • 24 篇 shen yi-dong

语言

  • 3,558 篇 英文
  • 238 篇 其他
  • 110 篇 中文
检索条件"机构=State Key Lab of Computer Science Institute of Software"
3902 条 记 录,以下是41-50 订阅
排序:
Semantic-Aware Pseudo-labeling for Unsupervised Meta-Learning
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 第7期47卷 5475-5488页
作者: Ouyang, Tianran Dong, Xingping Ye, Mang Du, Bo Shao, Ling Shen, Jianbing Wuhan University School of Computer Science National Engineering Research Center for Multimedia Software Institute of Artificial Intelligence Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan430072 China University of Chinese Academy of Sciences UCAS-Terminus AI Lab Beijing101408 China University of Macau State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science 314100 China
In unsupervised meta-learning, the clustering-based pseudo-labeling approach is an attractive framework, since it is model-agnostic, allowing it to synergize with supervised algorithms to learn from unlabeled data. Ho... 详细信息
来源: 评论
Efficient Federated Learning Using Dynamic Update and Adaptive Pruning with Momentum on Shared Server Data
收藏 引用
ACM Transactions on Intelligent Systems and Technology 2024年 第6期15卷 1-28页
作者: Liu, Ji Jia, Juncheng Zhang, Hong Yun, Yuhui Wang, Leye Zhou, Yang Dai, Huaiyu Dou, Dejing Hithink RoyalFlush Information Network Co. Ltd. Hangzhou China School of Computer Science and Technology Soochow University Suzhou China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing China Baidu Research Beijing China Key Lab of High Confidence Software Technologies Ministry of Education and Software Institute Peking University Beijing China Department of Computer Science and Software Engineering Auburn University AuburnAL United States Department of Electrical and Computer Engineering North Carolina State University RaleighNC United States Bedi Cloud and School of Computer Science Fudan University Beijing China
Despite achieving remarkable performance, Federated Learning (FL) encounters two important problems, i.e., low training efficiency and limited computational resources. In this article, we propose a new FL framework, i... 详细信息
来源: 评论
Efficient and Lossless Integrity-preserving Training Scheme for High-dimensional Logistic Regression over Vertical Data
Efficient and Lossless Integrity-preserving Training Scheme ...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Xu, Wei Zhu, Hui Liu, Ruikang Zheng, Yandong Wang, Fengwei Feng, Dengguo Xidian University School of Cyber Engineering Xi'an710126 China Institute of Software State Key Laboratory of Computer Science Beijing100190 China
Logistic regression is a widely used and efficient machine learning algorithm for data analysis. However, data is often distributed among different participants, and building high-quality models often involves data in... 详细信息
来源: 评论
String Constraints with Regex-Counting and String-Length Solved More Efficiently  9th
String Constraints with Regex-Counting and String-Length S...
收藏 引用
9th International Symposium on Dependable software Engineering: Theories, Tools and Applications, SETTA 2023
作者: Hu, Denghang Wu, Zhilin State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Regular expressions (regex for short) and string-length function are widely used in string-manipulating programs. Counting is a frequently used feature in regexes that counts the number of matchings of sub-patterns. T...
来源: 评论
Session Types with Multiple Senders Single Receiver  9th
Session Types with Multiple Senders Single Receiver
收藏 引用
9th International Symposium on Dependable software Engineering: Theories, Tools and Applications, SETTA 2023
作者: Ji, Zekun Wang, Shuling Xu, Xiong State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China
Message passing is a fundamental element in software development, ranging from concurrent and mobile computing to distributed services, but it suffers from communication errors such as deadlocks. Session types are a t... 详细信息
来源: 评论
Three-dimensional reconstruction of industrial parts from a single image
收藏 引用
Visual Computing for Industry,Biomedicine,and Art 2024年 第1期7卷 340-351页
作者: Zhenxing Xu Aizeng Wang Fei Hou Gang Zhao School of Mechanical Engineering and Automation Beihang UniversityBeijing 100191China Key Laboratory of Aeronautics Smart Manufacturing Beihang UniversityBeijing 100191China State Key Laboratory of Computer Science Institute of SoftwareChinese Academy of SciencesBeijing 100190China
This study proposes an image-based three-dimensional(3D)vector reconstruction of industrial parts that can gener-ate non-uniform rational B-splines(NURBS)surfaces with high fidelity and *** contributions of this study... 详细信息
来源: 评论
A study on the impact of pre-trained model on Just-In-Time defect prediction  23
A study on the impact of pre-trained model on Just-In-Time d...
收藏 引用
23rd IEEE International Conference on software Quality, Reliability, and Security, QRS 2023
作者: Guo, Yuxiang Gao, Xiaopeng Zhang, Zhenyu Chan, W.K. Jiang, Bo Beihang University State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China City University of Hong Kong Department of Computer Science Hong Kong
Previous researchers conducting Just-In-Time (JIT) defect prediction tasks have primarily focused on the performance of individual pre-trained models, without exploring the relationship between different pre-trained m... 详细信息
来源: 评论
The Computational Advantage of MIP∗ Vanishes in the Presence of Noise  39
The Computational Advantage of MIP∗ Vanishes in the Presenc...
收藏 引用
39th Computational Complexity Conference, CCC 2024
作者: Dong, Yangjing Fu, Honghao Natarajan, Anand Qin, Minglong Xu, Haochen Yao, Penghui State Key Laboratory for Novel Software Technology Nanjing University China Massachusetts Institute of Technology CambridgeMA United States State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Hefei National Laboratory China
The class MIP∗ of quantum multiprover interactive proof systems with entanglement is much more powerful than its classical counterpart MIP [7, 29, 28]: while MIP = NEXP, the quantum class MIP∗ is equal to RE, a class ... 详细信息
来源: 评论
DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection
收藏 引用
science China(Information sciences) 2023年 第3期66卷 289-290页
作者: Axin XIANG Hongfeng GAO Youliang TIAN Liang WAN College of Computer Science and Technology Guizhou University Institute of Cryptography and Data Security Guizhou University Network and Information Management Center Guizhou University State Key Laboratory of Public Big Data Guizhou University Institute of Computer Software and Theory Guizhou University
Dear editor, key security is of great practical significance and demand to guarantee the security of digital assets in the blockchain system. At present, users prefer to escrow their assets on centralized institutions...
来源: 评论
PathActMarker:an R package for inferring pathway activity of complex diseases
收藏 引用
Frontiers of computer science 2025年 第3期19卷 123-124页
作者: Xingyi LI Jun HAO Zhelin ZHAO Junming LI Xingyu LIAO Min LI Xuequn SHANG School of Computer Science Northwestern Polytechnical UniversityXi’an 710072China Research&Development Institute of Northwestern Polytechnical University in Shenzhen Shenzhen 518063China School of Software Northwestern Polytechnical UniversityXi’an 710072China Hunan Provincial Key Lab on Bioinformatics School of Computer Science and EngineeringCentral South UniversityChangsha 410083China
1 Introduction The process of complex diseases is closely linked to the disruption of key biological pathways,it is crucial to identify the dysfunctional pathways and quantify the degree of dysregulation at the indivi... 详细信息
来源: 评论