咨询与建议

限定检索结果

文献类型

  • 989 篇 会议
  • 724 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 1,717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 818 篇 计算机科学与技术...
    • 684 篇 软件工程
    • 203 篇 信息与通信工程
    • 130 篇 控制科学与工程
    • 98 篇 生物工程
    • 66 篇 机械工程
    • 64 篇 光学工程
    • 58 篇 交通运输工程
    • 54 篇 电子科学与技术(可...
    • 50 篇 生物医学工程(可授...
    • 48 篇 仪器科学与技术
    • 48 篇 化学工程与技术
    • 39 篇 动力工程及工程热...
    • 37 篇 电气工程
    • 36 篇 环境科学与工程(可...
    • 31 篇 建筑学
    • 30 篇 材料科学与工程(可...
    • 26 篇 土木工程
    • 22 篇 网络空间安全
  • 526 篇 理学
    • 298 篇 数学
    • 111 篇 生物学
    • 84 篇 物理学
    • 81 篇 统计学(可授理学、...
    • 57 篇 化学
    • 53 篇 系统科学
  • 328 篇 管理学
    • 187 篇 管理科学与工程(可...
    • 161 篇 图书情报与档案管...
    • 56 篇 工商管理
  • 40 篇 法学
    • 30 篇 社会学
  • 37 篇 医学
    • 30 篇 临床医学
  • 29 篇 农学
  • 21 篇 经济学
  • 12 篇 哲学
  • 9 篇 教育学
  • 7 篇 文学
  • 5 篇 军事学
  • 4 篇 艺术学

主题

  • 55 篇 semantics
  • 36 篇 programming
  • 32 篇 feature extracti...
  • 29 篇 data models
  • 28 篇 computational mo...
  • 27 篇 data mining
  • 25 篇 servers
  • 25 篇 software
  • 23 篇 algorithm design...
  • 23 篇 web services
  • 23 篇 training
  • 22 篇 accuracy
  • 21 篇 predictive model...
  • 19 篇 deep learning
  • 18 篇 symbolic computa...
  • 17 篇 computer archite...
  • 17 篇 optimization
  • 17 篇 visualization
  • 17 篇 machine learning
  • 17 篇 protocols

机构

  • 665 篇 state key labora...
  • 206 篇 state key lab of...
  • 177 篇 school of comput...
  • 109 篇 state key labora...
  • 64 篇 state key labora...
  • 50 篇 state key labora...
  • 47 篇 state key lab. o...
  • 44 篇 zhongguancun lab...
  • 28 篇 microsoft resear...
  • 26 篇 beijing advanced...
  • 24 篇 institute of art...
  • 23 篇 university of ch...
  • 21 篇 beihang universi...
  • 19 篇 school of automa...
  • 19 篇 school of cyber ...
  • 18 篇 microsoft resear...
  • 18 篇 ministry-of-educ...
  • 16 篇 the state key la...
  • 16 篇 state key labora...
  • 14 篇 key laboratory o...

作者

  • 103 篇 li zhoujun
  • 66 篇 liu xianglong
  • 54 篇 xu ke
  • 43 篇 xiao limin
  • 36 篇 limin xiao
  • 36 篇 ma shilong
  • 35 篇 lang bo
  • 32 篇 weifeng lv
  • 32 篇 huang di
  • 31 篇 tongyu zhu
  • 31 篇 ruan li
  • 29 篇 ke xu
  • 29 篇 yang jian
  • 28 篇 lv weifeng
  • 26 篇 shilong ma
  • 25 篇 wei li
  • 24 篇 li ruan
  • 23 篇 zhang xiong
  • 23 篇 bo lang
  • 23 篇 wenjun wu

语言

  • 1,645 篇 英文
  • 37 篇 中文
  • 35 篇 其他
检索条件"机构=State Key Lab of Software Development Environment"
1717 条 记 录,以下是171-180 订阅
排序:
TANET: Thread-Aware Pretraining for Abstractive Conversational Summarization
arXiv
收藏 引用
arXiv 2022年
作者: Yang, Ze Wang, Liran Tian, Zhoujin Wu, Wei Li, Zhoujun State Key Lab of Software Development Environment Beihang University Beijing China Meituan Beijing China
Although pre-trained language models (PLMs) have achieved great success and become a milestone in NLP, abstractive conversational summarization remains a challenging but less studied task. The difficulty lies in two a... 详细信息
来源: 评论
Ensuring the Correctness of Regular Expressions: A Review
收藏 引用
International Journal of Automation and Computing 2021年
作者: Li-Xiao Zheng Shuai Ma Zu-Xi Chen Xiang-Yu Luo College of Computer Science and Technology Huaqiao University State Key Laboratory of Software Development Environment Beihang University
Regular expressions are widely used within and even outside of computer science due to their expressiveness and ***, regular expressions have a quite compact and rather tolerant syntax that makes them hard to understa...
来源: 评论
SCPS:A Secure and Copyright-Preserving System for IIoT Based on Hyperledger Fabric  9
SCPS:A Secure and Copyright-Preserving System for IIoT Based...
收藏 引用
9th International Conference on Advanced Cloud and Big Data, CBD 2021
作者: Peng, Jiahui Li, Chunpei Yuan, Bo Meng, Hongwei Yu, Feng Li, Xianxian Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining Security GuiLin China Beihang University Development Environment School of Computer Science and Engineering State Key Laboratory of Software Beijing100191 China Xiong'An Intelligent City Innovation Federation Blockchain Lab Beijing China
Data, a key asset in Industrial Internet of Things(IIoT), has fueled the emergence of a new data trading in-dustry, which can be collected and traded for better development of IIoT. However, copyright protection is no... 详细信息
来源: 评论
A Progressive Real-Time System Performance Defect Diagnosis Framework Based on Java Virtual Machine Run-time Data  5
A Progressive Real-Time System Performance Defect Diagnosis ...
收藏 引用
5th International Conference on Frontiers Technology of Information and Computer, ICFTIC 2023
作者: Meng, Fan Chen, Bing Zhang, Xiu Zhu, Shaohong Nanjing Betterway Information Technology Limited Company Research and Development Department Nanjing China Nanjing University State Key Lab for Novel Software Technology Nanjing China Wuhan Zhongtian Railway Rolling Stock Limited Company Research and Development Department Wuhan China
Effective diagnosis of real-time system performance defects is of great significance in practical scenarios. Traditional performance defect detection methods are limited in localization and time-cost, which restrict t... 详细信息
来源: 评论
Detecting Political Opinions in Tweets through Bipartite Graph Analysis: A Skip Aggregation Graph Convolution Approach
arXiv
收藏 引用
arXiv 2023年
作者: Peng, Xingyu Zhou, Zhenkun Zhang, Chong Xu, Ke State Key Lab of Software Development Environment Beihang University Beijing100191 China School of Statistics Capital University of Economics and Business Beijing100070 China
Public opinion is a crucial factor in shaping political decision-making. Nowadays, social media has become an essential platform for individuals to engage in political discussions and express their political views, pr... 详细信息
来源: 评论
Pbaeg: Combine-Vulnerabilities Aeg to Defeat Protection Mechanisms
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Yu Zhai, You Li, Zhoujun Zhang, Yipeng State Key Lab of Software Development Environment Beihang University Beijing China School of Information Science and Technology North China University of Technology Beijing China
Automatic exploit generation (AEG) refers to the process of automatically finding the path in the program that can trigger vulnerabilities and generate exploits. The existing AEG usually sets the preset environment id... 详细信息
来源: 评论
IoTAEG: Automatic Exploit Generation of IoT Devices
IoTAEG: Automatic Exploit Generation of IoT Devices
收藏 引用
Computer Engineering and Intelligent Control (ICCEIC) International Conference on
作者: Yu Wang Zhoujun Li Yipeng Zhang You Zhai State Key Lab of Software Development Environment Beihang University Beijing China School of Information Science and Technology North China University of Technology Beijing China
Automatic exploit generation (AEG) refers to the process of automatically finding the path in the program that can trigger vulnerabilities and generate exploits. Generally speaking, the process of finding vulnerabilit...
来源: 评论
TRANSFORMER-PATCHER: ONE MISTAKE WORTH ONE NEURON  11
TRANSFORMER-PATCHER: ONE MISTAKE WORTH ONE NEURON
收藏 引用
11th International Conference on Learning Representations, ICLR 2023
作者: Huang, Zeyu Shen, Yikang Zhang, Xiaofeng Zhou, Jie Rong, Wenge Xiong, Zhang State Key Laboratory of Software Development Environment Beihang University China Sino-French Engineer School Beihang University China School of Computer Science and Engineering Beihang University China Mila University of Montreal Canada WeChat AI Tencent Inc. China
Large Transformer-based Pretrained Language Models (PLMs) dominate almost all Natural Language Processing (NLP) tasks. Nevertheless, they still make mistakes from time to time. For a model deployed in an industrial en... 详细信息
来源: 评论
Predicting accepted pull requests in GitHub
收藏 引用
Science China(Information Sciences) 2021年 第7期64卷 241-243页
作者: Jing JIANG Jiateng ZHENG Yun YANG Li ZHANG Jie LUO State Key Laboratory of Software Development Environment Beihang University
Dear editor,Various open source software hosting sites, such as Github,provide support for pull-based development and allow developers to flexibly and efficiently make contributions [1].
来源: 评论
Goal2UCM: Automatic Generation of Use Case Model from iStar Model  14
Goal2UCM: Automatic Generation of Use Case Model from iStar ...
收藏 引用
14th International iStar Workshop, iStar 2021
作者: Yang, Yilong Bok, Younggi Yang, Zhuoxi Sheriff, Eric Li, Tong State Key Laboratory of Software Development Environment School of Software Beihang University China Faculty of Information Technology Beijing University of Technology China
Goal-oriented modeling is an effective way for modeling and analyzing the requirements of users. It takes stakeholder s intentions as the main clue and analyzes their goals and tasks to construct hierarchical requirem... 详细信息
来源: 评论