咨询与建议

限定检索结果

文献类型

  • 989 篇 会议
  • 724 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 1,717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 818 篇 计算机科学与技术...
    • 684 篇 软件工程
    • 203 篇 信息与通信工程
    • 130 篇 控制科学与工程
    • 98 篇 生物工程
    • 66 篇 机械工程
    • 64 篇 光学工程
    • 58 篇 交通运输工程
    • 54 篇 电子科学与技术(可...
    • 50 篇 生物医学工程(可授...
    • 48 篇 仪器科学与技术
    • 48 篇 化学工程与技术
    • 39 篇 动力工程及工程热...
    • 37 篇 电气工程
    • 36 篇 环境科学与工程(可...
    • 31 篇 建筑学
    • 30 篇 材料科学与工程(可...
    • 26 篇 土木工程
    • 22 篇 网络空间安全
  • 526 篇 理学
    • 298 篇 数学
    • 111 篇 生物学
    • 84 篇 物理学
    • 81 篇 统计学(可授理学、...
    • 57 篇 化学
    • 53 篇 系统科学
  • 328 篇 管理学
    • 187 篇 管理科学与工程(可...
    • 161 篇 图书情报与档案管...
    • 56 篇 工商管理
  • 40 篇 法学
    • 30 篇 社会学
  • 37 篇 医学
    • 30 篇 临床医学
  • 29 篇 农学
  • 21 篇 经济学
  • 12 篇 哲学
  • 9 篇 教育学
  • 7 篇 文学
  • 5 篇 军事学
  • 4 篇 艺术学

主题

  • 55 篇 semantics
  • 36 篇 programming
  • 32 篇 feature extracti...
  • 29 篇 data models
  • 28 篇 computational mo...
  • 27 篇 data mining
  • 25 篇 servers
  • 25 篇 software
  • 23 篇 algorithm design...
  • 23 篇 web services
  • 23 篇 training
  • 22 篇 accuracy
  • 21 篇 predictive model...
  • 19 篇 deep learning
  • 18 篇 symbolic computa...
  • 17 篇 computer archite...
  • 17 篇 optimization
  • 17 篇 visualization
  • 17 篇 machine learning
  • 17 篇 protocols

机构

  • 665 篇 state key labora...
  • 206 篇 state key lab of...
  • 177 篇 school of comput...
  • 109 篇 state key labora...
  • 64 篇 state key labora...
  • 50 篇 state key labora...
  • 47 篇 state key lab. o...
  • 44 篇 zhongguancun lab...
  • 28 篇 microsoft resear...
  • 26 篇 beijing advanced...
  • 24 篇 institute of art...
  • 23 篇 university of ch...
  • 21 篇 beihang universi...
  • 19 篇 school of automa...
  • 19 篇 school of cyber ...
  • 18 篇 microsoft resear...
  • 18 篇 ministry-of-educ...
  • 16 篇 the state key la...
  • 16 篇 state key labora...
  • 14 篇 key laboratory o...

作者

  • 103 篇 li zhoujun
  • 66 篇 liu xianglong
  • 54 篇 xu ke
  • 43 篇 xiao limin
  • 36 篇 limin xiao
  • 36 篇 ma shilong
  • 35 篇 lang bo
  • 32 篇 weifeng lv
  • 32 篇 huang di
  • 31 篇 tongyu zhu
  • 31 篇 ruan li
  • 29 篇 ke xu
  • 29 篇 yang jian
  • 28 篇 lv weifeng
  • 26 篇 shilong ma
  • 25 篇 wei li
  • 24 篇 li ruan
  • 23 篇 zhang xiong
  • 23 篇 bo lang
  • 23 篇 wenjun wu

语言

  • 1,645 篇 英文
  • 37 篇 中文
  • 35 篇 其他
检索条件"机构=State Key Lab of Software Development Environment"
1717 条 记 录,以下是181-190 订阅
排序:
Computer vision-based evaluation of dimensional accuracy for MEAM in new product development  33
Computer vision-based evaluation of dimensional accuracy for...
收藏 引用
33rd CIRP Design Conference
作者: Tu, Yongqiang Gong, Huiyun Hassan, Alaa Siadat, Ali Chen, Zhangwei Additive Manufacturing Institute College of Mechatronics and Control Engineering Shenzhen University Shenzhen518060 China The State Key Lab of Software Development Environment Beihang University Beijing100191 China ERPI Université de Lorraine NancyF-54000 France LCFC Arts et Métiers ParisTech MetzF-57000 France
Evaluation of dimensional accuracy for parts is a key component of quality assurance for material extrusion based additive manufacturing (MEAM) in new product development. Computer vision-based frameworks are currentl... 详细信息
来源: 评论
New Intent Discovery with Attracting and Dispersing Prototype
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Shun Yang, Jian Bai, Jiaqi Yan, Chaoran Li, Tongliang Yan, Zhao Li, Zhoujun State Key Lab of Software Development Environment Beihang University Beijing China School of Cyber Science and Technology Beihang University Beijing China Beijing Information Science and Technology University China Tencent Youtu Lab China
New Intent Discovery (NID) aims to recognize known and infer new intent categories with the help of limited labeled and large-scale unlabeled data. The task is addressed as a feature-clustering problem and recent stud... 详细信息
来源: 评论
Phonemic Adversarial Attack against Audio Recognition in Real World
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Jiakai Chen, Zhendong Yin, Zixin Yang, Qinghong Liu, Xianglong Zhongguancun Laboratory China College of Software Beihang University China State Key Lab of Software Development Environment Beihang University China
Recently, adversarial attacks for audio recognition have attracted much attention. However, most of the existing studies mainly rely on the coarse-grain audio features at the instance level to generate adversarial noi... 详细信息
来源: 评论
Lifeline Consensus: Protect Small-scale Blockchain From Typical Attacks
Lifeline Consensus: Protect Small-scale Blockchain From Typi...
收藏 引用
International Wireless Communications and Mobile Computing Conference, IWCMC
作者: Kundu Chen Jie Luo State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Haidian District Beijing China
Blockchain is a distributed network system known for its anonymity, security, and decentralized nature. While blockchains with robust networks such as Bitcoin and Ethereum are proving immutable to attacks, many others...
来源: 评论
Know What I don’t Know: Handling Ambiguous and Unanswerable Questions for Text-to-SQL
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Bing Gao, Yan Li, Zhoujun Lou, Jian-Guang State Key Lab of Software Development Environment Beihang University Beijing China Microsoft Research Asia China
The task of text-to-SQL aims to convert a natural language question into its corresponding SQL query within the context of relational tables. Existing text-to-SQL parsers generate a "plausible" SQL query for... 详细信息
来源: 评论
CQR-SQL: Conversational Question Reformulation Enhanced Context-Dependent Text-to-SQL Parsers
arXiv
收藏 引用
arXiv 2022年
作者: Xiao, Dongling Chai, Linzheng Zhang, Qian-Wen Yan, Zhao Li, Zhoujun Cao, Yunbo Tencent Cloud Xiaowei China State Key Lab of Software Development Environment Beihang University Beijing China
Context-dependent text-to-SQL is the task of translating multi-turn questions into database-related SQL queries. Existing methods typically focus on making full use of history context or previously predicted SQL for c... 详细信息
来源: 评论
SAT Requires Exhaustive Search
arXiv
收藏 引用
arXiv 2023年
作者: Xu, Ke Zhou, Guangyan State Key Lab of Software Development Environment Beihang University Beijing100083 China Department of Mathematics and Statistics Beijing Technology and Business University Beijing100048 China
In this paper, by constructing extremely hard examples of CSP (with large domains) and SAT (with long clauses), we prove that such examples cannot be solved without exhaustive search, which is stronger than P ≠ NP. T... 详细信息
来源: 评论
Enhancing the Transferability of Adversarial Attacks with Stealth Preservation
Enhancing the Transferability of Adversarial Attacks with St...
收藏 引用
IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)
作者: Xinwei Zhang Tianyuan Zhang Yitong Zhang Shuangcheng Liu School of Computer Science and Engineering Beihang University Beijing China State Key Lab of Software Development Environment Beihang University Beijing China Shen Yuan Honors College Beihang University Beijing China
Deep neural networks are susceptible to attacks from adversarial examples in recent years. Especially, the black-box attacks cause a more serious threat to practical applications. However, while most existing black-bo... 详细信息
来源: 评论
HILL: Hierarchy-aware Information Lossless Contrastive Learning for Hierarchical Text Classification
arXiv
收藏 引用
arXiv 2024年
作者: Zhu, He Wu, Junran Liu, Ruomei Hou, Yue Yuan, Ze Li, Shangzhe Pan, Yicheng Xu, Ke State Key Lab of Software Development Environment Beihang University Beijing100191 China Zhongguancun Laboratory Beijing100094 China School of Statistics and Mathematics Central University of Finance and Economics Beijing100081 China
Existing self-supervised methods in natural language processing (NLP), especially hierarchical text classification (HTC), mainly focus on self-supervised contrastive learning, extremely relying on human-designed augme... 详细信息
来源: 评论
基于时空数据的地下空间基础设施智能监测系统
收藏 引用
Engineering 2023年 第6期25卷 194-203,M0008页
作者: 杜博文 叶俊辰 朱合华 孙磊磊 杜彦良 State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100191China Department of Geotechnical Engineering College of Civil EngineeringTongji UniversityShanghai 200092China Institute of Urban Smart Transportation and Safety Maintenance Shenzhen UniversityShenzhen 518060China
基于时空大数据的智能感知、机理认知和劣化预知,不仅促进了基础设施安全的发展,同时也是基础设施建设向智能化转变的基础理论和关键技术。地下空间利用的发展,形成了深、大、聚的三大特征和立体的城市布局。然而,与地上的建筑物和桥梁... 详细信息
来源: 评论