咨询与建议

限定检索结果

文献类型

  • 989 篇 会议
  • 724 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 1,717 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,148 篇 工学
    • 818 篇 计算机科学与技术...
    • 684 篇 软件工程
    • 203 篇 信息与通信工程
    • 130 篇 控制科学与工程
    • 98 篇 生物工程
    • 66 篇 机械工程
    • 64 篇 光学工程
    • 58 篇 交通运输工程
    • 54 篇 电子科学与技术(可...
    • 50 篇 生物医学工程(可授...
    • 48 篇 仪器科学与技术
    • 48 篇 化学工程与技术
    • 39 篇 动力工程及工程热...
    • 37 篇 电气工程
    • 36 篇 环境科学与工程(可...
    • 31 篇 建筑学
    • 30 篇 材料科学与工程(可...
    • 26 篇 土木工程
    • 22 篇 网络空间安全
  • 526 篇 理学
    • 298 篇 数学
    • 111 篇 生物学
    • 84 篇 物理学
    • 81 篇 统计学(可授理学、...
    • 57 篇 化学
    • 53 篇 系统科学
  • 328 篇 管理学
    • 187 篇 管理科学与工程(可...
    • 161 篇 图书情报与档案管...
    • 56 篇 工商管理
  • 40 篇 法学
    • 30 篇 社会学
  • 37 篇 医学
    • 30 篇 临床医学
  • 29 篇 农学
  • 21 篇 经济学
  • 12 篇 哲学
  • 9 篇 教育学
  • 7 篇 文学
  • 5 篇 军事学
  • 4 篇 艺术学

主题

  • 55 篇 semantics
  • 36 篇 programming
  • 32 篇 feature extracti...
  • 29 篇 data models
  • 28 篇 computational mo...
  • 27 篇 data mining
  • 25 篇 servers
  • 25 篇 software
  • 23 篇 algorithm design...
  • 23 篇 web services
  • 23 篇 training
  • 22 篇 accuracy
  • 21 篇 predictive model...
  • 19 篇 deep learning
  • 18 篇 symbolic computa...
  • 17 篇 computer archite...
  • 17 篇 optimization
  • 17 篇 visualization
  • 17 篇 machine learning
  • 17 篇 protocols

机构

  • 665 篇 state key labora...
  • 206 篇 state key lab of...
  • 177 篇 school of comput...
  • 109 篇 state key labora...
  • 64 篇 state key labora...
  • 50 篇 state key labora...
  • 47 篇 state key lab. o...
  • 44 篇 zhongguancun lab...
  • 28 篇 microsoft resear...
  • 26 篇 beijing advanced...
  • 24 篇 institute of art...
  • 23 篇 university of ch...
  • 21 篇 beihang universi...
  • 19 篇 school of automa...
  • 19 篇 school of cyber ...
  • 18 篇 microsoft resear...
  • 18 篇 ministry-of-educ...
  • 16 篇 the state key la...
  • 16 篇 state key labora...
  • 14 篇 key laboratory o...

作者

  • 103 篇 li zhoujun
  • 66 篇 liu xianglong
  • 54 篇 xu ke
  • 43 篇 xiao limin
  • 36 篇 limin xiao
  • 36 篇 ma shilong
  • 35 篇 lang bo
  • 32 篇 weifeng lv
  • 32 篇 huang di
  • 31 篇 tongyu zhu
  • 31 篇 ruan li
  • 29 篇 ke xu
  • 29 篇 yang jian
  • 28 篇 lv weifeng
  • 26 篇 shilong ma
  • 25 篇 wei li
  • 24 篇 li ruan
  • 23 篇 zhang xiong
  • 23 篇 bo lang
  • 23 篇 wenjun wu

语言

  • 1,645 篇 英文
  • 37 篇 中文
  • 35 篇 其他
检索条件"机构=State Key Lab of Software Development Environment"
1717 条 记 录,以下是191-200 订阅
排序:
Smart Contract Service Optimization in Blockchain-Cloud Collaborative Computing  24
Smart Contract Service Optimization in Blockchain-Cloud Coll...
收藏 引用
24th IEEE International Conference on Mobile Data Management, MDM 2023
作者: Wan, Ji Hu, Kai Li, Jie Su, Hao Wu, Qingshun Li, Mingyuan Feng, Libo Pan, Yan Beihang University State Key Laboratory of Software Development Environment Beijing China Beihang Yunnan Innovation Institute Yunnan Key Laboratory of Blockchain Application Technology Kunming China Zhengzhou University School of Computer and Artificial Intelligence Zhengzhou China The First Affiliated Hospital of Zhengzhou University Zhengzhou China Yunnan University National Pilot School of Software Kunming China China Industrial Control Systems Cyber Emergency Response Team Institute of Software Beijing China
Smart contract is a trusted service provided on the blockchain, while cloud service is a traditional service mode with a large number of resources. The combination of the blockchain and cloud service is of great signi... 详细信息
来源: 评论
PPO Based Reinforcement Learning Horizontal Pods Auto-Scaling-A Case Study in Simulation environment
PPO Based Reinforcement Learning Horizontal Pods Auto-Scalin...
收藏 引用
Advances in Electrical Engineering and Computer Applications( AEECA), 2020 IEEE International Conference on
作者: Fang Peng Xin Ji Le Zhang Ruibo Chen Xingchuang Liao Kui Zhang Big Data Center State Grid Corporation of China Beijing China State Key Laboratory of Software Development Environment Beihang University Beijing China
Microservice has become a state-of-art architecture in the software engineering domain. In the big data scenario, the data can be encapsulated by microservice, providing independent service or orchestrating the busine...
来源: 评论
Attack End-to-End Autonomous Driving through Module-Wise Noise
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Lu Zhang, Tianyuan Han, Yikai Fang, Muyang Jin, Ting Kang, Jiaqi School of Computer Science and Engineering Beihang University Beijing China Shen Yuan Honors College Beihang University Beijing China State Key Lab of Software Development Environment Beihang University Beijing China School of Software Beihang University Beijing China
With recent breakthroughs in deep neural networks, numerous tasks within autonomous driving have exhibited remarkable performance. However, deep learning models are susceptible to adversarial attacks, presenting signi... 详细信息
来源: 评论
Noise-injected Consistency Training and Entropy-constrained Pseudo labeling for Semi-supervised Extractive Summarization  29
Noise-injected Consistency Training and Entropy-constrained ...
收藏 引用
29th International Conference on Computational Linguistics, COLING 2022
作者: Wang, Yiming Mao, Qianren Liu, Junnan Jiang, Weifeng Zhu, Hongdong Li, Jianxin Beijing Advanced Innovation Center for Big Data and Brain Computing Beihang University China The State Key Laboratory of Software Development Environment Beihang University China Institute of Artificial Intelligence Beihang University China
labeling large amounts of extractive summarization data is often prohibitive expensive due to time, financial, and expertise constraints, which poses great challenges to incorporating summarization system in practical... 详细信息
来源: 评论
Deep Fused Flow and Topology Features for Botnet Detection Basing on Pretrained Gcn
SSRN
收藏 引用
SSRN 2023年
作者: Meng, Xiaoyuan Lang, Bo Liu, Yanxi Yan, Yuhao State Key Laboratory of Software Development Environment Beihang University XueYuan Road Beijing100191 China Zhongguancun Laboratory Beijing China
Botnets become significant cyber security threats nowadays. The characteristics of botnets are mainly reflected in the network behaviors of the bots and their intercommunication relationships. Existing botnet detectio... 详细信息
来源: 评论
PriSTI: A Conditional Diffusion Framework for Spatiotemporal Imputation
PriSTI: A Conditional Diffusion Framework for Spatiotemporal...
收藏 引用
International Conference on Data Engineering
作者: Mingzhe Liu Han Huang Hao Feng Leilei Sun Bowen Du Yanjie Fu State Key Laboratory of Software Development Environment Beihang University Beijing China Department of Computer Science University of Central Florida USA
Spatiotemporal data mining plays an important role in air quality monitoring, crowd flow modeling, and climate forecasting. However, the originally collected spatiotemporal data in real-world scenarios is usually inco...
来源: 评论
label-Enhanced Graph Neural Network for Semi-supervised Node Classification
arXiv
收藏 引用
arXiv 2022年
作者: Yu, Le Sun, Leilei Du, Bowen Zhu, Tongyu Lv, Weifeng The State Key Laboratory of Software Development Environment Beihang University Beijing100191 China
Graph Neural Networks (GNNs) have been widely applied in the semi-supervised node classification task, where a key point lies in how to sufficiently leverage the limited but valuable label information. Most of the cla... 详细信息
来源: 评论
Variant quantifiers in L_(3)-valued first-order logic
收藏 引用
Frontiers of Computer Science 2021年 第5期15卷 151-159页
作者: Wei LI Yuefei SUI State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100083China Key Laboratory of Intelligent Information Processing Institute of Computing TechnologyChinese Academy of SciencesBeijing 100190China School of Computer Science and Technology University of Chinese Academy of SciencesBeijing 100049China
Traditional first-order logic has four definitions for quantifiers,which are defined by universal and existential *** L_(3)-valued(three-valued)first-order logic,there are eight kinds of definitions for quantifiers;an... 详细信息
来源: 评论
Defensive Patches for Robust Recognition in the Physical World
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Jiakai Yin, Zixin Hu, Pengfei Liu, Aishan Tao, Renshuai Qin, Haotong Liu, Xianglong Tao, Dacheng State Key Lab of Software Development Environment Beihang University Beijing China JD Explore Academy Beijing China
To operate in real-world high-stakes environments, deep learning systems have to endure noises that have been continuously thwarting their robustness. Data-end defense, which improves robustness by operations on input... 详细信息
来源: 评论
Multilingual Entity and Relation Extraction from Unified to Language-specific Training
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Zixiang Yang, Jian Li, Tongliang Liu, Jiaheng Mo, Ying Bai, Jiaqi He, Longtao Li, Zhoujun State Key Lab of Software Development Environment Beihang University Beijing China National Computer Network Emergency Response Technical Team Coordination Center of China Beijing China
Entity and relation extraction is a key task in information extraction, where the output can be used for downstream NLP tasks. Existing approaches for entity and relation extraction tasks mainly focus on the English c... 详细信息
来源: 评论