咨询与建议

限定检索结果

文献类型

  • 375 篇 期刊文献
  • 346 篇 会议
  • 2 册 图书

馆藏范围

  • 723 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 485 篇 工学
    • 353 篇 计算机科学与技术...
    • 286 篇 软件工程
    • 84 篇 信息与通信工程
    • 58 篇 控制科学与工程
    • 46 篇 生物工程
    • 38 篇 光学工程
    • 28 篇 生物医学工程(可授...
    • 24 篇 机械工程
    • 21 篇 动力工程及工程热...
    • 21 篇 电子科学与技术(可...
    • 20 篇 材料科学与工程(可...
    • 18 篇 电气工程
    • 17 篇 仪器科学与技术
    • 17 篇 建筑学
    • 17 篇 交通运输工程
    • 16 篇 化学工程与技术
    • 16 篇 环境科学与工程(可...
    • 14 篇 土木工程
    • 11 篇 安全科学与工程
  • 260 篇 理学
    • 142 篇 数学
    • 60 篇 生物学
    • 41 篇 物理学
    • 37 篇 统计学(可授理学、...
    • 26 篇 系统科学
    • 25 篇 化学
  • 128 篇 管理学
    • 75 篇 管理科学与工程(可...
    • 65 篇 图书情报与档案管...
    • 27 篇 工商管理
  • 20 篇 医学
    • 17 篇 临床医学
  • 16 篇 法学
    • 11 篇 社会学
  • 12 篇 农学
  • 8 篇 经济学
  • 4 篇 哲学
  • 4 篇 教育学
  • 2 篇 文学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 19 篇 semantics
  • 13 篇 servers
  • 12 篇 deep learning
  • 12 篇 symbolic computa...
  • 12 篇 feature extracti...
  • 12 篇 training
  • 10 篇 object detection
  • 9 篇 software
  • 8 篇 computer archite...
  • 8 篇 educational inst...
  • 8 篇 computational mo...
  • 8 篇 computer vision
  • 8 篇 heuristic algori...
  • 7 篇 programming
  • 7 篇 optimization
  • 7 篇 blockchain
  • 7 篇 taxonomy
  • 7 篇 forecasting
  • 7 篇 privacy
  • 7 篇 cryptography

机构

  • 183 篇 state key labora...
  • 163 篇 school of comput...
  • 86 篇 state key labora...
  • 74 篇 state key lab of...
  • 46 篇 state key labora...
  • 28 篇 state key labora...
  • 23 篇 zhongguancun lab...
  • 19 篇 institute of art...
  • 18 篇 school of cyber ...
  • 13 篇 school of automa...
  • 13 篇 state key labora...
  • 12 篇 beijing advanced...
  • 12 篇 school of scienc...
  • 10 篇 key laboratory o...
  • 10 篇 hangzhou innovat...
  • 9 篇 school of softwa...
  • 9 篇 university of ch...
  • 9 篇 ministry-of-educ...
  • 8 篇 school of econom...
  • 8 篇 school of comput...

作者

  • 39 篇 xiao limin
  • 30 篇 huang di
  • 28 篇 limin xiao
  • 27 篇 ruan li
  • 24 篇 li zhoujun
  • 23 篇 xu ke
  • 19 篇 liu xianglong
  • 17 篇 li ruan
  • 15 篇 zhang xiong
  • 14 篇 bai xiao
  • 14 篇 di huang
  • 11 篇 hao sheng
  • 11 篇 fan yubo
  • 10 篇 chen jiaxin
  • 10 篇 tian bo
  • 9 篇 xu yan
  • 9 篇 wei li
  • 9 篇 tao dacheng
  • 9 篇 lü jinhu
  • 9 篇 zhu mingfa

语言

  • 684 篇 英文
  • 26 篇 其他
  • 15 篇 中文
检索条件"机构=State Key Lab of Software Development Environment School of Computer Science Beijing University"
723 条 记 录,以下是21-30 订阅
排序:
GCSS:a global collaborative scheduling strategy for wide-area high-performance computing
收藏 引用
Frontiers of computer science 2022年 第5期16卷 1-15页
作者: Yao SONG Limin XIAO Liang WANG Guangjun QIN Bing WEI Baicheng YAN Chenhao ZHANG State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100191China School of Computer Science and Engineering Beihang UniversityBeijing 100191China Smart City College Beijing Union UniversityBeijing 100101China
Wide-area high-performance computing is widely used for large-scale parallel computing applications owing to its high computing and storage ***,the geographical distribution of computing and storage resources makes ef... 详细信息
来源: 评论
Adaptive Token Selection and Fusion Network for Multimodal Sentiment Analysis  1
收藏 引用
30th International Conference on MultiMedia Modeling, MMM 2024
作者: Li, Xiang Lu, Ming Guo, Ziming Zhang, Xiaoming School of Cyber Science and Technology Beihang University Beijing China State Key Laboratory of Software Development Environment Beihang University Beijing100191 China
Multimodal sentiment analysis aims to predict human sentiment polarity with multiple modalities. Most existing methods focus on directly integrating original modal features into multimodal fusion, ignoring the redunda... 详细信息
来源: 评论
New Intent Discovery with Attracting and Dispersing Prototype  30
New Intent Discovery with Attracting and Dispersing Prototyp...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Zhang, Shun Yang, Jian Bai, Jiaqi Yan, Chaoran Li, Tongliang Yan, Zhao Li, Zhoujun State Key Lab of Software Development Environment Beihang University Beijing China School of Cyber Science and Technology Beihang University Beijing China Beijing Information Science and Technology University China Tencent Youtu Lab China
New Intent Discovery (NID) aims to recognize known and infer new intent categories with the help of limited labeled and large-scale unlabeled data. The task is addressed as a feature-clustering problem and recent stud... 详细信息
来源: 评论
Adaptive Cost Aggregation in Iterative Depth Estimation for Efficient Multi-view Stereo  12th
Adaptive Cost Aggregation in Iterative Depth Estimation for...
收藏 引用
12th International Conference on Image and Graphics, ICIG 2023
作者: Wang, Xiang Bai, Xiao Wang, Chen School of Computer Science and Engineering State Key Laboratory of Software Development Environment Jiangxi Research Institute Beihang University Beijing China
The deep multi-view stereo (MVS) approaches generally construct 3D cost volumes to regularize and regress the depth map. These methods are limited with high-resolution outputs since the memory and time costs grow cubi... 详细信息
来源: 评论
Active Perception for Grasp Detection via Neural Graspness Field  38
Active Perception for Grasp Detection via Neural Graspness F...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Ma, Haoxiang Shi, Modi Gao, Boyang Huang, Di State Key Laboratory of Complex and Critical Software Environment School of Computer Science and Engineering Beihang University Beijing China Geometry Robotics
This paper tackles the challenge of active perception for robotic grasp detection in cluttered environments. Incomplete 3D geometry information can negatively affect the performance of learning-based grasp detection m...
来源: 评论
Some New Methods to Generate Short Addition Chains
IACR Transactions on Cryptographic Hardware and Embedded Sys...
收藏 引用
IACR Transactions on Cryptographic Hardware and Embedded Systems 2023年 第2期2023卷 270-285页
作者: Ding, Yuanchao Guo, Hua Guan, Yewei Song, Hutao Zhang, Xiyong Liu, Jianwei School of Cyber Science and Technology Beihang University Beijing China State Key Laboratory of Cryptology P.O. Box Beijing China State Key Laboratory of Software Development Environment Beihang University Beijing China Beijing Institute of Satellite Information Engineering Beijing China
Modular exponentiation and scalar multiplication are important operations in most public-key cryptosystems, and their efficient computation is essential to cryptosystems. The shortest addition chain is one of the most... 详细信息
来源: 评论
A study on the impact of pre-trained model on Just-In-Time defect prediction  23
A study on the impact of pre-trained model on Just-In-Time d...
收藏 引用
23rd IEEE International Conference on software Quality, Reliability, and Security, QRS 2023
作者: Guo, Yuxiang Gao, Xiaopeng Zhang, Zhenyu Chan, W.K. Jiang, Bo Beihang University State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beijing China State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing China City University of Hong Kong Department of Computer Science Hong Kong
Previous researchers conducting Just-In-Time (JIT) defect prediction tasks have primarily focused on the performance of individual pre-trained models, without exploring the relationship between different pre-trained m... 详细信息
来源: 评论
IoTAEG: Automatic Exploit Generation of IoT Devices  4
IoTAEG: Automatic Exploit Generation of IoT Devices
收藏 引用
2023 4th International Conference on computer Engineering and Intelligent Control, ICCEIC 2023
作者: Wang, Yu Li, Zhoujun Zhang, Yipeng Zhai, You Beihang University State Key Lab of Software Development Environment Beijing China North China University of Technology School of Information Science and Technology Beijing China
Automatic exploit generation (AEG) refers to the process of automatically finding the path in the program that can trigger vulnerabilities and generate exploits. Generally speaking, the process of finding vulnerabilit... 详细信息
来源: 评论
Aster: Encoding Data Augmentation Relations into Seed Test Suites for Robustness Assessment and Fuzzing of Data-Augmented Deep Learning Models  23
Aster: Encoding Data Augmentation Relations into Seed Test S...
收藏 引用
23rd IEEE International Conference on software Quality, Reliability, and Security, QRS 2023
作者: Wang, Haipeng Wei, Zhengyuan Zhou, Qilin Jiang, Bo Chan, W.K. City University of Hong Kong Hong Kong Beihang University State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beijing China
Data-augmented deep learning models are widely used in real-world applications. However, many state-of the-art loss-based or coverage-based fuzzing techniques fail to produce fuzzing samples for them from many seeds. ... 详细信息
来源: 评论
Light field super-resolution using complementary-view feature attention
收藏 引用
Computational Visual Media 2023年 第4期9卷 843-858页
作者: Wei Zhang Wei Ke Da Yang Hao Sheng Zhang Xiong Faculty of Applied Sciences Macao Polytechnic UniversityMacao SAR 999078China State Key Laboratory of Software Development Environment School of Computer Science and EngineeringBeihang UniversityBeijing 100191Chinaand Beihang Hangzhou Innovation Institute YuhangXixi Octagon CityYuhang DistrictHangzhou 310023China
Light field(LF)cameras record multiple perspectives by a sparse sampling of real scenes,and these perspectives provide complementary *** information is beneficial to LF super-resolution(LFSR).Compared with traditional... 详细信息
来源: 评论