咨询与建议

限定检索结果

文献类型

  • 2,171 篇 会议
  • 1,782 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 3,967 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,796 篇 工学
    • 2,086 篇 计算机科学与技术...
    • 1,714 篇 软件工程
    • 523 篇 信息与通信工程
    • 356 篇 控制科学与工程
    • 243 篇 生物工程
    • 214 篇 电子科学与技术(可...
    • 208 篇 电气工程
    • 174 篇 机械工程
    • 163 篇 光学工程
    • 129 篇 生物医学工程(可授...
    • 109 篇 仪器科学与技术
    • 109 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 96 篇 动力工程及工程热...
    • 79 篇 网络空间安全
    • 71 篇 建筑学
    • 69 篇 交通运输工程
    • 63 篇 土木工程
  • 1,282 篇 理学
    • 768 篇 数学
    • 272 篇 生物学
    • 246 篇 物理学
    • 200 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 121 篇 化学
  • 758 篇 管理学
    • 456 篇 管理科学与工程(可...
    • 345 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 104 篇 医学
    • 92 篇 临床医学
    • 74 篇 基础医学(可授医学...
  • 84 篇 法学
    • 63 篇 社会学
  • 57 篇 经济学
  • 38 篇 农学
  • 22 篇 教育学
  • 11 篇 艺术学
  • 9 篇 军事学
  • 8 篇 文学
  • 6 篇 哲学

主题

  • 102 篇 semantics
  • 69 篇 software enginee...
  • 67 篇 computer science
  • 65 篇 training
  • 62 篇 computational mo...
  • 58 篇 deep learning
  • 58 篇 data mining
  • 54 篇 web services
  • 50 篇 optimization
  • 49 篇 educational inst...
  • 49 篇 feature extracti...
  • 46 篇 algorithm design...
  • 46 篇 clustering algor...
  • 45 篇 machine learning
  • 45 篇 software
  • 40 篇 laboratories
  • 40 篇 cloud computing
  • 39 篇 data models
  • 38 篇 accuracy
  • 37 篇 quality of servi...

机构

  • 298 篇 state key labora...
  • 216 篇 school of comput...
  • 200 篇 state key labora...
  • 150 篇 state key labora...
  • 106 篇 state key labora...
  • 89 篇 state key labora...
  • 86 篇 school of comput...
  • 85 篇 state key lab. o...
  • 74 篇 state key lab of...
  • 71 篇 school of comput...
  • 69 篇 computer school ...
  • 65 篇 state key lab. f...
  • 57 篇 university of ch...
  • 52 篇 school of comput...
  • 49 篇 state key labora...
  • 46 篇 state key labora...
  • 45 篇 school of comput...
  • 43 篇 state key labora...
  • 40 篇 department of co...
  • 40 篇 international sc...

作者

  • 41 篇 huang di
  • 41 篇 xiao limin
  • 35 篇 gao yang
  • 35 篇 shi yinghuan
  • 32 篇 liu jin
  • 31 篇 limin xiao
  • 30 篇 ruan li
  • 27 篇 dou wanchun
  • 23 篇 bai xiao
  • 22 篇 tao dacheng
  • 22 篇 xu xiaolong
  • 21 篇 he keqing
  • 21 篇 zhao jian
  • 21 篇 qi lianyong
  • 21 篇 li yuanxiang
  • 21 篇 qi lei
  • 20 篇 shen furao
  • 20 篇 li bing
  • 20 篇 he yanxiang
  • 20 篇 du bo

语言

  • 3,637 篇 英文
  • 226 篇 其他
  • 105 篇 中文
  • 1 篇 法文
检索条件"机构=State Key Lab of Software Engineering and School of Computer"
3967 条 记 录,以下是341-350 订阅
排序:
ProCQA: A Large-scale Community-based Programming Question Answering Dataset for Code Search
arXiv
收藏 引用
arXiv 2024年
作者: Li, Zehan Zhang, Jianfei Yin, Chuantao Ouyang, Yuanxin Rong, Wenge State Key Laboratory of Complex & Critical Software Environment Beihang University China Sino-French Engineer School Beihang University China School of Computer Science and Engineering Beihang University China
Retrieval-based code question answering seeks to match user queries in natural language to relevant code snippets. Previous approaches typically rely on pretraining models using crafted bi-modal and uni-modal datasets... 详细信息
来源: 评论
Automated Order Dispatching Strategies Design Using Genetic Programming for Dynamic Ridesharing Problem
Automated Order Dispatching Strategies Design Using Genetic ...
收藏 引用
2023 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2023
作者: Fan, Chong-Jiong Jia, Ya-Hui Chen, Wei-Neng School of Computer Science and Engineering South China University of Technology State Key Laboratory of Subtropical Building and Urban Science Guangzhou510006 China School of Future Technology South China University of Technology Guangzhou510641 China Pazhou Lab Guangzhou510330 China
Ridesharing is a popular transportation mode and has become an important part of smart city development, which helps alleviate the pressure of urban travel. The ridesharing problem (RSP) is mainly to match drivers to ...
来源: 评论
Diffusion-4K: Ultra-High-Resolution Image Synthesis with Latent Diffusion Models
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Jinjin Huang, Qiuyu Liu, Junjie Guo, Xiefan Huang, Di State Key Laboratory of Complex and Critical Software Environment Beihang University Beijing100191 China School of Computer Science and Engineering Beihang University Beijing100191 China Meituan China
In this paper, we present Diffusion-4K, a novel framework for direct ultra-high-resolution image synthesis using text-to-image diffusion models. The core advancements include: (1) Aesthetic-4K Benchmark: addressing th... 详细信息
来源: 评论
Safe and robust subgame exploitation in imperfect information games  24
Safe and robust subgame exploitation in imperfect informatio...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Zhenxing Ge Zheng Xu Tianyu Ding Linjian Meng Bo An Wenbin Li Yang Gao State Key Laboratory for Novel Software Technology Nanjing University Nanjing Jiangsu China and School of Computer Science and Engineering Nanyang Technological University Singapore State Key Laboratory for Novel Software Technology Nanjing University Nanjing Jiangsu China Microsoft Corporation Redmond Washington Skywork AI Singapore and School of Computer Science and Engineering Nanyang Technological University Singapore State Key Laboratory for Novel Software Technology Nanjing University Nanjing Jiangsu China and School of Intelligence Science and Technology Nanjing University Suzhou Campus Suzhou Jiangsu China
Opponent exploitation is an important task for players to exploit the weaknesses of others in games. Existing approaches mainly focus on balancing between exploitation and exploitability but are often vulnerable to mo...
来源: 评论
RF-Boundary: RFID-Based Virtual Boundary
RF-Boundary: RFID-Based Virtual Boundary
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Xiaoyu Li Jia Liu Xuan Liu Yanyan Wang Shigeng Zhang Baoliu Ye Lijun Chen State Key Laboratory for Novel Software Technology Nanjing University China College of Computer Science and Electronic Engineering Hunan University China College of Computer and Information Hohai University China School of Computer Science and Engineering Central South University China
A boundary is a physical or virtual line that marks the edge or limit of a specific region, which has been widely used in many applications, such as autonomous driving, virtual wall, and robotic lawn mowers. However, ... 详细信息
来源: 评论
Learning Transferable Negative Prompts for Out-of-Distribution Detection
Learning Transferable Negative Prompts for Out-of-Distributi...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Tianqi Li Guansong Pang Xiao Bai Wenjun Miao Jin Zheng State Key Laboratory of Complex & Critical Software Environment School of Computer Science and Engineering Jiangxi Research Institute Beihang University China School of Computing and Information Systems Singapore Management University
Existing prompt learning methods have shown certain capabilities in Out-of-Distribution (OOD) detection, but the lack of OOD images in the target dataset in their training can lead to mismatches between OOD images and... 详细信息
来源: 评论
Generating Action-conditioned Prompts for Open-vocabulary Video Action Recognition  24
Generating Action-conditioned Prompts for Open-vocabulary Vi...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Jia, Chengyou Luo, Minnan Chang, Xiaojun Dang, Zhuohang Han, Mingfei Wang, Mengmeng Dai, Guang Dang, Sizhe Wang, Jingdong School of Computer Science and Technology MOEKLINNS Lab Xi'an Jiaotong University Shaanxi Xi'an China University of Science and Technology of China Anhui Hefei China School of Computer Science and Technology Xi'an Jiaotong University Shaanxi Xi'an China ReLER Lab AAII University of Technology Sydney SydneyNSW Australia Zhejiang University of Technology College of Computer Science and Technology China SGIT AI Lab State Grid Corporation of China Beijing China Baidu Inc Beijing China United Arab Emirates Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Xi'an710049 China SGIT AI Lab State Grid Corporation of China China School of Computer Science and Technology Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an710049 China
Exploring open-vocabulary video action recognition is a promising venture, which aims to recognize previously unseen actions within any arbitrary set of categories. Existing methods typically adapt pretrained image-te... 详细信息
来源: 评论
Investigating the Impact of Bug Dependencies on Bug-Fixing Time Prediction
Investigating the Impact of Bug Dependencies on Bug-Fixing T...
收藏 引用
International Symposium on Empirical software engineering and Measurement, ESEM
作者: Chenglin Li Yangyang Zhao Yibiao Yang Yuming Zhou Liming Nie Zuohua Ding School of Computer Science and Technology Zhejiang Sci-Tech University Hangzhou China State Key Lab for Novel Software Technology Nanjing University Nanjing China School of Computer Science and Engineering Nanyang Technological University Singapore
Background: Bug dependencies refer to the link relationships between bugs and related issues, which are commonly observed in software evolution. It has been found that bugs with bug dependencies often take longer time...
来源: 评论
Clothed Human Performance Capture with a Double-layer Neural Radiance Fields
Clothed Human Performance Capture with a Double-layer Neural...
收藏 引用
2023 IEEE/CVF Conference on computer Vision and Pattern Recognition, CVPR 2023
作者: Wang, Kangkan Zhang, Guofeng Cong, Suxu Yang, Jian Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education China Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology China State Key Laboratory of CAD&CG Zhejiang University China
This paper addresses the challenge of capturing performance for the clothed humans from sparse-view or monocular videos. Previous methods capture the performance of full humans with a personalized template or recover ... 详细信息
来源: 评论
Palmprint Anti-spoofing via Frequency Enhancement and Selection  18th
Palmprint Anti-spoofing via Frequency Enhancement and Select...
收藏 引用
18th Chinese Conference on Biometric Recognition, CCBR 2024
作者: Ren, Yani Shao, Huikai Zhong, Dexing School of Automation Science and Engineering Xi’an Jiaotong University Shaanxi Xi’an710049 China State Key Lab. for Novel Software Technology Nanjing University Jiangsu NanJing210000 China Xi’an Yizhanghui Technology Co. Shannxi Xi’an712000 China Pazhou Lab Guangzhou510335 China Research Institute of Xi’an Jiaotong University Zhejiang311215 China
Palmprint recognition has attracted considerable interest from researchers as a convenient and secure biometric identification technology. The majority of research on palmprint recognition focuses on enhancing recogni... 详细信息
来源: 评论