咨询与建议

限定检索结果

文献类型

  • 2,171 篇 会议
  • 1,782 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 3,967 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,796 篇 工学
    • 2,086 篇 计算机科学与技术...
    • 1,714 篇 软件工程
    • 523 篇 信息与通信工程
    • 356 篇 控制科学与工程
    • 243 篇 生物工程
    • 214 篇 电子科学与技术(可...
    • 208 篇 电气工程
    • 174 篇 机械工程
    • 163 篇 光学工程
    • 129 篇 生物医学工程(可授...
    • 109 篇 仪器科学与技术
    • 109 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 96 篇 动力工程及工程热...
    • 79 篇 网络空间安全
    • 71 篇 建筑学
    • 69 篇 交通运输工程
    • 63 篇 土木工程
  • 1,282 篇 理学
    • 768 篇 数学
    • 272 篇 生物学
    • 246 篇 物理学
    • 200 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 121 篇 化学
  • 758 篇 管理学
    • 456 篇 管理科学与工程(可...
    • 345 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 104 篇 医学
    • 92 篇 临床医学
    • 74 篇 基础医学(可授医学...
  • 84 篇 法学
    • 63 篇 社会学
  • 57 篇 经济学
  • 38 篇 农学
  • 22 篇 教育学
  • 11 篇 艺术学
  • 9 篇 军事学
  • 8 篇 文学
  • 6 篇 哲学

主题

  • 102 篇 semantics
  • 69 篇 software enginee...
  • 67 篇 computer science
  • 65 篇 training
  • 62 篇 computational mo...
  • 58 篇 deep learning
  • 58 篇 data mining
  • 54 篇 web services
  • 50 篇 optimization
  • 49 篇 educational inst...
  • 49 篇 feature extracti...
  • 46 篇 algorithm design...
  • 46 篇 clustering algor...
  • 45 篇 machine learning
  • 45 篇 software
  • 40 篇 laboratories
  • 40 篇 cloud computing
  • 39 篇 data models
  • 38 篇 accuracy
  • 37 篇 quality of servi...

机构

  • 298 篇 state key labora...
  • 216 篇 school of comput...
  • 200 篇 state key labora...
  • 150 篇 state key labora...
  • 106 篇 state key labora...
  • 89 篇 state key labora...
  • 86 篇 school of comput...
  • 85 篇 state key lab. o...
  • 74 篇 state key lab of...
  • 71 篇 school of comput...
  • 69 篇 computer school ...
  • 65 篇 state key lab. f...
  • 57 篇 university of ch...
  • 52 篇 school of comput...
  • 49 篇 state key labora...
  • 46 篇 state key labora...
  • 45 篇 school of comput...
  • 43 篇 state key labora...
  • 40 篇 department of co...
  • 40 篇 international sc...

作者

  • 41 篇 huang di
  • 41 篇 xiao limin
  • 35 篇 gao yang
  • 35 篇 shi yinghuan
  • 32 篇 liu jin
  • 31 篇 limin xiao
  • 30 篇 ruan li
  • 27 篇 dou wanchun
  • 23 篇 bai xiao
  • 22 篇 tao dacheng
  • 22 篇 xu xiaolong
  • 21 篇 he keqing
  • 21 篇 zhao jian
  • 21 篇 qi lianyong
  • 21 篇 li yuanxiang
  • 21 篇 qi lei
  • 20 篇 shen furao
  • 20 篇 li bing
  • 20 篇 he yanxiang
  • 20 篇 du bo

语言

  • 3,637 篇 英文
  • 226 篇 其他
  • 105 篇 中文
  • 1 篇 法文
检索条件"机构=State Key Lab of Software Engineering and School of Computer"
3967 条 记 录,以下是471-480 订阅
排序:
Centerness-based Instance-aware Knowledge Distillation with Task-wise Mutual Lifting for Object Detection on Drone Imagery
arXiv
收藏 引用
arXiv 2024年
作者: Du, Bowei Liao, Zhixuan Zhang, Yanan Cai, Zhi Chen, Jiaxin Huang, Di State Key Laboratory of Software Development Environment Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China Hangzhou Innovation Institute Beihang University Hangzhou China
Developing accurate and efficient detectors for drone imagery is challenging due to the inherent complexity of aerial scenes. While some existing methods aim to achieve high accuracy by utilizing larger models, their ... 详细信息
来源: 评论
JKT: A joint graph convolutional network based Deep Knowledge Tracing
收藏 引用
INFORMATION SCIENCES 2021年 580卷 510-523页
作者: Song, Xiangyu Li, Jianxin Tang, Yifu Zhao, Taige Chen, Yunliang Guan, Ziyu [a]School of IT Faculty of Science Engineering and Built Environment Deakin University Geelong VIC 3220 Australia [b]China University of Geosciences China [c]State Key Lab of ISN School of Computer Science and Technology Xidian University Xi’an China
Knowledge Tracing (KT) aims to trace the student's state of evolutionary mastery for a particular knowledge or concept based on the student's historical learning interactions with the corresponding exercises. ... 详细信息
来源: 评论
Bridging Trajectory-Aware Evolutionary Graph Learning and Large Language Models for Enhancing Navigability in Social Internet of Things
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Bi, Xin Han, Zhubin Yao, Xin Zhao, Xiangguo Wang, Yu-Ping Yuan, Ye State Key Laboratory of Intelligent Deep Metal Mining and Equipment China Northeastern University School of Computer Science and Engineering Shenyang110819 China Northeastern University College of Software Shenyang110819 China Beijing Institute of Technology School of Computer Science and Technology Beijing100091 China
Social Internet of Things (SIoT) has emerged as a novel paradigm that enhances IoT service capabilities by leveraging device-level social relationships. However, the explosive growth of heterogeneous devices, the dyna... 详细信息
来源: 评论
Meta Computing-Driven Optimization of AoI in Industrial IoT: A Hybrid Scheme with Self-Organizing Maps and Reinforcement Learning
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Wang, Min Wang, Yike Wang, Nuanlai Pang, Shanchen Sun, Xiaobing Li, Ming Yangzhou University School of Information Engineering Yangzhou225127 China College of Computer Science and Technology Qingdao China College of Computer Science and Technology China State Key Laboratory of Chemical Safety Shandong Key Laboratory of Intelligent Oil and Gas Industrial Software China Shandong Inspur Database Technology Co. Ltd Jinan250101 China
In the domain of Industrial Internet of Things (IIoT) applications, methodologies such as meta computing are essential for ensuring timely and efficient data acquisition within intricate environments characterized by ... 详细信息
来源: 评论
Graph Contrastive Learning with Cohesive Subgraph Awareness
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Yucheng Han, Xiao Wang, Leye Ye, Han-Jia Key Lab of High Confidence Software Technologies Peking University Ministry of Education School of Computer Science Peking University Beijing China School of Information Management and Engineering Shanghai University of Finance and Economics Shanghai China National Key Laboratory for Novel Software Technology Nanjing University School of Artificial Intelligence Nanjing University Nanjing China
Graph contrastive learning (GCL) has emerged as a state-of-the-art strategy for learning representations of diverse graphs including social and biomedical networks. GCL widely uses stochastic graph topology augmentati... 详细信息
来源: 评论
Fidelity-Preserved Reversible Data Hiding in JPEG Images Based on Adaptive Position Selection  8th
Fidelity-Preserved Reversible Data Hiding in JPEG Images Bas...
收藏 引用
8th International Conference on Artificial Intelligence and Security , ICAIS 2022
作者: Yue, Zhen Ren, Hua Li, Ming Liang, Cun-liang Hai, Ben-zhai Li, Rui-ping Faculty of Education Henan Normal University Henan Xinxiang453007 China Beijing Key Lab of Intelligent Telecommunication Software and Multimedia School of Computer Beijing University of Posts and Telecommunications Beijing100876 China College of Computer and Information Engineering Henan Normal University Xinxiang453007 China
Reversible data hiding (RDH) in JPEG images has gained considerable attention from scholars in recent years. However, it is not easy for JPEG images to exploit the pixel redundancy for RDH design like uncompressed ima... 详细信息
来源: 评论
MEC-Enabled Cooperative Rendering in Metaverse: A Coalition Formation Game Approach
MEC-Enabled Cooperative Rendering in Metaverse: A Coalition ...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Mengzhen Cheng Zhou Su Yuan Wu Qichao Xu Minghui Dai Dongfeng Fang School of Mechatronic Engineering and Automation Shanghai University Shanghai China School of Cyber Science and Engineering Xi'an Jiaotong University Xi'an China State Key Laboratory of Internet of Things for Smart City University of Macau Macau China Department of Computer Science and Software Engineering California Polytechnic State University USA
Virtual Reality (VR) paves the way to link Meta-verse and the real world, allowing users to enjoy immersive experiences. However, delivering high-quality full spherical VR service within limited rendering energy is a ... 详细信息
来源: 评论
Sybil attack simulation on Enhanced IdAPoS protocol with different network topology
Sybil attack simulation on Enhanced IdAPoS protocol with dif...
收藏 引用
International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI)
作者: Shengyu Chen Shenghao Jin Yigang Wei Hui Zhang State Key Laboratory of Complex & Critical Software Environment School of Computer Science & Engineering Beihang University Beijing People’s Republic of China School of economics and management Beihang University Beijing People’s Republic of China
This study mainly focus on Sybil attacks with the Identity-Augmented Proof-of-Stake (IdAPoS) protocol under different network topologies, including random, scale-free, and hierarchical networks. The study finds that s... 详细信息
来源: 评论
Off-OAB: Off-Policy Policy Gradient Method with Optimal Action-Dependent Baseline
arXiv
收藏 引用
arXiv 2024年
作者: Meng, Wenjia Zheng, Qian Yang, Long Yin, Yilong Pan, Gang The School of Software Shandong University Jinan250000 China The School of Artificial Intelligence Peking University China The State Key Lab of Brain-Machine Intelligence College of Computer Science and Technology Zhejiang University Hangzhou310000 China
Policy-based methods have achieved remarkable success in solving challenging reinforcement learning problems. Among these methods, off-policy policy gradient methods are particularly important due to that they can ben... 详细信息
来源: 评论
Pseudo label Refinery for Unsupervised Domain Adaptation on Cross-Dataset 3D Object Detection
Pseudo Label Refinery for Unsupervised Domain Adaptation on ...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Zhanwei Zhang Minghao Chen Shuai Xiao Liang Peng Hengjia Li Binbin Lin Ping Li Wenxiao Wang Boxi Wu Deng Cai State Key Lab of CAD&CG Zhejiang University Fabu Inc. School of Computer Sciene and Technology Hangzhou Dianzi University Alibaba Group School of Software Technology Zhejiang University Fullong Inc.
Recent self-training techniques have shown notable improvements in unsupervised domain adaptation for 3D object detection (3D UDA). These techniques typically select pseudo labels, i.e., 3D boxes, to supervise models ... 详细信息
来源: 评论