咨询与建议

限定检索结果

文献类型

  • 2,131 篇 会议
  • 1,783 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 3,928 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,774 篇 工学
    • 2,063 篇 计算机科学与技术...
    • 1,712 篇 软件工程
    • 528 篇 信息与通信工程
    • 331 篇 控制科学与工程
    • 242 篇 生物工程
    • 222 篇 电气工程
    • 217 篇 电子科学与技术(可...
    • 176 篇 机械工程
    • 164 篇 光学工程
    • 128 篇 生物医学工程(可授...
    • 109 篇 仪器科学与技术
    • 107 篇 化学工程与技术
    • 100 篇 材料科学与工程(可...
    • 98 篇 动力工程及工程热...
    • 81 篇 网络空间安全
    • 72 篇 交通运输工程
    • 68 篇 建筑学
    • 60 篇 土木工程
  • 1,291 篇 理学
    • 772 篇 数学
    • 276 篇 生物学
    • 249 篇 物理学
    • 205 篇 统计学(可授理学、...
    • 130 篇 系统科学
    • 119 篇 化学
  • 761 篇 管理学
    • 459 篇 管理科学与工程(可...
    • 346 篇 图书情报与档案管...
    • 156 篇 工商管理
  • 103 篇 医学
    • 91 篇 临床医学
    • 74 篇 基础医学(可授医学...
  • 82 篇 法学
    • 62 篇 社会学
  • 58 篇 经济学
  • 39 篇 农学
  • 23 篇 教育学
  • 11 篇 艺术学
  • 9 篇 军事学
  • 8 篇 文学
  • 6 篇 哲学

主题

  • 102 篇 semantics
  • 69 篇 software enginee...
  • 66 篇 computer science
  • 66 篇 training
  • 63 篇 computational mo...
  • 59 篇 data mining
  • 54 篇 web services
  • 53 篇 deep learning
  • 50 篇 optimization
  • 50 篇 feature extracti...
  • 49 篇 educational inst...
  • 46 篇 algorithm design...
  • 46 篇 machine learning
  • 45 篇 clustering algor...
  • 45 篇 software
  • 40 篇 laboratories
  • 40 篇 cloud computing
  • 39 篇 data models
  • 37 篇 quality of servi...
  • 36 篇 authentication

机构

  • 292 篇 state key labora...
  • 215 篇 school of comput...
  • 202 篇 state key labora...
  • 150 篇 state key labora...
  • 106 篇 state key labora...
  • 90 篇 state key labora...
  • 89 篇 school of comput...
  • 85 篇 state key lab. o...
  • 74 篇 state key lab of...
  • 70 篇 school of comput...
  • 69 篇 computer school ...
  • 63 篇 state key lab. f...
  • 57 篇 university of ch...
  • 53 篇 school of comput...
  • 49 篇 state key labora...
  • 46 篇 state key labora...
  • 43 篇 state key labora...
  • 43 篇 school of comput...
  • 41 篇 department of co...
  • 40 篇 international sc...

作者

  • 41 篇 xiao limin
  • 40 篇 huang di
  • 35 篇 gao yang
  • 35 篇 shi yinghuan
  • 32 篇 liu jin
  • 31 篇 limin xiao
  • 30 篇 ruan li
  • 26 篇 dou wanchun
  • 22 篇 zhao jian
  • 22 篇 tao dacheng
  • 22 篇 bai xiao
  • 21 篇 he keqing
  • 21 篇 li bing
  • 21 篇 li yuanxiang
  • 21 篇 qi lei
  • 20 篇 shen furao
  • 20 篇 jin liu
  • 20 篇 du bo
  • 19 篇 qi lianyong
  • 19 篇 xu baowen

语言

  • 3,693 篇 英文
  • 133 篇 其他
  • 103 篇 中文
  • 1 篇 法文
检索条件"机构=State Key Lab of Software Engineering and School of Computer"
3928 条 记 录,以下是41-50 订阅
排序:
Towards Expanding Precise Timing for Collaborative Its with Deterministic Communications in 6G
Towards Expanding Precise Timing for Collaborative Its with ...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Hongxing Li Haotian Li Qianhan Gao Guochu Shou Yaqiong Liu Zhigang Guo Yihong Hu State Key Laboratory of Networking and Switching Technology School of Computer Science (National Pilot Software Engineering School) Beijing Key Laboratory of Network System Architecture and Convergence School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China
The demand for precise timing continues to grow with the rapid development of smart cities, where intelligent transportation emerges as a critical application heavily dependent on accurate time distribution. Determini... 详细信息
来源: 评论
On Optimizing Inter-and Intra-Chiplet Interconnection Topologies for Robust Multi-Chiplet Systems
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Wang, Xiaohang Xu, Miao Singh, Amit Kumar Jiang, Yingtao Yang, Mei Zhejiang University State Key Laboratory of Blockchain and Data Security China Hangzhou China South China University of Technology School of Software Engineering China University of Essex School of Computer Science and Electronic Engineering United Kingdom University of Nevada Department of Electrical and Computer Engineering Las Vegas United States
Inter-and intra-chiplet interconnection networks play a vital role in the operation of many core systems made of multiple chiplets. However, these networks are susceptible to faults caused by manufacturing defects and... 详细信息
来源: 评论
Anomize: Better Open Vocabulary Video Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Li, Fei Liu, Wenxuan Chen, Jingjing Zhang, Ruixu Wang, Yuran Zhong, Xian Wang, Zheng National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University China Shanghai Key Lab of Intelligent Information Processing School of Computer Science Fudan University China State Key Laboratory for Multimedia Information Processing School of Computer Science Peking University China Hubei Key Laboratory of Transportation Internet of Things Wuhan University of Technology China
Open Vocabulary Video Anomaly Detection (OVVAD) seeks to detect and classify both base and novel anomalies. However, existing methods face two specific challenges related to novel anomalies. The first challenge is det...
来源: 评论
A comprehensive survey on shadow removal from document images: datasets, methods, and opportunities
收藏 引用
Vicinagearth 2025年 第1期2卷 1-18页
作者: Wang, Bingshu Li, Changping Zou, Wenbin Zhang, Yongjun Chen, Xuhang Chen, C.L. Philip School of Software Northwestern Polytechnical University Xi’an China Guangdong Provincial Key Laboratory of Intelligent Information Processing & Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing College of Electronics and Information Engineering Shenzhen University Shenzhen China Yongjun Zhang is with the State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang China School of Computer Science and Engineering Huizhou University Huizhou China School of Computer Science and Engineering South China University of Technology and Pazhou Lab Guangzhou China
With the rapid development of document digitization, people have become accustomed to capturing and processing documents using electronic devices such as smartphones. However, the captured document images often suffer...
来源: 评论
CoSDH: Communication-Efficient Collaborative Perception via Supply-Demand Awareness and Intermediate-Late Hybridization
arXiv
收藏 引用
arXiv 2025年
作者: Xu, Junhao Zhang, Yanan Cai, Zhi Huang, Di State Key Laboratory of Complex and Critical Software Environment Beihang University Beijing China School of Computer Science and Information Engineering Hefei University of Technology Hefei China
Multi-agent collaborative perception enhances perceptual capabilities by utilizing information from multiple agents and is considered a fundamental solution to the problem of weak single-vehicle perception in autonomo... 详细信息
来源: 评论
FAMC: Fair and Publicly Auditable Multi-Party Computation with Cheater Detection  26th
FAMC: Fair and Publicly Auditable Multi-Party Computation w...
收藏 引用
26th International Conference on Information and Communications Security, ICICS 2024
作者: Li, Yong Feng, Yueyang Chen, Xi Zhang, Jian Li, Ruxian Lv, Kewei Zhang, Dawei School of Electronic and Information Engineering Beijing Jiaotong University Beijing100044 China Linklogis Shenzhen518063 China State Key Lab of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100193 China School of Cyber Security University of Chinese Academy of Sciences Beijing101400 China School of Computer Science and Technology Beijing Jiaotong University Beijing100044 China
Secure multi-party computation (MPC) protocols do not completely prevent malicious parties from cheating. Though numerous researches on cheating detection are proposed, most cheater detection works do not guarantee fa... 详细信息
来源: 评论
Towards Training-free Anomaly Detection with Vision and Language Foundation Models
arXiv
收藏 引用
arXiv 2025年
作者: Zhang, Jinjin Wang, Guodong Jin, Yizhou Huang, Di State Key Laboratory of Complex and Critical Software Environment Beihang University Beijing100191 China School of Computer Science and Engineering Beihang University Beijing100191 China
Anomaly detection is valuable for real-world applications, such as industrial quality inspection. However, most approaches focus on detecting local structural anomalies while neglecting compositional anomalies incorpo... 详细信息
来源: 评论
Fairness-Aware Incentive Mechanism for Multi-Server Federated Learning in Edge-Enabled Wireless Networks with Differential Privacy
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Yang, Yu Peng, Kai Wang, Shangguang Xu, Xiaolong Xiao, Peiyun Leung, Victor C.M Huaqiao University College of Engineering Quanzhou362021 China Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China Nanjing University of Information Science and Technology School of Software Nanjing China Nanjing University State Key Lab. for Novel Software Technology Nanjing210093 China Shenzhen University College of the Computer Science and Software Engineering Shenzhen518060 China University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada
As a distributed machine learning method, federated learning (FL) can collaboratively train a global model with multiple devices without sharing the original data, thus protecting certain privacy. However, due to the ... 详细信息
来源: 评论
Constructing A Theoretical Model to Bridge Neural Transition with a state Switch in Bipolar Disorder
收藏 引用
Neuroscience Bulletin 2025年 第1期41卷 181-185页
作者: Xiaonan Guo Lizichen Chen Jianbo Lai Shaohua Hu Department of Psychiatry the First Affiliated HospitalZhejiang University School of MedicineHangzhou310003China Department of Engineering Mechanics Zhejiang UniversityHangzhou310027China Nanhu Brain-computer Interface Institute Hangzhou311100China The Zhejiang Key Laboratory of Precision Psychiatry Hangzhou310003China MOE Frontier Science Center for Brain Science and Brain-Machine Integration Zhejiang University School of MedicineHangzhou310003China Brain Research Institute of Zhejiang University Hangzhou310003China The State Key Lab of Brain-Machine Intelligence Zhejiang UniversityHangzhouChina Zhejiang Engineering Center for Mathematical Mental Health Hangzhou310003China
Reward or stress,which exists extensively,causes resilient emotional fluctuations under common ***,reward or stress is a typical trigger for manic or depressive episodes of bipolar disorder(BD),which is corroborated b... 详细信息
来源: 评论
Correcting Noisy Multilabel Predictions: Modeling label Noise through Latent Space Shifts
arXiv
收藏 引用
arXiv 2025年
作者: Huang, Weipeng Li, Qin Xiao, Yang Qiao, Cheng Cai, Tie Liang, Junwei Hurley, Neil J. Piao, Guangyuan School of Computer Science and Software Engineering Shenzhen Institute of Information Technology Guangdong China State Key Lab of Integrated Service Networks School of Cyber Engineering Xidian University Shaanxi China Cyberspace Institute of Advanced Technology Guangzhou University Guangdong China School of Computer Science University College Dublin Dublin Ireland
Noise in data appears to be inevitable in most realworld machine learning applications and would cause severe overfitting problems. Not only can data features contain noise, but labels are also prone to be noisy due t... 详细信息
来源: 评论