咨询与建议

限定检索结果

文献类型

  • 2,171 篇 会议
  • 1,782 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 3,967 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,796 篇 工学
    • 2,086 篇 计算机科学与技术...
    • 1,714 篇 软件工程
    • 523 篇 信息与通信工程
    • 356 篇 控制科学与工程
    • 243 篇 生物工程
    • 214 篇 电子科学与技术(可...
    • 208 篇 电气工程
    • 174 篇 机械工程
    • 163 篇 光学工程
    • 129 篇 生物医学工程(可授...
    • 109 篇 仪器科学与技术
    • 109 篇 化学工程与技术
    • 101 篇 材料科学与工程(可...
    • 96 篇 动力工程及工程热...
    • 79 篇 网络空间安全
    • 71 篇 建筑学
    • 69 篇 交通运输工程
    • 63 篇 土木工程
  • 1,282 篇 理学
    • 768 篇 数学
    • 272 篇 生物学
    • 246 篇 物理学
    • 200 篇 统计学(可授理学、...
    • 132 篇 系统科学
    • 121 篇 化学
  • 758 篇 管理学
    • 456 篇 管理科学与工程(可...
    • 345 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 104 篇 医学
    • 92 篇 临床医学
    • 74 篇 基础医学(可授医学...
  • 84 篇 法学
    • 63 篇 社会学
  • 57 篇 经济学
  • 38 篇 农学
  • 22 篇 教育学
  • 11 篇 艺术学
  • 9 篇 军事学
  • 8 篇 文学
  • 6 篇 哲学

主题

  • 102 篇 semantics
  • 69 篇 software enginee...
  • 67 篇 computer science
  • 65 篇 training
  • 62 篇 computational mo...
  • 58 篇 deep learning
  • 58 篇 data mining
  • 54 篇 web services
  • 50 篇 optimization
  • 49 篇 educational inst...
  • 49 篇 feature extracti...
  • 46 篇 algorithm design...
  • 46 篇 clustering algor...
  • 45 篇 machine learning
  • 45 篇 software
  • 40 篇 laboratories
  • 40 篇 cloud computing
  • 39 篇 data models
  • 38 篇 accuracy
  • 37 篇 quality of servi...

机构

  • 298 篇 state key labora...
  • 216 篇 school of comput...
  • 200 篇 state key labora...
  • 150 篇 state key labora...
  • 106 篇 state key labora...
  • 89 篇 state key labora...
  • 86 篇 school of comput...
  • 85 篇 state key lab. o...
  • 74 篇 state key lab of...
  • 71 篇 school of comput...
  • 69 篇 computer school ...
  • 65 篇 state key lab. f...
  • 57 篇 university of ch...
  • 52 篇 school of comput...
  • 49 篇 state key labora...
  • 46 篇 state key labora...
  • 45 篇 school of comput...
  • 43 篇 state key labora...
  • 40 篇 department of co...
  • 40 篇 international sc...

作者

  • 41 篇 huang di
  • 41 篇 xiao limin
  • 35 篇 gao yang
  • 35 篇 shi yinghuan
  • 32 篇 liu jin
  • 31 篇 limin xiao
  • 30 篇 ruan li
  • 27 篇 dou wanchun
  • 23 篇 bai xiao
  • 22 篇 tao dacheng
  • 22 篇 xu xiaolong
  • 21 篇 he keqing
  • 21 篇 zhao jian
  • 21 篇 qi lianyong
  • 21 篇 li yuanxiang
  • 21 篇 qi lei
  • 20 篇 shen furao
  • 20 篇 li bing
  • 20 篇 he yanxiang
  • 20 篇 du bo

语言

  • 3,637 篇 英文
  • 226 篇 其他
  • 105 篇 中文
  • 1 篇 法文
检索条件"机构=State Key Lab of Software Engineering and School of Computer"
3967 条 记 录,以下是591-600 订阅
排序:
StencilMART: Predicting Optimization Selection for Stencil Computations across GPUs
StencilMART: Predicting Optimization Selection for Stencil C...
收藏 引用
International Symposium on Parallel and Distributed Processing (IPDPS)
作者: Qingxiao Sun Yi Liu Hailong Yang Zhonghui Jiang Zhongzhi Luan Depei Qian State Key Laboratory of Software Development Environment Beijing China School of Computer Science and Engineering Beihang University Beijing China
Stencil computations are widely used in high performance computing (HPC) applications. Many HPC platforms utilize the high computation capability of GPUs to accelerate stencil computations. In recent years, stencils h... 详细信息
来源: 评论
TUBENCH: BENCHMARKING LARGE VISION-LANGUAGE MODELS ON TRUSTWORTHINESS WITH UNANSWERABLE QUESTIONS
arXiv
收藏 引用
arXiv 2024年
作者: He, Xingwei Zhang, Qianru Jin, A-Long Yuan, Yuan Yiu, Siu-Ming The University of Hong Kong Hong Kong Xi’an Jiaotong-Liverpool University China School of Computer Science and Engineering Beihang University Beijing China State Key Laboratory of Software Development Environment China Zhongguancun Laboratory China
Large Vision-Language Models (LVLMs) have achieved remarkable progress on visual perception and linguistic interpretation. Despite their impressive capabilities across various tasks, LVLMs still suffer from the issue ... 详细信息
来源: 评论
Imperceptible Face Forgery Attack via Adversarial Semantic Mask
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Decheng Su, Qixuan Peng, Chunlei Wang, Nannan Gao, Xinbo State Key Laboratory of Integrated Services Networks School of Cyber Engineering Xidian University Shaanxi Xi’an710071 China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai201112 China State Key Laboratory of Integrated Services Networks School of Telecommunications Engineering Xidian University Shaanxi Xi’an710071 China Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications Chongqing400065 China
With the great development of generative model techniques, face forgery detection draws more and more attention in the related field. Researchers find that existing face forgery models are still vulnerable to adversar... 详细信息
来源: 评论
Solving Math Word Problems Following Logically Consistent Template
Solving Math Word Problems Following Logically Consistent Te...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Zeyu Huang Xiaofeng Zhang Jun Bai Wenge Rong Yuanxin Ouyang Zhang Xiong State Key Laboratory of Software Development Environment Beihang University Beijing China Sino-French Engineer School Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China
Solving math word problems (MWPs) is a challenging task. Some existing solvers retrieve textually similar problems and draw on their solutions to solve the given problem. However, textually similar questions are not g...
来源: 评论
Disentangled Hypergraph Collaborative Filtering for Social Recommendation
Disentangled Hypergraph Collaborative Filtering for Social R...
收藏 引用
IEEE International Conference on Web Services (ICWS)
作者: Xiao Liu Shunmei Meng Qianmu Li Xiaolong Xu Lianyong Qi Wanchun Dou Jing Zhang Xuyun Zhang Nanjing University of Science and Technology China State Key Lab. for Novel Software Technology Nanjing University China School of Computer and Software Nanjing University of Information Science and Technology China College of Computer Science and Technology China University of Petroleum (East China) China School of Cyber Science and Engineering Southeast University China School of Computing Macquarie University Australia
In the current era of information overload, service recommendations have emerged as a valuable tool for enhancing the user experience. Among them, social recommendation models have shown promising results by incorpora...
来源: 评论
Neuro-symbolic learning yielding logical constraints  23
Neuro-symbolic learning yielding logical constraints
收藏 引用
Proceedings of the 37th International Conference on Neural Information Processing Systems
作者: Zenan Li Yunpeng Huang Zhaoyu Li Yuan Yao Jingwei Xu Taolue Chen Xiaoxing Ma Jian Lü State Key Lab of Novel Software Technology Nanjing University China Department of Computer Science University of Toronto Canada School of Computing and Mathematical Sciences Birkbeck University of London UK
Neuro-symbolic systems combine neural perception and logical reasoning, representing one of the priorities of AI research. End-to-end learning of neuro-symbolic systems is highly desirable, but remains to be challengi...
来源: 评论
Subgraph-Oriented Heterogeneous Drug-Target Interaction Identification
Subgraph-Oriented Heterogeneous Drug-Target Interaction Iden...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Xiaofeng Zhang Zeyu Huang Jun Bai Wenge Rong Yuanxin Ouyang Zhang Xiong State Key Laboratory of Software Development Environment Beihang University Beijing China Sino-French Engineer School Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China
Drug-target interaction (DTI) is an important task in drug discovery and drug repurposing. Currently, most methods utilizing drug-based and protein-based similarity values to predict DTIs achieve promising results. Ho...
来源: 评论
Graph-based Multi-view Clustering for Web services
Graph-based Multi-view Clustering for Web services
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Wang Yang Yuan Zhenzhen Kang Guosheng Cao Buqing Liu JianXun Xiao Yong HNUST Xiangtan China Hunan Provincial Key Lab. for Services Computing and Novel Software Technology Hunan University of Science and Technology Xiangtan China School of Computer Science and Engineering
The number of Web services on the Internet has been steadily increasing in recent years due to their growing popularity. Under the big data environment, how to effectively manage Web services is of significance for se...
来源: 评论
The Power of Age-based Reward in Fresh Information Acquisition
The Power of Age-based Reward in Fresh Information Acquisiti...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Zhiyuan Wang Qingkai Meng Shan Zhang Hongbin Luo School of Computer Science and Engineering Beihang University Beijing China State Key Laboratory of Virtual Reality Technology and Systems Beihang University Institute of Artificial Intelligence Beihang University Beijing China State Key Laboratory of Software Development Environment
Many Internet platforms collect fresh information of various points of interest (PoIs) relying on users who happen to be nearby the PoIs. The platform will offer reward to incentivize users and compensate their costs ...
来源: 评论
On Efficient Packet Batching and Resource Allocation for GPU based NFV Acceleration
On Efficient Packet Batching and Resource Allocation for GPU...
收藏 引用
International Workshop on Quality of Service
作者: Deze Zeng Andong Zhu Lin Gu Quan Chen Minyi Guo School of Computer Science China University of Geosciences Wuhan Hubei China State Key Lab. for Novel Software Technology Nanjing University Nanjing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China
Network Function Virtualization (NFV) has already become an essential technology for improving the scalability and flexibility of modern computer networks. The performance gap has become the main issue that impedes th...
来源: 评论