咨询与建议

限定检索结果

文献类型

  • 2,169 篇 会议
  • 1,777 篇 期刊文献
  • 14 册 图书

馆藏范围

  • 3,960 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,790 篇 工学
    • 2,079 篇 计算机科学与技术...
    • 1,725 篇 软件工程
    • 524 篇 信息与通信工程
    • 339 篇 控制科学与工程
    • 242 篇 生物工程
    • 215 篇 电子科学与技术(可...
    • 210 篇 电气工程
    • 174 篇 机械工程
    • 163 篇 光学工程
    • 129 篇 生物医学工程(可授...
    • 110 篇 仪器科学与技术
    • 109 篇 化学工程与技术
    • 100 篇 材料科学与工程(可...
    • 96 篇 动力工程及工程热...
    • 79 篇 网络空间安全
    • 74 篇 建筑学
    • 69 篇 交通运输工程
    • 67 篇 土木工程
  • 1,285 篇 理学
    • 772 篇 数学
    • 272 篇 生物学
    • 246 篇 物理学
    • 203 篇 统计学(可授理学、...
    • 131 篇 系统科学
    • 120 篇 化学
  • 761 篇 管理学
    • 456 篇 管理科学与工程(可...
    • 348 篇 图书情报与档案管...
    • 157 篇 工商管理
  • 103 篇 医学
    • 91 篇 临床医学
    • 74 篇 基础医学(可授医学...
  • 84 篇 法学
    • 63 篇 社会学
  • 57 篇 经济学
  • 38 篇 农学
  • 22 篇 教育学
  • 11 篇 艺术学
  • 9 篇 军事学
  • 8 篇 文学
  • 6 篇 哲学

主题

  • 102 篇 semantics
  • 69 篇 software enginee...
  • 67 篇 computer science
  • 66 篇 training
  • 63 篇 computational mo...
  • 58 篇 data mining
  • 57 篇 deep learning
  • 54 篇 web services
  • 50 篇 optimization
  • 49 篇 educational inst...
  • 49 篇 feature extracti...
  • 46 篇 algorithm design...
  • 45 篇 machine learning
  • 45 篇 clustering algor...
  • 45 篇 software
  • 40 篇 laboratories
  • 40 篇 cloud computing
  • 40 篇 data models
  • 38 篇 accuracy
  • 37 篇 quality of servi...

机构

  • 297 篇 state key labora...
  • 216 篇 school of comput...
  • 200 篇 state key labora...
  • 150 篇 state key labora...
  • 106 篇 state key labora...
  • 89 篇 state key labora...
  • 86 篇 school of comput...
  • 85 篇 state key lab. o...
  • 74 篇 state key lab of...
  • 71 篇 school of comput...
  • 69 篇 computer school ...
  • 65 篇 state key lab. f...
  • 57 篇 university of ch...
  • 52 篇 school of comput...
  • 49 篇 state key labora...
  • 46 篇 state key labora...
  • 45 篇 school of comput...
  • 43 篇 state key labora...
  • 41 篇 department of co...
  • 40 篇 international sc...

作者

  • 41 篇 huang di
  • 41 篇 xiao limin
  • 35 篇 gao yang
  • 35 篇 shi yinghuan
  • 32 篇 liu jin
  • 31 篇 limin xiao
  • 30 篇 ruan li
  • 26 篇 dou wanchun
  • 23 篇 bai xiao
  • 22 篇 zhao jian
  • 22 篇 tao dacheng
  • 21 篇 shen furao
  • 21 篇 he keqing
  • 21 篇 xu xiaolong
  • 21 篇 qi lei
  • 20 篇 qi lianyong
  • 20 篇 li bing
  • 20 篇 he yanxiang
  • 20 篇 li yuanxiang
  • 20 篇 du bo

语言

  • 3,656 篇 英文
  • 199 篇 其他
  • 105 篇 中文
  • 1 篇 法文
检索条件"机构=State Key Lab of Software Engineering and School of Computer"
3960 条 记 录,以下是921-930 订阅
排序:
Multi-Objective Optimization of High-Power Fiber Laser Cutting of Thick Mild Steel by Using Response Surface Methodology
SSRN
收藏 引用
SSRN 2023年
作者: Liu, Yanjie Yoshigoe, Kenji Ullah, Farhan Zhang, Shijin Zhao, Yue Shanghai Key Lab of Intelligent Manufacturing and Robotics School of Mechatronic Engineering and Automation Shanghai University Shanghai200444 China School of Software Northwestern Polytechnical University Xi’an710129 China Department of Electrical Engineering and Computer Science Embry-Riddle Aeronautical University Daytona BeachFL32114 United States
High-power continuous wave fiber laser cutting is a next-generation cutting technology for rapid prototyping and small-scale fabrication. To utilize the advantage offered by this technology in terms of high-quality cu... 详细信息
来源: 评论
A Privacy Preserving Method for IoT Forensics
A Privacy Preserving Method for IoT Forensics
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Wenzheng Zhang Boxi Chen Xiao Fu Qing Gu Jin Shi Xiaojiang Du Xiaoyang Zhou State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Information Management Nanjing University Nanjing China Department of Electrical and Computer Engineering Stevens Institute of Technology Hoboken NJ USA China Mobile Zijin(Jiangsu)Innovation Research Institute Nanjing China
The diversity of the Internet of Things (IoT) poses challenges to privacy protection, especially in the field of digital forensics. How to ensure that only the private information of the suspect is provided, and not t... 详细信息
来源: 评论
Accelerating zk-SNARK with Group and Zone Optimization on GPU
Accelerating zk-SNARK with Group and Zone Optimization on GP...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Runnan Shen Liang Wang Haotian Luo Rui Yang Jinqian Yang Jinquan Wang Qiancheng Sun Limin Xiao Jin Dong State Key Laboratory of Complex Key Software Environment Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China Shen Yuan Honors College Beihang University Beijing China Beijing Academy of Blockchain and Edge Computing (BABEC) Beijing China
Zero-knowledge proof (ZKP) is a popular cryptographic strategy for building a trusted environment, which can be applied to blockchain, electronic voting, and other scenarios. However, ZKP involves a number of computat...
来源: 评论
Reconfigurable Intelligence Surface Assisted Opportunistic Multiple Access in UAV-IoT Networks
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Zhang, Xi-Ran Sun, Wen-Bin Zhang, Zhaolin Wang, Ling Gao, Ang Cheng, Nan Meng, Wei-Xiao Leung, Victor C. M. Northwestern Polytechnical University School of Electronics And Information Xi'an China Xidian University State Key Laboratory of ISN Xi'an710071 China Xidian University School of Cyber Engineering Xi'an710071 China Harbin Institute of Technology Communication Research Center Harbin150001 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China The University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T1Z4 Canada
Due to the advantages of flexible deployment and strong environmental adaptability of an unmanned aerial vehicle (UAV), UAVs serve as aerial base stations (BSs) to meet Quality of Services (QoSs) of ground users in in... 详细信息
来源: 评论
How to Reduce Change Detection to Semantic Segmentation
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Guo-Hua Gao, Bin-Bin Wang, Chenjie State Key Laboratory for Novel Software Technology Nanjing University China Youtu Lab Tencent China Department of Computer Science and Engineering Shanghai Jiao Tong University China
Change detection (CD) aims to identify changes that occur in an image pair taken different times. Prior methods devise specific networks from scratch to predict change masks in pixel-level, and struggle with general s... 详细信息
来源: 评论
Research on Microservice Architecture: A Tertiary Study
SSRN
收藏 引用
SSRN 2022年
作者: Liu, Xiaodong Li, Shanshan Zhang, He Zhong, Chenxing Wang, Yanze Waseem, Muhammad Babar, Muhammad Ali State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Software Institute Nanjing University Nanjing China School of Computer Science Wuhan University Wuhan China Centre for Research on Engineering Software Technologies School of Computer Science University of Adelaide Adelaide Australia Cyber Security Cooperative Research Centre Australia
Context: Microservices architecture (MSA) has gained its popularity for designing software systems. Migrating to MSA is a challenging task and requires comprehensive understanding and careful decisions. Objective... 详细信息
来源: 评论
GrabDAE: An Innovative Framework for Unsupervised Domain Adaptation Utilizing Grab-Mask and Denoise Auto-Encoder
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Junzhou Wen, Xuan Zhang, Ronghui Ren, Bingtao Wu, Di Xu, Zhigang Wang, Danwei The Guangdong Provincial Key Laboratory of Intelligent Transport System School of Intelligent Systems Engineering Sun Yat-sen University Guangzhou510275 China The School of Transportation Science and Engineering Beihang University State Key Lab of Intelligent Transportation System Beijing100191 China The School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China The Guangdong Key Laboratory of Big Data Analysis and Processing Guangdong510006 China The School of Information Engineering Chang’an University Shaanxi Xi’an710064 China The School of Electrical and Electronic Engineering Nanyang Technological University Singapore639798 Singapore
Unsupervised Domain Adaptation (UDA) aims to adapt a model trained on a labeled source domain to an unlabeled target domain by addressing the domain shift. Existing Unsupervised Domain Adaptation (UDA) methods often f...
来源: 评论
DANI-Net: Uncalibrated Photometric Stereo by Differentiable Shadow Handling, Anisotropic Reflectance Modeling, and Neural Inverse Rendering
arXiv
收藏 引用
arXiv 2023年
作者: Li, Zongrui Zheng, Qian Shi, Boxin Pan, Gang Jiang, Xudong School of Electrical and Electronic Engineering Nanyang Technological University Singapore The State Key Lab of Brain-Machine Intelligence Zhejiang University Hangzhou China College of Computer Science and Technology Zhejiang University Hangzhou China National Key Laboratory for Multimedia Information Processing School of Computer Science Peking University Beijing China National Engineering Research Center of Visual Technology School of Computer Science Peking University Beijing China
Uncalibrated photometric stereo (UPS) is challenging due to the inherent ambiguity brought by the unknown light. Although the ambiguity is alleviated on non-Lambertian objects, the problem is still difficult to solve ... 详细信息
来源: 评论
TraInterSim: Adaptive and Planning-Aware Hybrid-Driven Traffic Intersection Simulation
arXiv
收藏 引用
arXiv 2022年
作者: Lv, Pei Pei, Xinming Ren, Xinyu Zhang, Yuzhen Li, Chaochao Xu, Mingliang The School of Computer and Artificial Intelligence Zhengzhou University Zhengzhou China The State Key Laboratory of CAD&CG Zhejiang University Hangzhou China Network engineering Henan University China Computer science and technology The State Key Laboratory of CAD&CG Zhejiang University Hangzhou China Software engineering Zhengzhou University China Software engineering Henan Polytechnic University Jiaozuo China The School of Information Engineering Zhengzhou University Zhengzhou China
Traffic intersections are important scenes that can be seen almost everywhere in the traffic system. Currently, most simulation methods perform well at highways and urban traffic networks. In intersection scenarios, t... 详细信息
来源: 评论
A Generalized Hybrid Hoare Logic
arXiv
收藏 引用
arXiv 2023年
作者: Zhan, Naijun Jin, Xiangyu Zhan, Bohua Wang, Shuling Guelev, Dimitar School of Computer Science Peking University Institute of Software Chinese Academy of Sciences Beijing China State Key Lab. of Computer Science Institute of Software Chinese Academy of Sciences University of CAS Beijing China Huawei Technologies Co. Ltd. Beijing China National Key Laboratory of Space Integrated Information System Institute of Software Chinese Academy of Sciences University of CAS Beijing China Institute of Mathematics and Informatics Bulgarian Academy of Sciences Sofia Bulgaria
Deductive verification of hybrid systems (HSs) increasingly attracts more attention in recent years because of its power and scalability, where a powerful specification logic for HSs is the cornerstone. Often, HSs are... 详细信息
来源: 评论