咨询与建议

限定检索结果

文献类型

  • 298 篇 会议
  • 206 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 505 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 352 篇 工学
    • 272 篇 计算机科学与技术...
    • 224 篇 软件工程
    • 72 篇 信息与通信工程
    • 38 篇 控制科学与工程
    • 28 篇 生物工程
    • 25 篇 机械工程
    • 24 篇 光学工程
    • 19 篇 电子科学与技术(可...
    • 17 篇 仪器科学与技术
    • 16 篇 交通运输工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 电气工程
    • 13 篇 建筑学
    • 12 篇 材料科学与工程(可...
    • 12 篇 动力工程及工程热...
    • 11 篇 安全科学与工程
    • 10 篇 土木工程
    • 8 篇 化学工程与技术
    • 6 篇 网络空间安全
  • 135 篇 理学
    • 81 篇 数学
    • 28 篇 生物学
    • 24 篇 统计学(可授理学、...
    • 19 篇 物理学
    • 16 篇 系统科学
    • 14 篇 化学
  • 93 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 44 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 9 篇 法学
  • 8 篇 医学
    • 7 篇 临床医学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 4 篇 哲学
  • 3 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 14 篇 semantics
  • 11 篇 object detection
  • 10 篇 servers
  • 9 篇 feature extracti...
  • 9 篇 software
  • 9 篇 heuristic algori...
  • 7 篇 educational inst...
  • 7 篇 computational mo...
  • 7 篇 machine learning
  • 7 篇 computer vision
  • 7 篇 training
  • 6 篇 semantic segment...
  • 6 篇 deep learning
  • 6 篇 programming
  • 6 篇 safety
  • 6 篇 resource allocat...
  • 6 篇 blockchain
  • 6 篇 satellites
  • 6 篇 privacy
  • 6 篇 cryptography

机构

  • 177 篇 school of comput...
  • 158 篇 state key labora...
  • 109 篇 state key labora...
  • 46 篇 state key labora...
  • 23 篇 state key lab of...
  • 19 篇 institute of art...
  • 12 篇 zhongguancun lab...
  • 12 篇 beijing advanced...
  • 12 篇 hangzhou innovat...
  • 11 篇 school of comput...
  • 7 篇 state key lab. o...
  • 7 篇 sino-french engi...
  • 6 篇 national lab. of...
  • 6 篇 state key labora...
  • 6 篇 school of mechan...
  • 5 篇 shen yuan honors...
  • 5 篇 school of artifi...
  • 5 篇 beihang universi...
  • 5 篇 school of comput...
  • 5 篇 ping an technolo...

作者

  • 41 篇 xiao limin
  • 31 篇 huang di
  • 30 篇 ruan li
  • 29 篇 limin xiao
  • 20 篇 li ruan
  • 18 篇 zhang xiong
  • 17 篇 hao sheng
  • 14 篇 bai xiao
  • 14 篇 di huang
  • 11 篇 wang yunhong
  • 10 篇 li zhoujun
  • 10 篇 chen jiaxin
  • 10 篇 zhu mingfa
  • 10 篇 xu ke
  • 9 篇 liu xianglong
  • 8 篇 wenge rong
  • 8 篇 yang hongyu
  • 8 篇 li yongnan
  • 8 篇 luo jie
  • 7 篇 peng hao

语言

  • 479 篇 英文
  • 17 篇 其他
  • 11 篇 中文
检索条件"机构=State Key Lab. Of Software Development Environment School of Computer Science & Engineering"
505 条 记 录,以下是271-280 订阅
排序:
Bi-directional mission offloading for agile space-air-ground integrated networks
arXiv
收藏 引用
arXiv 2019年
作者: Zhou, Sheng Wang, Guangchao Zhang, Shan Niu, Zhisheng Shen, Xuemin Beijing National Research Center for Information Science and Technology Department of Electronic Engineering Tsinghua University Beijing100084 China School of Computer Science and Engineering Beihang Univesity Beijing100191 China State Key Laboratory of Software Development Environment Beijing Key Laboratory of Computer Networks Department of Electrical and Computer Engineering University of Waterloo 200 University Avenue West WaterlooONN2L 3G1 Canada
Space-air-ground integrated networks (SAGIN) provide great strengths in extending the capability of ground wireless networks. On the other hand, with rich spectrum and computing resources, the ground networks can also... 详细信息
来源: 评论
Region-wise generative adversarial image inpainting for large missing areas
arXiv
收藏 引用
arXiv 2019年
作者: Ma, Yuqing Liu, Xianglong Bai, Shihao Wang, Lei Liu, Aishan Tao, Dacheng Hancock, Edwin State Key Lab of Software Development Environment Beihang University Beijing100191 China Beijing Advanced Innovation Center for Big Data-Based Precision Medicine UBTECH Sydney Artificial Intelligence Centre School of Information Technologies Faculty of Engineering and Information Technologies University of Sydney DarlingtonNSW2008 Australia Department of Computer Science University of York York United Kingdom
Recently deep neutral networks have achieved promising performance for filling large missing regions in image inpainting tasks. They usually adopted the standard convolutional architecture over the corrupted image, le... 详细信息
来源: 评论
A survey on formal specification and verification of separation kernels
收藏 引用
Frontiers of computer science 2017年 第4期11卷 585-607页
作者: Yongwang ZHAO Zhibin YANG Dianfu MA State Key Laboratory of Software Development Environment (NLSDE) School of Computer Science and Engineering Beihang Univerisity Beijing 100191 China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing 210016 China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing 210016 China
Abstract Separation kernels are fundamental software of safety and security-critical systems, which provide their hosted applications with spatial and temporal separation as well as controlled information flows among ... 详细信息
来源: 评论
A hierarchical similarity based job recommendation service framework for university students
收藏 引用
Frontiers of computer science 2017年 第5期11卷 912-922页
作者: Rui LIU Wenge RONG Yuanxin OUYANG Zhang XIONG State Key Laboratory of Software Development Environment Beihang University Beijing 100191 China Engineering Research Center of Advanced Computer Application Technology Ministry of Education Beihang University Beijing 100191 China School of Computer Science and Engineering Beihang University Beijing 100191 China
When people want to move to a new job, it is often difficult since there is too much job information availab.e. To select an appropriate job and then submit a resume is tedious. It is particularly difficult for univer... 详细信息
来源: 评论
Marshall-Olkin Power-Law Distributions in Length-Frequency of Entities
arXiv
收藏 引用
arXiv 2018年
作者: Zhong, Xiaoshi Yu, Xiang Cambria, Erik Rajapakse, Jagath C. School of Computer Science and Technology Beijing Institute of Technology China State Key Laboratory of Software Development Environment Beihang University China School of Computer Science and Engineering Nanyang Technological University Singapore
Entities involve important concepts with concrete meanings and play important roles in numerous linguistic tasks. Entities have different forms in different linguistic tasks and researchers treat those different forms... 详细信息
来源: 评论
Heuristic Maximum Clique Based Identity Switches Awareness for Tracking
Heuristic Maximum Clique Based Identity Switches Awareness f...
收藏 引用
2018 International Conference on Advanced Control, Automation and Artificial Intelligence (ACAAI2018)
作者: Chao Li Di Cui Hao Sheng Jiahui Chen Yang Zhang State Key Laboratory of Software Development Environment School of Computer Science and EngineeringBeihang University Shenzhen Key Laboratory of Data Vitalization Research Institute in ShenzhenBeihang University
Multi-target tracking is a popular research topic in the field of computer vision. Most recent works based on tracking-by-detection paradigm have trouble when dealing with tracking errors(i.e. identity switches) that ... 详细信息
来源: 评论
Context-aware Pedestrian Detection with Salient Region Self-growing in Far-infrared Images
Context-aware Pedestrian Detection with Salient Region Self-...
收藏 引用
2018 International Conference on Advanced Control, Automation and Artificial Intelligence (ACAAI2018)
作者: Hao Sheng Meiyuan Liu Yanwei Zheng Yang Liu State Key Laboratory of Software Development Environment School of Computer Science and EngineeringBeihang University Shenzhen Key Laboratory of Data Vitalization Research Institute in ShenzhenBeihang University
In this paper, we present a new framework to detect pedestrians in infrared images. The framework consists of a candidate generation module and a classification module, both of which are implemented based on convoluti... 详细信息
来源: 评论
An efficient and fast polarity optimization approach for mixed polarity Reed-Muller logic circuits
收藏 引用
Frontiers of computer science 2017年 第4期11卷 728-742页
作者: Zhenxue HE Limin XIAO Fei GU Tongsheng XIA Shubin SU Zhisheng HUO Rong ZHANG Longbing ZHANG Li RUAN Xiang WANG State Key Laboratory of Software Development Environment Beihang University Beijing 100191 China School of Computer Science and Engineering Beihang University Beijing 100191 China School of Electronic and Information Engineering Beihang University Beijing 100191 China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China National Engineering Research Center for Science & Technology Resources Sharing Service Beijing 100191 China
Although the genetic algorithm has been widely used in the polarity optimization of mixed polarity Reed- Muller (MPRM) logic circuits, few studies have taken into account the polarity conversion sequence. In order t... 详细信息
来源: 评论
Enhancing constraint based test generation by local search  17
Enhancing constraint based test generation by local search
收藏 引用
6th International Conference on software and computer Applications, ICSCA 2017
作者: Lin, Mengxiang Hou, Xiaomei Liu, Rui Ge, Linyan School of Mechanical Engineering and Automation State Key Laboratory of Software Development Environment Beihang University China School of Computer Science and Technology State Key Laboratory of Software Development Environment Beihang University China School of Information Management Wuhan University China
The core operation of symbolic execution based test data generation is to generate a path constraint in terms of input variables for a selected path. Solutions to the path constraint are test data which will be used t... 详细信息
来源: 评论
A reinforced hungarian algorithm for task allocation in global software development  29
A reinforced hungarian algorithm for task allocation in glob...
收藏 引用
29th International Conference on software engineering and Knowledge engineering, SEKE 2017
作者: Yu, Xiao Wu, Man Jia, Xiangyang Liu, Ye State Key Lab. of Software Engineering Computer School Wuhan University Wuhan China School of Computer Science and Information Engineering HuBei University Wuhan China
The allocation of software development tasks is a critical management activity in distributed development projects. One of the most important problem is to find the lowest-cost way to assign tasks in global software d... 详细信息
来源: 评论