咨询与建议

限定检索结果

文献类型

  • 298 篇 会议
  • 206 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 505 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 352 篇 工学
    • 272 篇 计算机科学与技术...
    • 224 篇 软件工程
    • 72 篇 信息与通信工程
    • 38 篇 控制科学与工程
    • 28 篇 生物工程
    • 25 篇 机械工程
    • 24 篇 光学工程
    • 19 篇 电子科学与技术(可...
    • 17 篇 仪器科学与技术
    • 16 篇 交通运输工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 电气工程
    • 13 篇 建筑学
    • 12 篇 材料科学与工程(可...
    • 12 篇 动力工程及工程热...
    • 11 篇 安全科学与工程
    • 10 篇 土木工程
    • 8 篇 化学工程与技术
    • 6 篇 网络空间安全
  • 135 篇 理学
    • 81 篇 数学
    • 28 篇 生物学
    • 24 篇 统计学(可授理学、...
    • 19 篇 物理学
    • 16 篇 系统科学
    • 14 篇 化学
  • 93 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 44 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 9 篇 法学
  • 8 篇 医学
    • 7 篇 临床医学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 4 篇 哲学
  • 3 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 14 篇 semantics
  • 11 篇 object detection
  • 10 篇 servers
  • 9 篇 feature extracti...
  • 9 篇 software
  • 9 篇 heuristic algori...
  • 7 篇 educational inst...
  • 7 篇 computational mo...
  • 7 篇 machine learning
  • 7 篇 computer vision
  • 7 篇 training
  • 6 篇 semantic segment...
  • 6 篇 deep learning
  • 6 篇 programming
  • 6 篇 safety
  • 6 篇 resource allocat...
  • 6 篇 blockchain
  • 6 篇 satellites
  • 6 篇 privacy
  • 6 篇 cryptography

机构

  • 177 篇 school of comput...
  • 158 篇 state key labora...
  • 109 篇 state key labora...
  • 46 篇 state key labora...
  • 23 篇 state key lab of...
  • 19 篇 institute of art...
  • 12 篇 zhongguancun lab...
  • 12 篇 beijing advanced...
  • 12 篇 hangzhou innovat...
  • 11 篇 school of comput...
  • 7 篇 state key lab. o...
  • 7 篇 sino-french engi...
  • 6 篇 national lab. of...
  • 6 篇 state key labora...
  • 6 篇 school of mechan...
  • 5 篇 shen yuan honors...
  • 5 篇 school of artifi...
  • 5 篇 beihang universi...
  • 5 篇 school of comput...
  • 5 篇 ping an technolo...

作者

  • 41 篇 xiao limin
  • 31 篇 huang di
  • 30 篇 ruan li
  • 29 篇 limin xiao
  • 20 篇 li ruan
  • 18 篇 zhang xiong
  • 17 篇 hao sheng
  • 14 篇 bai xiao
  • 14 篇 di huang
  • 11 篇 wang yunhong
  • 10 篇 li zhoujun
  • 10 篇 chen jiaxin
  • 10 篇 zhu mingfa
  • 10 篇 xu ke
  • 9 篇 liu xianglong
  • 8 篇 wenge rong
  • 8 篇 yang hongyu
  • 8 篇 li yongnan
  • 8 篇 luo jie
  • 7 篇 peng hao

语言

  • 479 篇 英文
  • 17 篇 其他
  • 11 篇 中文
检索条件"机构=State Key Lab. Of Software Development Environment School of Computer Science & Engineering"
505 条 记 录,以下是41-50 订阅
排序:
Joint Visual Perception and Linguistic Commonsense for Daily Events Causality Reasoning
Joint Visual Perception and Linguistic Commonsense for Daily...
收藏 引用
2022 IEEE International Conference on Multimedia and Expo, ICME 2022
作者: Ma, Bole Tong, Chao School of Computer Science and Engineering Beihang University China Beihang University State Key Laboratory of Software Development Environment China Yunnan Key Laboratory of Blockchain Application Technology China
Multimodal networks that juxtapose visual and linguistic modalities are currently widely adopted for solving vision-and-language tasks. They perform well in simple and intu-itive tasks, but are prone to mistakes in ta... 详细信息
来源: 评论
On Efficient Packet Batching and Resource Allocation for GPU based NFV Acceleration  31
On Efficient Packet Batching and Resource Allocation for GPU...
收藏 引用
31st IEEE/ACM International Symposium on Quality of Service, IWQoS 2023
作者: Zeng, Deze Zhu, Andong Gu, Lin Chen, Quan Guo, Minyi School of Computer Science China University of Geosciences Hubei Wuhan China Nanjing University State Key Lab. for Novel Software Technology Nanjing China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China Shanghai Jiao Tong University Department of Computer Science and Engineering Shanghai China
Network Function Virtualization (NFV) has already become an essential technology for improving the scalab.lity and flexibility of modern computer networks. The performance gap has become the main issue that impedes th... 详细信息
来源: 评论
Effective Training of PINNs by Combining CMA-ES with Gradient Descent
Effective Training of PINNs by Combining CMA-ES with Gradien...
收藏 引用
Congress on Evolutionary Computation
作者: Lin Liu Yuan Yuan School of Computer Science and Engineering Beihang University Beijing China State Key Laboratory of Software Development Environment Zhongguancun Laboratory School of Computer Science and Engineering Beihang University Beijing China
Physics-Informed Neural Networks (PINNs) have recently received increasing attention, however, optimizing the loss function of PINNs is notoriously difficult, where the landscape of the loss function is often highly n... 详细信息
来源: 评论
Understanding heterophily for graph neural networks  24
Understanding heterophily for graph neural networks
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Junfu Wang Yuanfang Guo Liang Yang Yunhong Wang State Key Laboratory of Software Development Environment and School of Computer Science and Engineering and Shen Yuan Honors College Beihang University Beijing China State Key Laboratory of Software Development Environment and School of Computer Science and Engineering Beihang University Beijing China School of Artificial Intelligence Hebei University of Technology Tianjin China School of Computer Science and Engineering Beihang University Beijing China
Graphs with heterophily have been regarded as challenging scenarios for Graph Neural Networks (GNNs), where nodes are connected with dissimilar neighbors through various patterns. In this paper, we present theoretical...
来源: 评论
A Framework to Analyze the Impact of Maps on VANET Simulation
收藏 引用
Chinese Journal of Electronics 2023年 第3期20卷 401-406页
作者: Xiaoming LI Jingxuan WANG Xin JIN Tong ZHAO Wei YAN State Key Laboratory of Software Development Environment Beihang University Beijing China School of Electronic Engineering and Computer Science Peking University Beijing China
Mobility models play an important role on VANET simulation, which has been discussed in many studies. However, few studies have analyzed the impact of maps. We find that maps can greatly influence simulation results. ... 详细信息
来源: 评论
Pooling Under the Sun: A Mining Pool Centralized Revisit and Solution
Pooling Under the Sun: A Mining Pool Centralized Revisit and...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Kundu Chen Jie Luo State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China
Mining pools are fundamental infrastructure in most public blockchain networks that utilize Proof-of-Work consensus, ensuring that miners receive stable rewards and contribute to the computational power and storage of... 详细信息
来源: 评论
TRANSFORMER-PATCHER: ONE MISTAKE WORTH ONE NEURON  11
TRANSFORMER-PATCHER: ONE MISTAKE WORTH ONE NEURON
收藏 引用
11th International Conference on Learning Representations, ICLR 2023
作者: Huang, Zeyu Shen, Yikang Zhang, Xiaofeng Zhou, Jie Rong, Wenge Xiong, Zhang State Key Laboratory of Software Development Environment Beihang University China Sino-French Engineer School Beihang University China School of Computer Science and Engineering Beihang University China Mila University of Montreal Canada WeChat AI Tencent Inc. China
Large Transformer-based Pretrained Language Models (PLMs) dominate almost all Natural Language Processing (NLP) tasks. Nevertheless, they still make mistakes from time to time. For a model deployed in an industrial en... 详细信息
来源: 评论
Towards Fully Decoupled End-to-End Person Search
Towards Fully Decoupled End-to-End Person Search
收藏 引用
2023 International Conference on Digital Image Computing: Techniques and Applications, DICTA 2023
作者: Zhang, Pengcheng Bai, Xiao Zheng, Jin Ning, Xin Jiangxi Research Institute Beihang University School of Computer Science and Engineering State Key Laboratory of Software Development Environment Beijing China Institute of Semiconductors Chinese Academy of Sciences Cognitive Computing Technology Joint Laboratory Wave Group Beijing China
End-to-end person search aims to jointly detect and re-identify a target person in raw scene images with a unified model. The detection task unifies all persons while the re-id task discriminates different identities,... 详细信息
来源: 评论
Approximate k-Nearest Neighbor Query over Spatial Data Federation  28th
Approximate k-Nearest Neighbor Query over Spatial Data Fede...
收藏 引用
28th International Conference on Database Systems for Advanced Applications, DASFAA 2023
作者: Zhang, Kaining Tong, Yongxin Shi, Yexuan Zeng, Yuxiang Xu, Yi Chen, Lei Zhou, Zimu Xu, Ke Lv, Weifeng Zheng, Zhiming State Key Laboratory of Software Development Environment Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing School of Computer Science and Engineering and Institute of Artificial Intelligence Beihang University Beijing China Department of Computer Science and Engineering HKUST Hong Kong Guangzhou China City University of Hong Kong Hong Kong
Approximate nearest neighbor query is a fundamental spatial query widely applied in many real-world applications. In the big data era, there is an increasing demand to scale these queries over a spatial data federatio... 详细信息
来源: 评论
CODESWIFT: Accelerating LLM Inference for Efficient Code Generation
arXiv
收藏 引用
arXiv 2025年
作者: Zhao, Qianhui Zhang, Li Liu, Fang Lian, Xiaoli Meng, Qiaoyuanhe Jiao, Ziqian Zhou, Zetong Zhang, Borui Guo, Runlin Li, Jia School of Computer Science and Engineering State Key Laboratory of Complex & Critical Software Environment Beihang University China Key Lab of High Confidence Software Technology Peking University China
Code generation is a latency-sensitive task that demands high timeliness, but the autoregressive decoding mechanism of Large Language Models (LLMs) leads to poor inference efficiency. Existing LLM inference accelerati... 详细信息
来源: 评论