咨询与建议

限定检索结果

文献类型

  • 298 篇 会议
  • 206 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 505 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 352 篇 工学
    • 272 篇 计算机科学与技术...
    • 224 篇 软件工程
    • 72 篇 信息与通信工程
    • 38 篇 控制科学与工程
    • 28 篇 生物工程
    • 25 篇 机械工程
    • 24 篇 光学工程
    • 19 篇 电子科学与技术(可...
    • 17 篇 仪器科学与技术
    • 16 篇 交通运输工程
    • 14 篇 生物医学工程(可授...
    • 13 篇 电气工程
    • 13 篇 建筑学
    • 12 篇 材料科学与工程(可...
    • 12 篇 动力工程及工程热...
    • 11 篇 安全科学与工程
    • 10 篇 土木工程
    • 8 篇 化学工程与技术
    • 6 篇 网络空间安全
  • 135 篇 理学
    • 81 篇 数学
    • 28 篇 生物学
    • 24 篇 统计学(可授理学、...
    • 19 篇 物理学
    • 16 篇 系统科学
    • 14 篇 化学
  • 93 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 44 篇 图书情报与档案管...
    • 22 篇 工商管理
  • 9 篇 法学
  • 8 篇 医学
    • 7 篇 临床医学
  • 6 篇 经济学
    • 6 篇 应用经济学
  • 4 篇 哲学
  • 3 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 14 篇 semantics
  • 11 篇 object detection
  • 10 篇 servers
  • 9 篇 feature extracti...
  • 9 篇 software
  • 9 篇 heuristic algori...
  • 7 篇 educational inst...
  • 7 篇 computational mo...
  • 7 篇 machine learning
  • 7 篇 computer vision
  • 7 篇 training
  • 6 篇 semantic segment...
  • 6 篇 deep learning
  • 6 篇 programming
  • 6 篇 safety
  • 6 篇 resource allocat...
  • 6 篇 blockchain
  • 6 篇 satellites
  • 6 篇 privacy
  • 6 篇 cryptography

机构

  • 177 篇 school of comput...
  • 158 篇 state key labora...
  • 109 篇 state key labora...
  • 46 篇 state key labora...
  • 23 篇 state key lab of...
  • 19 篇 institute of art...
  • 12 篇 zhongguancun lab...
  • 12 篇 beijing advanced...
  • 12 篇 hangzhou innovat...
  • 11 篇 school of comput...
  • 7 篇 state key lab. o...
  • 7 篇 sino-french engi...
  • 6 篇 national lab. of...
  • 6 篇 state key labora...
  • 6 篇 school of mechan...
  • 5 篇 shen yuan honors...
  • 5 篇 school of artifi...
  • 5 篇 beihang universi...
  • 5 篇 school of comput...
  • 5 篇 ping an technolo...

作者

  • 41 篇 xiao limin
  • 31 篇 huang di
  • 30 篇 ruan li
  • 29 篇 limin xiao
  • 20 篇 li ruan
  • 18 篇 zhang xiong
  • 17 篇 hao sheng
  • 14 篇 bai xiao
  • 14 篇 di huang
  • 11 篇 wang yunhong
  • 10 篇 li zhoujun
  • 10 篇 chen jiaxin
  • 10 篇 zhu mingfa
  • 10 篇 xu ke
  • 9 篇 liu xianglong
  • 8 篇 wenge rong
  • 8 篇 yang hongyu
  • 8 篇 li yongnan
  • 8 篇 luo jie
  • 7 篇 peng hao

语言

  • 479 篇 英文
  • 17 篇 其他
  • 11 篇 中文
检索条件"机构=State Key Lab. Of Software Development Environment School of Computer Science & Engineering"
505 条 记 录,以下是61-70 订阅
排序:
RGB-D Grasp Detection via Depth Guided Learning with Cross-modal Attention
arXiv
收藏 引用
arXiv 2023年
作者: Qin, Ran Ma, Haoxiang Gao, Boyang Huang, Di State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China School of Computer Science and Technology Harbin Institute of Technology Harbin China
Planar grasp detection is one of the most fundamental tasks to robotic manipulation, and the recent progress of consumer-grade RGB-D sensors enables delivering more comprehensive features from both the texture and sha... 详细信息
来源: 评论
Zone Based Writing Optimization in User Space  23
Zone Based Writing Optimization in User Space
收藏 引用
23rd IEEE International Conference on High Performance Computing and Communications, 7th IEEE International Conference on Data science and Systems, 19th IEEE International Conference on Smart City and 7th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC-DSS-SmartCity-DependSys 2021
作者: Shen, Runnan Liu, Yuting Zhang, Rui Zhu, Jinbin Liu, Zhonglin Xiao, Limin School of Computer Science and Engineering Beihang University Beijing100191 China North China Institute of Computing Technology Beijing China Beihang University State Key Laboratory of Software Development Environment Beijing100191 China
Write operation of the latest storage media such as NAND SSDs has certain restrictions. Data can only be written in an additional write mode. When erasing, some valid data still needs to be written again, which will c... 详细信息
来源: 评论
Prune and Merge: Efficient Token Compression for Vision Transformer with Spatial Information Preserved
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Mao, Junzhu Shen, Yang Guo, Jinyang Yao, Yazhou Hua, Xiansheng Shen, Hengtao Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210094 China Beihang University State Key Laboratory of Software Development Environment Institute of Artificial Intelligence Beijing100191 China Terminus Group Beijing100027 China University of Electronic Science and Technology of China School of Computer Science and Engineering Chengdu611731 China
Token compression is essential for reducing the computational and memory requirements of transformer models, enabling their deployment in resource-constrained environments. In this work, we propose an efficient and ha... 详细信息
来源: 评论
User-level failure detection and auto-recovery of parallel programs in HPC systems
收藏 引用
Frontiers of computer science 2021年 第6期15卷 31-42页
作者: Guozhen ZHANG Yi LIU Hailong YANG Jun XU Depei QIAN State Key Laboratory of Software Development Environment Beijing 100191China Sino-German Joint Software Institute Beihang UniversityBeijing 100191China School of Computer Science and Engineering Beihang UniversityBeijing 100191China Science and Technology on Space System Simulation Laboratory Beijing Simulation Center Beijing 100854China
As the mean-time-between-failures(MTBF)continues to decline with the increasing number of components on large-scale high performance computing(HPC)systems,program failures might occur during the execution period with ... 详细信息
来源: 评论
Zero-Shot Scene Graph Generation via Triplet Calibration and Reduction
arXiv
收藏 引用
arXiv 2023年
作者: Li, Jiankai Wang, Yunhong Li, Weixin State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Shanghai Artificial Intelligence Laboratory 100191 China
Scene Graph Generation (SGG) plays a pivotal role in downstream vision-language tasks. Existing SGG methods typically suffer from poor compositional generalizations on unseen triplets. They are generally trained on in... 详细信息
来源: 评论
AGDB: A Dictionary-based Malicious Domain Detection Method based on Representation Fusion  7
AGDB: A Dictionary-based Malicious Domain Detection Method b...
收藏 引用
7th IEEE International Conference on Data science in Cyberspace, DSC 2022
作者: Zhai, You Dong, Hao Li, Zhoujun Yang, Liqun He, Longtao Beihang University State Key Lab of Software Development Environment China Beihang University School of Cyber Science and Technology China National Computer Network Emergency Response Technical Team Coordination Center of China China
Botnets are starting to use domain generation algorithms (DGAs) extensively to enhance the stealth of command and control (C&C) communications between C&C servers and bots. Domains generated by DGAs are called... 详细信息
来源: 评论
Enhancing the Transferability of Adversarial Attacks with Stealth Preservation
Enhancing the Transferability of Adversarial Attacks with St...
收藏 引用
IEEE computer Society Conference on computer Vision and Pattern Recognition Workshops (CVPRW)
作者: Xinwei Zhang Tianyuan Zhang Yitong Zhang Shuangcheng Liu School of Computer Science and Engineering Beihang University Beijing China State Key Lab of Software Development Environment Beihang University Beijing China Shen Yuan Honors College Beihang University Beijing China
Deep neural networks are susceptible to attacks from adversarial examples in recent years. Especially, the black-box attacks cause a more serious threat to practical applications. However, while most existing black-bo... 详细信息
来源: 评论
How Well Do Large Language Models Serve as End-to-End Secure Code Producers?
arXiv
收藏 引用
arXiv 2024年
作者: Gong, Jianian Duan, Nachuan Tao, Ziheng Gong, Zhaohui Yuan, Yuan Huang, Minlie School of Computer Science and Engineering Beihang University Beijing China School of Computer Science and Engineering Beihang University State Key Laboratory of Software Development Environment Zhongguancun Laboratory Beijing100191 China Tsinghua University Zhongguancun Laboratory Beijing China
The rapid advancement of large language models (LLMs) such as GPT-4 has revolutionized the landscape of software engineering, positioning these models at the core of modern development practices. As we anticipate thes... 详细信息
来源: 评论
Generalizing 6-DoF Grasp Detection via Domain Prior Knowledge
Generalizing 6-DoF Grasp Detection via Domain Prior Knowledg...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Haoxiang Ma Modi Shi Boyang Gao Di Huang State Key Laboratory of Software Development Environment Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China School of Computer Science and Technology Harbin Institute of Technology Harbin China Geometry Robotics
We focus on the generalization ability of the 6-DoF grasp detection method in this paper. While learning-based grasp detection methods can predict grasp poses for unseen ob-jects using the grasp distribution learned f... 详细信息
来源: 评论
Non-salient region erasure for time series augmentation
收藏 引用
Frontiers of computer science 2022年 第6期16卷 203-205页
作者: Pin LIU Xiaohui GUO Bin SHI Rui WANG Tianyu WO Xudong LIU State Key Lab of Software Development Environment(SKLSDE) Beihang UniversityBeijing100191China Beijing Advanced Innovation Center for Big Data and Brain Computing(BDBC) Beijing100191China Hangzhou Innovation Institute Beihang UniversityHangzhou310052China School of Computer Science and Technology Xi’an Jiaotong UniversityXi’an710049China
1 Introduction Time seriesaugmentationis an essential approachto solvethe overfitting problem on the time series classification(TSC)task[1,2].Although existing approaches perform better in mitigating this problem,none... 详细信息
来源: 评论