咨询与建议

限定检索结果

文献类型

  • 2,860 篇 会议
  • 1,287 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 4,156 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,346 篇 工学
    • 1,630 篇 计算机科学与技术...
    • 1,344 篇 软件工程
    • 671 篇 电子科学与技术(可...
    • 641 篇 电气工程
    • 634 篇 信息与通信工程
    • 548 篇 化学工程与技术
    • 406 篇 控制科学与工程
    • 404 篇 材料科学与工程(可...
    • 319 篇 动力工程及工程热...
    • 286 篇 机械工程
    • 230 篇 光学工程
    • 223 篇 力学(可授工学、理...
    • 206 篇 冶金工程
    • 172 篇 仪器科学与技术
    • 157 篇 土木工程
    • 153 篇 建筑学
    • 143 篇 生物工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 安全科学与工程
    • 81 篇 交通运输工程
  • 2,085 篇 理学
    • 1,037 篇 数学
    • 824 篇 物理学
    • 526 篇 化学
    • 253 篇 统计学(可授理学、...
    • 173 篇 生物学
    • 163 篇 系统科学
  • 649 篇 管理学
    • 422 篇 管理科学与工程(可...
    • 269 篇 图书情报与档案管...
    • 173 篇 工商管理
  • 75 篇 医学
  • 70 篇 法学
  • 69 篇 经济学
  • 54 篇 农学
  • 16 篇 军事学
  • 9 篇 教育学
  • 8 篇 文学
  • 6 篇 艺术学
  • 1 篇 哲学

主题

  • 65 篇 semantics
  • 55 篇 web services
  • 46 篇 software enginee...
  • 44 篇 optimization
  • 36 篇 computational mo...
  • 32 篇 algorithm design...
  • 30 篇 data mining
  • 30 篇 topology
  • 29 篇 educational inst...
  • 28 篇 computer archite...
  • 28 篇 feature extracti...
  • 28 篇 software
  • 26 篇 bandwidth
  • 26 篇 clustering algor...
  • 25 篇 wireless sensor ...
  • 25 篇 analytical model...
  • 25 篇 mathematical mod...
  • 23 篇 cloud computing
  • 22 篇 computer science
  • 22 篇 forecasting

机构

  • 151 篇 state key lab of...
  • 147 篇 state key lab. f...
  • 130 篇 state key lab. o...
  • 59 篇 state key lab. o...
  • 47 篇 state key lab. o...
  • 47 篇 state key labora...
  • 43 篇 state key lab. o...
  • 40 篇 state key lab. o...
  • 40 篇 computer school ...
  • 38 篇 university of ch...
  • 35 篇 state key lab of...
  • 35 篇 state key lab fo...
  • 33 篇 state key lab. o...
  • 30 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 26 篇 state key lab. o...
  • 25 篇 state key lab. o...
  • 25 篇 school of inform...
  • 25 篇 school of comput...
  • 25 篇 state key lab of...

作者

  • 32 篇 he keqing
  • 28 篇 zhan naijun
  • 28 篇 ying shi
  • 27 篇 cheng nan
  • 26 篇 wang jian
  • 25 篇 sanglu lu
  • 24 篇 hong wei
  • 24 篇 liu jin
  • 23 篇 chen hongsheng
  • 22 篇 liang peng
  • 22 篇 li yuanxiang
  • 21 篇 shi ying
  • 21 篇 zhuzhong qian
  • 21 篇 sheng zhang
  • 19 篇 yang yihao
  • 19 篇 wang bin
  • 19 篇 tian wenxi
  • 18 篇 qiu suizheng
  • 17 篇 wang jing
  • 17 篇 liu xu

语言

  • 3,763 篇 英文
  • 338 篇 中文
  • 56 篇 其他
检索条件"机构=State Key Lab. for Software Engineering"
4156 条 记 录,以下是1-10 订阅
排序:
E-PRedictor: an approach for early prediction of pull request acceptance
收藏 引用
Science China(Information Sciences) 2025年 第5期68卷 380-395页
作者: Kexing CHEN Lingfeng BAO Xing HU Xin XIA Xiaohu YANG State Key Laboratory of Blockchain and Data Security Zhejiang University Software Engineering Application Technology Lab
A pull request(PR) is an event in Git where a contributor asks project maintainers to review code he/she wants to merge into a project. The PR mechanism greatly improves the efficiency of distributed software developm... 详细信息
来源: 评论
Synthesizing Invariants for Polynomial Programs by Semidefinite Programming
收藏 引用
ACM Transactions on Programming Languages and Systems 2025年 第1期47卷 1-35页
作者: Wu, Hao Wang, Qiuye Xue, Bai Zhan, Naijun Zhi, Lihong Yang, Zhi-Hong State Key Lab. of Computer Sciences Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Fermat Labs Huawei Inc. Dongguan China Key Lab. of System Software and State Key Lab. of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Key Laboratory of High Confidence Software Technology School of Computer Science Peking University Beijing China School of Mathematics and Statistics Central South University Changsha China
Constraint-solving-based program invariant synthesis takes a parametric invariant template and encodes the (inductive) invariant conditions into constraints. The problem of characterizing the set of all valid paramete... 详细信息
来源: 评论
Improving prompt tuning-based software vulnerability assessment by fusing source code and vulnerability description
收藏 引用
Automated software engineering 2025年 第2期32卷 1-29页
作者: Wang, Jiyu Chen, Xiang Pei, Wenlong Yang, Shaoyu School of Artificial Intelligence and Computer Science Nantong University Jiangsu Nantong China State Key Lab. for Novel Software Technology Nanjing University Jiangsu Nanjing China
To effectively allocate resources for vulnerability remediation, it is crucial to prioritize vulnerability fixes based on vulnerability severity. With the increasingnumber of vulnerabilities in recent years, there is ... 详细信息
来源: 评论
A sharding blockchain-based UAV system for search and rescue missions
收藏 引用
Frontiers of Computer Science 2025年 第3期19卷 103-118页
作者: Xihan ZHANG Jiashuo ZHANG Jianbo GAO Libin XIA Zhi GUAN Hao HU Zhong CHEN School of Computer Science Peking UniversityBeijing 100871China Peking University Chongqing Research Institute of Big Data Chongqing 401329China National Engineering Research Center for Software Engineering Peking UniversityBeijing 100871China State Key Lab for Novel Software Technology Nanjing UniversityNanjing 210023China
Sharding is a promising technique to tackle the critical weakness of scalab.lity in blockchain-based unmanned aerial vehicle(UAV)search and rescue(SAR)*** breaking up the blockchain network into smaller partitions cal... 详细信息
来源: 评论
A Helmet Detection Algorithm Based on Transformers with Deformable Attention Module
收藏 引用
Chinese Journal of Electronics 2025年 第1期34卷 229-241页
作者: Songle Chen Hongbo Sun Yuxin Wu Lei Shang Xiukai Ruan Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Nanjing University of Posts and Telecommunications State Key Lab for Novel Software Technology Nanjing University Institute of Intelligent Locks Wenzhou University
Wearing a helmet is one of the effective measures to protect workers' safety. To address the challenges of severe occlusion, multi-scale, and small target issues in helmet detection, this paper proposes a helmet d... 详细信息
来源: 评论
A 316 stainless steel rod impacts with a rigid flat: Theory,experiment, and numerical simulation
收藏 引用
Science China(Physics,Mechanics & Astronomy) 2025年 第5期Mechanics & Astronomy) .卷 168-186页
作者: Yifan Wang Xuan Ye Hao Yan Tao Wang Guangyan Huang Zhuo Zhuang State Key Laboratory of Explosion Science and Safety Protection Beijing Institute of Technology Institute of Nuclear and New Energy Technology Tsinghua University Applied Mechanics Lab. School of Aerospace Engineering Tsinghua University
A slender rod suffers global vibration in impact. In this study, we present the experimental, numerical, and theoretical studies of the axial responses of a 316 stainless steel rod during vertical impact with a rigid ... 详细信息
来源: 评论
A Novel Model Predictive Control for Quasi Z-Source Inverter to Eliminate Negative Influence of Inductor Current Ripple on Output Current
收藏 引用
IEEE Transactions on Power Electronics 2025年 第7期40卷 9672-9684页
作者: Qiao, Shejuan Huang, Jin Xu, Yuhao Xidian University State Key Lab. of Electromechanical Intgd. Manufacturing of High-performance Electronic Equipments Xi'an710071 China Xi'an Aeronautical Institute School of Electronics Engineering Xi'an710077 China
The dead-beat control inherits the high control precision and the fast dynamic response of model predictive control (MPC). In many literatures, the dc-side current of the quasi Z-source inverter (qZSI) using the dead-... 详细信息
来源: 评论
Decentralized Federated Learning for Wireless Traffic Prediction
收藏 引用
IEEE Communications Letters 2025年 第5期29卷 1057-1061页
作者: Zhang, Haochang Huang, Sirui Zhou, Xiaotian Zhang, Chuanting Jia, Junrong Shandong University School of Control Science and Engineering China Shandong University Shandong Key Lab. of Intelligent Communications and Sensing-Computation Integration China Shandong University Institute of Intelligent Communication Technologies China Shandong University School of Software China
Wireless traffic prediction is indispensable for future intelligent cellular networks, as it can guide the resource allocation smartly to boost the usage efficiency. While the deep learning based methods have been rep... 详细信息
来源: 评论
SACM: spatial attributes of complex movements in multi-object tracking
收藏 引用
Multimedia Tools and Applications 2025年 1-20页
作者: Li, Hongjun Li, Jiaxin Sun, Xiaohu School of Information Science and Technology Nantong University Jiangsu Nantong226019 China State Key Lab. for Novel Software Technology Nanjing University Jiangsu Nantong210023 China Nantong Research Institute for Advanced Communication Technologies Jiangsu Nantong226019 China
Multi-object tracking is a crucial task in computer vision, but it faces significant challenges due to complex scenes and interactions between tracked objects. To address these challenges, we propose a complex movemen... 详细信息
来源: 评论
ESA: Example Sieve Approach for Multi-Positive and Unlab.led Learning  25
ESA: Example Sieve Approach for Multi-Positive and Unlabeled...
收藏 引用
18th ACM International Conference on Web Search and Data Mining, WSDM 2025
作者: Li, Zhongnian Wei, Meng Ying, Peng Xu, Xinzheng School of Computer Science and Technology China University of Mining and Technology Xuzhou China Mine Digitization Engineering Research Center of the Ministry of Education Xuzhou China State Key Lab. for Novel Software Technology Nanjing University Nanjing China
Learning from Multi-Positive and Unlab.led (MPU) data has gradually attracted significant attention from practical applications. Unfortunately, the risk of MPU also suffer from the shift of minimum risk, particularly ... 详细信息
来源: 评论