咨询与建议

限定检索结果

文献类型

  • 780 篇 会议
  • 328 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 1,113 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 878 篇 工学
    • 635 篇 计算机科学与技术...
    • 542 篇 软件工程
    • 190 篇 信息与通信工程
    • 131 篇 控制科学与工程
    • 86 篇 电子科学与技术(可...
    • 70 篇 电气工程
    • 59 篇 机械工程
    • 48 篇 光学工程
    • 44 篇 生物工程
    • 42 篇 动力工程及工程热...
    • 38 篇 材料科学与工程(可...
    • 33 篇 化学工程与技术
    • 30 篇 建筑学
    • 29 篇 土木工程
    • 27 篇 生物医学工程(可授...
    • 27 篇 安全科学与工程
    • 26 篇 仪器科学与技术
    • 17 篇 交通运输工程
  • 500 篇 理学
    • 354 篇 数学
    • 108 篇 物理学
    • 79 篇 统计学(可授理学、...
    • 66 篇 系统科学
    • 50 篇 生物学
    • 32 篇 化学
  • 237 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 72 篇 工商管理
  • 31 篇 法学
    • 25 篇 社会学
  • 28 篇 经济学
    • 28 篇 应用经济学
  • 19 篇 医学
    • 17 篇 基础医学(可授医学...
  • 15 篇 农学
  • 7 篇 文学
  • 6 篇 教育学
  • 5 篇 艺术学
  • 3 篇 军事学

主题

  • 24 篇 semantics
  • 17 篇 computational mo...
  • 14 篇 wireless sensor ...
  • 12 篇 computer science
  • 12 篇 optimization
  • 12 篇 data mining
  • 11 篇 training
  • 10 篇 graphics process...
  • 10 篇 web services
  • 9 篇 ordinary differe...
  • 9 篇 quality of servi...
  • 9 篇 algorithm design...
  • 9 篇 software
  • 9 篇 cloud computing
  • 9 篇 forecasting
  • 8 篇 conferences
  • 8 篇 wireless communi...
  • 8 篇 bandwidth
  • 8 篇 servers
  • 8 篇 computers

机构

  • 87 篇 state key lab. f...
  • 66 篇 state key lab. o...
  • 46 篇 state key lab. o...
  • 35 篇 university of ch...
  • 33 篇 state key lab. o...
  • 28 篇 state key lab. o...
  • 26 篇 computer school ...
  • 22 篇 state key lab. o...
  • 21 篇 state key lab. o...
  • 18 篇 school of comput...
  • 16 篇 state key labora...
  • 16 篇 state key lab. o...
  • 16 篇 school of comput...
  • 15 篇 state key lab. f...
  • 14 篇 department of co...
  • 11 篇 state key lab. o...
  • 11 篇 college of compu...
  • 10 篇 graduate univers...
  • 10 篇 nanjing universi...
  • 9 篇 international sc...

作者

  • 21 篇 zhan naijun
  • 21 篇 xue bai
  • 17 篇 liu jin
  • 16 篇 xia gui-song
  • 14 篇 pan zhigeng
  • 12 篇 cai deng
  • 12 篇 he xiaofei
  • 12 篇 sheng zhang
  • 11 篇 zhuzhong qian
  • 11 篇 jie wu
  • 11 篇 chen jiming
  • 10 篇 wang hongan
  • 10 篇 f. richard yu
  • 9 篇 jiming chen
  • 9 篇 shen xuemin
  • 9 篇 fuchun sun
  • 9 篇 sanglu lu
  • 9 篇 zhang yunquan
  • 9 篇 chen hongsheng
  • 9 篇 he yanxiang

语言

  • 1,058 篇 英文
  • 43 篇 中文
  • 12 篇 其他
检索条件"机构=State Key Lab. of Computer Architecture"
1113 条 记 录,以下是1-10 订阅
排序:
Synthesizing Invariants for Polynomial Programs by Semidefinite Programming
收藏 引用
ACM Transactions on Programming Languages and Systems 2025年 第1期47卷 1-35页
作者: Wu, Hao Wang, Qiuye Xue, Bai Zhan, Naijun Zhi, Lihong Yang, Zhi-Hong State Key Lab. of Computer Sciences Institute of Software Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Fermat Labs Huawei Inc. Dongguan China Key Lab. of System Software and State Key Lab. of Computer Science Institute of Software Chinese Academy of Sciences Beijing China Key Laboratory of High Confidence Software Technology School of Computer Science Peking University Beijing China School of Mathematics and Statistics Central South University Changsha China
Constraint-solving-based program invariant synthesis takes a parametric invariant template and encodes the (inductive) invariant conditions into constraints. The problem of characterizing the set of all valid paramete... 详细信息
来源: 评论
Improving prompt tuning-based software vulnerability assessment by fusing source code and vulnerability description
收藏 引用
Automated Software Engineering 2025年 第2期32卷 1-29页
作者: Wang, Jiyu Chen, Xiang Pei, Wenlong Yang, Shaoyu School of Artificial Intelligence and Computer Science Nantong University Jiangsu Nantong China State Key Lab. for Novel Software Technology Nanjing University Jiangsu Nanjing China
To effectively allocate resources for vulnerability remediation, it is crucial to prioritize vulnerability fixes based on vulnerability severity. With the increasingnumber of vulnerabilities in recent years, there is ... 详细信息
来源: 评论
ESA: Example Sieve Approach for Multi-Positive and Unlab.led Learning  25
ESA: Example Sieve Approach for Multi-Positive and Unlabeled...
收藏 引用
18th ACM International Conference on Web Search and Data Mining, WSDM 2025
作者: Li, Zhongnian Wei, Meng Ying, Peng Xu, Xinzheng School of Computer Science and Technology China University of Mining and Technology Xuzhou China Mine Digitization Engineering Research Center of the Ministry of Education Xuzhou China State Key Lab. for Novel Software Technology Nanjing University Nanjing China
Learning from Multi-Positive and Unlab.led (MPU) data has gradually attracted significant attention from practical applications. Unfortunately, the risk of MPU also suffer from the shift of minimum risk, particularly ... 详细信息
来源: 评论
Poster Abstract: IMU-assisted Image Stitching for Scenes with Obstructions Based on Camera Motion Sensing  25
Poster Abstract: IMU-assisted Image Stitching for Scenes wit...
收藏 引用
Proceedings of the 23rd ACM Conference on Embedded Networked Sensor Systems
作者: Saibing Han Yanling Bu Yanchao Zhao Lei Xie College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China State Key Lab. for Novel Software Technology Nanjing University Nanjing China
Image stitching is often affected by obstructions such as pedestrians and vehicles. Traditional methods often ignore obstructions or retain them, leading to artifacts. They also cause edge distortion due to fixed-pers... 详细信息
来源: 评论
Toward Covert and Reliable Communication for Anti-eavesdropping Transmission in V2X Networks
收藏 引用
IEEE Transactions on Wireless Communications 2025年
作者: Xu, Rui Li, Gaolei Wu, Jun Li, Jianhua Zhao, Yue Liu, Yuchen Chen, Mingzhe Shanghai Jiao Tong University School of Electronic Information and Electrical Engineering Shanghai200030 China Xidian University State Key Lab. of ISN School of Telecommunication Engineering Shaanxi 710071 China North Carolina State University Department of Computer Science Raleigh27607 United States University of Miami Department of Electrical and Computer Engineering Coral Gables33156 United States
The integration of covert communication in vehicle-to-everything (V2X) network has recently shown great potential to improve efficiency and reliability of data transmission under adversarial eavesdropping scenarios. I... 详细信息
来源: 评论
Fairness-Aware Incentive Mechanism for Multi-Server Federated Learning in Edge-Enabled Wireless Networks with Differential Privacy
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Yang, Yu Peng, Kai Wang, Shangguang Xu, Xiaolong Xiao, Peiyun Leung, Victor C.M Huaqiao University College of Engineering Quanzhou362021 China Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China Nanjing University of Information Science and Technology School of Software Nanjing China Nanjing University State Key Lab. for Novel Software Technology Nanjing210093 China Shenzhen University College of the Computer Science and Software Engineering Shenzhen518060 China University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada
As a distributed machine learning method, federated learning (FL) can collab.ratively train a global model with multiple devices without sharing the original data, thus protecting certain privacy. However, due to the ... 详细信息
来源: 评论
DRL-Based Optimization for AoI and Energy Consumption in C-V2X Enabled IoV
IEEE Transactions on Green Communications and Networking
收藏 引用
IEEE Transactions on Green Communications and Networking 2025年
作者: Zhang, Zheng Wu, Qiong Fan, Pingyi Cheng, Nan Chen, Wen Letaief, Khaled B. Jiangnan University School of Internet of Things Engineering Wuxi214122 China Tsinghua University Beijing National Research Center for Information Science and Technology Department of Electronic Engineering State Key laboratory of Space Network and Communications Tsinghua University Beijing100084 China Xidian University State Key Lab. of ISN School of Telecom-munications Engineering Xi'an710071 China Shanghai Jiao Tong University Department of Electronic Engineering Shanghai200240 China Department of Electrical and Computer Engineer-ing Hong Kong
To address communication latency issues, the Third Generation Partnership Project (3GPP) has defined Cellular-Vehicle to Everything (C-V2X) technology, which includes Vehicle-to-Vehicle (V2V) communication for direct ... 详细信息
来源: 评论
POSTER: STAR (Space-Time Adaptive and Reductive) Algorithms for Real-World Space-Time Optimality
收藏 引用
ACM SIGPLAN Notices 2017年 第8期52卷 455-456页
作者: Tang, Yuan You, Ronghui School of Computer Science School of Software Fudan University Shanghai Key Lab. of Intelligent Information Processing State Key Lab. of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China
It's important to hit a space-time balance for a real-world algorithm to achieve high performance on modern shared-memory multi-core or many-core systems. However, a large class of dynamic programs with more than ... 详细信息
来源: 评论
The NeRF Signature: Codebook-Aided Watermarking for Neural Radiance Fields
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 第6期47卷 4652-4667页
作者: Ziyuan Luo Anderson Rocha Boxin Shi Qing Guo Haoliang Li Renjie Wan Department of Computer Science Hong Kong Baptist University Hong Kong SAR China Artificial Intelligence Lab. Recod.ai Institute of Computing University of Campinas Campinas Brazil State Key Laboratory of Multimedia Information Processing and National Engineering Research Center of Visual Technology School of Computer Science Peking University Beijing China IHPC and CFAR Agency for Science Technology and Research (A*STAR) Singapore Department of Electrical Engineering City University of Hong Kong Kowloon Hong Kong
Neural Radiance Fields (NeRF) have been gaining attention as a significant form of 3D content representation. With the proliferation of NeRF-based creations, the need for copyright protection has emerged as a critical... 详细信息
来源: 评论
Adaptive foreground and shadow segmentation using hidden conditional random fields
收藏 引用
Journal of Zhejiang University-Science A(Applied Physics & Engineering) 2007年 第4期8卷 586-592页
作者: CHU Yi-ping YE Xiu-zi QIAN Jiang ZHANG Yin ZHANG San-yuan School of Computer Science State Key Lab. of CAD & CG Zhejiang University Hangzhou 310027 China
Video object segmentation is important for video surveillance, object tracking, video object recognition and video editing. An adaptive video segmentation algorithm based on hidden conditional random fields (HCRFs) is... 详细信息
来源: 评论