咨询与建议

限定检索结果

文献类型

  • 278 篇 会议
  • 201 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 480 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 332 篇 工学
    • 253 篇 计算机科学与技术...
    • 206 篇 软件工程
    • 69 篇 信息与通信工程
    • 37 篇 控制科学与工程
    • 27 篇 生物工程
    • 24 篇 机械工程
    • 22 篇 光学工程
    • 18 篇 电子科学与技术(可...
    • 17 篇 仪器科学与技术
    • 16 篇 交通运输工程
    • 13 篇 电气工程
    • 12 篇 动力工程及工程热...
    • 12 篇 建筑学
    • 12 篇 生物医学工程(可授...
    • 11 篇 材料科学与工程(可...
    • 10 篇 安全科学与工程
    • 9 篇 土木工程
    • 8 篇 化学工程与技术
    • 6 篇 网络空间安全
  • 122 篇 理学
    • 71 篇 数学
    • 27 篇 生物学
    • 21 篇 统计学(可授理学、...
    • 19 篇 物理学
    • 15 篇 系统科学
    • 14 篇 化学
  • 81 篇 管理学
    • 52 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 17 篇 工商管理
  • 8 篇 法学
    • 5 篇 社会学
  • 8 篇 医学
    • 7 篇 临床医学
  • 4 篇 哲学
  • 4 篇 经济学
  • 3 篇 农学
  • 2 篇 教育学
  • 2 篇 文学
  • 1 篇 艺术学

主题

  • 14 篇 semantics
  • 10 篇 object detection
  • 10 篇 servers
  • 9 篇 feature extracti...
  • 9 篇 software
  • 9 篇 heuristic algori...
  • 7 篇 computational mo...
  • 7 篇 machine learning
  • 7 篇 computer vision
  • 7 篇 training
  • 6 篇 semantic segment...
  • 6 篇 deep learning
  • 6 篇 programming
  • 6 篇 safety
  • 6 篇 educational inst...
  • 6 篇 optimization
  • 6 篇 graph neural net...
  • 6 篇 resource allocat...
  • 6 篇 blockchain
  • 6 篇 satellites

机构

  • 180 篇 school of comput...
  • 158 篇 state key labora...
  • 112 篇 state key labora...
  • 47 篇 state key labora...
  • 23 篇 state key lab of...
  • 20 篇 institute of art...
  • 13 篇 zhongguancun lab...
  • 12 篇 beijing advanced...
  • 12 篇 hangzhou innovat...
  • 11 篇 school of comput...
  • 7 篇 state key labora...
  • 7 篇 sino-french engi...
  • 6 篇 school of mechan...
  • 5 篇 shen yuan honors...
  • 5 篇 school of artifi...
  • 5 篇 beihang universi...
  • 5 篇 beihang universi...
  • 5 篇 school of comput...
  • 5 篇 ping an technolo...
  • 5 篇 state key labora...

作者

  • 41 篇 xiao limin
  • 31 篇 huang di
  • 30 篇 ruan li
  • 29 篇 limin xiao
  • 20 篇 li ruan
  • 18 篇 zhang xiong
  • 17 篇 hao sheng
  • 14 篇 bai xiao
  • 14 篇 di huang
  • 11 篇 wang yunhong
  • 10 篇 li zhoujun
  • 10 篇 chen jiaxin
  • 10 篇 zhu mingfa
  • 9 篇 liu xianglong
  • 8 篇 wenge rong
  • 8 篇 yang hongyu
  • 8 篇 li yongnan
  • 8 篇 xu ke
  • 8 篇 luo jie
  • 7 篇 peng hao

语言

  • 416 篇 英文
  • 57 篇 其他
  • 9 篇 中文
检索条件"机构=State Key Lab.Of Software Development Environment School of Computer Science & Engineering"
480 条 记 录,以下是371-380 订阅
排序:
A efficient and robust method for complexly faulted horizon reconstruction based on meshes cutting and interpolating
A efficient and robust method for complexly faulted horizon ...
收藏 引用
2012 IEEE International Conference on computer science and Automation engineering, CSAE 2012
作者: Li, Jigang Meng, Xianhai Li, Yufeng Yang, Qin State Key Laboratory of Software Development Environment School of Computer Science and Engineering Beihang University Beijing China
3d-geological modeling is a means of improving data interpretation through visualization, as well as a way to generate support for numerical simulations of complex phenomena. Reconstructing horizons from scattered poi... 详细信息
来源: 评论
3D structural geological modeling based on morphing field  1
收藏 引用
International Conference on Information engineering and Applications, IEA 2011
作者: Xianhai, Meng Jigang, Li Qin, Yang State Key Laboratory of Software Development Environment School of Computer Science and Engineering BeiHang University Beijing 100191 China
Strata are continuous surface by sediment, which form fractured and discontinuous geological layers during strata moving. In 3D structural geological modeling, how to describe fractured geological layers well and trul... 详细信息
来源: 评论
Chinese personal name recognition using N-gram model and rules
Chinese personal name recognition using N-gram model and rul...
收藏 引用
2012 7th International Conference on Computing and Convergence Technology (ICCIT, ICEI and ICACT), ICCCT 2012
作者: Lin, Chen Hui, Zhang Zhen'an, Li State Key Laboratory of Software Development Environment Beihang University School of Computer Science and Engineering 100191 Beijing China
Chinese personal name recognition plays an important role in Chinese word segmentation and it's difficult to recognize whether a sequence of characters is a name or not for its complexity. This paper presents a ne... 详细信息
来源: 评论
USO- a new slope one algorithm based on modified user similarity
USO- a new slope one algorithm based on modified user simila...
收藏 引用
2012 International Conference on Information Management, Innovation Management and Industrial engineering, ICIII 2012
作者: Sun, Mingtao Zhang, Hui Song, Shiyu Wu, Kejia State Key Software Development Environment Lab. Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China
Recommendation algorithm based on collaborative filtering strategy has achieved great success in the field of personalized recommendation, However, based on collaborative filtering recommendation algorithm complexity ... 详细信息
来源: 评论
When sparsity meets noise in collaborative filtering
收藏 引用
14th Asia Pacific Web Technology Conference, APWeb 2012
作者: Hu, Biyun Li, Zhoujun Chao, Wenhan State Key Laboratory of Software Development Environment Beihang University China School of Computer Science and Engineering Beihang University Beijing China
Traditionally, it is often assumed that data sparsity is a big problem of user-based collaborative filtering algorithm. However, the analysis is based only on data quantity without considering data quality, which is a... 详细信息
来源: 评论
When a GUI regression test failed, what should be blamed?
When a GUI regression test failed, what should be blamed?
收藏 引用
5th IEEE International Conference on software Testing, Verification and Validation, ICST 2012
作者: Chen, Jin Lin, Mengxiang Yu, Kai Shao, Bing School of Software Beihang University Beijing China School of Computer Science and Engineering Beihang University Beijing China School of Mechanical Engineering and Automation Beihang University Beijing China State Key Laboratory of Software Development Environment Beihang University Beijing China
Script-based automated regression testing is widely used in industry. In this work, we focus on failed tests in a real regression test project. The causes of 197 failed tests produced in automated testing are examined... 详细信息
来源: 评论
Independent domination on tree convex bipartite graphs
Independent domination on tree convex bipartite graphs
收藏 引用
6th International Frontiers of Algorithmics Workshop, FAW 2012 and 8th International Conference on Algorithmic Aspects of Information and Management, AAIM 2012
作者: Song, Yu Liu, Tian Xu, Ke Key Laboratory of High Confidence Software Technologies School of Electronic Engineering and Computer Science Peking University Beijing 100871 China National Lab. of Software Development Environment Beihang University Beijing 100191 China
An independent dominating set in a graph is a subset of vertices, such that every vertex outside this subset has a neighbor in this subset (dominating), and the induced subgraph of this subset contains no edge (indepe... 详细信息
来源: 评论
Personalized video recommendation based on viewing history with the study on YouTube  12
Personalized video recommendation based on viewing history w...
收藏 引用
4th International Conference on Internet Multimedia Computing and Service, ICIMCS 2012
作者: Zhao, Xiaojian Luan, Huanbo Cai, Junjie Yuan, Jin Chen, Xiaoming Li, Zhoujun State Key Laboratory of Software Development Environment Beihang University China School of Computing National University of Singapore Singapore Department of Computer Science University of Texas at San Antonio United States School of Computer Science and Engineering Beihang University China
With internet delivery of video content surging to an un-precedented level, video recommendation has become an important approach for helping people access interesting videos. In this paper, we propose a novel approac... 详细信息
来源: 评论
Malware behavior classification approach based on Naive Bayes
收藏 引用
Journal of Convergence Information Technology 2012年 第5期7卷 203-210页
作者: Zhu, Kenan Yin, Baolin State Key Laboratory of Software Development Environment School of Computer Science and Engineering BeiHang University China
Because of the interference of obfuscation and polymorphism on malware analysis and detection, the dynamic analysis of malware binaries during run-time is becoming a research hotspot in intrusion detection field. Malw... 详细信息
来源: 评论
Towards practical debugging for regression faults
Towards practical debugging for regression faults
收藏 引用
5th IEEE International Conference on software Testing, Verification and Validation, ICST 2012
作者: Yu, Kai Lin, Mengxiang State Key Laboratory of Software Development Environment Beihang University Beijing 100191 China School of Computer Science and Engineering Beihang University Beijing 100191 China School of Mechanical Engineering and Automation Beihang University Beijing 100191 China
Regression faults are inevitably introduced in software development. Identifying and fixing regression faults can be tedious and time-consuming. The goal of my doctoral research is to provide an automated practical te... 详细信息
来源: 评论