咨询与建议

限定检索结果

文献类型

  • 6,315 篇 会议
  • 4,488 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 10,818 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,357 篇 工学
    • 5,537 篇 计算机科学与技术...
    • 4,556 篇 软件工程
    • 1,351 篇 信息与通信工程
    • 936 篇 控制科学与工程
    • 665 篇 生物工程
    • 633 篇 电气工程
    • 553 篇 机械工程
    • 550 篇 电子科学与技术(可...
    • 416 篇 光学工程
    • 325 篇 生物医学工程(可授...
    • 299 篇 化学工程与技术
    • 270 篇 仪器科学与技术
    • 206 篇 网络空间安全
    • 201 篇 动力工程及工程热...
    • 185 篇 建筑学
    • 175 篇 土木工程
    • 172 篇 安全科学与工程
    • 168 篇 材料科学与工程(可...
    • 166 篇 交通运输工程
  • 3,499 篇 理学
    • 2,132 篇 数学
    • 740 篇 物理学
    • 737 篇 生物学
    • 600 篇 统计学(可授理学、...
    • 398 篇 系统科学
    • 305 篇 化学
  • 2,080 篇 管理学
    • 1,223 篇 管理科学与工程(可...
    • 921 篇 图书情报与档案管...
    • 398 篇 工商管理
  • 258 篇 法学
    • 190 篇 社会学
  • 234 篇 医学
    • 193 篇 临床医学
  • 143 篇 经济学
  • 93 篇 教育学
  • 93 篇 农学
  • 37 篇 艺术学
  • 34 篇 文学
  • 27 篇 军事学
  • 2 篇 哲学

主题

  • 297 篇 semantics
  • 255 篇 computer science
  • 223 篇 laboratories
  • 208 篇 feature extracti...
  • 188 篇 computational mo...
  • 169 篇 deep learning
  • 155 篇 optimization
  • 142 篇 data mining
  • 133 篇 wireless sensor ...
  • 131 篇 training
  • 129 篇 software enginee...
  • 129 篇 software
  • 117 篇 algorithm design...
  • 110 篇 image segmentati...
  • 108 篇 accuracy
  • 105 篇 neural networks
  • 105 篇 educational inst...
  • 104 篇 task analysis
  • 103 篇 machine learning
  • 97 篇 conferences

机构

  • 1,836 篇 state key labora...
  • 242 篇 national key lab...
  • 207 篇 department of co...
  • 201 篇 university of ch...
  • 176 篇 state key labora...
  • 172 篇 department of co...
  • 132 篇 tianjin key labo...
  • 118 篇 nanjing universi...
  • 113 篇 state key labora...
  • 109 篇 state key labora...
  • 95 篇 school of comput...
  • 94 篇 state key labora...
  • 92 篇 school of inform...
  • 91 篇 school of comput...
  • 90 篇 college of compu...
  • 88 篇 beijing key labo...
  • 87 篇 college of compu...
  • 84 篇 key laboratory o...
  • 80 篇 college of compu...
  • 77 篇 state key labora...

作者

  • 91 篇 gao yang
  • 53 篇 liu yang
  • 49 篇 baowen xu
  • 48 篇 wu gangshan
  • 48 篇 guihai chen
  • 47 篇 sanglu lu
  • 46 篇 zhou zhi-hua
  • 45 篇 junping du
  • 41 篇 limin wang
  • 41 篇 shen furao
  • 40 篇 yin baocai
  • 39 篇 lu sanglu
  • 36 篇 zhang hua
  • 36 篇 zhao jian
  • 35 篇 shi yinghuan
  • 34 篇 baocai yin
  • 34 篇 wang wei
  • 34 篇 zhang yan
  • 31 篇 wanchun dou
  • 30 篇 zhenyu chen

语言

  • 9,405 篇 英文
  • 1,112 篇 其他
  • 315 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novel Software Technology Computer Science and Technology"
10818 条 记 录,以下是141-150 订阅
排序:
Adaptive loitering anomaly detection based on motion states
收藏 引用
Multimedia Tools and Applications 2024年 1-25页
作者: Li, Hongjun Huang, Xiezhou School of Information Science and Technology Nantong University 9 Seyuan Road Jiangsu Province Nantong226019 China State Key Laboratory of Novel Software Technology Nanjing University Jiangsu Nanjing210023 China
In the field of video surveillance security in public places, loitering anomaly detection is a very critical part. Currently, the detection targets often face difficulties in loitering anomaly detection due to the com... 详细信息
来源: 评论
Constraint-aware and multi-objective optimization for micro-service composition in mobile edge computing
Constraint-aware and multi-objective optimization for micro-...
收藏 引用
作者: Wu, Jintao Zhang, Jingyi Zhang, Yiwen Wen, Yiping School of Software Nanjing University of Information Science and Technology Nanjing China School of Computer Science and Technology Anhui University Anhui China Hunan Key Laboratory for Service Computing and Novel Software Technology Hunan University of Science and Technology Hunan China
As a new paradigm of distributed computing, mobile edge computing (MEC) has gained increasing attention due to its ability to expand the capabilities of centralized cloud computing. In MEC environments, a software app... 详细信息
来源: 评论
A sharding blockchain-based UAV system for search and rescue missions
收藏 引用
Frontiers of computer science 2025年 第3期19卷 103-118页
作者: Xihan ZHANG Jiashuo ZHANG Jianbo GAO Libin XIA Zhi GUAN Hao HU Zhong CHEN School of Computer Science Peking UniversityBeijing 100871China Peking University Chongqing Research Institute of Big Data Chongqing 401329China National Engineering Research Center for Software Engineering Peking UniversityBeijing 100871China State Key Lab for Novel Software Technology Nanjing UniversityNanjing 210023China
Sharding is a promising technique to tackle the critical weakness of scalability in blockchain-based unmanned aerial vehicle(UAV)search and rescue(SAR)*** breaking up the blockchain network into smaller partitions cal... 详细信息
来源: 评论
Explainable AI: A Way to Achieve Trustworthy AI  10
Explainable AI: A Way to Achieve Trustworthy AI
收藏 引用
10th IEEE Conference on Big Data Security on Cloud, BigDataSecurity 2024
作者: Li, Yanlu Xiao, Yufeng Gong, Yinyan Zhang, Ronglin Huo, Yingzi Wu, Yanbing Hunan Key Laboratory for Service Computing Novel Software Technology Xiangtan411201 China Hunan University of Science and Technology School of Computer Science and Engineering Xiangtan411201 China
AI is black-box and non-explainable, in other words, due to the complexity of the decision-making process of AI, people are unable to know why and how AI makes the decision. For these reasons, people will question and... 详细信息
来源: 评论
Quantum Pseudorandom Scramblers  22nd
Quantum Pseudorandom Scramblers
收藏 引用
22nd Theory of Cryptography Conference, TCC 2024
作者: Lu, Chuhan Qin, Minglong Song, Fang Yao, Penghui Zhao, Mingnan Computer Science Department Portland State University Portland United States State Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China Hefei National Laboratory Hefei230088 China
Quantum pseudorandom state generators (PRSGs) have stimulated exciting developments in recent years. A PRSG, on a fixed initial (e.g., all-zero) state, produces an output state that is computationally indistinguishabl... 详细信息
来源: 评论
Specification and counterexample generation for cyber-physical systems
收藏 引用
Soft Computing 2024年 第17-18期28卷 9137-9155页
作者: Li, Zhen Cao, Zining Wang, Fujun Xing, Chao College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Jiangsu Nanjing211106 China Science and Technology on Electro-optic Control Laboratory Henan Luoyang471000 China Collaborative Innovation Center of Novel Software Technology and Industrializaton Nanjing University of Aeronautics and Astronautics Jiangsu Nanjing210023 China Key Laboratory of Safety-Critical Software Ministry of Industry and Information Technology Jiangsu Nanjing211106 China
Cyber-Physical Systems (CPS) are complex systems that integrate information control devices with physical resources, which can be automatically and formalized verified by model checking according to the expected requi... 详细信息
来源: 评论
Evaluation of TCP Variants on Dynamic UAV Networks  26
Evaluation of TCP Variants on Dynamic UAV Networks
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Fei, Junkai Zhu, Xiaojun Zhang, Ruyan Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology China Nanjing University State Key Laboratory of Novel Software Technology Nanjing China
UAV networks are wireless networks composed of dynamic UAVs, characterized by a complex and constantly changing wireless environment. A recent TCP variant, BBR, has been verified to significantly improve packet loss r... 详细信息
来源: 评论
Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1399-1414页
作者: Xixi Yan Jing Zhang Pengyu Cheng Henan Key Laboratory of Network Cryptography Technology Network Information Security and Cryptography LaboratorySchool of SoftwareHenan Polytechnic UniversityJiaozuo454003China School of Computer Science and Technology Henan Polytechnic UniversityJiaozuo454000China
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu... 详细信息
来源: 评论
Space Complexity of Euclidean Clustering  40
Space Complexity of Euclidean Clustering
收藏 引用
40th International Symposium on Computational Geometry, SoCG 2024
作者: Zhu, Xiaoyi Tian, Yuxiang Huang, Lingxiao Huang, Zengfeng School of Data Science Fudan University Shanghai China State Key Laboratory of Novel Software Technology Nanjing University China
The (k,z)-Clustering problem in Euclidean space Rd has been extensively studied. Given the scale of data involved, compression methods for the Euclidean (k,z)-Clustering problem, such as data compression and dimension... 详细信息
来源: 评论
On the robustness of median sampling in noisy evolutionary optimization
收藏 引用
science China(Information sciences) 2021年 第5期64卷 32-44页
作者: Chao BIAN Chao QIAN Yang YU Ke TANG State Key Laboratory for Novel Software Technology Nanjing University Shenzhen Key Laboratory of Computational Intelligence Department of Computer Science and EngineeringSouthern University of Science and Technology
Evolutionary algorithms(EAs) are a sort of nature-inspired metaheuristics, which have wide applications in various practical optimization problems. In these problems, objective evaluations are usually inaccurate, beca... 详细信息
来源: 评论