咨询与建议

限定检索结果

文献类型

  • 6,315 篇 会议
  • 4,488 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 10,818 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,357 篇 工学
    • 5,537 篇 计算机科学与技术...
    • 4,556 篇 软件工程
    • 1,351 篇 信息与通信工程
    • 936 篇 控制科学与工程
    • 665 篇 生物工程
    • 633 篇 电气工程
    • 553 篇 机械工程
    • 550 篇 电子科学与技术(可...
    • 416 篇 光学工程
    • 325 篇 生物医学工程(可授...
    • 299 篇 化学工程与技术
    • 270 篇 仪器科学与技术
    • 206 篇 网络空间安全
    • 201 篇 动力工程及工程热...
    • 185 篇 建筑学
    • 175 篇 土木工程
    • 172 篇 安全科学与工程
    • 168 篇 材料科学与工程(可...
    • 166 篇 交通运输工程
  • 3,499 篇 理学
    • 2,132 篇 数学
    • 740 篇 物理学
    • 737 篇 生物学
    • 600 篇 统计学(可授理学、...
    • 398 篇 系统科学
    • 305 篇 化学
  • 2,080 篇 管理学
    • 1,223 篇 管理科学与工程(可...
    • 921 篇 图书情报与档案管...
    • 398 篇 工商管理
  • 258 篇 法学
    • 190 篇 社会学
  • 234 篇 医学
    • 193 篇 临床医学
  • 143 篇 经济学
  • 93 篇 教育学
  • 93 篇 农学
  • 37 篇 艺术学
  • 34 篇 文学
  • 27 篇 军事学
  • 2 篇 哲学

主题

  • 297 篇 semantics
  • 255 篇 computer science
  • 223 篇 laboratories
  • 208 篇 feature extracti...
  • 188 篇 computational mo...
  • 169 篇 deep learning
  • 155 篇 optimization
  • 142 篇 data mining
  • 133 篇 wireless sensor ...
  • 131 篇 training
  • 129 篇 software enginee...
  • 129 篇 software
  • 117 篇 algorithm design...
  • 110 篇 image segmentati...
  • 108 篇 accuracy
  • 105 篇 neural networks
  • 105 篇 educational inst...
  • 104 篇 task analysis
  • 103 篇 machine learning
  • 97 篇 conferences

机构

  • 1,836 篇 state key labora...
  • 242 篇 national key lab...
  • 207 篇 department of co...
  • 201 篇 university of ch...
  • 176 篇 state key labora...
  • 172 篇 department of co...
  • 132 篇 tianjin key labo...
  • 118 篇 nanjing universi...
  • 113 篇 state key labora...
  • 109 篇 state key labora...
  • 95 篇 school of comput...
  • 94 篇 state key labora...
  • 92 篇 school of inform...
  • 91 篇 school of comput...
  • 90 篇 college of compu...
  • 88 篇 beijing key labo...
  • 87 篇 college of compu...
  • 84 篇 key laboratory o...
  • 80 篇 college of compu...
  • 77 篇 state key labora...

作者

  • 91 篇 gao yang
  • 53 篇 liu yang
  • 49 篇 baowen xu
  • 48 篇 wu gangshan
  • 48 篇 guihai chen
  • 47 篇 sanglu lu
  • 46 篇 zhou zhi-hua
  • 45 篇 junping du
  • 41 篇 limin wang
  • 41 篇 shen furao
  • 40 篇 yin baocai
  • 39 篇 lu sanglu
  • 36 篇 zhang hua
  • 36 篇 zhao jian
  • 35 篇 shi yinghuan
  • 34 篇 baocai yin
  • 34 篇 wang wei
  • 34 篇 zhang yan
  • 31 篇 wanchun dou
  • 30 篇 zhenyu chen

语言

  • 9,405 篇 英文
  • 1,112 篇 其他
  • 315 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novel Software Technology Computer Science and Technology"
10818 条 记 录,以下是241-250 订阅
排序:
Joint Mobile Edge Caching and Pricing: A Mean-Field Game Approach  40
Joint Mobile Edge Caching and Pricing: A Mean-Field Game App...
收藏 引用
40th IEEE International Conference on Data Engineering, ICDE 2024
作者: Xu, Yin Zhang, Xichong Xiao, Mingjun Wu, Jie Liu, An Zhang, Sheng School of Computer Science and Technology University of Science and Technology of China Hefei China Suzhou Institute for Advanced Research University of Science and Technology of China Suzhou China Temple University Department of Computer and Information Sciences Philadelphia United States School of Computer Science and Technology Soochow University Suzhou China Nanjing University State Key Laboratory for Novel Software Technology Nanjing China
In this paper, we investigate the competitive content placement problem in Mobile Edge Caching (MEC) systems, where Edge Data Providers (EDPs) cache appropriate contents and trade them with requesters at a suitable pr... 详细信息
来源: 评论
Reconfigurable Intelligent Surface-Aided Covert Communications: A Multi-User Scenario
收藏 引用
IEEE Transactions on Vehicular technology 2025年 第6期74卷 10052-10057页
作者: Hu, Xiaoyan Zhao, Pengze Xiao, Han Zheng, Tong-Xing Wang, Wenjie Yang, Kun Xi'an Jiaotong University School of Information and Communications Engineering Xi'an710049 China Southeast University National Mobile Communications Research Laboratory Nanjing210096 China Nanjing University State Key Laboratory of Novel Software Technology Nanjing210008 China School of Intelligent Software and Engineering Suzhou215163 China University of Essex School of Computer Science and Electronic Engineering United Kingdom
This paper explores a multi-user covert communication scenario with the assistance of a reconfigurable intelligent surface (RIS). Except a covert user monitored by the warden, there are multiple public users existing ... 详细信息
来源: 评论
Blockchain-Enabled Secure, Fair and Scalable Data Sharing in Zero-Trust Edge-End Environment
收藏 引用
IEEE Journal on Selected Areas in Communications 2025年 第6期43卷 2056-2069页
作者: Xu, Xiaolong Meng, Ke Xiang, Haolong Cui, Guangming Xia, Xiaoyu Dou, Wanchun Nanjing210044 China Nanjing University of Information Science and Technology School of Software and the Jiangsu Province Engineering Research Center of Advanced Computing and Intelligent Services Nanjing210044 China RMIT University School of Computing Technologies MelbourneVIC3000 Australia Nanjing University State Key Laboratory for Novel Software Technology Nanjing210023 China
In edge computing, the Zero-Trust Security Model (ZTSM), as a key enabling technology for next-generation networks, plays a crucial role in providing authentication for addressing data sharing concerns, such as freque... 详细信息
来源: 评论
SoVAR: Build Generalizable Scenarios from Accident Reports for Autonomous Driving Testing  24
SoVAR: Build Generalizable Scenarios from Accident Reports f...
收藏 引用
39th ACM/IEEE International Conference on Automated software Engineering, ASE 2024
作者: Guo, An Zhou, Yuan Tian, Haoxiang Fang, Chunrong Sun, Yunjian Sun, Weisong Gao, Xinyu Luu, Anh Tuan Liu, Yang Chen, Zhenyu State Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China School of Computer Science and Technology Zhejiang Sci-Tech University Hangzhou310018 China College of Computing and Data Science Nanyang Technological University Singapore
Autonomous driving systems (ADSs) have undergone remarkable development and are increasingly employed in safety-critical applications. However, recently reported data on fatal accidents involving ADSs suggests that th... 详细信息
来源: 评论
Combining KNN with AutoEncoder for Outlier Detection
收藏 引用
Journal of computer science & technology 2024年 第5期39卷 1153-1166页
作者: Shu-Zheng Liu Shuai Ma Han-Qing Chen Li-Zhen Cui Jie Ding State Key Laboratory of Software Development Environment Beihang UniversityBeijing 100191China School of Software Shandong UniversityJinan 250100China Joint SDU-NTU Centre for Artificial Intelligence Research Shandong UniversityJinan 250100China School of Computer Science Jiangsu University of Science and TechnologyZhenjiang 212003China
K-nearest neighbor(KNN)is one of the most fundamental methods for unsupervised outlier detection because of its various advantages,e.g.,ease of use and relatively high ***,most data analytic tasks need to deal with hi... 详细信息
来源: 评论
Distantly Supervised Entity Linking with Selection Consistency Constraint  28th
Distantly Supervised Entity Linking with Selection Consiste...
收藏 引用
28th International Conference on Database Systems for Advanced Applications, DASFAA 2023
作者: Dai, Haipeng Meng, Lei Wang, Hancheng Gu, Rong Chen, Siwen Chen, Feng Hu, Wei State Key Laboratory for Novel Software Technology Nanjing University Jiangsu Nanjing210023 China
Entity linking (EL) aims to find entities that the textual mentions refer to from a knowledge base (KB). The performance of current distantly supervised EL methods is not satisfactory under the condition of low-qualit... 详细信息
来源: 评论
Research on Microkernel Integrity Semantics Model and Formal Verification
收藏 引用
Chinese Journal of Electronics 2025年 第1期23卷 43-48页
作者: Zhenjiang Qian Wei Liu Hao Huang State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Department of Computer Science and Technology Nanjing University Nanjing China
Microkernel integrity is an important aspect of security for the whole microkernel system. Many of the research works on microkernel integrity focus on analysis and safeguards against the existing kernel attacks, and ... 详细信息
来源: 评论
Federated Collaborative Graph Neural Networks for Few-shot Graph Classification
收藏 引用
Machine Intelligence Research 2024年 第6期21卷 1077-1091页
作者: Yu Xie Yanfeng Liang Chao Wen A.K.Qin Maoguo Gong School of Computer and Information Technology Shanxi UniversityTaiyuan030000China Key Laboratory of Collaborative Intelligence Systems of Ministry of Education Xidian UniversityXi’an710071China Department of Computer Science and Software Engineering Swinburne University of TechnologyMelbourne3000Australia
Graph neural networks(GNNs)have achieved state-of-the-art performance on graph classification tasks,which aim to pre-dict the class labels of entire graphs and have widespread ***,existing GNN based methods for graph ... 详细信息
来源: 评论
CLIP: Accelerating Features Deployment for Programmable Switch  42
CLIP: Accelerating Features Deployment for Programmable Swit...
收藏 引用
42nd IEEE International Conference on computer Communications, INFOCOM 2023
作者: Xu, Tingting Wang, Xiaoliang Tian, Chen Xiong, Yun Lin, Yun Ye, Baoliu Nanjing University State Key Laboratory for Novel Software Technology Nanjing China Huawei China
Cloud network serves a large number of tenants and a variety of applications. The continuously changing demands require a programmable data plane to achieve fast feature velocity. However, the years-long release cycle... 详细信息
来源: 评论
Finetuning Generative Large Language Models with Discrimination Instructions for Knowledge Graph Completion  23rd
Finetuning Generative Large Language Models with Discrimina...
收藏 引用
23rd International Semantic Web Conference, ISWC 2024
作者: Liu, Yang Tian, Xiaobin Sun, Zequn Hu, Wei State Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China National Institute of Healthcare Data Science Nanjing University Nanjing210093 China
Traditional knowledge graph (KG) completion models learn embeddings to predict missing facts. Recent works attempt to complete KGs in a text-generation manner with large language models (LLMs). However, they need to g... 详细信息
来源: 评论