咨询与建议

限定检索结果

文献类型

  • 6,315 篇 会议
  • 4,488 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 10,818 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,357 篇 工学
    • 5,537 篇 计算机科学与技术...
    • 4,556 篇 软件工程
    • 1,351 篇 信息与通信工程
    • 936 篇 控制科学与工程
    • 665 篇 生物工程
    • 633 篇 电气工程
    • 553 篇 机械工程
    • 550 篇 电子科学与技术(可...
    • 416 篇 光学工程
    • 325 篇 生物医学工程(可授...
    • 299 篇 化学工程与技术
    • 270 篇 仪器科学与技术
    • 206 篇 网络空间安全
    • 201 篇 动力工程及工程热...
    • 185 篇 建筑学
    • 175 篇 土木工程
    • 172 篇 安全科学与工程
    • 168 篇 材料科学与工程(可...
    • 166 篇 交通运输工程
  • 3,499 篇 理学
    • 2,132 篇 数学
    • 740 篇 物理学
    • 737 篇 生物学
    • 600 篇 统计学(可授理学、...
    • 398 篇 系统科学
    • 305 篇 化学
  • 2,080 篇 管理学
    • 1,223 篇 管理科学与工程(可...
    • 921 篇 图书情报与档案管...
    • 398 篇 工商管理
  • 258 篇 法学
    • 190 篇 社会学
  • 234 篇 医学
    • 193 篇 临床医学
  • 143 篇 经济学
  • 93 篇 教育学
  • 93 篇 农学
  • 37 篇 艺术学
  • 34 篇 文学
  • 27 篇 军事学
  • 2 篇 哲学

主题

  • 297 篇 semantics
  • 255 篇 computer science
  • 223 篇 laboratories
  • 208 篇 feature extracti...
  • 188 篇 computational mo...
  • 169 篇 deep learning
  • 155 篇 optimization
  • 142 篇 data mining
  • 133 篇 wireless sensor ...
  • 131 篇 training
  • 129 篇 software enginee...
  • 129 篇 software
  • 117 篇 algorithm design...
  • 110 篇 image segmentati...
  • 108 篇 accuracy
  • 105 篇 neural networks
  • 105 篇 educational inst...
  • 104 篇 task analysis
  • 103 篇 machine learning
  • 97 篇 conferences

机构

  • 1,836 篇 state key labora...
  • 242 篇 national key lab...
  • 207 篇 department of co...
  • 201 篇 university of ch...
  • 176 篇 state key labora...
  • 172 篇 department of co...
  • 132 篇 tianjin key labo...
  • 118 篇 nanjing universi...
  • 113 篇 state key labora...
  • 109 篇 state key labora...
  • 95 篇 school of comput...
  • 94 篇 state key labora...
  • 92 篇 school of inform...
  • 91 篇 school of comput...
  • 90 篇 college of compu...
  • 88 篇 beijing key labo...
  • 87 篇 college of compu...
  • 84 篇 key laboratory o...
  • 80 篇 college of compu...
  • 77 篇 state key labora...

作者

  • 91 篇 gao yang
  • 53 篇 liu yang
  • 49 篇 baowen xu
  • 48 篇 wu gangshan
  • 48 篇 guihai chen
  • 47 篇 sanglu lu
  • 46 篇 zhou zhi-hua
  • 45 篇 junping du
  • 41 篇 limin wang
  • 41 篇 shen furao
  • 40 篇 yin baocai
  • 39 篇 lu sanglu
  • 36 篇 zhang hua
  • 36 篇 zhao jian
  • 35 篇 shi yinghuan
  • 34 篇 baocai yin
  • 34 篇 wang wei
  • 34 篇 zhang yan
  • 31 篇 wanchun dou
  • 30 篇 zhenyu chen

语言

  • 9,405 篇 英文
  • 1,112 篇 其他
  • 315 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novel Software Technology Computer Science and Technology"
10818 条 记 录,以下是351-360 订阅
排序:
Tabular Insights, Visual Impacts: Transferring Expertise from Tables to Images  41
Tabular Insights, Visual Impacts: Transferring Expertise fro...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Jiang, Jun-Peng Ye, Han-Jia Wang, Leye Yang, Yang Jiang, Yuan Zhan, De-Chuan School of Artificial Intelligence Nanjing University Nanjing China National Key Laboratory for Novel Software Technology Nanjing University Nanjing China Ministry of Education & School of Computer Science Peking University Beijing China School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing China
Transferring knowledge across diverse data modalities is receiving increasing attention in machine learning. This paper tackles the task of leveraging expert-derived, yet expensive, tabular data to enhance image-based... 详细信息
来源: 评论
Robust Deep One-Class Classification Time Series Anomaly Detection
收藏 引用
computers, Materials & Continua 2025年 第6期83卷 5181-5197页
作者: Zhengdao Yang Xuewei Wang Yuling Chen Hui Dou Haiwei Sang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550000China College of Computer Science and Technology Weifang University of Science and TechnologyWeifang261000China School of Mathematics and Big Data Guizhou Education UniversityGuiyang550018China
Anomaly detection(AD)in time series data is widely applied across various industries for monitoring and security applications,emerging as a key research focus within the field of deep *** many methods based on differe... 详细信息
来源: 评论
Efficient Algorithms for Empirical Group Distributionally Robust Optimization and Beyond  41
Efficient Algorithms for Empirical Group Distributionally Ro...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Yu, Dingzhi Cai, Yunuo Jiang, Wei Zhang, Lijun National Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Data Science Fudan University Shanghai China Guangzhou China
In this paper, we investigate the empirical counterpart of Group Distributionally Robust Optimization (GDRO), which aims to minimize the maximal empirical risk across m distinct groups. We formulate empirical GDRO as ... 详细信息
来源: 评论
Efficient Federated Learning Using Dynamic Update and Adaptive Pruning with Momentum on Shared Server Data
收藏 引用
ACM Transactions on Intelligent Systems and technology 2024年 第6期15卷 1-28页
作者: Liu, Ji Jia, Juncheng Zhang, Hong Yun, Yuhui Wang, Leye Zhou, Yang Dai, Huaiyu Dou, Dejing Hithink RoyalFlush Information Network Co. Ltd. Hangzhou China School of Computer Science and Technology Soochow University Suzhou China Collaborative Innovation Center of Novel Software Technology and Industrialization Nanjing China Baidu Research Beijing China Key Lab of High Confidence Software Technologies Ministry of Education and Software Institute Peking University Beijing China Department of Computer Science and Software Engineering Auburn University AuburnAL United States Department of Electrical and Computer Engineering North Carolina State University RaleighNC United States Bedi Cloud and School of Computer Science Fudan University Beijing China
Despite achieving remarkable performance, Federated Learning (FL) encounters two important problems, i.e., low training efficiency and limited computational resources. In this article, we propose a new FL framework, i... 详细信息
来源: 评论
User story clustering in agile development:a framework and an empirical study
收藏 引用
Frontiers of computer science 2023年 第6期17卷 43-59页
作者: Bo YANG Xiuyin MA Chunhui WANG Haoran GUO Huai LIU Zhi JIN School of Information Science and Technology Beijing Forestry UniversityBeijing 100083China Engineering Research Center for Forestry Oriented Intelligent Information Processing National Forestry and Grassland AdministrationBeijing 100083China School of Information Science and Technology North China University of TechnologyBeijing 100144China College of Computer Science and Technology Inner Mongolia Normal UniversityHohhot 010020China Department of Computer Science and Software Engineering Swinburne University of TechnologyHawthorn VIC 3122Australia Key Laboratory of High Confidence Software Technologies(Peking University) Ministry of EducationBeijing 100871China Institute of Software School of Computer SciencePeking UniversityBeijing 100871China
Agile development aims at rapidly developing software while embracing the continuous evolution of user requirements along the whole development *** stories are the primary means of requirements collection and elicitat... 详细信息
来源: 评论
Discrete Geometric Coded Data Layout for Large-scale Object Storage Systems  21
Discrete Geometric Coded Data Layout for Large-scale Object ...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Tian, Yi Xu, Guangping Yang, Hongzhang Ni, Yue Cao, JiaXin Yang, Lei Tianjin University of Technology School of Computer Science and Engineering Tianjin China Novel Software Technology Tianjin Key Laboratory of Intelligence Computing Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China Information Technology Co. Ltd. China
Regenerating codes are new network codes proposed to reduce the data required for fault repair, which can improve the recovery efficiency of faulty nodes in data storage systems. However, unlike Reed-Solomon code, whi... 详细信息
来源: 评论
eSROP Attack: Leveraging Signal Handler to Implement Turing-Complete Attack Under CFI Defense  1
收藏 引用
18th EAI International Conference on Security and Privacy in Communication Networks, SecureComm 2022
作者: Zhang, Tianning Cai, Miao Zhang, Diming Huang, Hao Department of Computer Science and Technology Nanjing University Nanjing China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China Key Laboratory of Water Big Data Technology of Ministry of Water Resources Hohai University Nanjing China School of Computer and Information Hohai University Nanjing China College of Computer Engineering Jiangsu University of Science and Technology Nanjing China
Signal Return Oriented Programming (SROP) is a dangerous code reuse attack method. Recently, defense techniques have been proposed to defeat SROP attacks. In this paper, we leverage the signal nesting mechanism provid... 详细信息
来源: 评论
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 473-481页
作者: Qi Li Gaozhan Liu Qianqian Zhang Lidong Han Wei Chen Rui Li Jinbo Xiong School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Key Laboratory of Cryptography of Zhejiang Province Hangzhou Normal UniversityHangzhou 311121China Tongda College of Nanjing University of Posts and Telecommunications Yangzhou 225127China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China School of Computer Science and Technology Xidian UniversityXi'an 710071China State Key Laboratory of Tibetan Intelligent Information Processing and Application Qinghai Normal UniversityXining 810008China Faculty of Software Fujian Normal UniversityFuzhou 350108China
Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of *** existing schemes ofte... 详细信息
来源: 评论
RENN: A Rule Embedding Enhanced Neural Network Framework for Temporal Knowledge Graph Completion  30
RENN: A Rule Embedding Enhanced Neural Network Framework for...
收藏 引用
Joint 30th International Conference on Computational Linguistics and 14th International Conference on Language Resources and Evaluation, LREC-COLING 2024
作者: Zong, Linlin Xie, Zhenrong Ma, Chi Liu, Xinyue Zhang, Xianchao Xu, Bo Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province School of Software Dalian University of Technology China School of Computer Science and Technology Dalian University of Technology China Key Laboratory of Social Computing and Cognitive Intelligence Dalian University of Technology Ministry of Education China
Existing approaches encompass deep neural network-based methods for temporal knowledge graph embedding and rule-based logical symbolic reasoning. However, the former may not adequately account for structural dependenc... 详细信息
来源: 评论
GaitCycFormer: Leveraging Gait Cycles and Transformers for Gait Emotion Recognition  39
GaitCycFormer: Leveraging Gait Cycles and Transformers for G...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Zeng, Qingyang Shang, Lin State Key Laboratory for Novel Software Technology Nanjing University China Department of Computer Science and Technology Nanjing University China
Gait Emotion Recognition (GER) is an emerging task within Human Emotion Recognition. Skeleton-based GER requires discriminative spatial and temporal features. However, current methods primarily focus on capturing spat...
来源: 评论