咨询与建议

限定检索结果

文献类型

  • 6,333 篇 会议
  • 4,558 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 10,906 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,439 篇 工学
    • 5,600 篇 计算机科学与技术...
    • 4,597 篇 软件工程
    • 1,382 篇 信息与通信工程
    • 966 篇 控制科学与工程
    • 674 篇 电气工程
    • 667 篇 生物工程
    • 569 篇 电子科学与技术(可...
    • 557 篇 机械工程
    • 425 篇 光学工程
    • 331 篇 生物医学工程(可授...
    • 301 篇 化学工程与技术
    • 274 篇 仪器科学与技术
    • 219 篇 网络空间安全
    • 203 篇 动力工程及工程热...
    • 190 篇 建筑学
    • 180 篇 土木工程
    • 178 篇 安全科学与工程
    • 174 篇 交通运输工程
    • 170 篇 材料科学与工程(可...
  • 3,530 篇 理学
    • 2,143 篇 数学
    • 754 篇 物理学
    • 738 篇 生物学
    • 600 篇 统计学(可授理学、...
    • 400 篇 系统科学
    • 311 篇 化学
  • 2,097 篇 管理学
    • 1,236 篇 管理科学与工程(可...
    • 927 篇 图书情报与档案管...
    • 399 篇 工商管理
  • 259 篇 法学
    • 191 篇 社会学
  • 239 篇 医学
    • 198 篇 临床医学
  • 143 篇 经济学
  • 94 篇 教育学
  • 93 篇 农学
  • 37 篇 艺术学
  • 34 篇 文学
  • 27 篇 军事学
  • 2 篇 哲学

主题

  • 295 篇 semantics
  • 255 篇 computer science
  • 223 篇 laboratories
  • 213 篇 feature extracti...
  • 190 篇 computational mo...
  • 173 篇 deep learning
  • 157 篇 optimization
  • 143 篇 data mining
  • 135 篇 training
  • 133 篇 wireless sensor ...
  • 130 篇 software enginee...
  • 129 篇 software
  • 115 篇 algorithm design...
  • 114 篇 image segmentati...
  • 109 篇 accuracy
  • 106 篇 neural networks
  • 105 篇 educational inst...
  • 105 篇 machine learning
  • 104 篇 task analysis
  • 99 篇 predictive model...

机构

  • 1,840 篇 state key labora...
  • 243 篇 national key lab...
  • 210 篇 department of co...
  • 203 篇 university of ch...
  • 175 篇 department of co...
  • 175 篇 state key labora...
  • 132 篇 tianjin key labo...
  • 123 篇 nanjing universi...
  • 110 篇 state key labora...
  • 107 篇 state key labora...
  • 95 篇 school of comput...
  • 93 篇 state key labora...
  • 91 篇 college of compu...
  • 90 篇 school of comput...
  • 88 篇 beijing key labo...
  • 88 篇 college of compu...
  • 88 篇 school of inform...
  • 84 篇 key laboratory o...
  • 79 篇 college of compu...
  • 77 篇 state key labora...

作者

  • 93 篇 gao yang
  • 52 篇 liu yang
  • 49 篇 baowen xu
  • 48 篇 wu gangshan
  • 48 篇 guihai chen
  • 47 篇 zhou zhi-hua
  • 45 篇 junping du
  • 43 篇 sanglu lu
  • 41 篇 limin wang
  • 41 篇 shen furao
  • 41 篇 yin baocai
  • 39 篇 lu sanglu
  • 36 篇 zhang hua
  • 36 篇 zhao jian
  • 34 篇 baocai yin
  • 34 篇 zhang yan
  • 34 篇 shi yinghuan
  • 33 篇 wang wei
  • 31 篇 wanchun dou
  • 30 篇 yang yang

语言

  • 9,141 篇 英文
  • 1,465 篇 其他
  • 319 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novel Software Technology Computer Science and Technology"
10906 条 记 录,以下是431-440 订阅
排序:
Risk Region-based Prediction Model for the Epidemic Spreading  26
Risk Region-based Prediction Model for the Epidemic Spreadin...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Li, Fuwei Lu, Dianjie An, Baoxu Zhang, Guijuan Shandong Normal University School of Information Science and Engineering Jinan250358 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan250358 China State Key Laboratory of High-end Server & Storage Technology Jinan250101 China
Studying the spread process of epidemics in the crowd is a significant topic, which can help to take measures in advance to avoid epidemic spread and reduce the losses of life and property of the general public. Howev... 详细信息
来源: 评论
Towards Cache-Assisted Hierarchical Detection for Real-Time Health Data Monitoring in IoHT
收藏 引用
computers, Materials & Continua 2023年 第11期77卷 2529-2544页
作者: Muhammad Tahir Mingchu Li Irfan Khan Salman AAl Qahtani Rubia Fatima Javed Ali Khan Muhammad Shahid Anwar School of Software Technology Dalian University of Technology(DUT)Dalian116621China School of Software Technology Key Laboratory for Ubiquitous Network and Service Software of Liaoning ProvinceDalian116650China Department of Computer Engineering King Saud UniversityRiyadh11543Saudi Arabia School of Software Tsinghua UniversityBeijing100084China Department of Software Engineering University of Science and TechnologyBanu28100Pakistan Department of AI and Software Gachon UniversitySeongnamsi13120Korea
Real-time health data monitoring is pivotal for bolstering road services’safety,intelligence,and efficiency within the Internet of Health Things(IoHT)***,delays in data retrieval can markedly hinder the efficacy of b... 详细信息
来源: 评论
Adaptive fusion of structure and attribute guided polarized communities search
收藏 引用
Frontiers of computer science 2024年 第1期18卷 255-257页
作者: Fanyi YANG Huifang MA Wentao WANG Zhixin LI Liang CHANG College of Computer Science and Engineering Northwest Normal UniversityLanzhou 730070China Key Lab of Education Blockchain and Intelligent Technology(Ministry of Education) Guangxi Normal UniversityGuilin 541004China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic TechnologyGuilin 541004China
1 Introduction and main contributions The exploration of polarized communities,which consist of two antagonistic subgraphs and include a set of query nodes,is a crucial task in community search on signed *** existing ... 详细信息
来源: 评论
Deep reinforcement learning-based panic crowd evacuation simulation  26
Deep reinforcement learning-based panic crowd evacuation sim...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: An, Baoxu Zhang, Guijuan Li, Fuwei Song, Nianyun Liu, Hong Lu, Dianjie Shandong Normal University School of Information Science and Engineering Jinan250358 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan250358 China State Key Laboratory of High-end Server & Storage Technology Jinan250101 China
Crowd evacuation simulation can provide guidance for public emergencies or mass casualties which is easy to cause crowding and stampede. Deep reinforcement learning is an effective method for the path planning of crow... 详细信息
来源: 评论
Compresso: Latency-Aware Transmission of Compressed IoT Measurement Data Over SDN
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20462-20472页
作者: Feng, Wendi Dou, Xintan Taherkordi, Amir Cheng, Bo Zhang, Wei Beijing Information Science and Technology University College of Computer Science Beijing102206 China Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China University of Oslo Department of Informatics Oslo0316 Norway
Measurement data obtained from "things" in the Internet of Things (IoT) faces challenges in efficient transmission due to the low-bandwidth data transmission link. We observe that measurement data are fixed ... 详细信息
来源: 评论
A Program Logic for Concurrent Randomized Programs in the Oblivious Adversary Model  34th
A Program Logic for Concurrent Randomized Programs in the Ob...
收藏 引用
34th European Symposium on Programming, ESOP 2025, which was held as part of the International Joint Conferences on Theory and Practice of software, ETAPS 2025
作者: Fan, Weijie Liang, Hongjin Feng, Xinyu Jiang, Hanru State Key Laboratory for Novel Software Technology Nanjing University Jiangsu Nanjing210023 China Beijing Institute of Mathematical Sciences and Applications Beijing Beijing101408 China
Concurrent randomized programs in the oblivious adversary model are extremely difficult for modular verification because the interaction between threads is very sensitive to the program structure and the exe... 详细信息
来源: 评论
TSCMR:Two-Stage Cross-Modal Retrieval  9th
TSCMR:Two-Stage Cross-Modal Retrieval
收藏 引用
19th International Conference on Advanced Data Mining and Applications, ADMA 2023
作者: Chen, Zhihao Wang, Hongya School of Computer Science and Technology Donghua University Shanghai China State Key Laboratory of Computer Architecture Institute of Computing Technology CAS Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
Currently, large-scale vision and language models has significantly improved the performances of cross-modal retrieval tasks. However, large-scale models require a substantial amount of computing resources, so the exe... 详细信息
来源: 评论
A Function-Aware Mimic Defense Theory and Its Practice
收藏 引用
China Communications 2024年 第8期21卷 192-210页
作者: He Jiajun Yuan Yali Liang Sichu Fu Jiale Zhu Hongyu Cheng Guang School of Mathematics Southeast UniversityNanjing 211189China School of Cyber Science and Engineering Southeast UniversityNanjing 211189China School of Artificial Intelligence Southeast UniversityNanjing 211189China State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210093China
In recent years,network attacks have been characterized by diversification and scale,which indicates a requirement for defense strategies to sacrifice generalizability for higher *** the latest theoretical achievement... 详细信息
来源: 评论
Abnormal Crowd Behavior Detection Based on the Fusion of Macro and Micro Features  26
Abnormal Crowd Behavior Detection Based on the Fusion of Mac...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Jiao, Shourong Lu, Dianjie Jia, Chuanhua Liu, Hong Zhang, Guijuan Shandong Normal University School of Information Science and Engineering Jinan250358 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan250358 China State Key Laboratory of High-end Server & Storage Technology Jinan250101 China
There are two types of research on abnormal crowd behavior detection: micro modeling methods (e.g., crowd pose) and macro modeling methods (e.g., optical flow methods). In crowd evacuation, however, micro methods fail... 详细信息
来源: 评论
Singular Value Decomposition Based Pedestrian Trajectory Prediction  26
Singular Value Decomposition Based Pedestrian Trajectory Pre...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Wang, Heng Zhang, Guijuan Liu, Hong Lu, Dianjie Shandong Normal University School of Information Science and Engineering Jinan250358 China Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan250358 China State Key Laboratory of High-end Server & Storage Technology Jinan250101 China
Numerous cameras deployed in venues can collect video data, which can be analyzed to help evacuate people in emergency situations. Most surveillance videos can provide data support for pedestrian trajectory prediction... 详细信息
来源: 评论