咨询与建议

限定检索结果

文献类型

  • 6,333 篇 会议
  • 4,558 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 10,906 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,439 篇 工学
    • 5,600 篇 计算机科学与技术...
    • 4,597 篇 软件工程
    • 1,382 篇 信息与通信工程
    • 966 篇 控制科学与工程
    • 674 篇 电气工程
    • 667 篇 生物工程
    • 569 篇 电子科学与技术(可...
    • 557 篇 机械工程
    • 425 篇 光学工程
    • 331 篇 生物医学工程(可授...
    • 301 篇 化学工程与技术
    • 274 篇 仪器科学与技术
    • 219 篇 网络空间安全
    • 203 篇 动力工程及工程热...
    • 190 篇 建筑学
    • 180 篇 土木工程
    • 178 篇 安全科学与工程
    • 174 篇 交通运输工程
    • 170 篇 材料科学与工程(可...
  • 3,530 篇 理学
    • 2,143 篇 数学
    • 754 篇 物理学
    • 738 篇 生物学
    • 600 篇 统计学(可授理学、...
    • 400 篇 系统科学
    • 311 篇 化学
  • 2,097 篇 管理学
    • 1,236 篇 管理科学与工程(可...
    • 927 篇 图书情报与档案管...
    • 399 篇 工商管理
  • 259 篇 法学
    • 191 篇 社会学
  • 239 篇 医学
    • 198 篇 临床医学
  • 143 篇 经济学
  • 94 篇 教育学
  • 93 篇 农学
  • 37 篇 艺术学
  • 34 篇 文学
  • 27 篇 军事学
  • 2 篇 哲学

主题

  • 295 篇 semantics
  • 255 篇 computer science
  • 223 篇 laboratories
  • 213 篇 feature extracti...
  • 190 篇 computational mo...
  • 173 篇 deep learning
  • 157 篇 optimization
  • 143 篇 data mining
  • 135 篇 training
  • 133 篇 wireless sensor ...
  • 130 篇 software enginee...
  • 129 篇 software
  • 115 篇 algorithm design...
  • 114 篇 image segmentati...
  • 109 篇 accuracy
  • 106 篇 neural networks
  • 105 篇 educational inst...
  • 105 篇 machine learning
  • 104 篇 task analysis
  • 99 篇 predictive model...

机构

  • 1,840 篇 state key labora...
  • 243 篇 national key lab...
  • 210 篇 department of co...
  • 203 篇 university of ch...
  • 175 篇 department of co...
  • 175 篇 state key labora...
  • 132 篇 tianjin key labo...
  • 123 篇 nanjing universi...
  • 110 篇 state key labora...
  • 107 篇 state key labora...
  • 95 篇 school of comput...
  • 93 篇 state key labora...
  • 91 篇 college of compu...
  • 90 篇 school of comput...
  • 88 篇 beijing key labo...
  • 88 篇 college of compu...
  • 88 篇 school of inform...
  • 84 篇 key laboratory o...
  • 79 篇 college of compu...
  • 77 篇 state key labora...

作者

  • 93 篇 gao yang
  • 52 篇 liu yang
  • 49 篇 baowen xu
  • 48 篇 wu gangshan
  • 48 篇 guihai chen
  • 47 篇 zhou zhi-hua
  • 45 篇 junping du
  • 43 篇 sanglu lu
  • 41 篇 limin wang
  • 41 篇 shen furao
  • 41 篇 yin baocai
  • 39 篇 lu sanglu
  • 36 篇 zhang hua
  • 36 篇 zhao jian
  • 34 篇 baocai yin
  • 34 篇 zhang yan
  • 34 篇 shi yinghuan
  • 33 篇 wang wei
  • 31 篇 wanchun dou
  • 30 篇 yang yang

语言

  • 9,141 篇 英文
  • 1,465 篇 其他
  • 319 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novel Software Technology Computer Science and Technology"
10906 条 记 录,以下是451-460 订阅
排序:
Global-Semantic Alignment Distillation for Partial Multi-view Classification  39
Global-Semantic Alignment Distillation for Partial Multi-vie...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Wang, Xiaoli Huang, Anqi Wang, Yongli Ke, Guanzhou Hong, Xiaobin Liu, Jun School of Computer Science and Engineering Nanjing University of Science and Technology Nanjing210000 China School of Economics and Management Beijing Jiaotong University Beijing100080 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing210023 China School of Computing and Communications Lancaster University Lancaster United Kingdom
Partial multi-view classification (PMvC) poses a significant challenge due to the incomplete nature of multi-view data, which complicates effective information fusion and accurate classification. Existing PMvC methods... 详细信息
来源: 评论
Ant: An Efficient Lossless Compression Algorithm for IoT Time Series Data  21
Ant: An Efficient Lossless Compression Algorithm for IoT Tim...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Li, Junhui Xu, Guangping Yang, Hongzhang Wu, Yulei Tianjin University of Technology School of Computer Science and Engineering Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China University of Bristol Faculty of Science and Engineering Bristol United Kingdom
In various applications in Internet of Things like industrial monitoring, large amounts of floating-point time series data are generated at an unprecedented rate. Efficient compression algorithms can effectively reduc... 详细信息
来源: 评论
SQCC: Stable Queue Congestion Control  14
SQCC: Stable Queue Congestion Control
收藏 引用
14th International Conference on Network of the Future, NoF 2023
作者: Tang, Jian Xu, Tingting Wang, Liming Lin, Zhenjie Zhao, Ming Wang, Xiaoliang Nguyen, Cam-Tu Tian, Chen Qian, Zhuzhong Li, Wenzhong Nanjing University State Key Laboratory for Novel Software Technology China Csg China Southern Power Grid Digital Platform Technology Company China
The advent of high-speed networks has revolutionized data center capabilities by providing low latency and high bandwidth for applications. However, traditional TCP congestion control algorithms are no longer adequate... 详细信息
来源: 评论
MIRNet: A Robust RGBT Tracking Jointly with Multi-Modal Interaction and Refinement
MIRNet: A Robust RGBT Tracking Jointly with Multi-Modal Inte...
收藏 引用
2022 IEEE International Conference on Multimedia and Expo, ICME 2022
作者: Hou, Ruichao Ren, Tongwei Wu, Gangshan Nanjing University State Key Laboratory for Novel Software Technology Nanjing China
RGBT tracking attempts to design a robust all-weather tracker by integrating the complementary features of visible and thermal spectrums. To explore the latent interdependencies across modalities, we propose a novel r... 详细信息
来源: 评论
Sequence generation model of traditional Chinese medicine  12
Sequence generation model of traditional Chinese medicine
收藏 引用
12th International Conference on Information technology in Medicine and Education, ITME 2022
作者: Duan, Chengzhi Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan China
The application of artificial intelligence in the field of traditional Chinese medicine is more and more extensive, and the related research is also more and more. Increasingly, the electronic processing of TCM textua... 详细信息
来源: 评论
Hardware Computation Graph for DNN Accelerator Design Automation Without Inter-PU Templates
收藏 引用
IEEE Transactions on computer-Aided Design of Integrated Circuits and Systems 2025年
作者: Li, Jun Wang, Wei Li, Wu-Jun Nanjing University National Key Laboratory for Novel Software Technology School of Computer Science Jiangsu Nanjing210023 China
Existing deep neural network (DNN) accelerator design automation (ADA) methods adopt architecture templates to predetermine parts of design choices and then explore the remaining design choices beyond templates. Based... 详细信息
来源: 评论
DIG: Improved DINO for Graffiti Detection
收藏 引用
IEEE Transactions on Systems, Man, and Cybernetics: Systems 2025年 第5期55卷 3557-3569页
作者: Wang, Bingshu Mao, Qianchen Liu, Aifei Chen, Long Chen, C. L. Philip Northwestern Polytechnical University School of Software Xi’an710129 China Shenzhen University Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen518060 China University of Macao Department of Computer and Information Science China South China University of Technology School of Computer Science and Engineering Guangzhou510641 China
Graffiti detection is essential in historic building protection and urban neighborhood management. Graffiti detection has made significant progress in recent years based on the development of deep learning. However, s... 详细信息
来源: 评论
A new method to analyze visual efficiency in interactive web environment
A new method to analyze visual efficiency in interactive web...
收藏 引用
2023 International Conference on computer Graphics, Artificial Intelligence, and Data Processing, ICCAID 2023
作者: Lv, Wen Li, Tingting Xie, Zhenping School of Artificial Intelligence and Computer Science Jiangnan University China Jiangsu Key Laboratory of Media Design and Software Technology China
Interactive web interfaces are widely used, yet users often struggle to discover important and useful information. Psychologists have pointed out that in the process of human visual perception, the global topological ... 详细信息
来源: 评论
SAT-based Formal Verification of Fault Injection Countermeasures for Cryptographic Circuits∗
IACR Transactions on Cryptographic Hardware and Embedded Sys...
收藏 引用
IACR Transactions on Cryptographic Hardware and Embedded Systems 2024年 第4期2024卷 1-39页
作者: Tan, Huiyu Gao, Pengfei Song, Fu Chen, Taolue Wu, Zhilin ShanghaiTech University Shanghai201210 China Wingsemi Technology Co. Ltd. Shanghai201203 China Bytedance Beijing100098 China Key Laboratory of System Software Chinese Academy of Sciences and State Key Laboratory of Computer Science Institute of Software Chinese Academy of Sciences Beijing100190 China Nanjing Institute of Software Technology Nanjing211135 China Birkbeck University of London WC1E 7HX United Kingdom
Fault injection attacks represent a type of active, physical attack against cryptographic circuits. Various countermeasures have been proposed to thwart such attacks, however, the design and implementation of which ar... 详细信息
来源: 评论
Thoth: Provisioning Over-Committed Memory Resource with Differentiated QoS in Public Clouds  25
Thoth: Provisioning Over-Committed Memory Resource with Diff...
收藏 引用
25th IEEE International Conferences on High Performance Computing and Communications, 9th International Conference on Data science and Systems, 21st IEEE International Conference on Smart City and 9th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Applications, HPCC/DSS/SmartCity/DependSys 2023
作者: Tang, Wenda Zhu, Jiazhen Ai, Tianxiang Li, Guanghui Yu, Bin Yang, Xin Dou, Wanchun China Telecom ESurfing Cloud Beijing China Nanjing University State Key Laboratory for Novel Software Technology Nanjing China
Due to workload fluctuation in virtualized systems running multiple Virtual Machines (VMs), tenants often allocate more memory than actually used to handle peak memory demands. Memory adjustment by reclaiming inactive... 详细信息
来源: 评论