咨询与建议

限定检索结果

文献类型

  • 6,315 篇 会议
  • 4,488 篇 期刊文献
  • 15 册 图书

馆藏范围

  • 10,818 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7,357 篇 工学
    • 5,537 篇 计算机科学与技术...
    • 4,556 篇 软件工程
    • 1,351 篇 信息与通信工程
    • 936 篇 控制科学与工程
    • 665 篇 生物工程
    • 633 篇 电气工程
    • 553 篇 机械工程
    • 550 篇 电子科学与技术(可...
    • 416 篇 光学工程
    • 325 篇 生物医学工程(可授...
    • 299 篇 化学工程与技术
    • 270 篇 仪器科学与技术
    • 206 篇 网络空间安全
    • 201 篇 动力工程及工程热...
    • 185 篇 建筑学
    • 175 篇 土木工程
    • 172 篇 安全科学与工程
    • 168 篇 材料科学与工程(可...
    • 166 篇 交通运输工程
  • 3,499 篇 理学
    • 2,132 篇 数学
    • 740 篇 物理学
    • 737 篇 生物学
    • 600 篇 统计学(可授理学、...
    • 398 篇 系统科学
    • 305 篇 化学
  • 2,080 篇 管理学
    • 1,223 篇 管理科学与工程(可...
    • 921 篇 图书情报与档案管...
    • 398 篇 工商管理
  • 258 篇 法学
    • 190 篇 社会学
  • 234 篇 医学
    • 193 篇 临床医学
  • 143 篇 经济学
  • 93 篇 教育学
  • 93 篇 农学
  • 37 篇 艺术学
  • 34 篇 文学
  • 27 篇 军事学
  • 2 篇 哲学

主题

  • 297 篇 semantics
  • 255 篇 computer science
  • 223 篇 laboratories
  • 208 篇 feature extracti...
  • 188 篇 computational mo...
  • 169 篇 deep learning
  • 155 篇 optimization
  • 142 篇 data mining
  • 133 篇 wireless sensor ...
  • 131 篇 training
  • 129 篇 software enginee...
  • 129 篇 software
  • 117 篇 algorithm design...
  • 110 篇 image segmentati...
  • 108 篇 accuracy
  • 105 篇 neural networks
  • 105 篇 educational inst...
  • 104 篇 task analysis
  • 103 篇 machine learning
  • 97 篇 conferences

机构

  • 1,836 篇 state key labora...
  • 242 篇 national key lab...
  • 207 篇 department of co...
  • 201 篇 university of ch...
  • 176 篇 state key labora...
  • 172 篇 department of co...
  • 132 篇 tianjin key labo...
  • 118 篇 nanjing universi...
  • 113 篇 state key labora...
  • 109 篇 state key labora...
  • 95 篇 school of comput...
  • 94 篇 state key labora...
  • 92 篇 school of inform...
  • 91 篇 school of comput...
  • 90 篇 college of compu...
  • 88 篇 beijing key labo...
  • 87 篇 college of compu...
  • 84 篇 key laboratory o...
  • 80 篇 college of compu...
  • 77 篇 state key labora...

作者

  • 91 篇 gao yang
  • 53 篇 liu yang
  • 49 篇 baowen xu
  • 48 篇 wu gangshan
  • 48 篇 guihai chen
  • 47 篇 sanglu lu
  • 46 篇 zhou zhi-hua
  • 45 篇 junping du
  • 41 篇 limin wang
  • 41 篇 shen furao
  • 40 篇 yin baocai
  • 39 篇 lu sanglu
  • 36 篇 zhang hua
  • 36 篇 zhao jian
  • 35 篇 shi yinghuan
  • 34 篇 baocai yin
  • 34 篇 wang wei
  • 34 篇 zhang yan
  • 31 篇 wanchun dou
  • 30 篇 zhenyu chen

语言

  • 9,405 篇 英文
  • 1,112 篇 其他
  • 315 篇 中文
  • 2 篇 德文
检索条件"机构=State Key Laboratory for Novel Software Technology Computer Science and Technology"
10818 条 记 录,以下是4871-4880 订阅
排序:
Blockchain-based Solutions for IoT: A Tertiary Study
Blockchain-based Solutions for IoT: A Tertiary Study
收藏 引用
IEEE International Conference on software Quality, Reliability and Security Companion (QRS-C)
作者: Qianwen Xu Xiudi Chen Shanshan Li He Zhang Muhammad Ali Babar Nguyen Khoi Tran State Key Laboratory of Novel Software Technology Software Institute Nanjing University Jiangsu China Cyber Security Cooperative Research Centre University of Adelaide Adelaide Australia
The combination of blockchain and Internet of Things (IoT) brings revolutionary changes to Industry 4.0. However, blockchain technology is immature now and the combination is under exploration. To understand the resea... 详细信息
来源: 评论
Mining minimal failure-causing schema for software complex configuration space
收藏 引用
International Journal of Performability Engineering 2019年 第12期15卷 3253-3261页
作者: Wei, Liangfen Li, Yong Wang, Yong Chen, Xiangyu Xu, Zhaohui Department of Computer Engineering Anhui Sanlian University Hefei23060 China Ministry of Industry and Information Technology Nanjing210000 China Data Security Key Laboratory Xinjiang Normal University Urumqi830054 China State Key Laboratory for Novel Software Technology Nanjing University Nanjing210000 China School of Computer and Information Anhui Polytechnic University Wuhu241000 China Co. LTD. Shanghai201100 China
Minimal failure-causing schema (MFS) may be affected by masking effects in software complex configuration space. A method for mining MFS based on combination testing and its testing results is proposed. The method fir... 详细信息
来源: 评论
Distributed quantum algorithm for discrete logarithm problem
arXiv
收藏 引用
arXiv 2025年
作者: Li, Hao Qiu, Daowen Institute of Quantum Computing and Software School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China The Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China
The quantum algorithm with polynomial time for discrete logarithm problem proposed by Shor is one of the most significant quantum algorithms, but a large number of qubits may be required in the Noisy Intermediate-scal... 详细信息
来源: 评论
Feasible Basic Path Generation Based on Genetic Algorithm  6
Feasible Basic Path Generation Based on Genetic Algorithm
收藏 引用
6th International Conference on Dependable Systems and Their Applications, DSA 2019
作者: Xia, ChunYan Wang, XingYa Qiao, Li Zhang, Yan Ma, Baoying Shi, ChenYang School of Computer and Information Technology Mudanjiang Normal University Mudanjiang China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Health Management Mudanjiang Medical University Mudanjiang China
In this paper, a feasible basic path generation method based on a genetic algorithm is proposed, which combines a probabilistic statistical method with a genetic algorithm to generate a feasible basic path. First, con... 详细信息
来源: 评论
Feasible Basic Path Generation Based on Genetic Algorithm
Feasible Basic Path Generation Based on Genetic Algorithm
收藏 引用
International Conference on Dependable Systems and Their Applications (DSA)
作者: ChunYan Xia XingYa Wang Li Qiao Yan Zhang Baoying Ma ChenYang Shi School of Computer and Information Technology Mudanjiang Normal University Mudanjiang China State Key Laboratory for Novel Software Technology Nanjing University Nanjing China School of Health Management Mudanjiang Medical University Mudanjiang China
In this paper, a feasible basic path generation method based on a genetic algorithm is proposed, which combines a probabilistic statistical method with a genetic algorithm to generate a feasible basic path. First, con... 详细信息
来源: 评论
Meta-Knowledge Transfer for Inductive Knowledge Graph Embedding
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Mingyang Zhang, Wen Zhu, Yushan Zhou, Hongting Yuan, Zonggang Xu, Changliang Chen, Huajun College of Computer Science and Technology Zhejiang University China School of Software Technology Zhejiang University China Huawei Technologies Co. Ltd China State Key Laboratory of Media Convergence Production Technology and Systems Beijing China ZJU Hangzhou Global Scientific and Technological Innovation Center Alibaba-Zhejiang University Joint Institute of Frontier Technologies China
Knowledge graphs (KGs) consisting of a large number of triples have become widespread recently, and many knowledge graph embedding (KGE) methods are proposed to embed entities and relations of a KG into continuous vec... 详细信息
来源: 评论
A novel eemd-based privacy preserving approach for top-k snps query in genome-wide association studies  6
A Novel eemd-based privacy preserving approach for top-k snp...
收藏 引用
6th IEEE International Conference on Control science and Systems Engineering, ICCSSE 2020
作者: Xiaoyun, He Hao, Guo Hongsong, Chen Global Energy Interconnection Research Institute Co Ltd State Grid Key Laboratory of Information Network Security Beijing China University of Science and Technology Beijing School of Computer Communication Engineering Beijing China
Genome-wide association studies (GWAS) have been a popular method for querying Top-k most significant sets of singe-nucleotide polymorphism locations (SNPs) to discover the genetic factors of diseases. Doctors have be... 详细信息
来源: 评论
Multiple Feature Fusion-based Video Face Tracking for IoT Big Data
arXiv
收藏 引用
arXiv 2021年
作者: Li, Tianping Liu, Zhifeng Qiao, Jianping Key Laboratory of Medical Physics and Image Processing in Shandong Province Shandong Provincial Key Laboratory for Distributed Computer Software Novel Technology Shandong Normal University School of Physics and Electronics Jinan Shandong China School of Physics and Electronics Shandong Normal University JinanShandong China School of Physics and Electronics Shandong Normal University Jinan China
With the advancement of IoT and artificial intelligence technologies, and the need for rapid application growth in fields such as security entrance control and financial business trade, facial information processing h... 详细信息
来源: 评论
Corrections to “Brain-Inspired Computing: A Systematic Survey and Future Trends”
收藏 引用
Proceedings of the IEEE 2025年 第12期112卷 1850-1850页
作者: Guoqi Li Lei Deng Huajin Tang Gang Pan Yonghong Tian Kaushik Roy Wolfgang Maass Institute of Automation Chinese Academy of Sciences Beijing China Key Laboratory of Brain Cognition and Brain-inspired Intelligence Technology Chinese Academy of Sciences Beijing China Peng Cheng Laboratory Shenzhen China Department of Precision Instrument Tsinghua University Beijing China State Key Laboratory of Brain-Machine Intelligence College of Computer Science and Technology MOE Frontier Science Center for Brain Science and Brain-Machine Integration Zhejiang University Hangzhou China Department of Computer Science Peking University Beijing China School of Electrical and Computer Engineering Purdue University West Lafayette IN USA School of Computer Science Graz University of Technology Graz Austria
Presents corrections to the paper, (Corrections to “Brain-Inspired Computing: A Systematic Survey and Future Trends”).
来源: 评论
Spatio-Temporal meets Wavelet: Disentangled Traffic Flow Forecasting via Efficient Spectral Graph Attention Network
arXiv
收藏 引用
arXiv 2021年
作者: Fang, Yuchen Qin, Yanjun Luo, Haiyong Zhao, Fang Xu, Bingbing Wang, Chenxing Zeng, Liang School of Computer Science National Pilot Software Engineering School Beijing University of Posts and Telecommunications China Research Center for Ubiquitous Computing Systems Institute of Computing Technology Chinese Academy of Sciences China CAS Key Laboratory of Network Data Science and Technology Institute of Computing Technology Chinese Academy of Sciences China Tsinghua University China
Traffic forecasting is crucial for public safety and resource optimization, yet is very challenging due to three aspects: i) current existing works mostly exploit intricate temporal patterns (e.g., the short-term thun... 详细信息
来源: 评论